You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use neutral words instead of vendor-specific strings whenever possible.
Replace `github.com/docker/docker` with `github.com/moby/moby`,
but do not change other repos like `github.com/docker/docker-registry`.
Here we don't change HTTP headers, as those would need more discussions.
Signed-off-by: Dongsu Park <[email protected]>
<!--- TODO: add relevant background information here --->
@@ -102,15 +102,15 @@ The following is an incomplete list of features, discussed during the process of
102
102
103
103
### Image Verification
104
104
105
-
A docker engine instance would like to run verified image named "library/ubuntu", with the tag "latest".
105
+
A container engine would like to run verified image named "library/ubuntu", with the tag "latest".
106
106
The engine contacts the registry, requesting the manifest for "library/ubuntu:latest".
107
107
An untrusted registry returns a manifest.
108
108
Before proceeding to download the individual layers, the engine verifies the manifest's signature, ensuring that the content was produced from a trusted source and no tampering has occurred.
109
109
After each layer is downloaded, the engine verifies the digest of the layer, ensuring that the content matches that specified by the manifest.
110
110
111
111
### Resumable Push
112
112
113
-
Company X's build servers lose connectivity to docker registry before completing an image layer transfer.
113
+
Company X's build servers lose connectivity to a distribution endpoint before completing an image layer transfer.
114
114
After connectivity returns, the build server attempts to re-upload the image.
115
115
The registry notifies the build server that the upload has already been partially attempted.
116
116
The build server responds by only sending the remaining data to complete the image file.
@@ -123,7 +123,7 @@ The client keeps the partial data and uses http `Range` requests to avoid downlo
123
123
124
124
### Layer Upload De-duplication
125
125
126
-
Company Y's build system creates two identical docker layers from build processes A and B.
126
+
Company Y's build system creates two identical layers from build processes A and B.
127
127
Build process A completes uploading the layer before B.
128
128
When process B attempts to upload the layer, the registry indicates that its not necessary because the layer is already known.
129
129
@@ -161,7 +161,7 @@ More strictly, it must match the regular expression `[a-z0-9]+(?:[._-][a-z0-9]+)
161
161
2. If a repository name has two or more path components, they must be separated by a forward slash ("/").
162
162
3. The total length of a repository name, including slashes, must be less than 256 characters.
163
163
164
-
These name requirements _only_ apply to the registry API and should accept a superset of what is supported by other docker ecosystem components.
164
+
These name requirements _only_ apply to the registry API and should accept a superset of what is supported by other components.
165
165
166
166
All endpoints should support aggressive http caching, compression and range headers, where appropriate.
167
167
The new API attempts to leverage HTTP semantics where possible but may break from standards to implement targeted features.
@@ -294,7 +294,7 @@ For reference, the relevant manifest fields for the registry are the following:
294
294
| fsLayers | A list of layer descriptors (including digest) |
295
295
| signature | A JWS used to verify the manifest content |
296
296
297
-
For more information about the manifest format, please see [docker/docker#8093](https://github.com/docker/docker/issues/8093).
297
+
For more information about the manifest format, please see [moby/moby#8093](https://github.com/moby/moby/issues/8093).
298
298
299
299
When the manifest is in hand, the client must verify the signature to ensure the names and layers are valid.
300
300
Once confirmed, the client will then use the digests to download the individual layers.
@@ -316,7 +316,7 @@ For more details on the manifest formats and their content types, see [manifest-
316
316
In a successful response, the Content-Type header will indicate which manifest type is being returned.
317
317
318
318
A `404 Not Found` response will be returned if the image is unknown to the registry.
319
-
If the image exists and the response is successful, the image manifest will be returned, with the following format (see [docker/docker#8093](https://github.com/docker/docker/issues/8093) for details):
319
+
If the image exists and the response is successful, the image manifest will be returned, with the following format (see [moby/moby#8093](https://github.com/moby/moby/issues/8093) for details):
320
320
321
321
{
322
322
"name": <name>,
@@ -899,7 +899,7 @@ A list of methods and URIs are covered in the table below:
| GET |`/v2/`| Base | Check that the endpoint implements Docker Registry API V2. |
902
+
| GET |`/v2/`| Base | Check that the endpoint implements distribution API. |
903
903
| GET |`/v2/<name>/tags/list`| Tags | Fetch the tags under the repository identified by `name`. |
904
904
| GET |`/v2/<name>/manifests/<reference>`| Manifest | Fetch the manifest identified by `name` and `reference` where `reference` can be a tag or digest. A `HEAD` request can also be issued to this endpoint to obtain resource information without receiving all data. |
905
905
| PUT |`/v2/<name>/manifests/<reference>`| Manifest | Put the manifest identified by `name` and `reference` where `reference` can be a tag or digest. |
@@ -944,7 +944,7 @@ Typically, this can be used for lightweight version checks and to validate regis
944
944
945
945
#### GET Base
946
946
947
-
Check that the endpoint implements Docker Registry API V2.
947
+
Check that the endpoint implements the distribution API.
0 commit comments