Comments (2)
@alexeagle is there reason for us to do this in 2.x?
from rules_oci.
I put a similar idea into #634
instruct crane to be happy with missing blobs on disk (to be done)
If we are only downloading the json manifest and store it, with some additional metadata about where to fetch the final image at runtime, then we probably don't even need crane until runtime.
oci_tarball has to be aware of shallow oci-layouts and create necessary metadata on its tarball manifest so the runtime knows where to get the blobs from
Agree. In my head, I am thinking of a different set of providers to propagate the metadata between build targets.
I think you would not need oci_tarball
at all, because you would also want to defer the tarball creation to runtime. So perhaps just storing a tarball manifest (which file should go to which path inside the tarball) would be sufficient.
oci_push needs to know how to deal oci-layouts
There won't be a layout, right?
Just json metadatas on disk and bazel runfiles.
The new "push" here will do a combination of things at runtime:
- Download the base images and verify their sha256 against the stored metadata.
- Compose all image layers/tarballs according to the metadata using relevant runfiles
- Push the result to registry / load image to local docker daemon.
from rules_oci.
Related Issues (20)
- 2.0: consider rename of oci_tarball HOT 2
- Multiline cmd and entrypoint handling HOT 4
- Adding a defer_download mode to rules_oci HOT 3
- multi arch images broken on 2.x HOT 1
- Multi arch indices broken in v2alpha5 HOT 2
- rules_oci fails to build when appending an env value with :PATH HOT 3
- [OCI Load] OCI Load fails if dependents are not pre-built HOT 6
- rules_oci@v2beta1 bazel run with remote execution does not work correctly HOT 3
- rules_oci@v2beta1 - Image not compatible with AWS lambdas HOT 4
- `external/jq_linux_amd64/jq: Argument list too long` on v2 beta1 HOT 4
- v2beta1: `oci_push` to AWS ECR needs `ecr:BatchGetImage` permission HOT 2
- 2.0.0beta1: regression: cmd inherited from base image should be cleared when setting entrypoint HOT 1
- oci_tarball for multiarch image fails with `blobs/json: no such file or directory` HOT 6
- v1.8.0: credentials not found in native keychain HOT 13
- oci_push does not pass the runfile correctly to the dependent rule HOT 2
- 2.0.0beta1: Entrypoints with comma separated values are not correctly built
- oci_image should support setting `created` and stamp
- oci.pull doesn't work for some images running on Debian on WSL2
- Document output of oci_image more clearly HOT 2
- FR: Ability to output `oci_image` as a .tar file HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from rules_oci.