{"id":13493563,"url":"https://github.com/plexsystems/sinker","last_synced_at":"2026-03-10T07:33:22.645Z","repository":{"id":37845504,"uuid":"262421344","full_name":"plexsystems/sinker","owner":"plexsystems","description":"A tool to sync images from one container registry to another","archived":false,"fork":false,"pushed_at":"2024-06-13T22:25:52.000Z","size":1416,"stargazers_count":627,"open_issues_count":16,"forks_count":54,"subscribers_count":12,"default_branch":"main","last_synced_at":"2025-12-17T15:11:27.211Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/plexsystems.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2020-05-08T20:23:44.000Z","updated_at":"2025-12-02T07:22:05.000Z","dependencies_parsed_at":"2023-01-30T20:45:44.106Z","dependency_job_id":"f67ee4f5-9a75-42c1-ad20-53b54f957387","html_url":"https://github.com/plexsystems/sinker","commit_stats":{"total_commits":87,"total_committers":10,"mean_commits":8.7,"dds":0.1839080459770115,"last_synced_commit":"bb5d49fdcc9ba53afd7335a06dc16ff0b8b0e1a6"},"previous_names":["plexsystems/imagesync"],"tags_count":31,"template":false,"template_full_name":null,"purl":"pkg:github/plexsystems/sinker","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/plexsystems%2Fsinker","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/plexsystems%2Fsinker/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/plexsystems%2Fsinker/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/plexsystems%2Fsinker/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/plexsystems","download_url":"https://codeload.github.com/plexsystems/sinker/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/plexsystems%2Fsinker/sbom","scorecard":{"id":737758,"data":{"date":"2025-08-11","repo":{"name":"github.com/plexsystems/sinker","commit":"e4323d1bce8964cdb13cbecd95ff701caea7d218"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":2.6,"checks":[{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Code-Review","score":4,"reason":"Found 9/20 approved changesets -- score normalized to 4","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/pull_request.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pull_request.yml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/plexsystems/sinker/pull_request.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pull_request.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/plexsystems/sinker/pull_request.yml/main?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:1","Warn: containerImage not pinned by hash: Dockerfile:12: pin your Docker image by updating alpine:3.14.6 to alpine:3.14.6@sha256:06b5d462c92fc39303e6363c65e074559f8d6b1363250027ed5053557e3398c5","Warn: downloadThenRun not pinned by hash: .github/workflows/pull_request.yml:22","Info:   0 out of   2 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   2 containerImage dependencies pinned","Info:   0 out of   1 downloadThenRun dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v0.18.0 not signed: https://api.github.com/repos/plexsystems/sinker/releases/97520485","Warn: release artifact v0.17.0 not signed: https://api.github.com/repos/plexsystems/sinker/releases/68349278","Warn: release artifact v0.16.0 not signed: https://api.github.com/repos/plexsystems/sinker/releases/60486938","Warn: release artifact v0.15.0 not signed: https://api.github.com/repos/plexsystems/sinker/releases/55679827","Warn: release artifact v0.14.3 not signed: https://api.github.com/repos/plexsystems/sinker/releases/51444171","Warn: release artifact v0.18.0 does not have provenance: https://api.github.com/repos/plexsystems/sinker/releases/97520485","Warn: release artifact v0.17.0 does not have provenance: https://api.github.com/repos/plexsystems/sinker/releases/68349278","Warn: release artifact v0.16.0 does not have provenance: https://api.github.com/repos/plexsystems/sinker/releases/60486938","Warn: release artifact v0.15.0 does not have provenance: https://api.github.com/repos/plexsystems/sinker/releases/55679827","Warn: release artifact v0.14.3 does not have provenance: https://api.github.com/repos/plexsystems/sinker/releases/51444171"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'main'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 25 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":0,"reason":"30 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2024-2842 / GHSA-6wvf-f2vw-3425","Warn: Project is vulnerable to: GHSA-hqxw-f8mx-cpmw","Warn: Project is vulnerable to: GO-2023-1699 / GHSA-232p-vwff-86mp","Warn: Project is vulnerable to: GO-2023-1700 / GHSA-33pg-m6jh-5237","Warn: Project is vulnerable to: GO-2023-1701 / GHSA-6wrf-mxfj-pf5p","Warn: Project is vulnerable to: GHSA-jq35-85cj-fj4p","Warn: Project is vulnerable to: GHSA-mq39-4gv4-mvpx","Warn: Project is vulnerable to: GO-2024-3005 / GHSA-v23v-6jw2-98fq","Warn: Project is vulnerable to: GO-2024-2512 / GHSA-xw73-rw38-6vjc","Warn: Project is vulnerable to: GO-2025-3829 / GHSA-4vq8-7jfc-9cvp","Warn: Project is vulnerable to: GO-2023-1683 / GHSA-g2j6-57v7-gm8c","Warn: Project is vulnerable to: GO-2023-1682 / GHSA-m8cg-xc2p-r3fc","Warn: Project is vulnerable to: GO-2023-1627 / GHSA-vpvm-3wq2-2wvm","Warn: Project is vulnerable to: GO-2024-2491 / GHSA-xr7r-f8xq-vfvv","Warn: Project is vulnerable to: GO-2024-3110 / GHSA-jfvp-7x6p-h2pv","Warn: Project is vulnerable to: GO-2023-1754 / GHSA-2h5h-59f5-c5x9","Warn: Project is vulnerable to: GO-2023-1795 / GHSA-frqx-jfcm-6jjr","Warn: Project is vulnerable to: GO-2023-2402 / GHSA-45x7-px36-x8w8","Warn: Project is vulnerable to: GO-2024-3321 / GHSA-v778-237x-gjrc","Warn: Project is vulnerable to: GO-2025-3487 / GHSA-hcg3-q754-cr77","Warn: Project is vulnerable to: GO-2023-1988 / GHSA-2wrh-6pvc-2jm9","Warn: Project is vulnerable to: GO-2023-2102 / GHSA-4374-p667-p6c8","Warn: Project is vulnerable to: GO-2023-2153 / GHSA-m425-mq94-257g / GHSA-qppj-fm5r-hxr3","Warn: Project is vulnerable to: GO-2024-2687 / GHSA-4v7x-pqxf-cx7m","Warn: Project is vulnerable to: GO-2024-3333","Warn: Project is vulnerable to: GO-2025-3503 / GHSA-qxp5-gwg8-xv66","Warn: Project is vulnerable to: GO-2025-3595 / GHSA-vvgc-356p-c3xw","Warn: Project is vulnerable to: GO-2023-1631 / GHSA-hw7c-3rfg-p46j","Warn: Project is vulnerable to: GO-2024-2611 / GHSA-8r3f-844c-mc37","Warn: Project is vulnerable to: GO-2024-2631 / GHSA-c5q2-7r4c-mv6g"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-22T16:24:26.369Z","repository_id":37845504,"created_at":"2025-08-22T16:24:26.369Z","updated_at":"2025-08-22T16:24:26.369Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30326934,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-10T05:25:20.737Z","status":"ssl_error","status_checked_at":"2026-03-10T05:25:17.430Z","response_time":106,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T19:01:16.589Z","updated_at":"2026-03-10T07:33:22.596Z","avatar_url":"https://github.com/plexsystems.png","language":"Go","readme":"# Sinker\n\n[![Go Report Card](https://goreportcard.com/badge/github.com/plexsystems/sinker)](https://goreportcard.com/report/github.com/plexsystems/sinker)\n[![GitHub release](https://img.shields.io/github/release/plexsystems/sinker.svg)](https://github.com/plexsystems/sinker/releases)\n\n![logo](assets/logo.png)\n\n`sinker` syncs container images from one registry to another. This is useful in cases when you rely on images that exist in a public container registry, but need to pull from a private registry.\n\nImages can be sync'd either by using [The image manifest](#the-image-manifest) or via the command line.\n\nSee the [example](https://github.com/plexsystems/sinker/tree/main/example) folder for more details on the produced files.\n\n## Installation\n\n`go install github.com/plexsystems/sinker@latest`\n\nReleases are also provided in the [releases](https://github.com/plexsystems/sinker/releases) tab on GitHub.\n\n## The image manifest\n\n### The target section\n\n```yaml\ntarget:\n  host: mycompany.com\n  repository: myteam\n```\n\nThe `target` section is where the images will be synced to. The above yaml would sync all images to the `myteam` repository hosted at `mycompany.com` (`mycompany.com/myteam/...`)\n\n### The images section\n\n```yaml\ntarget:\n  host: mycompany.com\n  repository: myteam\nsources:\n- repository: coreos/prometheus-operator\n  host: quay.io\n  tag: v0.40.0\n- repository: super/secret\n  tag: v0.3.0\n  auth:\n    username: DOCKER_USER_ENV\n    password: DOCKER_PASSWORD_ENV\n- repository: nginx\n  digest: sha256:bbda10abb0b7dc57cfaab5d70ae55bd5aedfa3271686bace9818bba84cd22c29\n```\n\n### Optional host defaults to Docker Hub\n\nIn both the `target` and `sources` section, the `host` field is _optional_. When no host is set, the host is assumed to be Docker Hub.\n\n### Auth\n\nAll auth is handled by looking at the clients Docker auth. If the client can perform a `docker push` or `docker pull`, sinker will be able to as well.\n\nOptionally, the `auth` section allows you to set the names of _environment variables_ that will be used for creating basic auth to the registry. This could be useful in pipelines where auth is stored in environment variables.\n\n## Sync behavior\n\nIf the `target` registry supports nested paths, the entire source repository will be pushed to the target. For example, the `prometheus-operator` would be pushed to:\n\n```text\nmycompany.com/myteam/coreos/prometheus-operator:v0.40.0\n```\n\n**Registries that support nested paths:** Azure Container Registry (ACR), Amazon Elastic Container Registry (ECR), Google Container Registry (GCR)\n\nIf the `target` registry does _not_ support nested paths, only the base path of the source will be pushed to the target registry. For example, the `prometheus-operator` would be pushed to:\n\n```text\nmycompany.com/myteam/prometheus-operator:v0.40.0\n```\n\n**Registries that do not support nested paths:** Docker Hub, GitHub Container Registry, Quay.io\n\n## Demo\n\nAn example run of the `sinker pull` command which pulls all images specified in the image manifest.\n\n![demo](assets/sinker-pull-demo.gif)\n\nFor additional help, you can run `sinker help`.\n","funding_links":[],"categories":["Go","Container registry tooling","Image"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fplexsystems%2Fsinker","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fplexsystems%2Fsinker","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fplexsystems%2Fsinker/lists"}