-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature] Allow hauler to keep upstream registry information #232
Comments
I mentioned in #241 that a potential alternative solution to this could be a manifest rewrite rule:
for example. |
Hey @clausa, thanks for submitting this issue. I do understand the use case of persisting the upstream registry information, but I would disagree a bit on the important of persisting it, since most user cases would want to have the seamless experience between the internet connected and disconnected or airgapped environments and only need to update the registry FQDN/IP/PORT. I think implementing an option to persist registry information might be a good non-defaulted solution, but I would rather prioritize a rewrite function short term and allow the user to call it out themselves, like @ngearhart suggested. @amartin120 any thoughts on this? |
@zackbradys wrote (emphasis mine):
/endorsed Moreover, we shouldn't really consider patching oci manifests that pass through Hauler without somehow communicating, upfront and loud every time, that the resulting content addresses (aka sha256 content digests) of the manifests themselves will change (tags will point to different digests) to be unique per source registry (which would be very unexpected for the vast majority of use cases). If we are talking about patching hauler manifests, however, we already have the ability to be explicit about where the content will be or was pulled from via fully-qualified image refs therein, provided we also include the manifest as a file in the haul. I am not comfortable mutating content as a side effect. We should consider a new |
I think the rewrite feature will allow us to do whats needed - for now. |
Bumping because this is a feature I prefer when laying out my air-gapped repos, e.i. |
Is this RFE related to an Existing Problem? If so, please describe:
When adding images, information about origin or upstream registry (fqdn:port) is removed.
This could eventually lead to clashes on the receiving / air-gapped registry, if two different, but similarly named and versioned images, are copied over.
Describe Proposed Solution(s):
Keeping upstream info would also make it somewhat simpler to patch deployment manifests on air-gapped side, as one would just have to prepend the local registry:
quay.io/prometheus/alertmanager:v0.27.0
becomes:localregistry:5000/quay.io/prometheus/alertmanager:v0.27.0
instead of:
quay.io/prometheus/alertmanager:v0.27.0
->localregistry:5000/prometheus/alertmanager:v0.27.0
(where you have to remove the registry part of the image reference, before prepending the local registry)
Describe Possible Alternatives:
Additional Context:
The text was updated successfully, but these errors were encountered: