image-syncer
is a docker registry tools. With image-syncer
you can synchronize docker images from some source registries to target registries, which include most popular public docker registry services.
English | 简体中文
- Support for many-to-many registry synchronization
- Supports docker registry services based on Docker Registry V2 (e.g., Alibaba Cloud Container Registry Service, Docker Hub, Quay.io, Harbor, etc.)
- Network & Memory Only, doesn't rely on any large disk storage, fast synchronization
- Incremental Synchronization, ignore unchanged images automatically
- BloB-Level Concurrent Synchronization, adjustable goroutine numbers
- Automatic Retries of Failed Sync Tasks, to resolve the network problems (rate limit, etc.) while synchronizing
- Doesn't rely on Docker daemon or other programs
You can use image-sync-action to try image-syncer online without paying for any machine resources.
You can download the latest binary release here
go get github.com/AliyunContainerService/image-syncer
cd $GOPATH/github.com/AliyunContainerService/image-syncer
# This will create a binary file named image-syncer
make
# Get usage information
./image-syncer -h
./image-syncer --proc=6 --auth=./auth.json --images=./images.json --auth=./auth.json --retries=3
Image-syncer supports --auth
and --images
flag for passing authentication file and image sync configuration file, both of which supports YAML and JSON format. Seperate authentication information is more flexible to reuse it in different sync missions.
The older version (< v1.2.0) of configuration file is still supported via
--config
flag, you can find the example in config.yaml and config.json.
Authentication file holds all the authentication information for each registry. For each registry (or namespace), there is a object which contains username and password. For each images sync rule in image sync configuration file, image-syncer will try to find a match in all the authentication information and use the best(longest) fit one. Access will be anonymous if no authentication information is found.
You can find the example in auth.yaml and auth.json, here we use auth.yaml for explaination:
quay.io: # This "registry" or "registry/namespace" string should be the same as registry or registry/namespace used below in image sync rules. And if an url match multiple objects, the "registry/namespace" string will actually be used.
username: xxx
password: xxxxxxxxx
insecure: true # Optional, "insecure" field needs to be true if this registry is a http service, default value is false.
registry.cn-beijing.aliyuncs.com:
username: xxx # Optional, if the value string is a format of "${env}" or "$env", use the "env" environment variables as username.
password: xxxxxxxxx # Optional, if the value string is a format of "${env}" or "$env", use the "env" environment variables as password.
docker.io:
username: "${env}"
password: "$env"
quay.io/coreos:
username: abc
password: xxxxxxxxx
insecure: true
Image sync configuration file defines all the image sync rules. Each rule is a key/value pair, of which the key refers to "the source images url" and the value refers to "the destination images url". The source/destination images url is mostly the same with the url we use
in docker pull/push
commands, but still something different in the "tags and digest" part:
- Neither of the source images url and the destination images url should be empty.
- If the source images url contains no tags or digest, all the tags of source repository will be synced.
- The source images url can have more than one tags, which should be seperated by comma, only the specified tags will be synced.
- The source images url can have at most one digest, and the destination images url should only have no digest or the same digest at the same time.
- The "tags" part of source images url can be a regular expression which needs to have an additional prefix and suffix string
/
. All the tags of source repository that matches the regular expression will be synced. Multiple regular expressions is not supported. - If the destination images url has no digest or tags, it means the source images will keep the same tags or digest after being synced.
- The destination images url can have more than one tags, the number of which must be the same with the tags in the source images url, then all the source images' tags will be changed to a new one (correspond from left to right).
- The "destination images url" can also be an array, each of which follows the rules above.
You can find the example in images.yaml and images.json, here we use images.yaml for explaination:
quay.io/coreos/kube-rbac-proxy: quay.io/ruohe/kube-rbac-proxy
quay.io/coreos/kube-rbac-proxy:v1.0: quay.io/ruohe/kube-rbac-proxy
quay.io/coreos/kube-rbac-proxy:v1.0,v2.0: quay.io/ruohe/kube-rbac-proxy
quay.io/coreos/kube-rbac-proxy@sha256:14b267eb38aa85fd12d0e168fffa2d8a6187ac53a14a0212b0d4fce8d729598c: quay.io/ruohe/kube-rbac-proxy
quay.io/coreos/kube-rbac-proxy:v1.1:
- quay.io/ruohe/kube-rbac-proxy1
- quay.io/ruohe/kube-rbac-proxy2
quay.io/coreos/kube-rbac-proxy:/a+/: quay.io/ruohe/kube-rbac-proxy
-h --help Usage information
--config Set the path of config file, this file need to be created before starting synchronization, default
config file is at "current/working/directory/config.json". (This flag can be replaced with flag --auth
and --images which for better orgnization.)
--auth Set the path of authentication file, this file need to be created before starting synchronization, default
config file is at "current/working/directory/auth.json". This flag need to be pair used with --images.
--images Set the path of image rules file, this file need to be created before starting synchronization, default
config file is at "current/working/directory/images.json". This flag need to be pair used with --auth.
--log Set the path of log file, logs will be printed to Stderr by default
--proc Number of goroutines, default value is 5
--retries Times to retry failed tasks, default value is 2, the retries of failed tasks will start after all the tasks
are executed once, this can resolve most occasional network problems during synchronization
--os OS list to filter source tags, not works for docker v2 schema1 media, takes no effect if empty
--arch Architecture list to filter source tags, takes no effect if empty
--force Force update manifest whether the destination manifest exists
Frequently asked questions are listed in FAQs