# go-containerregistry [![GitHub Actions Build Status](https://github.com/google/go-containerregistry/workflows/Build/badge.svg)](https://github.com/google/go-containerregistry/actions?query=workflow%3ABuild) [![GoDoc](https://godoc.org/github.com/google/go-containerregistry?status.svg)](https://godoc.org/github.com/google/go-containerregistry) [![Code Coverage](https://codecov.io/gh/google/go-containerregistry/branch/main/graph/badge.svg)](https://codecov.io/gh/google/go-containerregistry) ## Introduction This is a golang library for working with container registries. It's largely based on the [Python library of the same name](https://github.com/google/containerregistry). The following diagram shows the main types that this library handles. ![OCI image representation](images/ociimage.jpeg) ## Philosophy The overarching design philosophy of this library is to define interfaces that present an immutable view of resources (e.g. [`Image`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1#Image), [`Layer`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1#Layer), [`ImageIndex`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1#ImageIndex)), which can be backed by a variety of medium (e.g. [registry](./pkg/v1/remote/README.md), [tarball](./pkg/v1/tarball/README.md), [daemon](./pkg/v1/daemon/README.md), ...). To complement these immutable views, we support functional mutations that produce new immutable views of the resulting resource (e.g. [mutate](./pkg/v1/mutate/README.md)). The end goal is to provide a set of versatile primitives that can compose to do extraordinarily powerful things efficiently and easily. Both the resource views and mutations may be lazy, eager, memoizing, etc, and most are optimized for common paths based on the tooling we have seen in the wild (e.g. writing new images from disk to the registry as a compressed tarball). ### Experiments Over time, we will add new functionality under experimental environment variables listed here. | Env Var | Value(s) | What is does | |---------|----------|--------------| | `GGCR_EXPERIMENT_ESTARGZ` | `"1"` | ⚠️DEPRECATED⚠️: When enabled this experiment will direct `tarball.LayerFromOpener` to emit [estargz](https://github.com/opencontainers/image-spec/issues/815) compatible layers, which enable them to be lazily loaded by an appropriately configured containerd. | ### `v1.Image` #### Sources * [`remote.Image`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/remote#Image) * [`tarball.Image`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/tarball#Image) * [`daemon.Image`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/daemon#Image) * [`layout.Image`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/layout#Path.Image) * [`random.Image`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/random#Image) #### Sinks * [`remote.Write`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/remote#Write) * [`tarball.Write`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/tarball#Write) * [`daemon.Write`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/daemon#Write) * [`legacy/tarball.Write`](https://godoc.org/github.com/google/go-containerregistry/pkg/legacy/tarball#Write) * [`layout.AppendImage`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/layout#Path.AppendImage) ### `v1.ImageIndex` #### Sources * [`remote.Index`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/remote#Index) * [`random.Index`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/random#Index) * [`layout.ImageIndexFromPath`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/layout#ImageIndexFromPath) #### Sinks * [`remote.WriteIndex`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/remote#WriteIndex) * [`layout.Write`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/layout#Write) ### `v1.Layer` #### Sources * [`remote.Layer`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/remote#Layer) * [`tarball.LayerFromFile`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/tarball#LayerFromFile) * [`random.Layer`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/random#Layer) * [`stream.Layer`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/stream#Layer) #### Sinks * [`remote.WriteLayer`](https://godoc.org/github.com/google/go-containerregistry/pkg/v1/remote#WriteLayer) ## Overview ### `mutate` The simplest use for these libraries is to read from one source and write to another. For example, * `crane pull` is `remote.Image -> tarball.Write`, * `crane push` is `tarball.Image -> remote.Write`, * `crane cp` is `remote.Image -> remote.Write`. However, often you actually want to _change something_ about an image. This is the purpose of the [`mutate`](pkg/v1/mutate) package, which exposes some commonly useful things to change about an image. ### `partial` If you're trying to use this library with a different source or sink than it already supports, it can be somewhat cumbersome. The `Image` and `Layer` interfaces are pretty wide, with a lot of redundant information. This is somewhat by design, because we want to expose this information as efficiently as possible where we can, but again it is a pain to implement yourself. The purpose of the [`partial`](pkg/v1/partial) package is to make implementing a `v1.Image` much easier, by filling in all the derived accessors for you if you implement a minimal subset of `v1.Image`. ### `transport` You might think our abstractions are bad and you just want to authenticate and send requests to a registry. This is the purpose of the [`transport`](pkg/v1/remote/transport) and [`authn`](pkg/authn) packages. ## Tools This repo hosts some tools built on top of the library. ### `crane` [`crane`](cmd/crane/README.md) is a tool for interacting with remote images and registries. ### `gcrane` [`gcrane`](cmd/gcrane/README.md) is a GCR-specific variant of `crane` that has richer output for the `ls` subcommand and some basic garbage collection support. ### `krane` [`krane`](cmd/krane/README.md) is a drop-in replacement for `crane` that supports common Kubernetes-based workload identity mechanisms using [`k8schain`](#k8schain) as a fallback to traditional authentication mechanisms. ### `k8schain` [`k8schain`](pkg/authn/k8schain/README.md) implements the authentication semantics used by kubelets in a way that is easily consumable by this library. `k8schain` is not a standalone tool, but it is linked here for visibility. ### Emeritus: [`ko`](https://github.com/google/ko) This tool was originally developed in this repo but has since been moved to its own repo.