|
| 1 | +#!/usr/bin/python3 |
| 2 | + |
| 3 | +# This is a glorified wrapper around `skopeo copy` but with support for |
| 4 | +# "deconstructing" a manifest-listed image to copy into a registry that does |
| 5 | +# not support it. |
| 6 | + |
| 7 | +import argparse |
| 8 | +import json |
| 9 | +import sys |
| 10 | + |
| 11 | +from cosalib.cmdlib import runcmd |
| 12 | + |
| 13 | +EXAMPLE_USAGE = """examples: |
| 14 | + cosa copy-container --tag=main --tag=4.12 \\ |
| 15 | + quay.io/jlebon/coreos-assembler \\ |
| 16 | + quay.io/dustymabe/coreos-assembler |
| 17 | +
|
| 18 | + cosa copy-container --authfile=auth.json --tag=stable \\ |
| 19 | + quay.io/jlebon/fedora-coreos \\ |
| 20 | + registry.ci.openshift.org/jlebon/fedora-coreos |
| 21 | +""" |
| 22 | + |
| 23 | +MEDIA_TYPE_IMAGE_INDEX = 'application/vnd.oci.image.index.v1+json' |
| 24 | + |
| 25 | + |
| 26 | +def main(): |
| 27 | + args = parse_args() |
| 28 | + |
| 29 | + # verify no tag is provided in src and dest |
| 30 | + for s in [args.src_repo, args.dest_repo]: |
| 31 | + if ':' in s: |
| 32 | + raise Exception(f"Invalid repo '{s}': use --tag to provide tags") |
| 33 | + |
| 34 | + # if fallback is enabled, let's check upfront if dest registry supports |
| 35 | + # manifest lists |
| 36 | + if args.manifest_list_to_arch_tag == 'never': |
| 37 | + keep_manifest_lists = True |
| 38 | + elif args.manifest_list_to_arch_tag == 'always': |
| 39 | + keep_manifest_lists = False |
| 40 | + elif args.manifest_list_to_arch_tag == 'auto': |
| 41 | + keep_manifest_lists = registry_supports_manifest_lists(args.dest_repo) |
| 42 | + else: |
| 43 | + assert False, f"unreachable: {args.manifest_list_to_arch_tag}" |
| 44 | + |
| 45 | + for tag in args.tags: |
| 46 | + copies = {} |
| 47 | + if keep_manifest_lists: |
| 48 | + copies[f'{args.src_repo}:{tag}'] = f'{args.dest_repo}:{tag}' |
| 49 | + else: |
| 50 | + inspect = skopeo_inspect(f'{args.src_repo}:{tag}', args.authfile) |
| 51 | + if inspect.get('mediaType') != MEDIA_TYPE_IMAGE_INDEX: |
| 52 | + # src is not manifest listed, so no arch peeling needed |
| 53 | + copies[f'{args.src_repo}:{tag}'] = f'{args.dest_repo}:{tag}' |
| 54 | + else: |
| 55 | + for manifest in inspect['manifests']: |
| 56 | + digest = manifest['digest'] |
| 57 | + arch = manifest['platform']['architecture'] |
| 58 | + final_tag = f'{tag}-{arch}' |
| 59 | + copies[f'{args.src_repo}@{digest}'] = f'{args.dest_repo}:{final_tag}' |
| 60 | + |
| 61 | + for pullspec, pushspec in copies.items(): |
| 62 | + skopeo_copy(pullspec, args.authfile, pushspec, args.dest_authfile, |
| 63 | + args.v2s2) |
| 64 | + |
| 65 | + |
| 66 | +def skopeo_inspect(fqin, authfile): |
| 67 | + args = ['skopeo', 'inspect', '--raw'] |
| 68 | + if authfile: |
| 69 | + args += ['--authfile', authfile] |
| 70 | + return run_get_json(args + [f'docker://{fqin}']) |
| 71 | + |
| 72 | + |
| 73 | +def skopeo_copy(pullspec, src_authfile, pushspec, dest_authfile, v2s2): |
| 74 | + args = ['skopeo', 'copy', '--all', '--quiet'] |
| 75 | + if src_authfile and dest_authfile: |
| 76 | + args += ['--src-authfile', src_authfile, |
| 77 | + '--dest-authfile', dest_authfile] |
| 78 | + # assume --authfile applies to both src and dest |
| 79 | + elif src_authfile: |
| 80 | + args += ['--authfile', src_authfile] |
| 81 | + elif dest_authfile: |
| 82 | + args += ['--dest-authfile', dest_authfile] |
| 83 | + if v2s2: |
| 84 | + args += ['--format=v2s2', '--remove-signatures'] |
| 85 | + runcmd(args + [f'docker://{pullspec}', f'docker://{pushspec}']) |
| 86 | + |
| 87 | + |
| 88 | +# XXX: dedupe with oscontainer-deprecated-legacy-format.py |
| 89 | +def run_get_json(args): |
| 90 | + return json.loads(runcmd(args, capture_output=True).stdout) |
| 91 | + |
| 92 | + |
| 93 | +def registry_supports_manifest_lists(repo): |
| 94 | + # XXX: Ideally here, we'd figure out a way to query the registry to know if |
| 95 | + # manifest lists are supported. For now, just hardcode known cases. |
| 96 | + if repo.startswith("quay.io/"): |
| 97 | + return True |
| 98 | + if repo.startswith("registry.ci.openshift.org/"): |
| 99 | + return False |
| 100 | + # assume manifest lists are supported |
| 101 | + return True |
| 102 | + |
| 103 | + |
| 104 | +def parse_args(): |
| 105 | + parser = argparse.ArgumentParser( |
| 106 | + prog="cosa copy-container", |
| 107 | + usage="%(prog)s [OPTION...] --tag=TAG ... SRC_REPO DEST_REPO", |
| 108 | + description="Copy a container from one location to another.", |
| 109 | + epilog=EXAMPLE_USAGE, |
| 110 | + formatter_class=argparse.RawDescriptionHelpFormatter) |
| 111 | + |
| 112 | + parser.add_argument("--authfile", help="A file to use for registry auth") |
| 113 | + parser.add_argument("--dest-authfile", |
| 114 | + help="A file to use for dest registry auth") |
| 115 | + # could support a `--tag SRC_TAG:DEST_TAG` syntax in the future if needed |
| 116 | + parser.add_argument("--tag", required=True, dest='tags', action='append', |
| 117 | + help="The tag of the manifest to use") |
| 118 | + parser.add_argument('--v2s2', action='store_true', |
| 119 | + help='Use old image manifest version 2 schema 2 format') |
| 120 | + parser.add_argument("--manifest-list-to-arch-tag", |
| 121 | + choices=["always", "never", "auto"], default="auto", |
| 122 | + help="""Whether source images using manifest lists are |
| 123 | + converted to use `-${arch}` tag suffixes in the |
| 124 | + destination repo. `auto` enables the feature only if the |
| 125 | + destination registry doesn't support manifest lists.""") |
| 126 | + parser.add_argument('src_repo', help='Repo from which to copy') |
| 127 | + parser.add_argument('dest_repo', help='Repo to which to copy') |
| 128 | + return parser.parse_args() |
| 129 | + |
| 130 | + |
| 131 | +if __name__ == '__main__': |
| 132 | + sys.exit(main()) |
0 commit comments