mirror of
https://github.com/containers/podman.git
synced 2025-12-04 04:09:40 +08:00
build(deps): bump github.com/containers/image/v5 from 5.0.0 to 5.1.0
Bumps [github.com/containers/image/v5](https://github.com/containers/image) from 5.0.0 to 5.1.0. - [Release notes](https://github.com/containers/image/releases) - [Commits](https://github.com/containers/image/compare/v5.0.0...v5.1.0) Signed-off-by: dependabot-preview[bot] <support@dependabot.com> Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
80
vendor/github.com/containers/image/v5/openshift/openshift-copies.go
generated
vendored
80
vendor/github.com/containers/image/v5/openshift/openshift-copies.go
generated
vendored
@@ -19,6 +19,7 @@ import (
|
||||
"github.com/ghodss/yaml"
|
||||
"github.com/imdario/mergo"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
"golang.org/x/net/http2"
|
||||
"k8s.io/client-go/util/homedir"
|
||||
)
|
||||
@@ -137,9 +138,8 @@ func (config *deferredLoadingClientConfig) createClientConfig() (clientConfig, e
|
||||
return nil, err
|
||||
}
|
||||
|
||||
var mergedClientConfig clientConfig
|
||||
// REMOVED: Interactive fallback support.
|
||||
mergedClientConfig = newNonInteractiveClientConfig(*mergedConfig)
|
||||
mergedClientConfig := newNonInteractiveClientConfig(*mergedConfig)
|
||||
|
||||
config.clientConfig = mergedClientConfig
|
||||
}
|
||||
@@ -210,13 +210,17 @@ func (config *directClientConfig) ClientConfig() (*restConfig, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
mergo.MergeWithOverwrite(clientConfig, userAuthPartialConfig)
|
||||
if err = mergo.MergeWithOverwrite(clientConfig, userAuthPartialConfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
serverAuthPartialConfig, err := getServerIdentificationPartialConfig(configAuthInfo, configClusterInfo)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
mergo.MergeWithOverwrite(clientConfig, serverAuthPartialConfig)
|
||||
if err = mergo.MergeWithOverwrite(clientConfig, serverAuthPartialConfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
return clientConfig, nil
|
||||
@@ -237,7 +241,9 @@ func getServerIdentificationPartialConfig(configAuthInfo clientcmdAuthInfo, conf
|
||||
configClientConfig.CAFile = configClusterInfo.CertificateAuthority
|
||||
configClientConfig.CAData = configClusterInfo.CertificateAuthorityData
|
||||
configClientConfig.Insecure = configClusterInfo.InsecureSkipTLSVerify
|
||||
mergo.MergeWithOverwrite(mergedConfig, configClientConfig)
|
||||
if err := mergo.MergeWithOverwrite(mergedConfig, configClientConfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return mergedConfig, nil
|
||||
}
|
||||
@@ -272,14 +278,6 @@ func getUserIdentificationPartialConfig(configAuthInfo clientcmdAuthInfo) (*rest
|
||||
return mergedConfig, nil
|
||||
}
|
||||
|
||||
// canIdentifyUser is a modified copy of k8s.io/kubernetes/pkg/client/unversioned/clientcmd.canIdentifyUser
|
||||
func canIdentifyUser(config restConfig) bool {
|
||||
return len(config.Username) > 0 ||
|
||||
(len(config.CertFile) > 0 || len(config.CertData) > 0) ||
|
||||
len(config.BearerToken) > 0
|
||||
|
||||
}
|
||||
|
||||
// ConfirmUsable is a modified copy of k8s.io/kubernetes/pkg/client/unversioned/clientcmd.DirectClientConfig.ConfirmUsable.
|
||||
// ConfirmUsable looks a particular context and determines if that particular part of the config is useable. There might still be errors in the config,
|
||||
// but no errors in the sections requested or referenced. It does not return early so that it can find as many errors as possible.
|
||||
@@ -320,7 +318,9 @@ func (config *directClientConfig) getContext() clientcmdContext {
|
||||
|
||||
var mergedContext clientcmdContext
|
||||
if configContext, exists := contexts[contextName]; exists {
|
||||
mergo.MergeWithOverwrite(&mergedContext, configContext)
|
||||
if err := mergo.MergeWithOverwrite(&mergedContext, configContext); err != nil {
|
||||
logrus.Debugf("Can't merge configContext: %v", err)
|
||||
}
|
||||
}
|
||||
// REMOVED: overrides support
|
||||
|
||||
@@ -333,6 +333,17 @@ var (
|
||||
errEmptyCluster = errors.New("cluster has no server defined")
|
||||
)
|
||||
|
||||
//helper for checking certificate/key/CA
|
||||
func validateFileIsReadable(name string) error {
|
||||
answer, err := os.Open(name)
|
||||
defer func() {
|
||||
if err := answer.Close(); err != nil {
|
||||
logrus.Debugf("Error closing %v: %v", name, err)
|
||||
}
|
||||
}()
|
||||
return err
|
||||
}
|
||||
|
||||
// validateClusterInfo is a modified copy of k8s.io/kubernetes/pkg/client/unversioned/clientcmd.DirectClientConfig.validateClusterInfo.
|
||||
// validateClusterInfo looks for conflicts and errors in the cluster info
|
||||
func validateClusterInfo(clusterName string, clusterInfo clientcmdCluster) []error {
|
||||
@@ -354,8 +365,7 @@ func validateClusterInfo(clusterName string, clusterInfo clientcmdCluster) []err
|
||||
validationErrors = append(validationErrors, errors.Errorf("certificate-authority-data and certificate-authority are both specified for %v. certificate-authority-data will override", clusterName))
|
||||
}
|
||||
if len(clusterInfo.CertificateAuthority) != 0 {
|
||||
clientCertCA, err := os.Open(clusterInfo.CertificateAuthority)
|
||||
defer clientCertCA.Close()
|
||||
err := validateFileIsReadable(clusterInfo.CertificateAuthority)
|
||||
if err != nil {
|
||||
validationErrors = append(validationErrors, errors.Errorf("unable to read certificate-authority %v for %v due to %v", clusterInfo.CertificateAuthority, clusterName, err))
|
||||
}
|
||||
@@ -393,15 +403,13 @@ func validateAuthInfo(authInfoName string, authInfo clientcmdAuthInfo) []error {
|
||||
}
|
||||
|
||||
if len(authInfo.ClientCertificate) != 0 {
|
||||
clientCertFile, err := os.Open(authInfo.ClientCertificate)
|
||||
defer clientCertFile.Close()
|
||||
err := validateFileIsReadable(authInfo.ClientCertificate)
|
||||
if err != nil {
|
||||
validationErrors = append(validationErrors, errors.Errorf("unable to read client-cert %v for %v due to %v", authInfo.ClientCertificate, authInfoName, err))
|
||||
}
|
||||
}
|
||||
if len(authInfo.ClientKey) != 0 {
|
||||
clientKeyFile, err := os.Open(authInfo.ClientKey)
|
||||
defer clientKeyFile.Close()
|
||||
err := validateFileIsReadable(authInfo.ClientKey)
|
||||
if err != nil {
|
||||
validationErrors = append(validationErrors, errors.Errorf("unable to read client-key %v for %v due to %v", authInfo.ClientKey, authInfoName, err))
|
||||
}
|
||||
@@ -423,7 +431,9 @@ func (config *directClientConfig) getAuthInfo() clientcmdAuthInfo {
|
||||
|
||||
var mergedAuthInfo clientcmdAuthInfo
|
||||
if configAuthInfo, exists := authInfos[authInfoName]; exists {
|
||||
mergo.MergeWithOverwrite(&mergedAuthInfo, configAuthInfo)
|
||||
if err := mergo.MergeWithOverwrite(&mergedAuthInfo, configAuthInfo); err != nil {
|
||||
logrus.Debugf("Can't merge configAuthInfo: %v", err)
|
||||
}
|
||||
}
|
||||
// REMOVED: overrides support
|
||||
|
||||
@@ -436,10 +446,16 @@ func (config *directClientConfig) getCluster() clientcmdCluster {
|
||||
clusterInfoName := config.getClusterName()
|
||||
|
||||
var mergedClusterInfo clientcmdCluster
|
||||
mergo.MergeWithOverwrite(&mergedClusterInfo, defaultCluster)
|
||||
mergo.MergeWithOverwrite(&mergedClusterInfo, envVarCluster)
|
||||
if err := mergo.MergeWithOverwrite(&mergedClusterInfo, defaultCluster); err != nil {
|
||||
logrus.Debugf("Can't merge defaultCluster: %v", err)
|
||||
}
|
||||
if err := mergo.MergeWithOverwrite(&mergedClusterInfo, envVarCluster); err != nil {
|
||||
logrus.Debugf("Can't merge envVarCluster: %v", err)
|
||||
}
|
||||
if configClusterInfo, exists := clusterInfos[clusterInfoName]; exists {
|
||||
mergo.MergeWithOverwrite(&mergedClusterInfo, configClusterInfo)
|
||||
if err := mergo.MergeWithOverwrite(&mergedClusterInfo, configClusterInfo); err != nil {
|
||||
logrus.Debugf("Can't merge configClusterInfo: %v", err)
|
||||
}
|
||||
}
|
||||
// REMOVED: overrides support
|
||||
|
||||
@@ -573,7 +589,9 @@ func (rules *clientConfigLoadingRules) Load() (*clientcmdConfig, error) {
|
||||
// first merge all of our maps
|
||||
mapConfig := clientcmdNewConfig()
|
||||
for _, kubeconfig := range kubeconfigs {
|
||||
mergo.MergeWithOverwrite(mapConfig, kubeconfig)
|
||||
if err := mergo.MergeWithOverwrite(mapConfig, kubeconfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
// merge all of the struct values in the reverse order so that priority is given correctly
|
||||
@@ -581,14 +599,20 @@ func (rules *clientConfigLoadingRules) Load() (*clientcmdConfig, error) {
|
||||
nonMapConfig := clientcmdNewConfig()
|
||||
for i := len(kubeconfigs) - 1; i >= 0; i-- {
|
||||
kubeconfig := kubeconfigs[i]
|
||||
mergo.MergeWithOverwrite(nonMapConfig, kubeconfig)
|
||||
if err := mergo.MergeWithOverwrite(nonMapConfig, kubeconfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
// since values are overwritten, but maps values are not, we can merge the non-map config on top of the map config and
|
||||
// get the values we expect.
|
||||
config := clientcmdNewConfig()
|
||||
mergo.MergeWithOverwrite(config, mapConfig)
|
||||
mergo.MergeWithOverwrite(config, nonMapConfig)
|
||||
if err := mergo.MergeWithOverwrite(config, mapConfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if err := mergo.MergeWithOverwrite(config, nonMapConfig); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// REMOVED: Possibility to skip this.
|
||||
if err := resolveLocalPaths(config); err != nil {
|
||||
|
||||
5
vendor/github.com/containers/image/v5/openshift/openshift.go
generated
vendored
5
vendor/github.com/containers/image/v5/openshift/openshift.go
generated
vendored
@@ -378,7 +378,7 @@ func (d *openshiftImageDestination) AcceptsForeignLayerURLs() bool {
|
||||
return true
|
||||
}
|
||||
|
||||
// MustMatchRuntimeOS returns true iff the destination can store only images targeted for the current runtime OS. False otherwise.
|
||||
// MustMatchRuntimeOS returns true iff the destination can store only images targeted for the current runtime architecture and OS. False otherwise.
|
||||
func (d *openshiftImageDestination) MustMatchRuntimeOS() bool {
|
||||
return false
|
||||
}
|
||||
@@ -491,6 +491,9 @@ sigExists:
|
||||
Content: newSig,
|
||||
}
|
||||
body, err := json.Marshal(sig)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
_, err = d.client.doRequest(ctx, "POST", "/oapi/v1/imagesignatures", body)
|
||||
if err != nil {
|
||||
return err
|
||||
|
||||
Reference in New Issue
Block a user