Working with the Container registry --- 使用github做docker镜像仓库
Working with the Container registry
https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry
Pushing container images
This example pushes the latest version of
IMAGE_NAME.docker push ghcr.io/NAMESPACE/IMAGE_NAME:latestReplace
NAMESPACEwith the name of the personal account or organization to which you want the image to be scoped.This example pushes the
2.5version of the image.docker push ghcr.io/NAMESPACE/IMAGE_NAME:2.5When you first publish a package, the default visibility is private. To change the visibility or set access permissions, see "Configuring a package's access control and visibility." You can link a published package to a repository using the user interface or command line. For more information, see "Connecting a repository to a package."
When you push a container image from the command line, the image is not linked to a repository by default. This is the case even if you tag the image with a namespace that matches the name of the repository, such as
ghcr.io/octocat/my-repo:latest.The easiest way to connect a repository to a container package is to publish the package from a workflow using
${{secrets.GITHUB_TOKEN}}, as the repository that contains the workflow is linked automatically. Note that theGITHUB_TOKENwill not have permission to push the package if you have previously pushed a package to the same namespace, but have not connected the package to the repository.To connect a repository when publishing an image from the command line, and to ensure your
GITHUB_TOKENhas appropriate permissions when using a GitHub Actions workflow, we recommend adding the labelorg.opencontainers.image.sourceto yourDockerfile. For more information, see “Labelling container images” in this article and “Publishing and installing a package with GitHub Actions.”
Pulling container images
Pull by digest
To ensure you're always using the same image, you can specify the exact container image version you want to pull by the
digestSHA value.
To find the digest SHA value, use
docker inspectordocker pulland copy the SHA value afterDigest:docker inspect ghcr.io/NAMESPACE/IMAGE_NAMEReplace
NAMESPACEwith the name of the personal account or organization to which the image is scoped.Remove image locally as needed.
docker rmi ghcr.io/NAMESPACE/IMAGE_NAME:latestPull the container image with
@YOUR_SHA_VALUEafter the image name.docker pull ghcr.io/NAMESPACE/IMAGE_NAME@sha256:82jf9a84u29hiasldj289498uhois8498hjs29hkuhsPull by name
docker pull ghcr.io/NAMESPACE/IMAGE_NAMEReplace
NAMESPACEwith the name of the personal account or organization to which the image is scoped.Pull by name and version
Docker CLI example showing an image pulled by its name and the
1.14.1version tag:$ docker pull ghcr.io/NAMESPACE/IMAGE_NAME:1.14.1 > 5e35bd43cf78: Pull complete > 0c48c2209aab: Pull complete > fd45dd1aad5a: Pull complete > db6eb50c2d36: Pull complete > Digest: sha256:ae3b135f133155b3824d8b1f62959ff8a72e9cf9e884d88db7895d8544010d8e > Status: Downloaded newer image for ghcr.io/NAMESPACE/IMAGE_NAME/release:1.14.1 > ghcr.io/NAMESPACE/IMAGE_NAME/release:1.14.1Replace
NAMESPACEwith the name of the personal account or organization to which the image is scoped.Pull by name and latest version
$ docker pull ghcr.io/NAMESPACE/IMAGE_NAME:latest > latest: Pulling from NAMESPACE/IMAGE_NAME > Digest: sha256:b3d3e366b55f9a54599220198b3db5da8f53592acbbb7dc7e4e9878762fc5344 > Status: Downloaded newer image for ghcr.io/NAMESPACE/IMAGE_NAME:latest > ghcr.io/NAMESPACE/IMAGE_NAME:latestReplace
NAMESPACEwith the name of the personal account or organization to which the image is scoped.

浙公网安备 33010602011771号