зеркало из https://github.com/Azure/ARO-RP.git
183 строки
5.3 KiB
Go
183 строки
5.3 KiB
Go
package main
|
|
|
|
// Copyright (c) Microsoft Corporation.
|
|
// Licensed under the Apache License 2.0.
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/base64"
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/containers/image/v5/types"
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"github.com/Azure/ARO-RP/pkg/env"
|
|
pkgmirror "github.com/Azure/ARO-RP/pkg/mirror"
|
|
"github.com/Azure/ARO-RP/pkg/util/version"
|
|
)
|
|
|
|
// These are versions that need to be skipped because they are unable
|
|
// to be mirrored
|
|
var doNotMirrorTags = map[string]struct{}{
|
|
"4.8.8": {}, // release points to unreachable link
|
|
}
|
|
|
|
func getAuth(key string) (*types.DockerAuthConfig, error) {
|
|
b, err := base64.StdEncoding.DecodeString(os.Getenv(key))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &types.DockerAuthConfig{
|
|
Username: string(b[:bytes.IndexByte(b, ':')]),
|
|
Password: string(b[bytes.IndexByte(b, ':')+1:]),
|
|
}, nil
|
|
}
|
|
|
|
func mirror(ctx context.Context, log *logrus.Entry) error {
|
|
err := env.ValidateVars(
|
|
"DST_AUTH",
|
|
"DST_ACR_NAME",
|
|
"SRC_AUTH_QUAY",
|
|
"SRC_AUTH_REDHAT")
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
env, err := env.NewCoreForCI(ctx, log)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
acrDomainSuffix := "." + env.Environment().ContainerRegistryDNSSuffix
|
|
|
|
dstAuth, err := getAuth("DST_AUTH")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
dstAcr := os.Getenv("DST_ACR_NAME")
|
|
|
|
srcAuthQuay, err := getAuth("SRC_AUTH_QUAY")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
srcAuthRedhat, err := getAuth("SRC_AUTH_REDHAT")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// We can lose visibility of early image mirroring errors because logs are trimmed in the output of Ev2 pipelines.
|
|
// If images fail to mirror, those errors need to be returned together and logged at the end of the execution.
|
|
var imageMirroringErrors []string
|
|
|
|
for _, ref := range []string{
|
|
|
|
// https://mcr.microsoft.com/en-us/product/azure-cli/about
|
|
"mcr.microsoft.com/azure-cli:cbl-mariner2.0",
|
|
|
|
// https://catalog.redhat.com/software/containers/rhel8/support-tools/5ba3eaf9bed8bd6ee819b78b
|
|
// https://catalog.redhat.com/software/containers/rhel9/support-tools/615be213075b022acc111bf9
|
|
"registry.redhat.io/rhel8/support-tools:latest",
|
|
"registry.redhat.io/rhel9/support-tools:latest",
|
|
|
|
// https://catalog.redhat.com/software/containers/openshift4/ose-tools-rhel8/5f748d3399cc5b9e7c1a8747
|
|
"registry.redhat.io/openshift4/ose-tools-rhel8:v4.11",
|
|
"registry.redhat.io/openshift4/ose-tools-rhel8:v4.12",
|
|
"registry.redhat.io/openshift4/ose-tools-rhel8:v4.13",
|
|
"registry.redhat.io/openshift4/ose-tools-rhel8:v4.14",
|
|
"registry.redhat.io/openshift4/ose-tools-rhel8:v4.15",
|
|
"registry.redhat.io/openshift4/ose-tools-rhel8:latest",
|
|
|
|
// https://catalog.redhat.com/software/containers/ubi8/ubi-minimal/5c359a62bed8bd75a2c3fba8
|
|
// https://catalog.redhat.com/software/containers/ubi9/ubi-minimal/615bd9b4075b022acc111bf5
|
|
"registry.access.redhat.com/ubi8/ubi-minimal:latest",
|
|
"registry.access.redhat.com/ubi9/ubi-minimal:latest",
|
|
|
|
// https://catalog.redhat.com/software/containers/ubi8/nodejs-18/6278e5c078709f5277f26998
|
|
"registry.access.redhat.com/ubi8/nodejs-18:latest",
|
|
|
|
// https://catalog.redhat.com/software/containers/ubi8/go-toolset/5ce8713aac3db925c03774d1
|
|
"registry.access.redhat.com/ubi8/go-toolset:1.21.13-1",
|
|
|
|
// https://quay.io/repository/app-sre/managed-upgrade-operator?tab=tags
|
|
// https://gitlab.cee.redhat.com/service/app-interface/-/blob/master/data/services/osd-operators/cicd/saas/saas-managed-upgrade-operator.yaml?ref_type=heads
|
|
"quay.io/app-sre/managed-upgrade-operator:v0.1.952-44b631a",
|
|
|
|
// https://quay.io/repository/app-sre/hive?tab=tags
|
|
"quay.io/app-sre/hive:986c5efa21",
|
|
} {
|
|
log.Printf("mirroring %s -> %s", ref, pkgmirror.Dest(dstAcr+acrDomainSuffix, ref))
|
|
|
|
srcAuth := srcAuthRedhat
|
|
if strings.Index(ref, "quay.io") == 0 {
|
|
srcAuth = srcAuthQuay
|
|
}
|
|
|
|
err = pkgmirror.Copy(ctx, pkgmirror.Dest(dstAcr+acrDomainSuffix, ref), ref, dstAuth, srcAuth)
|
|
if err != nil {
|
|
imageMirroringErrors = append(imageMirroringErrors, fmt.Sprintf("%s: %s\n", ref, err))
|
|
}
|
|
}
|
|
|
|
// OCP release mirroring
|
|
var releases []pkgmirror.Node
|
|
if len(flag.Args()) == 1 {
|
|
log.Print("reading release graph")
|
|
releases, err = pkgmirror.AddFromGraph(version.NewVersion(4, 12))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
for _, arg := range flag.Args()[1:] {
|
|
if strings.EqualFold(arg, "latest") {
|
|
releases = append(releases, pkgmirror.Node{
|
|
Version: version.DefaultInstallStream.Version.String(),
|
|
Payload: version.DefaultInstallStream.PullSpec,
|
|
})
|
|
} else {
|
|
vers, err := version.ParseVersion(arg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
node, err := pkgmirror.VersionInfo(vers)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
releases = append(releases, pkgmirror.Node{
|
|
Version: node.Version,
|
|
Payload: node.Payload,
|
|
})
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, release := range releases {
|
|
if _, ok := doNotMirrorTags[release.Version]; ok {
|
|
log.Printf("skipping mirror of release %s", release.Version)
|
|
continue
|
|
}
|
|
log.Printf("mirroring release %s", release.Version)
|
|
err = pkgmirror.Mirror(ctx, log, dstAcr+acrDomainSuffix, release.Payload, dstAuth, srcAuthQuay)
|
|
if err != nil {
|
|
imageMirroringErrors = append(imageMirroringErrors, fmt.Sprintf("%s: %s\n", release, err))
|
|
}
|
|
}
|
|
|
|
log.Print("done")
|
|
|
|
if imageMirroringErrors != nil {
|
|
return fmt.Errorf("failed to mirror image/s\n%s", strings.Join(imageMirroringErrors, "\n"))
|
|
}
|
|
|
|
return nil
|
|
}
|