Skip to content

Commit c28bad0

Browse files
committed
Add new cosa copy-container
This command supports copying images between registries, optionally converting a manifest list into multiple images tagged by architecture. This will be used by the pipeline to copy RHCOS images from their canonical Quay.io location to registry.ci.openshift.org.
1 parent f9418fd commit c28bad0

File tree

3 files changed

+180
-1
lines changed

3 files changed

+180
-1
lines changed

cmd/coreos-assembler.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import (
1515
var buildCommands = []string{"init", "fetch", "build", "run", "prune", "clean", "list"}
1616
var advancedBuildCommands = []string{"buildfetch", "buildupload", "oc-adm-release", "push-container", "upload-oscontainer", "buildextend-extensions", "create-legacy-oscontainer"}
1717
var buildextendCommands = []string{"aliyun", "aws", "azure", "digitalocean", "exoscale", "gcp", "ibmcloud", "kubevirt", "live", "metal", "metal4k", "nutanix", "openstack", "qemu", "secex", "virtualbox", "vmware", "vultr"}
18-
var utilityCommands = []string{"aws-replicate", "build-extensions-container", "compress", "generate-hashlist", "koji-upload", "kola", "push-container-manifest", "remote-build-container", "remote-prune", "remote-session", "sign", "update-variant"}
18+
var utilityCommands = []string{"aws-replicate", "build-extensions-container", "compress", "copy-container", "generate-hashlist", "koji-upload", "kola", "push-container-manifest", "remote-build-container", "remote-prune", "remote-session", "sign", "update-variant"}
1919
var otherCommands = []string{"shell", "meta"}
2020

2121
func init() {

src/cmd-copy-container

+132
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
#!/usr/bin/python3
2+
3+
# This is a glorified wrapper around `skopeo copy` but with support for
4+
# "deconstructing" a manifest-listed image to copy into a registry that does
5+
# not support it.
6+
7+
import argparse
8+
import json
9+
import sys
10+
11+
from cosalib.cmdlib import runcmd
12+
13+
EXAMPLE_USAGE = """examples:
14+
cosa copy-container --tag=main --tag=4.12 \\
15+
quay.io/jlebon/coreos-assembler \\
16+
quay.io/dustymabe/coreos-assembler
17+
18+
cosa copy-container --authfile=auth.json --tag=stable \\
19+
quay.io/jlebon/fedora-coreos \\
20+
registry.ci.openshift.org/jlebon/fedora-coreos
21+
"""
22+
23+
MEDIA_TYPE_IMAGE_INDEX = 'application/vnd.oci.image.index.v1+json'
24+
25+
26+
def main():
27+
args = parse_args()
28+
29+
# verify no tag is provided in src and dest
30+
for s in [args.src_repo, args.dest_repo]:
31+
if ':' in s:
32+
raise Exception(f"Invalid repo '{s}': use --tag to provide tags")
33+
34+
# if fallback is enabled, let's check upfront if dest registry supports
35+
# manifest lists
36+
if args.manifest_list_to_arch_tag == 'never':
37+
keep_manifest_lists = True
38+
elif args.manifest_list_to_arch_tag == 'always':
39+
keep_manifest_lists = False
40+
elif args.manifest_list_to_arch_tag == 'auto':
41+
keep_manifest_lists = registry_supports_manifest_lists(args.dest_repo)
42+
else:
43+
assert False, f"unreachable: {args.manifest_list_to_arch_tag}"
44+
45+
for tag in args.tags:
46+
copies = {}
47+
if keep_manifest_lists:
48+
copies[f'{args.src_repo}:{tag}'] = f'{args.dest_repo}:{tag}'
49+
else:
50+
inspect = skopeo_inspect(f'{args.src_repo}:{tag}', args.authfile)
51+
if inspect.get('mediaType') != MEDIA_TYPE_IMAGE_INDEX:
52+
# src is not manifest listed, so no arch peeling needed
53+
copies[f'{args.src_repo}:{tag}'] = f'{args.dest_repo}:{tag}'
54+
else:
55+
for manifest in inspect['manifests']:
56+
digest = manifest['digest']
57+
arch = manifest['platform']['architecture']
58+
final_tag = f'{tag}-{arch}'
59+
copies[f'{args.src_repo}@{digest}'] = f'{args.dest_repo}:{final_tag}'
60+
61+
for pullspec, pushspec in copies.items():
62+
skopeo_copy(pullspec, args.authfile, pushspec, args.dest_authfile,
63+
args.v2s2)
64+
65+
66+
def skopeo_inspect(fqin, authfile):
67+
args = ['skopeo', 'inspect', '--raw']
68+
if authfile:
69+
args += ['--authfile', authfile]
70+
return run_get_json(args + [f'docker://{fqin}'])
71+
72+
73+
def skopeo_copy(pullspec, src_authfile, pushspec, dest_authfile, v2s2):
74+
args = ['skopeo', 'copy', '--all', '--quiet']
75+
if src_authfile and dest_authfile:
76+
args += ['--src-authfile', src_authfile,
77+
'--dest-authfile', dest_authfile]
78+
# assume --authfile applies to both src and dest
79+
elif src_authfile:
80+
args += ['--authfile', src_authfile]
81+
elif dest_authfile:
82+
args += ['--dest-authfile', dest_authfile]
83+
if v2s2:
84+
args += ['--format=v2s2', '--remove-signatures']
85+
runcmd(args + [f'docker://{pullspec}', f'docker://{pushspec}'])
86+
87+
88+
# XXX: dedupe with oscontainer-deprecated-legacy-format.py
89+
def run_get_json(args):
90+
return json.loads(runcmd(args, capture_output=True).stdout)
91+
92+
93+
def registry_supports_manifest_lists(repo):
94+
# XXX: Ideally here, we'd figure out a way to query the registry to know if
95+
# manifest lists are supported. For now, just hardcode known cases.
96+
if repo.startswith("quay.io/"):
97+
return True
98+
if repo.startswith("registry.ci.openshift.org/"):
99+
return False
100+
# assume manifest lists are supported
101+
return True
102+
103+
104+
def parse_args():
105+
parser = argparse.ArgumentParser(
106+
prog="cosa copy-container",
107+
usage="%(prog)s [OPTION...] --tag=TAG ... SRC_REPO DEST_REPO",
108+
description="Copy a container from one location to another.",
109+
epilog=EXAMPLE_USAGE,
110+
formatter_class=argparse.RawDescriptionHelpFormatter)
111+
112+
parser.add_argument("--authfile", help="A file to use for registry auth")
113+
parser.add_argument("--dest-authfile",
114+
help="A file to use for dest registry auth")
115+
# could support a `--tag SRC_TAG:DEST_TAG` syntax in the future if needed
116+
parser.add_argument("--tag", required=True, dest='tags', action='append',
117+
help="The tag of the manifest to use")
118+
parser.add_argument('--v2s2', action='store_true',
119+
help='Use old image manifest version 2 schema 2 format')
120+
parser.add_argument("--manifest-list-to-arch-tag",
121+
choices=["always", "never", "auto"], default="auto",
122+
help="""Whether source images using manifest lists are
123+
converted to use `-${arch}` tag suffixes in the
124+
destination repo. `auto` enables the feature only if the
125+
destination registry doesn't support manifest lists.""")
126+
parser.add_argument('src_repo', help='Repo from which to copy')
127+
parser.add_argument('dest_repo', help='Repo to which to copy')
128+
return parser.parse_args()
129+
130+
131+
if __name__ == '__main__':
132+
sys.exit(main())

tests/test-cmd-copy-container.sh

+47
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
#!/bin/bash
2+
set -xeuo pipefail
3+
4+
# NOTE: both destination repos must be empty before starting
5+
6+
SRC_REPO=quay.io/jlebon/fedora-coreos
7+
DEST_REPO_QUAY=quay.io/jlebon/fedora-coreos-2
8+
DEST_REPO_QUAY_AUTHFILE=dest.quay.auth.json
9+
DEST_REPO_APPCI=registry.ci.openshift.org/coreos/jlebon-fedora-coreos-test
10+
DEST_REPO_APPCI_AUTHFILE=dest.appci.auth.json
11+
12+
fatal() {
13+
echo "$@"
14+
exit 1
15+
}
16+
17+
# copy to quay.io; auto-default to preserving manifest list
18+
cosa copy-container --dest-authfile "${DEST_REPO_QUAY_AUTHFILE}" \
19+
--tag=stable --tag=stable-single "${SRC_REPO}" "${DEST_REPO_QUAY}"
20+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable" | grep -q manifests
21+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-amd64" && fatal "expected missing"
22+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-arm64" && fatal "expected missing"
23+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-s390x" && fatal "expected missing"
24+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-single" | grep -q layers
25+
26+
# copy to quay.io; force arch tag
27+
cosa copy-container --dest-authfile "${DEST_REPO_QUAY_AUTHFILE}" \
28+
--tag=stable --manifest-list-to-arch-tag=always \
29+
"${SRC_REPO}" "${DEST_REPO_QUAY}"
30+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-amd64" | grep -q layers
31+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-arm64" | grep -q layers
32+
skopeo inspect --raw "docker://${DEST_REPO_QUAY}:stable-s390x" | grep -q layers
33+
34+
# copy to registry.ci; auto-default to arch tag transform
35+
cosa copy-container --dest-authfile "${DEST_REPO_APPCI_AUTHFILE}" \
36+
--tag=stable --tag=stable-single "${SRC_REPO}" "${DEST_REPO_APPCI}"
37+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable" && fatal "expected missing"
38+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable-amd64" | grep -q layers
39+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable-arm64" | grep -q layers
40+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable-s390x" | grep -q layers
41+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable-single" | grep -q layers
42+
43+
# copy in v2s2 mode
44+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable-single" | grep -q vnd.oci.image.config.v1
45+
cosa copy-container --dest-authfile "${DEST_REPO_APPCI_AUTHFILE}" \
46+
--tag=stable-single --v2s2 "${SRC_REPO}" "${DEST_REPO_APPCI}"
47+
skopeo inspect --raw "docker://${DEST_REPO_APPCI}:stable-single" | grep -q vnd.docker.distribution.manifest.v2

0 commit comments

Comments
 (0)