Open La0 opened 5 years ago
I've worked around the blocker you mentioned here: https://github.com/MozillaSecurity/orion/blob/master/services/orion-builder/src/orion_builder/stage_deps.py
I'm using the Docker registry binary from https://github.com/docker/distribution-library-image, using skopeo
to load the image.tar
into a registry on localhost
, and then pulling from localhost
to img
It needs improvement. I rely on the artifact name to match the image name, eg. foo.bar
will be pulled to mozillasecurity/foo:latest
, instead of reading the manifest to see what it contains.
taskboot need to support the following workflow:
base
base
:final-b
andfinal-c
base
image in the img local state.So we should add the following logic:
TASK_ID
is set)public/taskboot/image*.tar
) : it is then downloaded and loaded in our img current stateBlocker:
img
does not seem to currently support loading tar images (only pull from repositories) See https://github.com/genuinetools/img/issues/226 Alternative: push to a docker repo using a custom tag in Task A, pull from task B/C and tag the image as the requiredFROM
target