Merge pull request #9265 from vrothberg/vendor-common

vendor latest containers/common
This commit is contained in:
OpenShift Merge Robot
2021-02-08 09:15:08 -05:00
committed by GitHub
15 changed files with 137 additions and 159 deletions

2
go.mod
View File

@ -11,7 +11,7 @@ require (
github.com/containernetworking/cni v0.8.1 github.com/containernetworking/cni v0.8.1
github.com/containernetworking/plugins v0.9.0 github.com/containernetworking/plugins v0.9.0
github.com/containers/buildah v1.19.3 github.com/containers/buildah v1.19.3
github.com/containers/common v0.33.1 github.com/containers/common v0.34.3-0.20210208115708-8668c76dd577
github.com/containers/conmon v2.0.20+incompatible github.com/containers/conmon v2.0.20+incompatible
github.com/containers/image/v5 v5.10.1 github.com/containers/image/v5 v5.10.1
github.com/containers/psgo v1.5.2 github.com/containers/psgo v1.5.2

2
go.sum
View File

@ -101,6 +101,8 @@ github.com/containers/buildah v1.19.3 h1:U0E1UKzqW5C11W7giHhLZI06xkZiV40ZKDK/c1j
github.com/containers/buildah v1.19.3/go.mod h1:uZb6GuE36tmRSOcIXGfiYqdpr+GPXWmlUIJSk5sn19w= github.com/containers/buildah v1.19.3/go.mod h1:uZb6GuE36tmRSOcIXGfiYqdpr+GPXWmlUIJSk5sn19w=
github.com/containers/common v0.33.1 h1:XpDiq8Cta8+u1s4kpYSEWdB140ZmqgyIXfWkLqKx3z0= github.com/containers/common v0.33.1 h1:XpDiq8Cta8+u1s4kpYSEWdB140ZmqgyIXfWkLqKx3z0=
github.com/containers/common v0.33.1/go.mod h1:mjDo/NKeweL/onaspLhZ38WnHXaYmrELHclIdvSnYpY= github.com/containers/common v0.33.1/go.mod h1:mjDo/NKeweL/onaspLhZ38WnHXaYmrELHclIdvSnYpY=
github.com/containers/common v0.34.3-0.20210208115708-8668c76dd577 h1:tUJcLouJ1bC3w9gdqgKqZBsj2uCuM8D8jSR592lxbhE=
github.com/containers/common v0.34.3-0.20210208115708-8668c76dd577/go.mod h1:mwZ9H8sK4+dtWxsnVLyWcjxK/gEQClrLsXsqLvbEKbI=
github.com/containers/conmon v2.0.20+incompatible h1:YbCVSFSCqFjjVwHTPINGdMX1F6JXHGTUje2ZYobNrkg= github.com/containers/conmon v2.0.20+incompatible h1:YbCVSFSCqFjjVwHTPINGdMX1F6JXHGTUje2ZYobNrkg=
github.com/containers/conmon v2.0.20+incompatible/go.mod h1:hgwZ2mtuDrppv78a/cOBNiCm6O0UMWGx1mu7P00nu5I= github.com/containers/conmon v2.0.20+incompatible/go.mod h1:hgwZ2mtuDrppv78a/cOBNiCm6O0UMWGx1mu7P00nu5I=
github.com/containers/image/v5 v5.9.0 h1:dRmUtcluQcmasNo3DpnRoZjfU0rOu1qZeL6wlDJr10Q= github.com/containers/image/v5 v5.9.0 h1:dRmUtcluQcmasNo3DpnRoZjfU0rOu1qZeL6wlDJr10Q=

View File

@ -13,7 +13,7 @@ var (
isCgroupV2Err error isCgroupV2Err error
) )
// Enabled returns whether we are running in cgroup 2 cgroup2 mode. // Enabled returns whether we are running on cgroup v2
func Enabled() (bool, error) { func Enabled() (bool, error) {
isCgroupV2Once.Do(func() { isCgroupV2Once.Do(func() {
var st syscall.Statfs_t var st syscall.Statfs_t

View File

@ -2,7 +2,7 @@
package cgroupv2 package cgroupv2
// Enabled returns whether we are running in cgroup 2 cgroup2 mode. // Enabled returns whether we are running on cgroup v2
func Enabled() (bool, error) { func Enabled() (bool, error) {
return false, nil return false, nil
} }

View File

@ -187,10 +187,6 @@ type ContainersConfig struct {
// EngineConfig contains configuration options used to set up a engine runtime // EngineConfig contains configuration options used to set up a engine runtime
type EngineConfig struct { type EngineConfig struct {
// ImageBuildFormat indicates the default image format to building
// container images. Valid values are "oci" (default) or "docker".
ImageBuildFormat string `toml:"image_build_format,omitempty"`
// CgroupCheck indicates the configuration has been rewritten after an // CgroupCheck indicates the configuration has been rewritten after an
// upgrade to Fedora 31 to change the default OCI runtime for cgroupv2v2. // upgrade to Fedora 31 to change the default OCI runtime for cgroupv2v2.
CgroupCheck bool `toml:"cgroup_check,omitempty"` CgroupCheck bool `toml:"cgroup_check,omitempty"`
@ -235,10 +231,25 @@ type EngineConfig struct {
// this slice takes precedence. // this slice takes precedence.
HooksDir []string `toml:"hooks_dir,omitempty"` HooksDir []string `toml:"hooks_dir,omitempty"`
// ImageBuildFormat (DEPRECATED) indicates the default image format to
// building container images. Should use ImageDefaultFormat
ImageBuildFormat string `toml:"image_build_format,omitempty"`
// ImageDefaultTransport is the default transport method used to fetch // ImageDefaultTransport is the default transport method used to fetch
// images. // images.
ImageDefaultTransport string `toml:"image_default_transport,omitempty"` ImageDefaultTransport string `toml:"image_default_transport,omitempty"`
// ImageParallelCopies indicates the maximum number of image layers
// to be copied simultaneously. If this is zero, container engines
// will fall back to containers/image defaults.
ImageParallelCopies uint `toml:"image_parallel_copies,omitempty"`
// ImageDefaultFormat sepecified the manifest Type (oci, v2s2, or v2s1)
// to use when pulling, pushing, building container images. By default
// image pulled and pushed match the format of the source image.
// Building/committing defaults to OCI.
ImageDefaultFormat string `toml:"image_default_format,omitempty"`
// InfraCommand is the command run to start up a pod infra container. // InfraCommand is the command run to start up a pod infra container.
InfraCommand string `toml:"infra_command,omitempty"` InfraCommand string `toml:"infra_command,omitempty"`

View File

@ -246,9 +246,14 @@ default_sysctls = [
# network_config_dir = "/etc/cni/net.d/" # network_config_dir = "/etc/cni/net.d/"
[engine] [engine]
# ImageBuildFormat indicates the default image format to building # Maximum number of image layers to be copied (pulled/pushed) simultaneously.
# container images. Valid values are "oci" (default) or "docker". # Not setting this field, or setting it to zero, will fall back to containers/image defaults.
# image_build_format = "oci" # image_parallel_copies=0
# Manifest Type (oci, v2s2, or v2s1) to use when pulling, pushing, building
# container images. By default image pulled and pushed match the format of the
# source image. Building/commiting defaults to OCI.
# image_default_format = ""
# Cgroup management implementation used for the runtime. # Cgroup management implementation used for the runtime.
# Valid options "systemd" or "cgroupfs" # Valid options "systemd" or "cgroupfs"

View File

@ -518,3 +518,9 @@ func (c *Config) TZ() string {
func (c *Config) Umask() string { func (c *Config) Umask() string {
return c.Containers.Umask return c.Containers.Umask
} }
// LogDriver returns the logging driver to be used
// currently k8s-file or journald
func (c *Config) LogDriver() string {
return c.Containers.LogDriver
}

View File

@ -25,6 +25,17 @@ func getRuntimeDir() (string, error) {
rootlessRuntimeDirOnce.Do(func() { rootlessRuntimeDirOnce.Do(func() {
runtimeDir := os.Getenv("XDG_RUNTIME_DIR") runtimeDir := os.Getenv("XDG_RUNTIME_DIR")
if runtimeDir != "" {
st, err := os.Stat(runtimeDir)
if err != nil {
rootlessRuntimeDirError = err
return
}
if int(st.Sys().(*syscall.Stat_t).Uid) != os.Geteuid() {
rootlessRuntimeDirError = fmt.Errorf("XDG_RUNTIME_DIR directory %q is not owned by the current user", runtimeDir)
return
}
}
uid := fmt.Sprintf("%d", unshare.GetRootlessUID()) uid := fmt.Sprintf("%d", unshare.GetRootlessUID())
if runtimeDir == "" { if runtimeDir == "" {
tmpDir := filepath.Join("/run", "user", uid) tmpDir := filepath.Join("/run", "user", uid)

View File

@ -13,7 +13,7 @@ import (
// ValidateVolumeOpts validates a volume's options // ValidateVolumeOpts validates a volume's options
func ValidateVolumeOpts(options []string) ([]string, error) { func ValidateVolumeOpts(options []string) ([]string, error) {
var foundRootPropagation, foundRWRO, foundLabelChange, bindType, foundExec, foundDev, foundSuid int var foundRootPropagation, foundRWRO, foundLabelChange, bindType, foundExec, foundDev, foundSuid, foundChown int
finalOpts := make([]string, 0, len(options)) finalOpts := make([]string, 0, len(options))
for _, opt := range options { for _, opt := range options {
switch opt { switch opt {
@ -42,6 +42,11 @@ func ValidateVolumeOpts(options []string) ([]string, error) {
if foundLabelChange > 1 { if foundLabelChange > 1 {
return nil, errors.Errorf("invalid options %q, can only specify 1 'z', 'Z', or 'O' option", strings.Join(options, ", ")) return nil, errors.Errorf("invalid options %q, can only specify 1 'z', 'Z', or 'O' option", strings.Join(options, ", "))
} }
case "U":
foundChown++
if foundChown > 1 {
return nil, errors.Errorf("invalid options %q, can only specify 1 'U' option", strings.Join(options, ", "))
}
case "private", "rprivate", "shared", "rshared", "slave", "rslave", "unbindable", "runbindable": case "private", "rprivate", "shared", "rshared", "slave", "rslave", "unbindable", "runbindable":
foundRootPropagation++ foundRootPropagation++
if foundRootPropagation > 1 { if foundRootPropagation > 1 {

View File

@ -38,7 +38,17 @@ Helpers:
... process JSON and output ... process JSON and output
} }
and Template Functions:
The following template functions are added to the template when parsed:
- join strings.Join, {{join .Field separator}}
- lower strings.ToLower {{ .Field | lower }}
- split strings.Split {{ .Field | split }}
- title strings.Title {{ .Field | title }}
- upper strings.ToUpper {{ .Field | upper }}
report.Funcs() may be used to add additional template functions.
Adding an existing function will replace that function for the life of that template.
Note: Your code should not ignore errors Note: Your code should not ignore errors

View File

@ -1,6 +1,8 @@
package report package report
import ( import (
"bytes"
"encoding/json"
"reflect" "reflect"
"strings" "strings"
"text/template" "text/template"
@ -21,16 +23,32 @@ type FuncMap template.FuncMap
var tableReplacer = strings.NewReplacer( var tableReplacer = strings.NewReplacer(
"table ", "", "table ", "",
`\t`, "\t", `\t`, "\t",
`\n`, "\n",
" ", "\t", " ", "\t",
) )
// escapedReplacer will clean up escaped characters from CLI // escapedReplacer will clean up escaped characters from CLI
var escapedReplacer = strings.NewReplacer( var escapedReplacer = strings.NewReplacer(
`\t`, "\t", `\t`, "\t",
`\n`, "\n",
) )
var DefaultFuncs = FuncMap{
"join": strings.Join,
"json": func(v interface{}) string {
buf := &bytes.Buffer{}
enc := json.NewEncoder(buf)
enc.SetEscapeHTML(false)
enc.Encode(v)
// Remove the trailing new line added by the encoder
return strings.TrimSpace(buf.String())
},
"lower": strings.ToLower,
"pad": padWithSpace,
"split": strings.Split,
"title": strings.Title,
"truncate": truncateWithLength,
"upper": strings.ToUpper,
}
// NormalizeFormat reads given go template format provided by CLI and munges it into what we need // NormalizeFormat reads given go template format provided by CLI and munges it into what we need
func NormalizeFormat(format string) string { func NormalizeFormat(format string) string {
var f string var f string
@ -47,6 +65,22 @@ func NormalizeFormat(format string) string {
return f return f
} }
// padWithSpace adds spaces*prefix and spaces*suffix to the input when it is non-empty
func padWithSpace(source string, prefix, suffix int) string {
if source == "" {
return source
}
return strings.Repeat(" ", prefix) + source + strings.Repeat(" ", suffix)
}
// truncateWithLength truncates the source string up to the length provided by the input
func truncateWithLength(source string, length int) string {
if len(source) < length {
return source
}
return source[:length]
}
// Headers queries the interface for field names. // Headers queries the interface for field names.
// Array of map is returned to support range templates // Array of map is returned to support range templates
// Note: unexported fields can be supported by adding field to overrides // Note: unexported fields can be supported by adding field to overrides
@ -88,7 +122,7 @@ func Headers(object interface{}, overrides map[string]string) []map[string]strin
// NewTemplate creates a new template object // NewTemplate creates a new template object
func NewTemplate(name string) *Template { func NewTemplate(name string) *Template {
return &Template{template.New(name), false} return &Template{Template: template.New(name).Funcs(template.FuncMap(DefaultFuncs))}
} }
// Parse parses text as a template body for t // Parse parses text as a template body for t
@ -100,13 +134,21 @@ func (t *Template) Parse(text string) (*Template, error) {
text = NormalizeFormat(text) text = NormalizeFormat(text)
} }
tt, err := t.Template.Parse(text) tt, err := t.Template.Funcs(template.FuncMap(DefaultFuncs)).Parse(text)
return &Template{tt, t.isTable}, err return &Template{tt, t.isTable}, err
} }
// Funcs adds the elements of the argument map to the template's function map // Funcs adds the elements of the argument map to the template's function map.
// A default template function will be replace if there is a key collision.
func (t *Template) Funcs(funcMap FuncMap) *Template { func (t *Template) Funcs(funcMap FuncMap) *Template {
return &Template{t.Template.Funcs(template.FuncMap(funcMap)), t.isTable} m := make(FuncMap)
for k, v := range DefaultFuncs {
m[k] = v
}
for k, v := range funcMap {
m[k] = v
}
return &Template{Template: t.Template.Funcs(template.FuncMap(m)), isTable: t.isTable}
} }
// IsTable returns true if format string defines a "table" // IsTable returns true if format string defines a "table"

View File

@ -5,8 +5,6 @@
package seccomp package seccomp
import ( import (
"syscall"
"golang.org/x/sys/unix" "golang.org/x/sys/unix"
) )
@ -45,7 +43,7 @@ func arches() []Architecture {
// DefaultProfile defines the allowlist for the default seccomp profile. // DefaultProfile defines the allowlist for the default seccomp profile.
func DefaultProfile() *Seccomp { func DefaultProfile() *Seccomp {
einval := uint(syscall.EINVAL) einval := uint(unix.EINVAL)
syscalls := []*Syscall{ syscalls := []*Syscall{
{ {
@ -87,6 +85,7 @@ func DefaultProfile() *Seccomp {
"epoll_ctl", "epoll_ctl",
"epoll_ctl_old", "epoll_ctl_old",
"epoll_pwait", "epoll_pwait",
"epoll_pwait2",
"epoll_wait", "epoll_wait",
"epoll_wait_old", "epoll_wait_old",
"eventfd", "eventfd",
@ -115,7 +114,11 @@ func DefaultProfile() *Seccomp {
"flock", "flock",
"fork", "fork",
"fremovexattr", "fremovexattr",
"fsconfig",
"fsetxattr", "fsetxattr",
"fsmount",
"fsopen",
"fspick",
"fstat", "fstat",
"fstat64", "fstat64",
"fstatat64", "fstatat64",
@ -203,6 +206,7 @@ func DefaultProfile() *Seccomp {
"mmap", "mmap",
"mmap2", "mmap2",
"mount", "mount",
"move_mount",
"mprotect", "mprotect",
"mq_getsetattr", "mq_getsetattr",
"mq_notify", "mq_notify",
@ -225,6 +229,7 @@ func DefaultProfile() *Seccomp {
"open", "open",
"openat", "openat",
"openat2", "openat2",
"open_tree",
"pause", "pause",
"pidfd_getfd", "pidfd_getfd",
"pidfd_open", "pidfd_open",
@ -331,7 +336,6 @@ func DefaultProfile() *Seccomp {
"signalfd", "signalfd",
"signalfd4", "signalfd4",
"sigreturn", "sigreturn",
"socket",
"socketcall", "socketcall",
"socketpair", "socketpair",
"splice", "splice",
@ -512,19 +516,13 @@ func DefaultProfile() *Seccomp {
{ {
Names: []string{ Names: []string{
"bpf", "bpf",
"clone",
"fanotify_init", "fanotify_init",
"lookup_dcookie", "lookup_dcookie",
"mount",
"name_to_handle_at",
"perf_event_open", "perf_event_open",
"quotactl", "quotactl",
"setdomainname", "setdomainname",
"sethostname", "sethostname",
"setns", "setns",
"umount",
"umount2",
"unshare",
}, },
Action: ActAllow, Action: ActAllow,
Args: []*Arg{}, Args: []*Arg{},
@ -532,55 +530,6 @@ func DefaultProfile() *Seccomp {
Caps: []string{"CAP_SYS_ADMIN"}, Caps: []string{"CAP_SYS_ADMIN"},
}, },
}, },
{
Names: []string{
"clone",
},
Action: ActAllow,
Args: []*Arg{
{
Index: 0,
Value: unix.CLONE_NEWNS | unix.CLONE_NEWUTS | unix.CLONE_NEWIPC | unix.CLONE_NEWUSER | unix.CLONE_NEWPID | unix.CLONE_NEWNET,
ValueTwo: 0,
Op: OpMaskedEqual,
},
},
Excludes: Filter{
Caps: []string{"CAP_SYS_ADMIN"},
Arches: []string{"s390", "s390x"},
},
},
{
Names: []string{
"clone",
},
Action: ActAllow,
Args: []*Arg{
{
Index: 1,
Value: unix.CLONE_NEWNS | unix.CLONE_NEWUTS | unix.CLONE_NEWIPC | unix.CLONE_NEWUSER | unix.CLONE_NEWPID | unix.CLONE_NEWNET,
ValueTwo: 0,
Op: OpMaskedEqual,
},
},
Comment: "s390 parameter ordering for clone is different",
Includes: Filter{
Arches: []string{"s390", "s390x"},
},
Excludes: Filter{
Caps: []string{"CAP_SYS_ADMIN"},
},
},
{
Names: []string{
"reboot",
},
Action: ActAllow,
Args: []*Arg{},
Includes: Filter{
Caps: []string{"CAP_SYS_BOOT"},
},
},
{ {
Names: []string{ Names: []string{
"chroot", "chroot",
@ -608,7 +557,6 @@ func DefaultProfile() *Seccomp {
Names: []string{ Names: []string{
"get_mempolicy", "get_mempolicy",
"mbind", "mbind",
"name_to_handle_at",
"set_mempolicy", "set_mempolicy",
}, },
Action: ActAllow, Action: ActAllow,
@ -630,6 +578,7 @@ func DefaultProfile() *Seccomp {
{ {
Names: []string{ Names: []string{
"kcmp", "kcmp",
"process_madvise",
"process_vm_readv", "process_vm_readv",
"process_vm_writev", "process_vm_writev",
"ptrace", "ptrace",
@ -683,12 +632,12 @@ func DefaultProfile() *Seccomp {
Args: []*Arg{ Args: []*Arg{
{ {
Index: 0, Index: 0,
Value: syscall.AF_NETLINK, Value: unix.AF_NETLINK,
Op: OpEqualTo, Op: OpEqualTo,
}, },
{ {
Index: 2, Index: 2,
Value: syscall.NETLINK_AUDIT, Value: unix.NETLINK_AUDIT,
Op: OpEqualTo, Op: OpEqualTo,
}, },
}, },
@ -704,7 +653,7 @@ func DefaultProfile() *Seccomp {
Args: []*Arg{ Args: []*Arg{
{ {
Index: 2, Index: 2,
Value: syscall.NETLINK_AUDIT, Value: unix.NETLINK_AUDIT,
Op: OpNotEqual, Op: OpNotEqual,
}, },
}, },
@ -720,7 +669,7 @@ func DefaultProfile() *Seccomp {
Args: []*Arg{ Args: []*Arg{
{ {
Index: 0, Index: 0,
Value: syscall.AF_NETLINK, Value: unix.AF_NETLINK,
Op: OpNotEqual, Op: OpNotEqual,
}, },
}, },
@ -736,7 +685,7 @@ func DefaultProfile() *Seccomp {
Args: []*Arg{ Args: []*Arg{
{ {
Index: 2, Index: 2,
Value: syscall.NETLINK_AUDIT, Value: unix.NETLINK_AUDIT,
Op: OpNotEqual, Op: OpNotEqual,
}, },
}, },

View File

@ -89,6 +89,7 @@
"epoll_ctl", "epoll_ctl",
"epoll_ctl_old", "epoll_ctl_old",
"epoll_pwait", "epoll_pwait",
"epoll_pwait2",
"epoll_wait", "epoll_wait",
"epoll_wait_old", "epoll_wait_old",
"eventfd", "eventfd",
@ -117,7 +118,11 @@
"flock", "flock",
"fork", "fork",
"fremovexattr", "fremovexattr",
"fsconfig",
"fsetxattr", "fsetxattr",
"fsmount",
"fsopen",
"fspick",
"fstat", "fstat",
"fstat64", "fstat64",
"fstatat64", "fstatat64",
@ -177,6 +182,7 @@
"ioprio_get", "ioprio_get",
"ioprio_set", "ioprio_set",
"ipc", "ipc",
"keyctl",
"kill", "kill",
"lchown", "lchown",
"lchown32", "lchown32",
@ -204,6 +210,7 @@
"mmap", "mmap",
"mmap2", "mmap2",
"mount", "mount",
"move_mount",
"mprotect", "mprotect",
"mq_getsetattr", "mq_getsetattr",
"mq_notify", "mq_notify",
@ -226,6 +233,7 @@
"open", "open",
"openat", "openat",
"openat2", "openat2",
"open_tree",
"pause", "pause",
"pidfd_getfd", "pidfd_getfd",
"pidfd_open", "pidfd_open",
@ -574,19 +582,13 @@
{ {
"names": [ "names": [
"bpf", "bpf",
"clone",
"fanotify_init", "fanotify_init",
"lookup_dcookie", "lookup_dcookie",
"mount",
"name_to_handle_at",
"perf_event_open", "perf_event_open",
"quotactl", "quotactl",
"setdomainname", "setdomainname",
"sethostname", "sethostname",
"setns", "setns"
"umount",
"umount2",
"unshare"
], ],
"action": "SCMP_ACT_ALLOW", "action": "SCMP_ACT_ALLOW",
"args": [], "args": [],
@ -598,71 +600,6 @@
}, },
"excludes": {} "excludes": {}
}, },
{
"names": [
"clone"
],
"action": "SCMP_ACT_ALLOW",
"args": [
{
"index": 0,
"value": 2080505856,
"valueTwo": 0,
"op": "SCMP_CMP_MASKED_EQ"
}
],
"comment": "",
"includes": {},
"excludes": {
"caps": [
"CAP_SYS_ADMIN"
],
"arches": [
"s390",
"s390x"
]
}
},
{
"names": [
"clone"
],
"action": "SCMP_ACT_ALLOW",
"args": [
{
"index": 1,
"value": 2080505856,
"valueTwo": 0,
"op": "SCMP_CMP_MASKED_EQ"
}
],
"comment": "s390 parameter ordering for clone is different",
"includes": {
"arches": [
"s390",
"s390x"
]
},
"excludes": {
"caps": [
"CAP_SYS_ADMIN"
]
}
},
{
"names": [
"reboot"
],
"action": "SCMP_ACT_ALLOW",
"args": [],
"comment": "",
"includes": {
"caps": [
"CAP_SYS_BOOT"
]
},
"excludes": {}
},
{ {
"names": [ "names": [
"chroot" "chroot"
@ -698,7 +635,6 @@
"names": [ "names": [
"get_mempolicy", "get_mempolicy",
"mbind", "mbind",
"name_to_handle_at",
"set_mempolicy" "set_mempolicy"
], ],
"action": "SCMP_ACT_ALLOW", "action": "SCMP_ACT_ALLOW",
@ -728,6 +664,7 @@
{ {
"names": [ "names": [
"kcmp", "kcmp",
"process_madvise",
"process_vm_readv", "process_vm_readv",
"process_vm_writev", "process_vm_writev",
"ptrace" "ptrace"

View File

@ -1,4 +1,4 @@
package version package version
// Version is the version of the build. // Version is the version of the build.
const Version = "0.33.1" const Version = "0.34.3-dev"

2
vendor/modules.txt vendored
View File

@ -89,7 +89,7 @@ github.com/containers/buildah/pkg/parse
github.com/containers/buildah/pkg/rusage github.com/containers/buildah/pkg/rusage
github.com/containers/buildah/pkg/supplemented github.com/containers/buildah/pkg/supplemented
github.com/containers/buildah/util github.com/containers/buildah/util
# github.com/containers/common v0.33.1 # github.com/containers/common v0.34.3-0.20210208115708-8668c76dd577
github.com/containers/common/pkg/apparmor github.com/containers/common/pkg/apparmor
github.com/containers/common/pkg/apparmor/internal/supported github.com/containers/common/pkg/apparmor/internal/supported
github.com/containers/common/pkg/auth github.com/containers/common/pkg/auth