Commit Graph

18 Commits

Author SHA1 Message Date
Tianon Gravi b38cded65d Update Go deps 2022-12-21 14:45:09 -08:00
Tianon Gravi 0b7ae64b2f Add "Builder: oci-import" support
In the case of base images (`debian`, `alpine`, `ubuntu`, etc), using a `Dockerfile` as our method of ingestion doesn't really buy us very much.  It made sense at the time it was implemented ("all `Dockerfile`, all the time"), but at this point they're all some variation on `FROM scratch \n ADD foo.tar.xz / \n CMD ["/bin/some-shell"]`, and cannot reasonably be "rebuilt" when their base image changes (which is one of the key functions of the official images) since they _are_ the base images in question.

Functionally, consuming a tarball in this way isn't _that_ much different from consuming a raw tarball that's part of, say, an OCI image layout (https://github.com/opencontainers/image-spec/blob/v1.0.2/image-layout.md) -- it's some tarball plus some metadata about what to do with it.

For less trivial images, there's a significant difference (and I'm not proposing to use this for anything beyond simple one-layer base images), but for a single layer this would be basically identical.

As a more specific use case, the Debian `rootfs.tar.xz` files are currently [100% reproducible](https://github.com/debuerreotype/debuerreotype).  Unfortunately, some of that gets lost when it gets imported into Docker, and thus it takes some additional effort to get from the Docker-generated rootfs back to the original debuerreotype-generated file.

This adds the ability to consume an OCI image directly, to go even further and have a 100% fully reproducible image digest as well, which makes it easier to trace a given published image back to the reproducible source generated by the upstream tooling (especially if a given image is also pushed by the maintainer elsewhere).

Here's an example `oci-debian` file I was using for testing this:

    Maintainers: Foo (@bar)
    GitRepo: https://github.com/tianon/docker-debian-artifacts.git
    GitFetch: refs/heads/oci-arm32v5
    Architectures: arm32v5
    GitCommit: d6ac440e7760b6b16e3d3da6f2b56736b9c10065
    Builder: oci-import
    File: index.json

    Tags: bullseye, bullseye-20221114, 11.5, 11, latest
    Directory: bullseye/oci

    Tags: bullseye-slim, bullseye-20221114-slim, 11.5-slim, 11-slim
    Directory: bullseye/slim/oci
2022-12-15 11:42:10 -08:00
Tianon Gravi b20e82cb0d Add new "bashbrew remote arches" command
This command will, given a remote image reference, look up the list of platforms from it and match them to supported bashbrew architectures (providing content descriptors for each).

Also, refactor registry code to be more correct: previously, this couldn't fetch from Docker without `DOCKERHUB_PUBLIC_PROXY` (see `registry-1.docker.io` change) and was ignoring content digests.  Now it works correctly with or without `DOCKERHUB_PUBLIC_PROXY`, verifies the size of every object it pulls, verifies the digest, _and_ should continue working with the in-progress Moby containerd-integration (where the local image ID becomes the digest of the manifest or index instead of the digest of the config blob as it is today).
2022-11-16 15:31:47 -08:00
Tianon Gravi f54c8e397a Rewrite "bashbrew children" and "bashbrew parents"
This time, they are distinct implementations because the problem they are solving is inherently different.

For listing children of a given name, we *have* to walk the entire library (since we only have tag -> FROM mappings, not the reverse, which is fundamentally the question that "children" answers).

On the flip side, listing the parents of a given name is as straightforward as looking up the FROM values and walking until we can't anymore.

In my own testing, these new implementations are significantly more correct, and handle more edge cases (including things we couldn't support before like `bashbrew children --depth=1 scratch`, `bashbrew children mcr.microsoft.com/windows/servercore`, etc).

They also more correctly handle edge cases like tags that are `FROM` a "`SharedTag`" such that they don't walk up/down both sides of the tree (for example, `orientdb:3.2` -> `FROM eclipse-temurin:8-jdk`, which is both Windows *and* Linux, even though `orientdb:3.2` is Linux-only).
2022-11-14 14:32:20 -08:00
Dave Henderson 7a3d9de20f
Update containerd to avoid CVEs
Signed-off-by: Dave Henderson <dhenderson@gmail.com>
2022-04-15 20:25:35 -04:00
Tianon Gravi eb66051aab Adjust logrus default logging level to silence some containerd logs 2022-03-03 13:01:43 -08:00
Tianon Gravi 81270c867e Update dependencies 2021-11-30 12:29:41 -08:00
Dave Henderson 8f2d87dc13
Update some dependencies to avoid CVEs
Signed-off-by: Dave Henderson <dhenderson@gmail.com>
2021-11-05 19:25:59 -04:00
Tianon Gravi 4c86d18022 Update pault.ag/go/debian to v0.11.0 2021-02-08 11:02:41 -08:00
Tianon Gravi a6373f407d Use containerd resolver/fetcher to query registry for "skip checking" 2020-09-15 15:50:00 -07:00
Tianon Gravi e609341812 Update Go dependencies 2020-08-21 14:43:01 -07:00
Tianon Gravi 5efa400516 Update "pault.ag/go/debian" to fix https://github.com/paultag/go-debian/issues/104 2020-08-21 14:35:45 -07:00
Tianon Gravi 143301cc9e Merge github.com/docker-library/go-dockerlibrary into bashbrew
This adjusts import paths, go.mod, and adds a new "Dockerfile.test" to run the unit tests.
2020-08-19 16:21:07 -07:00
Tianon Gravi 013567335e Update to github.com/go-git/go-git v5.1.0
See https://github.com/go-git/go-git/releases/tag/v5.1.0 for more details.
2020-05-26 12:09:00 -07:00
Tianon Gravi daa5333f67 Use new go-git functionality to fetch commits
This avoids shelling out by using the implementation from 8ecd388ae1, which is going to be much more performant.
2020-05-11 11:21:57 -07:00
Tianon Gravi 64bfd4ce30 Update to github.com/go-git/go-git v5 2020-05-06 11:42:58 -07:00
Tianon Gravi dfff1c3708 Move go.mod down to Go 1.11 (since that's really the bottom end of what we support) 2020-04-24 13:43:47 -07:00
Tianon Gravi 5425126232 Move Go code to root of the repo 2020-04-24 11:48:08 -07:00