João Pereira
e2ee31405d
Merge pull request #3343 from thaJeztah/update_slack_channel
...
Update slack channel to CNCF slack
2021-01-30 10:20:46 +00:00
Chris Patterson
ae2bedd3b9
Merge pull request #3344 from distribution/actions-fix-push
...
Fixing push workflow
2021-01-29 15:56:47 -05:00
Chris Patterson
402d3c943a
Fixing push workflow
...
Signed-off-by: Chris Patterson <chrispat@github.com>
2021-01-29 15:48:07 -05:00
Chris Patterson
be3670387f
Merge pull request #3338 from chrispat/actions-ci
...
Adding first draft of CI on GitHub Actions
2021-01-29 15:06:59 -05:00
Chris Patterson
64874d17b1
First draft of actions based ci
...
Signed-off-by: Chris Patterson <chrispat@github.com>
2021-01-29 14:40:09 -05:00
Sebastiaan van Stijn
b431b34fb8
update slack channel to CNCF slack
...
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-01-28 22:53:44 +01:00
Justin Cormack
13407c9e33
Merge pull request #3337 from SteveLasker/maintainer-update
...
Adding Steve Lasker as a maintainer
2021-01-28 13:48:53 +00:00
Steve Lasker
239c368ff6
Per distribution call, adding Steve Lasker as a maintainer to help with OCI and Notary collaboration.
...
Signed-off-by: Steve Lasker <stevenlasker@hotmail.com>
2021-01-27 09:38:17 -08:00
Justin Cormack
a91f895a50
Merge pull request #3335 from justincormack/milos
...
Replace Arko with Milos as a maintainer
2021-01-26 12:12:58 +00:00
Justin Cormack
c30c5b31b5
Replace Arko with Milos as a maintainer
...
Thanks for all the work Arko, and welcome Milos!
Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2021-01-26 12:11:02 +00:00
Justin Cormack
5b27a7fc8b
Merge pull request #3334 from justincormack/roadmap
...
Update roadmap
2021-01-26 11:39:23 +00:00
Justin Cormack
67c504de8b
Update roadmap, add code of conduct file
...
Most of the roadmap was written in 2015 and switching from the older registry...
Remove reference to Docker prior to CNCF donation.
Add code of conduct file, already in Governance file.
Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2021-01-26 11:34:53 +00:00
Arko Dasgupta
35f1369d37
Merge pull request #3314 from crazy-max/dummy
...
Dummy workflow to enable GitHub Actions
2020-12-18 15:39:20 -08:00
CrazyMax
07b948ea67
Dummy workflow to enable GitHub Actions
...
Signed-off-by: CrazyMax <crazy-max@users.noreply.github.com>
2020-12-19 00:35:45 +01:00
Arko Dasgupta
5ce1d85565
Merge pull request #3302 from ricardomaraschini/empty-prefixes-aws
...
Ignore self reference object on empty prefix
2020-12-18 08:02:41 -08:00
Arko Dasgupta
1057ff723b
Merge pull request #3306 from justincormack/adopters
...
Add Adopters
2020-12-13 18:39:09 -08:00
Justin Cormack
2d16db2ae7
Add Adopters
...
Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2020-12-09 17:44:18 +00:00
Justin Cormack
2db6df4cf1
Merge pull request #3303 from justincormack/new-maintainers
...
Add new maintainers
2020-12-09 10:45:12 +00:00
Justin Cormack
d11c4f9ade
Add new maintainers
...
Maintainers from Docker, GitHub, GitLab, Digital Ocean, Harbor.
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2020-12-07 16:49:54 +00:00
Ricardo Maraschini
87cbd09fa7
Ignore self reference object on empty prefix
...
When a given prefix is empty and we attempt to list its content AWS
returns that the prefix contains one object with key defined as the
prefix with an extra "/" at the end.
e.g.
If we call ListObjects() passing to it an existing but empty prefix,
say "my/empty/prefix", AWS will return that "my/empty/prefix/" is an
object inside "my/empty/prefix" (ListObjectsOutput.Contents).
This extra "/" causes the upload purging process to panic. On normal
circunstances we never find empty prefixes on S3 but users may touch
it.
Signed-off-by: Ricardo Maraschini <rmarasch@redhat.com>
2020-11-30 13:04:14 +01:00
Arko Dasgupta
551158e600
Merge pull request #3289 from Smasherr/master
...
#3288 Remove empty Content-Type header
2020-11-13 18:03:30 -08:00
Arko Dasgupta
f4506b517a
Merge pull request #3237 from olegburov/bump-gorilla-mux
...
Upgrade Gorilla Mux to `1.8.0`.
2020-11-05 13:23:17 -08:00
Arko Dasgupta
065aec5688
Merge pull request #3239 from olegburov/bump-redigo
...
Upgrade Redigo to `1.8.2`.
2020-11-04 18:19:51 -08:00
Smasherr
c8d90f904f
Remove empty Content-Type header
...
Fixes #3288
Signed-off-by: Smasherr <soundcracker@gmail.com>
2020-11-03 12:24:02 +01:00
Arko Dasgupta
f5cdc24dd3
Merge pull request #3245 from olegburov/reopen-pr-2973
...
Reopen PR #2973 (Support ECS TaskRole in S3 storage driver).
2020-10-28 17:30:56 -07:00
olegburov
34f1322664
Fix hardcoded credential provides.
...
Signed-off-by: olegburov <oleg.burov@outlook.com>
2020-09-02 17:32:34 -07:00
olegburov
264e26fd8c
Bump Redigo to v1.8.2
.
...
Signed-off-by: olegburov <oleg.burov@outlook.com>
2020-08-31 18:07:54 -07:00
olegburov
545596ae2c
Bump Gorilla Mux to v1.8.0
.
...
Signed-off-by: olegburov <oleg.burov@outlook.com>
2020-08-31 08:54:44 -07:00
Manish Tomar
2800ab0224
Merge pull request #2973 from redmatter/support-ecs-instance-profile-in-s3-driver
...
Support ECS TaskRole in S3 storage driver
2020-08-26 15:24:20 -07:00
Manish Tomar
5dc1f65acc
Merge pull request #3224 from AndreasHassing/fix/bad-pointer-windows-EnableVirtualTerminalProcessing
...
Update logrus to v1.6.0, fixes #3223
2020-08-24 15:04:52 -07:00
Manish Tomar
fe1ffa86bc
Merge pull request #3226 from thaJeztah/bump_go_digest
...
vendor: opencontainers/go-digest v1.0.0
2020-08-24 10:50:21 -07:00
Sebastiaan van Stijn
8a8d91529d
vendor: opencontainers/go-digest v1.0.0
...
full diff: https://github.com/opencontainers/go-digest/compare/v1.0.0-rc1...v1.0.0
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2020-08-24 18:46:53 +02:00
Andreas Hassing
9466dd4e5a
Update logrus to v1.6.0
...
Fixes #3223 by bumping logrus to v1.6.0, which in turn bumps
github.com/konsorten/go-windows-terminal-sequences to v1.0.3
wherein the fix to bad pointer is found.
Signed-off-by: Andreas Hassing <andreas@famhassing.dk>
2020-08-24 13:14:04 +02:00
Manish Tomar
0316f34bf2
Merge pull request #3118 from lawliet89/bump-aws-sdk
...
Bump AWS SDK to v1.34.9
2020-08-21 15:57:08 -07:00
Yong Wen Chua
e1464fd317
Bump AWS SDK
...
Fixes https://github.com/docker/distribution/issues/3097
Signed-off-by: Yong Wen Chua <lawliet89@users.noreply.github.com>
2020-08-21 17:35:24 +08:00
Derek McGowan
35b26def43
Merge pull request #3173 from adamwg/catalog-no-layers-upstream
...
catalog: List repositories with no unique layers
2020-08-07 23:12:18 -07:00
Adam Wolfe Gordon
a784441b62
catalog: List repositories with no unique layers
...
A repository need not contain any unique layers, if its images use only layers
mounted from other repositories. But, the catalog endpoint was looking for the
_layers directory to indicate that a directory was a repository.
Use the _manifests directory as the marker instead, since any repository with
revisions will contain a _manifests directory.
Signed-off-by: Adam Wolfe Gordon <awg@digitalocean.com>
2020-08-04 11:38:49 -06:00
Manish Tomar
1d0ea8ed7b
Merge pull request #3140 from linux-on-ibm-z/travis-s390x
...
Add s390x support for travis
2020-07-30 16:15:55 -07:00
Derek McGowan
208d68bd5c
Merge pull request #3209 from zhipengzuo/master
...
clean up code because err is always nil
2020-07-22 09:18:06 -07:00
zhipengzuo
f361d443b7
clean up code because err is always nil
...
Signed-off-by: zhipengzuo <zuozhipeng@baidu.com>
2020-07-22 10:54:46 +08:00
Derek McGowan
53e18a9d9b
Merge pull request #3196 from thaJeztah/add_redirect
...
docs: add redirect for old URL
2020-07-08 16:08:24 -07:00
Sebastiaan van Stijn
7728c5e445
docs: add redirect for old URL
...
Looks like there's some projects refering to this old URL:
https://grep.app/search?q=https%3A//docs.docker.com/reference/api/registry_api/
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2020-07-08 12:18:31 +02:00
Andrew Bulford
9690d843fa
Support ECS TaskRole in S3 storage driver
...
Instead of constructing the list of credential providers manually, if we
use the default list we can take advantage of the AWS SDK checking the
environment and returning either the EC2RoleProvider or the generic HTTP
credentials provider, configured to use the ECS credentials endpoint.
Also, use the `defaults.Config()` function instead of `aws.NewConfig()`,
as this results in an initialised HTTP client which prevents a fatal
error when retrieving credentials from the ECS credentials endpoint.
Fixes #2960
Signed-off-by: Andrew Bulford <andrew.bulford@redmatter.com>
2020-07-01 08:42:56 +01:00
Sebastiaan van Stijn
62d0fd45e7
Merge pull request #3187 from bloodorangeio/fix-ci
...
Fix CI failures, upgrade to Go 1.14+
2020-06-29 19:14:34 +02:00
jdolitsky
81ba770eff
Fix CI failures, upgrade to Go 1.14+
...
- Modify Travis manifest to use Go 1.14.x
- Hardcode version of golangci-lint in setup script
- Hardcode version of go-md2man in setup script
Signed-off-by: jdolitsky <393494+jdolitsky@users.noreply.github.com>
2020-06-26 10:59:50 -05:00
srajmane
a2ed1b5e80
Added dist: bionic, updated go version to 1.14.x and set GO111MODULE=on
...
Signed-off-by: Snehal Rajmane <srajmane@us.ibm.com>
2020-04-29 03:25:24 -07:00
srajmane
55f88c35b9
Adding s390x support.
...
Signed-off-by: Snehal Rajmane <srajmane@us.ibm.com>
2020-04-07 07:59:19 -07:00
Derek McGowan
742aab907b
Merge pull request #3127 from dmage/err-shadow
...
Fix err shadowing in gcs driver
2020-03-19 10:36:57 -07:00
Derek McGowan
17a394f9af
Merge pull request #3128 from dmcgowan/gosimple-fix
...
Fix gosimple checks
2020-03-18 16:06:17 -07:00
Derek McGowan
78c2ab6646
Fix gosimple checks
...
Signed-off-by: Derek McGowan <derek@mcgstyle.net>
2020-03-18 15:52:34 -07:00