Manish Tomar
8f6758278d
take handler update
...
forgot to commit this earlier
Signed-off-by: Manish Tomar <manish.tomar@docker.com>
2018-08-02 23:13:37 -07:00
Manish Tomar
328069bb4d
add support for repo deleted event also
...
by having another interface RepositoryRemover that is implemented by
registry instance and is injected in app context for event tracking
Signed-off-by: Manish Tomar <manish.tomar@docker.com>
2018-08-02 23:05:05 -07:00
Derek McGowan
dc49f84dcc
Update build to use travis
...
Update Makefile targets
Signed-off-by: Derek McGowan <derek@mcgstyle.net>
2018-08-01 16:54:54 -07:00
Andrew Leung
54aef6251e
Fix typo in manifestLayers variable name
...
Signed-off-by: Andrew Leung <anwleung@gmail.com>
2018-07-29 08:01:21 -07:00
Derek McGowan
0dae0957e5
Merge pull request #2076 from mikebrow/ocitype
...
Adds support for oci manifests and manifestlists
2018-07-20 10:21:23 -07:00
Mike Brown
20aecf1d7b
added test for initial oci schema version
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-07-19 19:41:31 -05:00
Mike Brown
5f588fbf9b
address review comment regarding panic use
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-07-19 16:07:26 -05:00
Manish Tomar
0d8f4ac7b8
add tag deletion event
...
whenever a tag is deleted an event is sent out via the regular
notification channels
Signed-off-by: Manish Tomar <manish.tomar@docker.com>
2018-07-18 11:34:09 -07:00
Andrew Leung
276fdce3d9
Add configurable layers in manifest events
...
Signed-off-by: Andrew Leung <anwleung@gmail.com>
2018-06-27 09:27:24 -07:00
sun jian
955f7ef68b
fix: configuration reference link
...
configuration.md not found.
2018-06-27 22:21:05 +08:00
Mike Brown
e8d7941ca6
address lint and gofmt issues
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-25 15:45:15 -05:00
Huu Nguyen
f5c6357c6d
Update s3_test to account for SkipVerify parameter
...
Signed-off-by: Huu Nguyen <whoshuu@gmail.com>
2018-06-22 12:00:28 -07:00
Huu Nguyen
7655a3d91f
Add option to skip certificate verification for the s3 driver
...
Signed-off-by: Huu Nguyen <whoshuu@gmail.com>
2018-06-22 12:00:21 -07:00
Per Lundberg
8112d01b9b
nginx.md: Add note about potential security isues
...
I thought about this while setting this up, and then found this guide (I was setting it up without the guide first.)
The potential security implications are important, so I think we should mention them here on this web page. (We could even go further by outright _warning_ people about this, but perhaps letting people know about it so they can make an informed decision is a better way to go. This can be perfectly fine for certain intranet scenarios.)
2018-06-20 16:28:10 +03:00
Mike Brown
321d636e76
Merge pull request #1 from owtaylor/oci-media-types
...
Handle OCI manifests and image indexes without a media type
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-19 11:46:49 -05:00
Owen W. Taylor
132abc6de5
Test storing OCI image manifests and indexes with/without a media type
...
OCI Image manifests and indexes are supported both with and without
an embeded MediaType (the field is reserved according to the spec).
Test storing and retrieving both types from the manifest store.
Signed-off-by: Owen W. Taylor <otaylor@fishsoup.net>
2018-06-19 11:24:25 -04:00
Owen W. Taylor
60d9c5dfad
Handle OCI manifests and image indexes without a media type
...
In the OCI image specification, the MediaType field is reserved
and otherwise undefined; assume that manifests without a media
in storage are OCI images or image indexes, and determine which
by looking at what fields are in the JSON. We do keep a check
that when unmarshalling an OCI image or image index, if it has
a MediaType field, it must match that media type of the upload.
Signed-off-by: Owen W. Taylor <otaylor@fishsoup.net>
2018-06-19 11:24:25 -04:00
Owen W. Taylor
1d47ef7b80
Check media types when unmarshalling manifests
...
When unmarshalling manifests from JSON, check that the MediaType field
corresponds to the type that we are unmarshalling as. This makes sure
that when we retrieve a manifest from the manifest store, it will have
the same type as it was handled as before storing it in the manifest
store.
Signed-off-by: Owen W. Taylor <otaylor@fishsoup.net>
2018-06-19 11:24:25 -04:00
Mike Brown
f6224f78ba
register oci image index
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 15:18:59 -05:00
Mike Brown
ad7ab0853c
folow commit 9c88801a12
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
7b47fb13cf
update url policy support; testing for annoations in index
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
f186e1da1c
adding some support for annotations at the manifest level
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
ec2aa05cdf
addressing comments from stevvooe
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
c1532332ad
update to image spec v1.0.0
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
6bae7ca597
refactor adding enum for storage types
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
9e3f78b8c8
addresses minor debug comments
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
b0cef05626
removes oci. namespace feature
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
426afb3a4c
address get manifest issue with oci. namespace; and comment descriptions
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
fcaffa38bc
vendor oci image-spec
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:55:24 -05:00
Mike Brown
c94f28805e
OCI media types; annotation support; oci index
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:48:58 -05:00
Mike Brown
6fcea22b0a
add an ocischema manifest handler for the registry
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:48:58 -05:00
Mike Brown
9986e8ca7c
adds support for oci manifests and manifestlists
...
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2018-06-18 13:48:58 -05:00
E. M. Bray
ff7866442a
Update deploying.md
...
since these docs are demonstrating how to run a swarm service with TLS support I assume port 443 was intended here
2018-06-15 14:53:47 -07:00
Derek McGowan
749f6afb45
Merge pull request #2603 from yuwaMSFT2/newazuresdk
...
closes #2496 and #2552
2018-06-11 11:39:26 -07:00
Yu Wang
62797237b9
closes #2496 and #2552
...
Update Azure SDK with release v16.2.1
Update Azure autorest SDK with release v10.8.1
Signed-off-by: Yu Wang <yuwa@microsoft.com>
2018-06-08 16:53:02 -07:00
Oleg Bulatov
7bc438a534
Use e.Message field instead of e.Code.Message()
...
Signed-off-by: Oleg Bulatov <oleg@bulatov.me>
2018-06-04 17:29:46 +02:00
Gladkov Alexey
fc7e8f42d7
Fix deadlock in the inmemory storage driver
...
According golang documentation [1]: no goroutine should expect to be
able to acquire a read lock until the initial read lock is released.
[1] https://golang.org/pkg/sync/#RWMutex
Signed-off-by: Gladkov Alexey <agladkov@redhat.com>
2018-05-30 18:01:08 +02:00
Derek McGowan
86b030c1ca
Update project maintainers file
...
Include rules and roles in file.
Remove inactive maintainers who have already acknowledged
leaving the maintainer role.
Signed-off-by: Derek McGowan <derek@mcgstyle.net>
2018-05-29 16:02:45 -07:00
Derek McGowan
f0cc927784
Merge pull request #2582 from thaJeztah/bump-golang-1.10
...
Update Golang to 1.10
2018-05-22 10:56:53 -07:00
Sebastiaan van Stijn
7f02f9e450
Update Golang to 1.10
...
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2018-05-22 19:42:22 +02:00
Derek McGowan
ed42a4909a
Merge pull request #2594 from dmcgowan/update-integration-test-certs
...
Update integration test certificates
2018-05-21 17:01:25 -07:00
Derek McGowan
dabcfdc5a6
Update for vndr update
...
Signed-off-by: Derek McGowan <derek@mcgstyle.net>
2018-05-21 16:33:38 -07:00
Derek McGowan
b4dd9b4376
Update certificates
...
Set expiration to 10 years
Signed-off-by: Derek McGowan <derek@mcgstyle.net>
2018-05-21 16:00:52 -07:00
mallchin
f497e79c7e
Update part2.md ( #6475 )
2018-04-18 15:55:16 -07:00
T N
1b6e19d694
Update link to Docker Trusted Registry ( #6479 )
...
https://docs.docker.com/datacenter/dtr/2.5/guides/ => https://docs.docker.com/ee/dtr/
2018-04-18 15:54:50 -07:00
Nat Zimmermann
9042088fad
Fix "Run the registry as a service" link ( #6289 )
2018-03-30 13:58:20 -07:00
Derek McGowan
83389a1480
Merge pull request #2556 from justincormack/fewer-gorillas
...
Remove gorilla/context from vendor.conf
2018-03-27 13:24:08 -07:00
Justin Cormack
fb7b0ddfc3
Remove gorilla/context from vendor.conf
...
This has been unused since we switched to Go context.
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-03-26 15:46:07 -07:00
Akihiro Suda
f0fe5c3875
registry/filesystem: mention umask ( #6276 )
...
* registry/filesystem; mention umask
2018-03-22 10:12:29 -07:00
Olivier Gambier
23bef416bd
Merge pull request #2538 from tianon/challanges
...
Fix minor "Challanges" typo
2018-03-21 09:58:14 -07:00