Skip to content

Commit a72d422

Browse files
committed
Merge branch 'update-registry-image-schema' of github.com:LukeBalizet/sts4 into LukeBalizet-update-registry-image-schema
2 parents 9552f40 + c5bdc95 commit a72d422

File tree

13 files changed

+77
-0
lines changed

13 files changed

+77
-0
lines changed

headless-services/concourse-language-server/src/main/java/org/springframework/ide/vscode/concourse/PipelineYmlSchema.java

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@
6262

6363
/**
6464
* @author Kris De Volder
65+
* @author LukeBalizet
6566
*/
6667
public class PipelineYmlSchema implements YamlSchema {
6768

@@ -674,10 +675,27 @@ private void initializeDefaultResourceTypes() {
674675
{
675676
AbstractType source = f.ybean("RegistryImageSource");
676677
addProp(source, "repository", t_ne_string).isPrimary(true);
678+
addProp(source, "insecure", t_boolean);
677679
addProp(source, "tag", t_ne_string);
680+
addProp(source, "variant", t_ne_string);
681+
addProp(source, "semver_constraint", t_ne_string);
678682
addProp(source, "username", t_ne_string);
679683
addProp(source, "password", t_ne_string);
684+
addProp(source, "aws_access_key_id", t_ne_string);
685+
addProp(source, "aws_secret_access_key", t_ne_string);
686+
addProp(source, "aws_session_token", t_ne_string);
687+
addProp(source, "aws_region", t_ne_string);
688+
addProp(source, "aws_role_arn", t_ne_string);
689+
addProp(source, "aws_role_arns", t_strings);
680690
addProp(source, "debug", t_boolean);
691+
{
692+
AbstractType registry_mirror = f.ybean("RegistryMirror");
693+
addProp(registry_mirror, "host", t_ne_string).isPrimary(true);
694+
addProp(registry_mirror, "username", t_ne_string);
695+
addProp(registry_mirror, "password", t_ne_string);
696+
697+
addProp(source, "registry_mirror", registry_mirror);
698+
}
681699
{
682700
AbstractType contentTrust = f.ybean("RegistryImageContentTrust");
683701
addProp(contentTrust, "server", t_ne_string);
@@ -689,13 +707,16 @@ private void initializeDefaultResourceTypes() {
689707

690708
addProp(source, "content_trust", contentTrust);
691709
}
710+
addProp(source, "ca_certs", t_strings);
692711

693712
AbstractType get = f.ybean("RegistryImageGetParams");
694713
addProp(get, "format", f.yenum("RegistryImageFormat", "rootfs", "oci"));
695714
addProp(get, "skip_download", t_boolean);
696715

697716
AbstractType put = f.ybean("RegistryImagePutParams");
698717
addProp(put, "image", t_ne_string).isPrimary(true);
718+
addProp(put, "version", t_ne_string);
719+
addProp(get, "bump_aliases", t_boolean);
699720
addProp(put, "additional_tags", t_ne_string);
700721

701722
resourceTypes.def("registry-image", source, get, put);
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
*Optional. Default `false`.* When set to `true` and `version` is specified
2+
automatically bump alias tags for the version. For example, when pushing version
3+
`1.2.3`, push the same image to the following tags:
4+
- `1.2`, if 1.2.3 is the latest version of 1.2.x.
5+
- `1`, if 1.2.3 is the latest version of 1.x.
6+
- `latest`, if 1.2.3 is the latest version overall.
7+
8+
If `variant` is configured as `foo`, push the same image to the following tags:
9+
- `1.2-foo`, if 1.2.3 is the latest version of 1.2.x with `foo`.
10+
- `1-foo`, if 1.2.3 is the latest version of 1.x with `foo`.
11+
- `foo`, if 1.2.3 is the latest version overall for `foo`
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
*Optional.* A version number to use as a tag.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
*Optional*. The access key ID to use for authenticating with ECR.
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
*Optional*. The region to use for
2+
accessing ECR. This is required if you are using ECR. This region
3+
will help determine the full repository URL you are accessing
4+
(e.g., `012345678910.dkr.ecr.us-east-1.amazonaws.com`)
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
*Optional*. If set, then this role will
2+
be assumed before authenticating to ECR. An error will occur if
3+
`aws_role_arns` is also specified. This is kept for backward compatibility.
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
*Optional*. An array of AWS IAM roles.
2+
If set, these roles will be assumed in the specified order before
3+
authenticating to ECR. An error will occur if `aws_role_arn`
4+
is also specified.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
*Optional*. The secret access key to use for authenticating with ECR.
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
*Optional*. The session token to use for authenticating with
2+
STS credentials with ECR.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
*Optional*. An array of PEM-encoded CA certificates. Example:
2+
```yaml
3+
ca_certs:
4+
- |
5+
-----BEGIN CERTIFICATE-----
6+
...
7+
-----END CERTIFICATE-----
8+
- |
9+
-----BEGIN CERTIFICATE-----
10+
...
11+
-----END CERTIFICATE-----
12+
```
13+
Each entry specifies the x509 CA certificate for the trusted docker registry.
14+
This is used to validate the certificate of the docker registry when the
15+
registry's certificate is signed by a custom authority (or itself).

0 commit comments

Comments
 (0)