pull.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618
  1. package graph
  2. import (
  3. "fmt"
  4. "io"
  5. "io/ioutil"
  6. "net"
  7. "net/url"
  8. "os"
  9. "strings"
  10. "time"
  11. "github.com/Sirupsen/logrus"
  12. "github.com/docker/distribution/digest"
  13. "github.com/docker/docker/cliconfig"
  14. "github.com/docker/docker/image"
  15. "github.com/docker/docker/pkg/progressreader"
  16. "github.com/docker/docker/pkg/streamformatter"
  17. "github.com/docker/docker/pkg/stringid"
  18. "github.com/docker/docker/registry"
  19. "github.com/docker/docker/utils"
  20. )
  21. type ImagePullConfig struct {
  22. Parallel bool
  23. MetaHeaders map[string][]string
  24. AuthConfig *cliconfig.AuthConfig
  25. Json bool
  26. OutStream io.Writer
  27. }
  28. func (s *TagStore) Pull(image string, tag string, imagePullConfig *ImagePullConfig) error {
  29. var (
  30. sf = streamformatter.NewStreamFormatter(imagePullConfig.Json)
  31. )
  32. // Resolve the Repository name from fqn to RepositoryInfo
  33. repoInfo, err := s.registryService.ResolveRepository(image)
  34. if err != nil {
  35. return err
  36. }
  37. if err := validateRepoName(repoInfo.LocalName); err != nil {
  38. return err
  39. }
  40. c, err := s.poolAdd("pull", utils.ImageReference(repoInfo.LocalName, tag))
  41. if err != nil {
  42. if c != nil {
  43. // Another pull of the same repository is already taking place; just wait for it to finish
  44. imagePullConfig.OutStream.Write(sf.FormatStatus("", "Repository %s already being pulled by another client. Waiting.", repoInfo.LocalName))
  45. <-c
  46. return nil
  47. }
  48. return err
  49. }
  50. defer s.poolRemove("pull", utils.ImageReference(repoInfo.LocalName, tag))
  51. logrus.Debugf("pulling image from host %q with remote name %q", repoInfo.Index.Name, repoInfo.RemoteName)
  52. endpoint, err := repoInfo.GetEndpoint()
  53. if err != nil {
  54. return err
  55. }
  56. r, err := registry.NewSession(imagePullConfig.AuthConfig, registry.HTTPRequestFactory(imagePullConfig.MetaHeaders), endpoint, true)
  57. if err != nil {
  58. return err
  59. }
  60. logName := repoInfo.LocalName
  61. if tag != "" {
  62. logName = utils.ImageReference(logName, tag)
  63. }
  64. if len(repoInfo.Index.Mirrors) == 0 && (repoInfo.Index.Official || endpoint.Version == registry.APIVersion2) {
  65. if repoInfo.Official {
  66. s.trustService.UpdateBase()
  67. }
  68. logrus.Debugf("pulling v2 repository with local name %q", repoInfo.LocalName)
  69. if err := s.pullV2Repository(r, imagePullConfig.OutStream, repoInfo, tag, sf, imagePullConfig.Parallel); err == nil {
  70. s.eventsService.Log("pull", logName, "")
  71. return nil
  72. } else if err != registry.ErrDoesNotExist && err != ErrV2RegistryUnavailable {
  73. logrus.Errorf("Error from V2 registry: %s", err)
  74. }
  75. logrus.Debug("image does not exist on v2 registry, falling back to v1")
  76. }
  77. logrus.Debugf("pulling v1 repository with local name %q", repoInfo.LocalName)
  78. if err = s.pullRepository(r, imagePullConfig.OutStream, repoInfo, tag, sf, imagePullConfig.Parallel); err != nil {
  79. return err
  80. }
  81. s.eventsService.Log("pull", logName, "")
  82. return nil
  83. }
  84. func (s *TagStore) pullRepository(r *registry.Session, out io.Writer, repoInfo *registry.RepositoryInfo, askedTag string, sf *streamformatter.StreamFormatter, parallel bool) error {
  85. out.Write(sf.FormatStatus("", "Pulling repository %s", repoInfo.CanonicalName))
  86. repoData, err := r.GetRepositoryData(repoInfo.RemoteName)
  87. if err != nil {
  88. if strings.Contains(err.Error(), "HTTP code: 404") {
  89. return fmt.Errorf("Error: image %s not found", utils.ImageReference(repoInfo.RemoteName, askedTag))
  90. }
  91. // Unexpected HTTP error
  92. return err
  93. }
  94. logrus.Debugf("Retrieving the tag list")
  95. tagsList, err := r.GetRemoteTags(repoData.Endpoints, repoInfo.RemoteName, repoData.Tokens)
  96. if err != nil {
  97. logrus.Errorf("unable to get remote tags: %s", err)
  98. return err
  99. }
  100. for tag, id := range tagsList {
  101. repoData.ImgList[id] = &registry.ImgData{
  102. ID: id,
  103. Tag: tag,
  104. Checksum: "",
  105. }
  106. }
  107. logrus.Debugf("Registering tags")
  108. // If no tag has been specified, pull them all
  109. if askedTag == "" {
  110. for tag, id := range tagsList {
  111. repoData.ImgList[id].Tag = tag
  112. }
  113. } else {
  114. // Otherwise, check that the tag exists and use only that one
  115. id, exists := tagsList[askedTag]
  116. if !exists {
  117. return fmt.Errorf("Tag %s not found in repository %s", askedTag, repoInfo.CanonicalName)
  118. }
  119. repoData.ImgList[id].Tag = askedTag
  120. }
  121. errors := make(chan error)
  122. layersDownloaded := false
  123. for _, image := range repoData.ImgList {
  124. downloadImage := func(img *registry.ImgData) {
  125. if askedTag != "" && img.Tag != askedTag {
  126. if parallel {
  127. errors <- nil
  128. }
  129. return
  130. }
  131. if img.Tag == "" {
  132. logrus.Debugf("Image (id: %s) present in this repository but untagged, skipping", img.ID)
  133. if parallel {
  134. errors <- nil
  135. }
  136. return
  137. }
  138. // ensure no two downloads of the same image happen at the same time
  139. if c, err := s.poolAdd("pull", "img:"+img.ID); err != nil {
  140. if c != nil {
  141. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Layer already being pulled by another client. Waiting.", nil))
  142. <-c
  143. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  144. } else {
  145. logrus.Debugf("Image (id: %s) pull is already running, skipping: %v", img.ID, err)
  146. }
  147. if parallel {
  148. errors <- nil
  149. }
  150. return
  151. }
  152. defer s.poolRemove("pull", "img:"+img.ID)
  153. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Pulling image (%s) from %s", img.Tag, repoInfo.CanonicalName), nil))
  154. success := false
  155. var lastErr, err error
  156. var isDownloaded bool
  157. for _, ep := range repoInfo.Index.Mirrors {
  158. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Pulling image (%s) from %s, mirror: %s", img.Tag, repoInfo.CanonicalName, ep), nil))
  159. if isDownloaded, err = s.pullImage(r, out, img.ID, ep, repoData.Tokens, sf); err != nil {
  160. // Don't report errors when pulling from mirrors.
  161. logrus.Debugf("Error pulling image (%s) from %s, mirror: %s, %s", img.Tag, repoInfo.CanonicalName, ep, err)
  162. continue
  163. }
  164. layersDownloaded = layersDownloaded || isDownloaded
  165. success = true
  166. break
  167. }
  168. if !success {
  169. for _, ep := range repoData.Endpoints {
  170. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Pulling image (%s) from %s, endpoint: %s", img.Tag, repoInfo.CanonicalName, ep), nil))
  171. if isDownloaded, err = s.pullImage(r, out, img.ID, ep, repoData.Tokens, sf); err != nil {
  172. // It's not ideal that only the last error is returned, it would be better to concatenate the errors.
  173. // As the error is also given to the output stream the user will see the error.
  174. lastErr = err
  175. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Error pulling image (%s) from %s, endpoint: %s, %s", img.Tag, repoInfo.CanonicalName, ep, err), nil))
  176. continue
  177. }
  178. layersDownloaded = layersDownloaded || isDownloaded
  179. success = true
  180. break
  181. }
  182. }
  183. if !success {
  184. err := fmt.Errorf("Error pulling image (%s) from %s, %v", img.Tag, repoInfo.CanonicalName, lastErr)
  185. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), err.Error(), nil))
  186. if parallel {
  187. errors <- err
  188. return
  189. }
  190. }
  191. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  192. if parallel {
  193. errors <- nil
  194. }
  195. }
  196. if parallel {
  197. go downloadImage(image)
  198. } else {
  199. downloadImage(image)
  200. }
  201. }
  202. if parallel {
  203. var lastError error
  204. for i := 0; i < len(repoData.ImgList); i++ {
  205. if err := <-errors; err != nil {
  206. lastError = err
  207. }
  208. }
  209. if lastError != nil {
  210. return lastError
  211. }
  212. }
  213. for tag, id := range tagsList {
  214. if askedTag != "" && tag != askedTag {
  215. continue
  216. }
  217. if err := s.Tag(repoInfo.LocalName, tag, id, true); err != nil {
  218. return err
  219. }
  220. }
  221. requestedTag := repoInfo.CanonicalName
  222. if len(askedTag) > 0 {
  223. requestedTag = utils.ImageReference(repoInfo.CanonicalName, askedTag)
  224. }
  225. WriteStatus(requestedTag, out, sf, layersDownloaded)
  226. return nil
  227. }
  228. func (s *TagStore) pullImage(r *registry.Session, out io.Writer, imgID, endpoint string, token []string, sf *streamformatter.StreamFormatter) (bool, error) {
  229. history, err := r.GetRemoteHistory(imgID, endpoint, token)
  230. if err != nil {
  231. return false, err
  232. }
  233. out.Write(sf.FormatProgress(stringid.TruncateID(imgID), "Pulling dependent layers", nil))
  234. // FIXME: Try to stream the images?
  235. // FIXME: Launch the getRemoteImage() in goroutines
  236. layersDownloaded := false
  237. for i := len(history) - 1; i >= 0; i-- {
  238. id := history[i]
  239. // ensure no two downloads of the same layer happen at the same time
  240. if c, err := s.poolAdd("pull", "layer:"+id); err != nil {
  241. logrus.Debugf("Image (id: %s) pull is already running, skipping: %v", id, err)
  242. <-c
  243. }
  244. defer s.poolRemove("pull", "layer:"+id)
  245. if !s.graph.Exists(id) {
  246. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Pulling metadata", nil))
  247. var (
  248. imgJSON []byte
  249. imgSize int
  250. err error
  251. img *image.Image
  252. )
  253. retries := 5
  254. for j := 1; j <= retries; j++ {
  255. imgJSON, imgSize, err = r.GetRemoteImageJSON(id, endpoint, token)
  256. if err != nil && j == retries {
  257. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error pulling dependent layers", nil))
  258. return layersDownloaded, err
  259. } else if err != nil {
  260. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  261. continue
  262. }
  263. img, err = image.NewImgJSON(imgJSON)
  264. layersDownloaded = true
  265. if err != nil && j == retries {
  266. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error pulling dependent layers", nil))
  267. return layersDownloaded, fmt.Errorf("Failed to parse json: %s", err)
  268. } else if err != nil {
  269. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  270. continue
  271. } else {
  272. break
  273. }
  274. }
  275. for j := 1; j <= retries; j++ {
  276. // Get the layer
  277. status := "Pulling fs layer"
  278. if j > 1 {
  279. status = fmt.Sprintf("Pulling fs layer [retries: %d]", j)
  280. }
  281. out.Write(sf.FormatProgress(stringid.TruncateID(id), status, nil))
  282. layer, err := r.GetRemoteImageLayer(img.ID, endpoint, token, int64(imgSize))
  283. if uerr, ok := err.(*url.Error); ok {
  284. err = uerr.Err
  285. }
  286. if terr, ok := err.(net.Error); ok && terr.Timeout() && j < retries {
  287. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  288. continue
  289. } else if err != nil {
  290. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error pulling dependent layers", nil))
  291. return layersDownloaded, err
  292. }
  293. layersDownloaded = true
  294. defer layer.Close()
  295. err = s.graph.Register(img,
  296. progressreader.New(progressreader.Config{
  297. In: layer,
  298. Out: out,
  299. Formatter: sf,
  300. Size: imgSize,
  301. NewLines: false,
  302. ID: stringid.TruncateID(id),
  303. Action: "Downloading",
  304. }))
  305. if terr, ok := err.(net.Error); ok && terr.Timeout() && j < retries {
  306. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  307. continue
  308. } else if err != nil {
  309. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error downloading dependent layers", nil))
  310. return layersDownloaded, err
  311. } else {
  312. break
  313. }
  314. }
  315. }
  316. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Download complete", nil))
  317. }
  318. return layersDownloaded, nil
  319. }
  320. func WriteStatus(requestedTag string, out io.Writer, sf *streamformatter.StreamFormatter, layersDownloaded bool) {
  321. if layersDownloaded {
  322. out.Write(sf.FormatStatus("", "Status: Downloaded newer image for %s", requestedTag))
  323. } else {
  324. out.Write(sf.FormatStatus("", "Status: Image is up to date for %s", requestedTag))
  325. }
  326. }
  327. // downloadInfo is used to pass information from download to extractor
  328. type downloadInfo struct {
  329. imgJSON []byte
  330. img *image.Image
  331. digest digest.Digest
  332. tmpFile *os.File
  333. length int64
  334. downloaded bool
  335. err chan error
  336. }
  337. func (s *TagStore) pullV2Repository(r *registry.Session, out io.Writer, repoInfo *registry.RepositoryInfo, tag string, sf *streamformatter.StreamFormatter, parallel bool) error {
  338. endpoint, err := r.V2RegistryEndpoint(repoInfo.Index)
  339. if err != nil {
  340. if repoInfo.Index.Official {
  341. logrus.Debugf("Unable to pull from V2 registry, falling back to v1: %s", err)
  342. return ErrV2RegistryUnavailable
  343. }
  344. return fmt.Errorf("error getting registry endpoint: %s", err)
  345. }
  346. auth, err := r.GetV2Authorization(endpoint, repoInfo.RemoteName, true)
  347. if err != nil {
  348. return fmt.Errorf("error getting authorization: %s", err)
  349. }
  350. var layersDownloaded bool
  351. if tag == "" {
  352. logrus.Debugf("Pulling tag list from V2 registry for %s", repoInfo.CanonicalName)
  353. tags, err := r.GetV2RemoteTags(endpoint, repoInfo.RemoteName, auth)
  354. if err != nil {
  355. return err
  356. }
  357. if len(tags) == 0 {
  358. return registry.ErrDoesNotExist
  359. }
  360. for _, t := range tags {
  361. if downloaded, err := s.pullV2Tag(r, out, endpoint, repoInfo, t, sf, parallel, auth); err != nil {
  362. return err
  363. } else if downloaded {
  364. layersDownloaded = true
  365. }
  366. }
  367. } else {
  368. if downloaded, err := s.pullV2Tag(r, out, endpoint, repoInfo, tag, sf, parallel, auth); err != nil {
  369. return err
  370. } else if downloaded {
  371. layersDownloaded = true
  372. }
  373. }
  374. requestedTag := repoInfo.CanonicalName
  375. if len(tag) > 0 {
  376. requestedTag = utils.ImageReference(repoInfo.CanonicalName, tag)
  377. }
  378. WriteStatus(requestedTag, out, sf, layersDownloaded)
  379. return nil
  380. }
  381. func (s *TagStore) pullV2Tag(r *registry.Session, out io.Writer, endpoint *registry.Endpoint, repoInfo *registry.RepositoryInfo, tag string, sf *streamformatter.StreamFormatter, parallel bool, auth *registry.RequestAuthorization) (bool, error) {
  382. logrus.Debugf("Pulling tag from V2 registry: %q", tag)
  383. manifestBytes, manifestDigest, err := r.GetV2ImageManifest(endpoint, repoInfo.RemoteName, tag, auth)
  384. if err != nil {
  385. return false, err
  386. }
  387. // loadManifest ensures that the manifest payload has the expected digest
  388. // if the tag is a digest reference.
  389. manifest, verified, err := s.loadManifest(manifestBytes, manifestDigest, tag)
  390. if err != nil {
  391. return false, fmt.Errorf("error verifying manifest: %s", err)
  392. }
  393. if err := checkValidManifest(manifest); err != nil {
  394. return false, err
  395. }
  396. if verified {
  397. logrus.Printf("Image manifest for %s has been verified", utils.ImageReference(repoInfo.CanonicalName, tag))
  398. }
  399. out.Write(sf.FormatStatus(tag, "Pulling from %s", repoInfo.CanonicalName))
  400. downloads := make([]downloadInfo, len(manifest.FSLayers))
  401. for i := len(manifest.FSLayers) - 1; i >= 0; i-- {
  402. var (
  403. sumStr = manifest.FSLayers[i].BlobSum
  404. imgJSON = []byte(manifest.History[i].V1Compatibility)
  405. )
  406. img, err := image.NewImgJSON(imgJSON)
  407. if err != nil {
  408. return false, fmt.Errorf("failed to parse json: %s", err)
  409. }
  410. downloads[i].img = img
  411. // Check if exists
  412. if s.graph.Exists(img.ID) {
  413. logrus.Debugf("Image already exists: %s", img.ID)
  414. continue
  415. }
  416. dgst, err := digest.ParseDigest(sumStr)
  417. if err != nil {
  418. return false, err
  419. }
  420. downloads[i].digest = dgst
  421. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Pulling fs layer", nil))
  422. downloadFunc := func(di *downloadInfo) error {
  423. logrus.Debugf("pulling blob %q to V1 img %s", sumStr, img.ID)
  424. if c, err := s.poolAdd("pull", "img:"+img.ID); err != nil {
  425. if c != nil {
  426. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Layer already being pulled by another client. Waiting.", nil))
  427. <-c
  428. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  429. } else {
  430. logrus.Debugf("Image (id: %s) pull is already running, skipping: %v", img.ID, err)
  431. }
  432. } else {
  433. defer s.poolRemove("pull", "img:"+img.ID)
  434. tmpFile, err := ioutil.TempFile("", "GetV2ImageBlob")
  435. if err != nil {
  436. return err
  437. }
  438. r, l, err := r.GetV2ImageBlobReader(endpoint, repoInfo.RemoteName, di.digest, auth)
  439. if err != nil {
  440. return err
  441. }
  442. defer r.Close()
  443. verifier, err := digest.NewDigestVerifier(di.digest)
  444. if err != nil {
  445. return err
  446. }
  447. if _, err := io.Copy(tmpFile, progressreader.New(progressreader.Config{
  448. In: ioutil.NopCloser(io.TeeReader(r, verifier)),
  449. Out: out,
  450. Formatter: sf,
  451. Size: int(l),
  452. NewLines: false,
  453. ID: stringid.TruncateID(img.ID),
  454. Action: "Downloading",
  455. })); err != nil {
  456. return fmt.Errorf("unable to copy v2 image blob data: %s", err)
  457. }
  458. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Verifying Checksum", nil))
  459. if !verifier.Verified() {
  460. logrus.Infof("Image verification failed: checksum mismatch for %q", di.digest.String())
  461. verified = false
  462. }
  463. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  464. logrus.Debugf("Downloaded %s to tempfile %s", img.ID, tmpFile.Name())
  465. di.tmpFile = tmpFile
  466. di.length = l
  467. di.downloaded = true
  468. }
  469. di.imgJSON = imgJSON
  470. return nil
  471. }
  472. if parallel {
  473. downloads[i].err = make(chan error)
  474. go func(di *downloadInfo) {
  475. di.err <- downloadFunc(di)
  476. }(&downloads[i])
  477. } else {
  478. if err := downloadFunc(&downloads[i]); err != nil {
  479. return false, err
  480. }
  481. }
  482. }
  483. var tagUpdated bool
  484. for i := len(downloads) - 1; i >= 0; i-- {
  485. d := &downloads[i]
  486. if d.err != nil {
  487. if err := <-d.err; err != nil {
  488. return false, err
  489. }
  490. }
  491. if d.downloaded {
  492. // if tmpFile is empty assume download and extracted elsewhere
  493. defer os.Remove(d.tmpFile.Name())
  494. defer d.tmpFile.Close()
  495. d.tmpFile.Seek(0, 0)
  496. if d.tmpFile != nil {
  497. err = s.graph.Register(d.img,
  498. progressreader.New(progressreader.Config{
  499. In: d.tmpFile,
  500. Out: out,
  501. Formatter: sf,
  502. Size: int(d.length),
  503. ID: stringid.TruncateID(d.img.ID),
  504. Action: "Extracting",
  505. }))
  506. if err != nil {
  507. return false, err
  508. }
  509. // FIXME: Pool release here for parallel tag pull (ensures any downloads block until fully extracted)
  510. }
  511. out.Write(sf.FormatProgress(stringid.TruncateID(d.img.ID), "Pull complete", nil))
  512. tagUpdated = true
  513. } else {
  514. out.Write(sf.FormatProgress(stringid.TruncateID(d.img.ID), "Already exists", nil))
  515. }
  516. }
  517. // Check for new tag if no layers downloaded
  518. if !tagUpdated {
  519. repo, err := s.Get(repoInfo.LocalName)
  520. if err != nil {
  521. return false, err
  522. }
  523. if repo != nil {
  524. if _, exists := repo[tag]; !exists {
  525. tagUpdated = true
  526. }
  527. } else {
  528. tagUpdated = true
  529. }
  530. }
  531. if verified && tagUpdated {
  532. out.Write(sf.FormatStatus(utils.ImageReference(repoInfo.CanonicalName, tag), "The image you are pulling has been verified. Important: image verification is a tech preview feature and should not be relied on to provide security."))
  533. }
  534. if manifestDigest != "" {
  535. out.Write(sf.FormatStatus("", "Digest: %s", manifestDigest))
  536. }
  537. if utils.DigestReference(tag) {
  538. if err = s.SetDigest(repoInfo.LocalName, tag, downloads[0].img.ID); err != nil {
  539. return false, err
  540. }
  541. } else {
  542. // only set the repository/tag -> image ID mapping when pulling by tag (i.e. not by digest)
  543. if err = s.Tag(repoInfo.LocalName, tag, downloads[0].img.ID, true); err != nil {
  544. return false, err
  545. }
  546. }
  547. return tagUpdated, nil
  548. }