mirror of
https://github.com/containers/podman.git
synced 2025-10-25 18:25:59 +08:00
Merge pull request #1756 from isimluk/update-dependent-metalinter
Update metalinter dependency
This commit is contained in:
@ -40,6 +40,8 @@ ${LINTER} \
|
|||||||
--exclude='.*_test\.go:.*error return value not checked.*\(errcheck\)$'\
|
--exclude='.*_test\.go:.*error return value not checked.*\(errcheck\)$'\
|
||||||
--exclude='duplicate of.*_test.go.*\(dupl\)$'\
|
--exclude='duplicate of.*_test.go.*\(dupl\)$'\
|
||||||
--exclude='cmd\/client\/.*\.go.*\(dupl\)$'\
|
--exclude='cmd\/client\/.*\.go.*\(dupl\)$'\
|
||||||
|
--exclude='libpod\/.*_easyjson.go:.*'\
|
||||||
|
--exclude='.* other occurrence\(s\) of "(container|host|tmpfs|unknown)" found in: .*\(goconst\)$'\
|
||||||
--exclude='vendor\/.*'\
|
--exclude='vendor\/.*'\
|
||||||
--exclude='podman\/.*'\
|
--exclude='podman\/.*'\
|
||||||
--exclude='server\/seccomp\/.*\.go.*$'\
|
--exclude='server\/seccomp\/.*\.go.*$'\
|
||||||
|
|||||||
2
Makefile
2
Makefile
@ -283,7 +283,7 @@ install.tools: .install.gitvalidation .install.gometalinter .install.md2man .ins
|
|||||||
if [ ! -x "$(GOBIN)/gometalinter" ]; then \
|
if [ ! -x "$(GOBIN)/gometalinter" ]; then \
|
||||||
$(GO) get -u github.com/alecthomas/gometalinter; \
|
$(GO) get -u github.com/alecthomas/gometalinter; \
|
||||||
cd $(FIRST_GOPATH)/src/github.com/alecthomas/gometalinter; \
|
cd $(FIRST_GOPATH)/src/github.com/alecthomas/gometalinter; \
|
||||||
git checkout 23261fa046586808612c61da7a81d75a658e0814; \
|
git checkout e8d801238da6f0dfd14078d68f9b53fa50a7eeb5; \
|
||||||
$(GO) install github.com/alecthomas/gometalinter; \
|
$(GO) install github.com/alecthomas/gometalinter; \
|
||||||
$(GOBIN)/gometalinter --install; \
|
$(GOBIN)/gometalinter --install; \
|
||||||
fi
|
fi
|
||||||
|
|||||||
@ -205,6 +205,7 @@ func TestBuildContainerGraphFourContainersNoEdges(t *testing.T) {
|
|||||||
ctr3, err := getTestCtrN("3", tmpDir)
|
ctr3, err := getTestCtrN("3", tmpDir)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
ctr4, err := getTestCtrN("4", tmpDir)
|
ctr4, err := getTestCtrN("4", tmpDir)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
graph, err := buildContainerGraph([]*Container{ctr1, ctr2, ctr3, ctr4})
|
graph, err := buildContainerGraph([]*Container{ctr1, ctr2, ctr3, ctr4})
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
@ -241,6 +242,7 @@ func TestBuildContainerGraphFourContainersTwoInCycle(t *testing.T) {
|
|||||||
ctr3, err := getTestCtrN("3", tmpDir)
|
ctr3, err := getTestCtrN("3", tmpDir)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
ctr4, err := getTestCtrN("4", tmpDir)
|
ctr4, err := getTestCtrN("4", tmpDir)
|
||||||
|
assert.NoError(t, err)
|
||||||
ctr1.config.IPCNsCtr = ctr2.config.ID
|
ctr1.config.IPCNsCtr = ctr2.config.ID
|
||||||
ctr2.config.UserNsCtr = ctr1.config.ID
|
ctr2.config.UserNsCtr = ctr1.config.ID
|
||||||
|
|
||||||
@ -260,6 +262,7 @@ func TestBuildContainerGraphFourContainersAllInCycle(t *testing.T) {
|
|||||||
ctr3, err := getTestCtrN("3", tmpDir)
|
ctr3, err := getTestCtrN("3", tmpDir)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
ctr4, err := getTestCtrN("4", tmpDir)
|
ctr4, err := getTestCtrN("4", tmpDir)
|
||||||
|
assert.NoError(t, err)
|
||||||
ctr1.config.IPCNsCtr = ctr2.config.ID
|
ctr1.config.IPCNsCtr = ctr2.config.ID
|
||||||
ctr2.config.UserNsCtr = ctr3.config.ID
|
ctr2.config.UserNsCtr = ctr3.config.ID
|
||||||
ctr3.config.NetNsCtr = ctr4.config.ID
|
ctr3.config.NetNsCtr = ctr4.config.ID
|
||||||
@ -281,6 +284,7 @@ func TestBuildContainerGraphFourContainersNoneInCycle(t *testing.T) {
|
|||||||
ctr3, err := getTestCtrN("3", tmpDir)
|
ctr3, err := getTestCtrN("3", tmpDir)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
ctr4, err := getTestCtrN("4", tmpDir)
|
ctr4, err := getTestCtrN("4", tmpDir)
|
||||||
|
assert.NoError(t, err)
|
||||||
ctr1.config.IPCNsCtr = ctr2.config.ID
|
ctr1.config.IPCNsCtr = ctr2.config.ID
|
||||||
ctr1.config.NetNsCtr = ctr3.config.ID
|
ctr1.config.NetNsCtr = ctr3.config.ID
|
||||||
ctr2.config.UserNsCtr = ctr3.config.ID
|
ctr2.config.UserNsCtr = ctr3.config.ID
|
||||||
|
|||||||
@ -350,7 +350,8 @@ func (r *OCIRuntime) createOCIContainer(ctr *Container, cgroupParent string, res
|
|||||||
// Set the label of the conmon process to be level :s0
|
// Set the label of the conmon process to be level :s0
|
||||||
// This will allow the container processes to talk to fifo-files
|
// This will allow the container processes to talk to fifo-files
|
||||||
// passed into the container by conmon
|
// passed into the container by conmon
|
||||||
plabel, err := selinux.CurrentLabel()
|
var plabel string
|
||||||
|
plabel, err = selinux.CurrentLabel()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
childPipe.Close()
|
childPipe.Close()
|
||||||
return errors.Wrapf(err, "Failed to get current SELinux label")
|
return errors.Wrapf(err, "Failed to get current SELinux label")
|
||||||
@ -360,7 +361,7 @@ func (r *OCIRuntime) createOCIContainer(ctr *Container, cgroupParent string, res
|
|||||||
runtime.LockOSThread()
|
runtime.LockOSThread()
|
||||||
if c["level"] != "s0" && c["level"] != "" {
|
if c["level"] != "s0" && c["level"] != "" {
|
||||||
c["level"] = "s0"
|
c["level"] = "s0"
|
||||||
if err := label.SetProcessLabel(c.Get()); err != nil {
|
if err = label.SetProcessLabel(c.Get()); err != nil {
|
||||||
runtime.UnlockOSThread()
|
runtime.UnlockOSThread()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|||||||
@ -19,6 +19,8 @@ import (
|
|||||||
"golang.org/x/sys/unix"
|
"golang.org/x/sys/unix"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const unknownPackage = "Unknown"
|
||||||
|
|
||||||
func (r *OCIRuntime) moveConmonToCgroup(ctr *Container, cgroupParent string, cmd *exec.Cmd) error {
|
func (r *OCIRuntime) moveConmonToCgroup(ctr *Container, cgroupParent string, cmd *exec.Cmd) error {
|
||||||
if os.Geteuid() == 0 {
|
if os.Geteuid() == 0 {
|
||||||
if r.cgroupManager == SystemdCgroupsManager {
|
if r.cgroupManager == SystemdCgroupsManager {
|
||||||
@ -112,7 +114,7 @@ func (r *OCIRuntime) createContainer(ctr *Container, cgroupParent string, restor
|
|||||||
}
|
}
|
||||||
|
|
||||||
func rpmVersion(path string) string {
|
func rpmVersion(path string) string {
|
||||||
output := "Unknown"
|
output := unknownPackage
|
||||||
cmd := exec.Command("/usr/bin/rpm", "-q", "-f", path)
|
cmd := exec.Command("/usr/bin/rpm", "-q", "-f", path)
|
||||||
if outp, err := cmd.Output(); err == nil {
|
if outp, err := cmd.Output(); err == nil {
|
||||||
output = string(outp)
|
output = string(outp)
|
||||||
@ -121,7 +123,7 @@ func rpmVersion(path string) string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func dpkgVersion(path string) string {
|
func dpkgVersion(path string) string {
|
||||||
output := "Unknown"
|
output := unknownPackage
|
||||||
cmd := exec.Command("/usr/bin/dpkg", "-S", path)
|
cmd := exec.Command("/usr/bin/dpkg", "-S", path)
|
||||||
if outp, err := cmd.Output(); err == nil {
|
if outp, err := cmd.Output(); err == nil {
|
||||||
output = string(outp)
|
output = string(outp)
|
||||||
@ -130,14 +132,14 @@ func dpkgVersion(path string) string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (r *OCIRuntime) pathPackage() string {
|
func (r *OCIRuntime) pathPackage() string {
|
||||||
if out := rpmVersion(r.path); out != "Unknown" {
|
if out := rpmVersion(r.path); out != unknownPackage {
|
||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
return dpkgVersion(r.path)
|
return dpkgVersion(r.path)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *OCIRuntime) conmonPackage() string {
|
func (r *OCIRuntime) conmonPackage() string {
|
||||||
if out := rpmVersion(r.conmonPath); out != "Unknown" {
|
if out := rpmVersion(r.conmonPath); out != unknownPackage {
|
||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
return dpkgVersion(r.conmonPath)
|
return dpkgVersion(r.conmonPath)
|
||||||
|
|||||||
@ -271,6 +271,9 @@ func (i *LibpodAPI) InspectImage(call iopodman.VarlinkCall, name string) error {
|
|||||||
return call.ReplyImageNotFound(name)
|
return call.ReplyImageNotFound(name)
|
||||||
}
|
}
|
||||||
inspectInfo, err := newImage.Inspect(getContext())
|
inspectInfo, err := newImage.Inspect(getContext())
|
||||||
|
if err != nil {
|
||||||
|
return call.ReplyErrorOccurred(err.Error())
|
||||||
|
}
|
||||||
b, err := json.Marshal(inspectInfo)
|
b, err := json.Marshal(inspectInfo)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return call.ReplyErrorOccurred(fmt.Sprintf("unable to serialize"))
|
return call.ReplyErrorOccurred(fmt.Sprintf("unable to serialize"))
|
||||||
|
|||||||
Reference in New Issue
Block a user