Manage OCI containers on a Forgejo instance
Go to file
Earl Warren 5dc0c0706f
All checks were successful
/ integration (push) Successful in 3m51s
assume semantic versioning and tag both major & minor versions
2024-04-12 11:18:04 +02:00
.forgejo/workflows upgrade to v1.21 2024-01-12 23:42:50 +01:00
testdata/upload-download assume semantic versioning and tag both major & minor versions 2024-04-12 11:18:04 +02:00
.gitignore initial implementation 2023-04-01 10:44:15 +02:00
action.yml the tag input is required 2024-04-12 11:18:04 +02:00
forgejo-container-image.sh assume semantic versioning and tag both major & minor versions 2024-04-12 11:18:04 +02:00
LICENSE LICENSE is MIT 2023-04-01 11:02:44 +02:00
README.md allow insecure manifest inspect 2023-04-01 18:30:39 +02:00

forgejo-container-image

Description

Copy Forgejo container images from an organization to another.

It must be run from a host supporting with access to Qemu emulation.

Example:

  - uses: actions/forgejo-container-image@v1
    with:
      destination-owner: forgejo-experimental
      project: forgejo
      tag: v3.1.2-2
      doer: release-team
      token: ${{ secrets.RELEASETEAM_TOKEN }}

Inputs

parameter description required default
url URL of the Forgejo instance (default to env.GITHUB_SERVER_URL) false
owner the owner to copy images from (default to the first part of github.repository) false
project the project to copy images from (default to the last part of github.repository) false
destination-owner the owner to copy images to true
tag Tag of the container image (default github.ref_name) false
archs Supported architectures false amd64 arm64
suffixes Space separated list of suffixes of the images to copy false -rootless
doer Forgejo user that owns the token and authors the upload true
token Forgejo application token, with package scope (write, read, delete) true
insecure If true allows communication with an http/insecure Forgejo instance false false
verbose Increase the verbosity level false false