Loading
Commits on Source 33
-
that can be used to centraslize parsing logic of different types. It adds a Bool parsing function. Related to #26
-
Hayley Swimelar authored
Add parse package for drivers parameters and implement Bool See merge request !659
-
João Pereira authored
-
Hayley Swimelar authored
refactor(storage/driver): make parse an internal package See merge request !707
-
-
Hayley Swimelar authored
chore: add configs, docs and scripts to generate semantic releases See merge request !708
-
Hayley Swimelar authored
-
João Pereira authored
fix(storage/driver/azure): give deeply nested errors more context See merge request !709
-
João Pereira authored
-
Hayley Swimelar authored
fix(handlers): fallback to OCI media type for manifests with no payload media type See merge request gitlab-org/container-registry!710
-
-
Hayley Swimelar authored
fix(handlers): display error details when invalid media types are detected during a manifest push See merge request !711
-
-
Hayley Swimelar authored
test(handlers): test combinations of payload and Content-Type media types during a manifest push See merge request !712
-
Hayley Swimelar authored
-
João Pereira authored
perf(storage): do not descend into hashstates directors during upload purge See merge request !713
-
João Pereira authored
-
Hayley Swimelar authored
test(handlers): add tests for all media type combinations during manifest list/index uploads See merge request !715
-
João Pereira authored
This also improves consistency of error details. Resolves #426.
-
Hayley Swimelar authored
fix(handlers): default to the schema 2 parser instead of schema 1 for manifest uploads See merge request !714
-
João Pereira authored
Related to #421.
-
Hayley Swimelar authored
fix(handlers): migration_path label should be logged as string See merge request !717
-
João Pereira authored
Resolves #405.
-
João Pereira authored
feat(storage): instrument blob download size and redirect option See merge request !716
-
João Pereira authored
-
Hayley Swimelar authored
fix(handlers): return 400 Bad Request when saving a manifest with unknown media types on the DB See merge request !720
-
Jaime Martinez authored
Use the variable `$CI_MERGE_REQUEST_DIFF_BASE_SHA` instead of `$CI_MERGE_REQUEST_TARGET_BRANCH_SHA` as it is only available in pipelines for merged results and not available for draft MRs either.
-
João Pereira authored
fix: use MR diff SHA in commitlint job See merge request !722
-
João Pereira authored
Related to #407.
-
Hayley Swimelar authored
fix(handlers): handle Buildkit index as an OCI manifest when using the database See merge request !719
-
-
Hayley Swimelar authored
fix(auth/token): fix migration eligibility validation for read requests See merge request !723
-
Hayley Swimelar authored
# [3.7.0](v3.6.2-gitlab...v3.7.0-gitlab) (2021-08-06) ### Bug Fixes * **auth/token:** fix migration eligibility validation for read requests ([65768973](65768973)) * **handlers:** handle Buildkit index as an OCI manifest when using the database ([556ab046](556ab046)) * use MR diff SHA in commitlint job ([f66bccb9](f66bccb9)) * **handlers:** default to the schema 2 parser instead of schema 1 for manifest uploads ([0c62ea47](0c62ea47)) * **handlers:** display error details when invalid media types are detected during a manifest push ([f7502972](f7502972)) * **handlers:** fallback to OCI media type for manifests with no payload media type ([854f3adc](854f3adc)) * **handlers:** migration_path label should be logged as string ([524a6141](524a6141)) * **handlers:** return 400 Bad Request when saving a manifest with unknown media types on the DB ([0a39980a](0a39980a)) * **storage/driver/azure:** give deeply nested errors more context ([3388e1dc](3388e1dc)) ### Features * **storage:** instrument blob download size and redirect option ([f091ff99](f091ff99)) ### Performance Improvements * **storage:** do not descend into hashstates directors during upload purge ([b46d5638](b46d5638))