@@ -394,30 +394,28 @@ async fn initialize_ostree_root_from_self(
394
394
let opts = & state. target_opts ;
395
395
let cancellable = gio:: Cancellable :: NONE ;
396
396
397
- // Parse the target CLI image reference options
397
+ // Parse the target CLI image reference options and create the *target* image
398
+ // reference, which defaults to pulling from a registry.
398
399
let target_sigverify = if opts. target_no_signature_verification {
399
400
SignatureSource :: ContainerPolicyAllowInsecure
400
401
} else if let Some ( remote) = opts. target_ostree_remote . as_deref ( ) {
401
402
SignatureSource :: OstreeRemote ( remote. to_string ( ) )
402
403
} else {
403
404
SignatureSource :: ContainerPolicy
404
405
} ;
405
- let target_imgref = if let Some ( imgref) = opts. target_imgref . as_ref ( ) {
406
- let transport = ostree_container:: Transport :: try_from ( opts. target_transport . as_str ( ) ) ?;
407
- let imgref = ostree_container:: ImageReference {
408
- transport,
409
- name : imgref. to_string ( ) ,
410
- } ;
411
- ostree_container:: OstreeImageReference {
412
- sigverify : target_sigverify,
413
- imgref,
414
- }
415
- } else {
416
- ostree_container:: OstreeImageReference {
417
- sigverify : target_sigverify,
418
- imgref : state. source . imageref . clone ( ) ,
419
- }
406
+ let target_imgname = opts
407
+ . target_imgref
408
+ . as_deref ( )
409
+ . unwrap_or_else ( || state. source . imageref . name . as_str ( ) ) ;
410
+ let target_transport = ostree_container:: Transport :: try_from ( opts. target_transport . as_str ( ) ) ?;
411
+ let target_imgref = ostree_container:: OstreeImageReference {
412
+ sigverify : target_sigverify,
413
+ imgref : ostree_container:: ImageReference {
414
+ transport : target_transport,
415
+ name : target_imgname. to_string ( ) ,
416
+ } ,
420
417
} ;
418
+ tracing:: debug!( "Target image reference: {target_imgref}" ) ;
421
419
422
420
// TODO: make configurable?
423
421
let stateroot = STATEROOT_DEFAULT ;
0 commit comments