pull.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626
  1. package graph
  2. import (
  3. "fmt"
  4. "io"
  5. "io/ioutil"
  6. "net"
  7. "net/url"
  8. "os"
  9. "strings"
  10. "time"
  11. "github.com/Sirupsen/logrus"
  12. "github.com/docker/distribution/digest"
  13. "github.com/docker/docker/engine"
  14. "github.com/docker/docker/image"
  15. "github.com/docker/docker/pkg/progressreader"
  16. "github.com/docker/docker/pkg/streamformatter"
  17. "github.com/docker/docker/pkg/stringid"
  18. "github.com/docker/docker/registry"
  19. "github.com/docker/docker/utils"
  20. )
  21. func (s *TagStore) CmdPull(job *engine.Job) error {
  22. if n := len(job.Args); n != 1 && n != 2 {
  23. return fmt.Errorf("Usage: %s IMAGE [TAG|DIGEST]", job.Name)
  24. }
  25. var (
  26. localName = job.Args[0]
  27. tag string
  28. sf = streamformatter.NewStreamFormatter(job.GetenvBool("json"))
  29. authConfig = &registry.AuthConfig{}
  30. metaHeaders map[string][]string
  31. )
  32. // Resolve the Repository name from fqn to RepositoryInfo
  33. repoInfo, err := s.registryService.ResolveRepository(localName)
  34. if err != nil {
  35. return err
  36. }
  37. if len(job.Args) > 1 {
  38. tag = job.Args[1]
  39. }
  40. job.GetenvJson("authConfig", authConfig)
  41. job.GetenvJson("metaHeaders", &metaHeaders)
  42. c, err := s.poolAdd("pull", utils.ImageReference(repoInfo.LocalName, tag))
  43. if err != nil {
  44. if c != nil {
  45. // Another pull of the same repository is already taking place; just wait for it to finish
  46. job.Stdout.Write(sf.FormatStatus("", "Repository %s already being pulled by another client. Waiting.", repoInfo.LocalName))
  47. <-c
  48. return nil
  49. }
  50. return err
  51. }
  52. defer s.poolRemove("pull", utils.ImageReference(repoInfo.LocalName, tag))
  53. logrus.Debugf("pulling image from host %q with remote name %q", repoInfo.Index.Name, repoInfo.RemoteName)
  54. endpoint, err := repoInfo.GetEndpoint()
  55. if err != nil {
  56. return err
  57. }
  58. r, err := registry.NewSession(authConfig, registry.HTTPRequestFactory(metaHeaders), endpoint, true)
  59. if err != nil {
  60. return err
  61. }
  62. logName := repoInfo.LocalName
  63. if tag != "" {
  64. logName = utils.ImageReference(logName, tag)
  65. }
  66. if len(repoInfo.Index.Mirrors) == 0 && (repoInfo.Index.Official || endpoint.Version == registry.APIVersion2) {
  67. if repoInfo.Official {
  68. j := job.Eng.Job("trust_update_base")
  69. if err = j.Run(); err != nil {
  70. logrus.Errorf("error updating trust base graph: %s", err)
  71. }
  72. }
  73. logrus.Debugf("pulling v2 repository with local name %q", repoInfo.LocalName)
  74. if err := s.pullV2Repository(job.Eng, r, job.Stdout, repoInfo, tag, sf, job.GetenvBool("parallel")); err == nil {
  75. s.eventsService.Log("pull", logName, "")
  76. return nil
  77. } else if err != registry.ErrDoesNotExist && err != ErrV2RegistryUnavailable {
  78. logrus.Errorf("Error from V2 registry: %s", err)
  79. }
  80. logrus.Debug("image does not exist on v2 registry, falling back to v1")
  81. }
  82. logrus.Debugf("pulling v1 repository with local name %q", repoInfo.LocalName)
  83. if err = s.pullRepository(r, job.Stdout, repoInfo, tag, sf, job.GetenvBool("parallel")); err != nil {
  84. return err
  85. }
  86. s.eventsService.Log("pull", logName, "")
  87. return nil
  88. }
  89. func (s *TagStore) pullRepository(r *registry.Session, out io.Writer, repoInfo *registry.RepositoryInfo, askedTag string, sf *streamformatter.StreamFormatter, parallel bool) error {
  90. out.Write(sf.FormatStatus("", "Pulling repository %s", repoInfo.CanonicalName))
  91. repoData, err := r.GetRepositoryData(repoInfo.RemoteName)
  92. if err != nil {
  93. if strings.Contains(err.Error(), "HTTP code: 404") {
  94. return fmt.Errorf("Error: image %s not found", utils.ImageReference(repoInfo.RemoteName, askedTag))
  95. }
  96. // Unexpected HTTP error
  97. return err
  98. }
  99. logrus.Debugf("Retrieving the tag list")
  100. tagsList, err := r.GetRemoteTags(repoData.Endpoints, repoInfo.RemoteName, repoData.Tokens)
  101. if err != nil {
  102. logrus.Errorf("unable to get remote tags: %s", err)
  103. return err
  104. }
  105. for tag, id := range tagsList {
  106. repoData.ImgList[id] = &registry.ImgData{
  107. ID: id,
  108. Tag: tag,
  109. Checksum: "",
  110. }
  111. }
  112. logrus.Debugf("Registering tags")
  113. // If no tag has been specified, pull them all
  114. if askedTag == "" {
  115. for tag, id := range tagsList {
  116. repoData.ImgList[id].Tag = tag
  117. }
  118. } else {
  119. // Otherwise, check that the tag exists and use only that one
  120. id, exists := tagsList[askedTag]
  121. if !exists {
  122. return fmt.Errorf("Tag %s not found in repository %s", askedTag, repoInfo.CanonicalName)
  123. }
  124. repoData.ImgList[id].Tag = askedTag
  125. }
  126. errors := make(chan error)
  127. layersDownloaded := false
  128. for _, image := range repoData.ImgList {
  129. downloadImage := func(img *registry.ImgData) {
  130. if askedTag != "" && img.Tag != askedTag {
  131. if parallel {
  132. errors <- nil
  133. }
  134. return
  135. }
  136. if img.Tag == "" {
  137. logrus.Debugf("Image (id: %s) present in this repository but untagged, skipping", img.ID)
  138. if parallel {
  139. errors <- nil
  140. }
  141. return
  142. }
  143. // ensure no two downloads of the same image happen at the same time
  144. if c, err := s.poolAdd("pull", "img:"+img.ID); err != nil {
  145. if c != nil {
  146. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Layer already being pulled by another client. Waiting.", nil))
  147. <-c
  148. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  149. } else {
  150. logrus.Debugf("Image (id: %s) pull is already running, skipping: %v", img.ID, err)
  151. }
  152. if parallel {
  153. errors <- nil
  154. }
  155. return
  156. }
  157. defer s.poolRemove("pull", "img:"+img.ID)
  158. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Pulling image (%s) from %s", img.Tag, repoInfo.CanonicalName), nil))
  159. success := false
  160. var lastErr, err error
  161. var isDownloaded bool
  162. for _, ep := range repoInfo.Index.Mirrors {
  163. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Pulling image (%s) from %s, mirror: %s", img.Tag, repoInfo.CanonicalName, ep), nil))
  164. if isDownloaded, err = s.pullImage(r, out, img.ID, ep, repoData.Tokens, sf); err != nil {
  165. // Don't report errors when pulling from mirrors.
  166. logrus.Debugf("Error pulling image (%s) from %s, mirror: %s, %s", img.Tag, repoInfo.CanonicalName, ep, err)
  167. continue
  168. }
  169. layersDownloaded = layersDownloaded || isDownloaded
  170. success = true
  171. break
  172. }
  173. if !success {
  174. for _, ep := range repoData.Endpoints {
  175. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Pulling image (%s) from %s, endpoint: %s", img.Tag, repoInfo.CanonicalName, ep), nil))
  176. if isDownloaded, err = s.pullImage(r, out, img.ID, ep, repoData.Tokens, sf); err != nil {
  177. // It's not ideal that only the last error is returned, it would be better to concatenate the errors.
  178. // As the error is also given to the output stream the user will see the error.
  179. lastErr = err
  180. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), fmt.Sprintf("Error pulling image (%s) from %s, endpoint: %s, %s", img.Tag, repoInfo.CanonicalName, ep, err), nil))
  181. continue
  182. }
  183. layersDownloaded = layersDownloaded || isDownloaded
  184. success = true
  185. break
  186. }
  187. }
  188. if !success {
  189. err := fmt.Errorf("Error pulling image (%s) from %s, %v", img.Tag, repoInfo.CanonicalName, lastErr)
  190. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), err.Error(), nil))
  191. if parallel {
  192. errors <- err
  193. return
  194. }
  195. }
  196. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  197. if parallel {
  198. errors <- nil
  199. }
  200. }
  201. if parallel {
  202. go downloadImage(image)
  203. } else {
  204. downloadImage(image)
  205. }
  206. }
  207. if parallel {
  208. var lastError error
  209. for i := 0; i < len(repoData.ImgList); i++ {
  210. if err := <-errors; err != nil {
  211. lastError = err
  212. }
  213. }
  214. if lastError != nil {
  215. return lastError
  216. }
  217. }
  218. for tag, id := range tagsList {
  219. if askedTag != "" && tag != askedTag {
  220. continue
  221. }
  222. if err := s.Set(repoInfo.LocalName, tag, id, true); err != nil {
  223. return err
  224. }
  225. }
  226. requestedTag := repoInfo.CanonicalName
  227. if len(askedTag) > 0 {
  228. requestedTag = utils.ImageReference(repoInfo.CanonicalName, askedTag)
  229. }
  230. WriteStatus(requestedTag, out, sf, layersDownloaded)
  231. return nil
  232. }
  233. func (s *TagStore) pullImage(r *registry.Session, out io.Writer, imgID, endpoint string, token []string, sf *streamformatter.StreamFormatter) (bool, error) {
  234. history, err := r.GetRemoteHistory(imgID, endpoint, token)
  235. if err != nil {
  236. return false, err
  237. }
  238. out.Write(sf.FormatProgress(stringid.TruncateID(imgID), "Pulling dependent layers", nil))
  239. // FIXME: Try to stream the images?
  240. // FIXME: Launch the getRemoteImage() in goroutines
  241. layersDownloaded := false
  242. for i := len(history) - 1; i >= 0; i-- {
  243. id := history[i]
  244. // ensure no two downloads of the same layer happen at the same time
  245. if c, err := s.poolAdd("pull", "layer:"+id); err != nil {
  246. logrus.Debugf("Image (id: %s) pull is already running, skipping: %v", id, err)
  247. <-c
  248. }
  249. defer s.poolRemove("pull", "layer:"+id)
  250. if !s.graph.Exists(id) {
  251. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Pulling metadata", nil))
  252. var (
  253. imgJSON []byte
  254. imgSize int
  255. err error
  256. img *image.Image
  257. )
  258. retries := 5
  259. for j := 1; j <= retries; j++ {
  260. imgJSON, imgSize, err = r.GetRemoteImageJSON(id, endpoint, token)
  261. if err != nil && j == retries {
  262. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error pulling dependent layers", nil))
  263. return layersDownloaded, err
  264. } else if err != nil {
  265. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  266. continue
  267. }
  268. img, err = image.NewImgJSON(imgJSON)
  269. layersDownloaded = true
  270. if err != nil && j == retries {
  271. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error pulling dependent layers", nil))
  272. return layersDownloaded, fmt.Errorf("Failed to parse json: %s", err)
  273. } else if err != nil {
  274. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  275. continue
  276. } else {
  277. break
  278. }
  279. }
  280. for j := 1; j <= retries; j++ {
  281. // Get the layer
  282. status := "Pulling fs layer"
  283. if j > 1 {
  284. status = fmt.Sprintf("Pulling fs layer [retries: %d]", j)
  285. }
  286. out.Write(sf.FormatProgress(stringid.TruncateID(id), status, nil))
  287. layer, err := r.GetRemoteImageLayer(img.ID, endpoint, token, int64(imgSize))
  288. if uerr, ok := err.(*url.Error); ok {
  289. err = uerr.Err
  290. }
  291. if terr, ok := err.(net.Error); ok && terr.Timeout() && j < retries {
  292. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  293. continue
  294. } else if err != nil {
  295. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error pulling dependent layers", nil))
  296. return layersDownloaded, err
  297. }
  298. layersDownloaded = true
  299. defer layer.Close()
  300. err = s.graph.Register(img,
  301. progressreader.New(progressreader.Config{
  302. In: layer,
  303. Out: out,
  304. Formatter: sf,
  305. Size: imgSize,
  306. NewLines: false,
  307. ID: stringid.TruncateID(id),
  308. Action: "Downloading",
  309. }))
  310. if terr, ok := err.(net.Error); ok && terr.Timeout() && j < retries {
  311. time.Sleep(time.Duration(j) * 500 * time.Millisecond)
  312. continue
  313. } else if err != nil {
  314. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Error downloading dependent layers", nil))
  315. return layersDownloaded, err
  316. } else {
  317. break
  318. }
  319. }
  320. }
  321. out.Write(sf.FormatProgress(stringid.TruncateID(id), "Download complete", nil))
  322. }
  323. return layersDownloaded, nil
  324. }
  325. func WriteStatus(requestedTag string, out io.Writer, sf *streamformatter.StreamFormatter, layersDownloaded bool) {
  326. if layersDownloaded {
  327. out.Write(sf.FormatStatus("", "Status: Downloaded newer image for %s", requestedTag))
  328. } else {
  329. out.Write(sf.FormatStatus("", "Status: Image is up to date for %s", requestedTag))
  330. }
  331. }
  332. // downloadInfo is used to pass information from download to extractor
  333. type downloadInfo struct {
  334. imgJSON []byte
  335. img *image.Image
  336. digest digest.Digest
  337. tmpFile *os.File
  338. length int64
  339. downloaded bool
  340. err chan error
  341. }
  342. func (s *TagStore) pullV2Repository(eng *engine.Engine, r *registry.Session, out io.Writer, repoInfo *registry.RepositoryInfo, tag string, sf *streamformatter.StreamFormatter, parallel bool) error {
  343. endpoint, err := r.V2RegistryEndpoint(repoInfo.Index)
  344. if err != nil {
  345. if repoInfo.Index.Official {
  346. logrus.Debugf("Unable to pull from V2 registry, falling back to v1: %s", err)
  347. return ErrV2RegistryUnavailable
  348. }
  349. return fmt.Errorf("error getting registry endpoint: %s", err)
  350. }
  351. auth, err := r.GetV2Authorization(endpoint, repoInfo.RemoteName, true)
  352. if err != nil {
  353. return fmt.Errorf("error getting authorization: %s", err)
  354. }
  355. var layersDownloaded bool
  356. if tag == "" {
  357. logrus.Debugf("Pulling tag list from V2 registry for %s", repoInfo.CanonicalName)
  358. tags, err := r.GetV2RemoteTags(endpoint, repoInfo.RemoteName, auth)
  359. if err != nil {
  360. return err
  361. }
  362. if len(tags) == 0 {
  363. return registry.ErrDoesNotExist
  364. }
  365. for _, t := range tags {
  366. if downloaded, err := s.pullV2Tag(eng, r, out, endpoint, repoInfo, t, sf, parallel, auth); err != nil {
  367. return err
  368. } else if downloaded {
  369. layersDownloaded = true
  370. }
  371. }
  372. } else {
  373. if downloaded, err := s.pullV2Tag(eng, r, out, endpoint, repoInfo, tag, sf, parallel, auth); err != nil {
  374. return err
  375. } else if downloaded {
  376. layersDownloaded = true
  377. }
  378. }
  379. requestedTag := repoInfo.CanonicalName
  380. if len(tag) > 0 {
  381. requestedTag = utils.ImageReference(repoInfo.CanonicalName, tag)
  382. }
  383. WriteStatus(requestedTag, out, sf, layersDownloaded)
  384. return nil
  385. }
  386. func (s *TagStore) pullV2Tag(eng *engine.Engine, r *registry.Session, out io.Writer, endpoint *registry.Endpoint, repoInfo *registry.RepositoryInfo, tag string, sf *streamformatter.StreamFormatter, parallel bool, auth *registry.RequestAuthorization) (bool, error) {
  387. logrus.Debugf("Pulling tag from V2 registry: %q", tag)
  388. manifestBytes, manifestDigest, err := r.GetV2ImageManifest(endpoint, repoInfo.RemoteName, tag, auth)
  389. if err != nil {
  390. return false, err
  391. }
  392. // loadManifest ensures that the manifest payload has the expected digest
  393. // if the tag is a digest reference.
  394. manifest, verified, err := s.loadManifest(eng, manifestBytes, manifestDigest, tag)
  395. if err != nil {
  396. return false, fmt.Errorf("error verifying manifest: %s", err)
  397. }
  398. if err := checkValidManifest(manifest); err != nil {
  399. return false, err
  400. }
  401. if verified {
  402. logrus.Printf("Image manifest for %s has been verified", utils.ImageReference(repoInfo.CanonicalName, tag))
  403. }
  404. out.Write(sf.FormatStatus(tag, "Pulling from %s", repoInfo.CanonicalName))
  405. downloads := make([]downloadInfo, len(manifest.FSLayers))
  406. for i := len(manifest.FSLayers) - 1; i >= 0; i-- {
  407. var (
  408. sumStr = manifest.FSLayers[i].BlobSum
  409. imgJSON = []byte(manifest.History[i].V1Compatibility)
  410. )
  411. img, err := image.NewImgJSON(imgJSON)
  412. if err != nil {
  413. return false, fmt.Errorf("failed to parse json: %s", err)
  414. }
  415. downloads[i].img = img
  416. // Check if exists
  417. if s.graph.Exists(img.ID) {
  418. logrus.Debugf("Image already exists: %s", img.ID)
  419. continue
  420. }
  421. dgst, err := digest.ParseDigest(sumStr)
  422. if err != nil {
  423. return false, err
  424. }
  425. downloads[i].digest = dgst
  426. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Pulling fs layer", nil))
  427. downloadFunc := func(di *downloadInfo) error {
  428. logrus.Debugf("pulling blob %q to V1 img %s", sumStr, img.ID)
  429. if c, err := s.poolAdd("pull", "img:"+img.ID); err != nil {
  430. if c != nil {
  431. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Layer already being pulled by another client. Waiting.", nil))
  432. <-c
  433. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  434. } else {
  435. logrus.Debugf("Image (id: %s) pull is already running, skipping: %v", img.ID, err)
  436. }
  437. } else {
  438. defer s.poolRemove("pull", "img:"+img.ID)
  439. tmpFile, err := ioutil.TempFile("", "GetV2ImageBlob")
  440. if err != nil {
  441. return err
  442. }
  443. r, l, err := r.GetV2ImageBlobReader(endpoint, repoInfo.RemoteName, di.digest.Algorithm(), di.digest.Hex(), auth)
  444. if err != nil {
  445. return err
  446. }
  447. defer r.Close()
  448. verifier, err := digest.NewDigestVerifier(di.digest)
  449. if err != nil {
  450. return err
  451. }
  452. if _, err := io.Copy(tmpFile, progressreader.New(progressreader.Config{
  453. In: ioutil.NopCloser(io.TeeReader(r, verifier)),
  454. Out: out,
  455. Formatter: sf,
  456. Size: int(l),
  457. NewLines: false,
  458. ID: stringid.TruncateID(img.ID),
  459. Action: "Downloading",
  460. })); err != nil {
  461. return fmt.Errorf("unable to copy v2 image blob data: %s", err)
  462. }
  463. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Verifying Checksum", nil))
  464. if !verifier.Verified() {
  465. logrus.Infof("Image verification failed: checksum mismatch for %q", di.digest.String())
  466. verified = false
  467. }
  468. out.Write(sf.FormatProgress(stringid.TruncateID(img.ID), "Download complete", nil))
  469. logrus.Debugf("Downloaded %s to tempfile %s", img.ID, tmpFile.Name())
  470. di.tmpFile = tmpFile
  471. di.length = l
  472. di.downloaded = true
  473. }
  474. di.imgJSON = imgJSON
  475. return nil
  476. }
  477. if parallel {
  478. downloads[i].err = make(chan error)
  479. go func(di *downloadInfo) {
  480. di.err <- downloadFunc(di)
  481. }(&downloads[i])
  482. } else {
  483. err := downloadFunc(&downloads[i])
  484. if err != nil {
  485. return false, err
  486. }
  487. }
  488. }
  489. var tagUpdated bool
  490. for i := len(downloads) - 1; i >= 0; i-- {
  491. d := &downloads[i]
  492. if d.err != nil {
  493. err := <-d.err
  494. if err != nil {
  495. return false, err
  496. }
  497. }
  498. if d.downloaded {
  499. // if tmpFile is empty assume download and extracted elsewhere
  500. defer os.Remove(d.tmpFile.Name())
  501. defer d.tmpFile.Close()
  502. d.tmpFile.Seek(0, 0)
  503. if d.tmpFile != nil {
  504. err = s.graph.Register(d.img,
  505. progressreader.New(progressreader.Config{
  506. In: d.tmpFile,
  507. Out: out,
  508. Formatter: sf,
  509. Size: int(d.length),
  510. ID: stringid.TruncateID(d.img.ID),
  511. Action: "Extracting",
  512. }))
  513. if err != nil {
  514. return false, err
  515. }
  516. // FIXME: Pool release here for parallel tag pull (ensures any downloads block until fully extracted)
  517. }
  518. out.Write(sf.FormatProgress(stringid.TruncateID(d.img.ID), "Pull complete", nil))
  519. tagUpdated = true
  520. } else {
  521. out.Write(sf.FormatProgress(stringid.TruncateID(d.img.ID), "Already exists", nil))
  522. }
  523. }
  524. // Check for new tag if no layers downloaded
  525. if !tagUpdated {
  526. repo, err := s.Get(repoInfo.LocalName)
  527. if err != nil {
  528. return false, err
  529. }
  530. if repo != nil {
  531. if _, exists := repo[tag]; !exists {
  532. tagUpdated = true
  533. }
  534. } else {
  535. tagUpdated = true
  536. }
  537. }
  538. if verified && tagUpdated {
  539. out.Write(sf.FormatStatus(utils.ImageReference(repoInfo.CanonicalName, tag), "The image you are pulling has been verified. Important: image verification is a tech preview feature and should not be relied on to provide security."))
  540. }
  541. if manifestDigest != "" {
  542. out.Write(sf.FormatStatus("", "Digest: %s", manifestDigest))
  543. }
  544. if utils.DigestReference(tag) {
  545. if err = s.SetDigest(repoInfo.LocalName, tag, downloads[0].img.ID); err != nil {
  546. return false, err
  547. }
  548. } else {
  549. // only set the repository/tag -> image ID mapping when pulling by tag (i.e. not by digest)
  550. if err = s.Set(repoInfo.LocalName, tag, downloads[0].img.ID, true); err != nil {
  551. return false, err
  552. }
  553. }
  554. return tagUpdated, nil
  555. }