-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ignore non matching digests #298
Comments
This looks like a possible bug in the huawei registry. The Docker API spec requires the digest to contain the algorithm: https://docs.docker.com/registry/spec/api/#content-digests @jonjohnsonjr should we default to sha256 if nothing is specified? |
That's definitely a registry bug, but I'm not sure how readily we could get them to fix it...
I'm okay with just ignoring this header when fetching by tag. We also don't care about the header when fetching by digest, since we just hash the response. Since Docker Hub still hasn't fixed a similar bug on their side, we should probably just treat this header as completely unreliable :/ |
Hi,
I am running Kaniko on Kubernetes (1.9) in Huawei cloud. I use the registry provided by Huawei.
Currently my build fail with the following error messages:
time="2018-08-21T12:28:45Z" level=error msg="manifest digest: "sha256:bc1c0e105251471a09b19d3f12ca4917646548a63c3022f9e0e1b1b3832baabf" does not match Docker-Content-Digest: "bc1c0e105251471a09b19d3f12ca4917646548a63c3022f9e0e1b1b3832baabf" for "x.x.x.x/test1234/docker-pyspark:latest""
The digests are identical, but the manifest digest contains a leading 'sha:'. Is there a way to tell Kaniko to ignore this?
Thx
The text was updated successfully, but these errors were encountered: