2024-06-09 09:27:06 +02:00
|
|
|
import json
|
|
|
|
import logging
|
2024-06-07 07:28:49 +02:00
|
|
|
from pathlib import Path
|
2024-06-09 09:27:06 +02:00
|
|
|
import tempfile
|
|
|
|
|
|
|
|
import requests
|
|
|
|
|
|
|
|
from .environment import DockerTarget, RelengEnvironment
|
|
|
|
from .version import VERSION, MAJOR
|
|
|
|
from . import gitutils
|
|
|
|
from .docker_assemble import Registry, OCIIndex, OCIIndexItem
|
|
|
|
from . import docker_assemble
|
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
log.setLevel(logging.INFO)
|
2024-06-07 07:28:49 +02:00
|
|
|
|
|
|
|
def check_all_logins(env: RelengEnvironment):
|
|
|
|
for target in env.docker_targets:
|
|
|
|
check_login(target)
|
|
|
|
|
|
|
|
def check_login(target: DockerTarget):
|
2024-06-14 02:04:07 +02:00
|
|
|
log.info('Checking login for %s', target.registry_name)
|
2024-06-07 07:28:49 +02:00
|
|
|
skopeo login @(target.registry_name())
|
|
|
|
|
2024-06-09 09:27:06 +02:00
|
|
|
def upload_docker_images(target: DockerTarget, paths: list[Path]):
|
|
|
|
if not paths: return
|
|
|
|
|
|
|
|
sess = requests.Session()
|
|
|
|
sess.headers['User-Agent'] = 'lix-releng'
|
|
|
|
|
|
|
|
tag_names = [DockerTarget.resolve(tag, version=VERSION, major=MAJOR) for tag in target.tags]
|
|
|
|
|
|
|
|
# latest only gets tagged for the current release branch of Lix
|
|
|
|
if not gitutils.is_maintenance_branch('HEAD'):
|
|
|
|
tag_names.append('latest')
|
|
|
|
|
|
|
|
meta = {}
|
|
|
|
|
|
|
|
reg = docker_assemble.Registry(sess)
|
|
|
|
manifests = []
|
|
|
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmp:
|
|
|
|
tmp = Path(tmp)
|
|
|
|
|
|
|
|
for path in paths:
|
|
|
|
digest_file = tmp / (path.name + '.digest')
|
2024-06-14 02:04:07 +02:00
|
|
|
|
2024-06-28 22:56:11 +02:00
|
|
|
inspection = json.loads($(skopeo inspect docker-archive:@(path)))
|
2024-06-09 09:27:06 +02:00
|
|
|
|
|
|
|
docker_arch = inspection['Architecture']
|
|
|
|
docker_os = inspection['Os']
|
|
|
|
meta = inspection['Labels']
|
|
|
|
|
2024-06-09 10:26:21 +02:00
|
|
|
log.info('Pushing image %s for %s to %s', path, docker_arch, target.registry_path)
|
2024-06-09 09:27:06 +02:00
|
|
|
|
2024-06-28 22:56:11 +02:00
|
|
|
# insecure-policy: we don't have any signature policy, we are just uploading an image
|
|
|
|
skopeo --insecure-policy copy --digestfile @(digest_file) --all docker-archive:@(path) f'docker://{target.registry_path}@@unknown-digest@@'
|
2024-06-09 09:27:06 +02:00
|
|
|
digest = digest_file.read_text().strip()
|
|
|
|
|
|
|
|
# skopeo doesn't give us the manifest size directly, so we just ask the registry
|
|
|
|
metadata = reg.image_info(target.registry_path, digest)
|
|
|
|
|
|
|
|
manifests.append(OCIIndexItem(metadata=metadata, architecture=docker_arch, os=docker_os))
|
|
|
|
|
2024-06-09 10:26:21 +02:00
|
|
|
log.info('Pushed images to %r, building a bigger and more menacing manifest from %r with metadata %r', target, manifests, meta)
|
2024-06-09 09:27:06 +02:00
|
|
|
# send the multiarch manifest to each tag
|
|
|
|
index = OCIIndex(manifests=manifests, annotations=meta)
|
|
|
|
for tag in tag_names:
|
|
|
|
reg.upload_index(target.registry_path, tag, index)
|