mirror of
https://github.com/containers/podman.git
synced 2025-06-23 02:18:13 +08:00
Vendor in containers/common v0.46.0
Fixes: https://github.com/containers/podman/issues/11745 [NO TESTS NEEDED] Since this is just a revendor and a one line change for the revendor Signed-off-by: Daniel J Walsh <dwalsh@redhat.com> Signed-off-by: Valentin Rothberg <rothberg@redhat.com>
This commit is contained in:

committed by
Valentin Rothberg

parent
e19a09c3df
commit
5a2ca77b9b
@ -71,7 +71,7 @@ func init() {
|
||||
)
|
||||
|
||||
ImagePathFlagName := "image-path"
|
||||
flags.StringVar(&initOpts.ImagePath, ImagePathFlagName, cfg.Engine.MachineImage, "Path to qcow image")
|
||||
flags.StringVar(&initOpts.ImagePath, ImagePathFlagName, cfg.Machine.Image, "Path to qcow image")
|
||||
_ = initCmd.RegisterFlagCompletionFunc(ImagePathFlagName, completion.AutocompleteDefault)
|
||||
|
||||
IgnitionPathFlagName := "ignition-path"
|
||||
|
2
go.mod
2
go.mod
@ -12,7 +12,7 @@ require (
|
||||
github.com/containernetworking/cni v1.0.1
|
||||
github.com/containernetworking/plugins v1.0.1
|
||||
github.com/containers/buildah v1.23.0
|
||||
github.com/containers/common v0.44.1-0.20210921143342-f2f10e650c73
|
||||
github.com/containers/common v0.46.0
|
||||
github.com/containers/conmon v2.0.20+incompatible
|
||||
github.com/containers/image/v5 v5.16.0
|
||||
github.com/containers/ocicrypt v1.1.2
|
||||
|
4
go.sum
4
go.sum
@ -250,8 +250,8 @@ github.com/containernetworking/plugins v1.0.1/go.mod h1:QHCfGpaTwYTbbH+nZXKVTxNB
|
||||
github.com/containers/buildah v1.23.0 h1:qGIeSNOczUHzvnaaOS29HSMiYAjw6JgIXYksAyvqnLs=
|
||||
github.com/containers/buildah v1.23.0/go.mod h1:K0iMKgy/MffkkgELBXhSXwTy2HTT6hM0X8qruDR1FwU=
|
||||
github.com/containers/common v0.44.0/go.mod h1:7sdP4vmI5Bm6FPFxb3lvAh1Iktb6tiO1MzjUzhxdoGo=
|
||||
github.com/containers/common v0.44.1-0.20210921143342-f2f10e650c73 h1:+qKOyTHbuFo3GPsrUksphfHxYMIJQmPgwpDdQnARGAI=
|
||||
github.com/containers/common v0.44.1-0.20210921143342-f2f10e650c73/go.mod h1:zxv7KjdYddSGoWuLUVp6eSb++Ow1zmSMB2jwxuNB4cU=
|
||||
github.com/containers/common v0.46.0 h1:95zB7kYBQJW+aK5xxZnaobCwoPyYOf85Y0yUx0E5aRg=
|
||||
github.com/containers/common v0.46.0/go.mod h1:zxv7KjdYddSGoWuLUVp6eSb++Ow1zmSMB2jwxuNB4cU=
|
||||
github.com/containers/conmon v2.0.20+incompatible h1:YbCVSFSCqFjjVwHTPINGdMX1F6JXHGTUje2ZYobNrkg=
|
||||
github.com/containers/conmon v2.0.20+incompatible/go.mod h1:hgwZ2mtuDrppv78a/cOBNiCm6O0UMWGx1mu7P00nu5I=
|
||||
github.com/containers/image/v5 v5.16.0 h1:WQcNSzb7+ngS2cfynx0vUwhk+scpgiKlldVcsF8GPbI=
|
||||
|
@ -32,7 +32,7 @@ verify_iid_and_name() {
|
||||
echo "I am an invalid file and should cause a podman-load error" > $invalid
|
||||
run_podman 125 load -i $invalid
|
||||
# podman and podman-remote emit different messages; this is a common string
|
||||
is "$output" ".*payload does not match any of the supported image formats .*" \
|
||||
is "$output" ".*payload does not match any of the supported image formats:.*" \
|
||||
"load -i INVALID fails with expected diagnostic"
|
||||
}
|
||||
|
||||
@ -129,7 +129,7 @@ verify_iid_and_name() {
|
||||
@test "podman load - redirect corrupt payload" {
|
||||
run_podman 125 load <<< "Danger, Will Robinson!! This is a corrupt tarball!"
|
||||
is "$output" \
|
||||
".*payload does not match any of the supported image formats .*" \
|
||||
".*payload does not match any of the supported image formats:.*" \
|
||||
"Diagnostic from 'podman load' unknown/corrupt payload"
|
||||
}
|
||||
|
||||
|
59
vendor/github.com/containers/common/libimage/load.go
generated
vendored
59
vendor/github.com/containers/common/libimage/load.go
generated
vendored
@ -2,7 +2,7 @@ package libimage
|
||||
|
||||
import (
|
||||
"context"
|
||||
"errors"
|
||||
"fmt"
|
||||
"os"
|
||||
"time"
|
||||
|
||||
@ -28,66 +28,69 @@ func (r *Runtime) Load(ctx context.Context, path string, options *LoadOptions) (
|
||||
defer r.writeEvent(&Event{ID: "", Name: path, Time: time.Now(), Type: EventTypeImageLoad})
|
||||
}
|
||||
|
||||
var (
|
||||
loadedImages []string
|
||||
loadError error
|
||||
)
|
||||
|
||||
if options == nil {
|
||||
options = &LoadOptions{}
|
||||
}
|
||||
|
||||
for _, f := range []func() ([]string, error){
|
||||
var loadErrors []error
|
||||
|
||||
for _, f := range []func() ([]string, string, error){
|
||||
// OCI
|
||||
func() ([]string, error) {
|
||||
func() ([]string, string, error) {
|
||||
logrus.Debugf("-> Attempting to load %q as an OCI directory", path)
|
||||
ref, err := ociTransport.NewReference(path, "")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
return nil, ociTransport.Transport.Name(), err
|
||||
}
|
||||
return r.copyFromDefault(ctx, ref, &options.CopyOptions)
|
||||
images, err := r.copyFromDefault(ctx, ref, &options.CopyOptions)
|
||||
return images, ociTransport.Transport.Name(), err
|
||||
},
|
||||
|
||||
// OCI-ARCHIVE
|
||||
func() ([]string, error) {
|
||||
func() ([]string, string, error) {
|
||||
logrus.Debugf("-> Attempting to load %q as an OCI archive", path)
|
||||
ref, err := ociArchiveTransport.NewReference(path, "")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
return nil, ociArchiveTransport.Transport.Name(), err
|
||||
}
|
||||
return r.copyFromDefault(ctx, ref, &options.CopyOptions)
|
||||
images, err := r.copyFromDefault(ctx, ref, &options.CopyOptions)
|
||||
return images, ociArchiveTransport.Transport.Name(), err
|
||||
},
|
||||
|
||||
// DIR
|
||||
func() ([]string, error) {
|
||||
func() ([]string, string, error) {
|
||||
logrus.Debugf("-> Attempting to load %q as a Docker dir", path)
|
||||
ref, err := dirTransport.NewReference(path)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
return nil, dirTransport.Transport.Name(), err
|
||||
}
|
||||
return r.copyFromDefault(ctx, ref, &options.CopyOptions)
|
||||
images, err := r.copyFromDefault(ctx, ref, &options.CopyOptions)
|
||||
return images, dirTransport.Transport.Name(), err
|
||||
},
|
||||
|
||||
// DOCKER-ARCHIVE
|
||||
func() ([]string, error) {
|
||||
func() ([]string, string, error) {
|
||||
logrus.Debugf("-> Attempting to load %q as a Docker archive", path)
|
||||
ref, err := dockerArchiveTransport.ParseReference(path)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
return nil, dockerArchiveTransport.Transport.Name(), err
|
||||
}
|
||||
return r.loadMultiImageDockerArchive(ctx, ref, &options.CopyOptions)
|
||||
},
|
||||
|
||||
// Give a decent error message if nothing above worked.
|
||||
func() ([]string, error) {
|
||||
return nil, errors.New("payload does not match any of the supported image formats (oci, oci-archive, dir, docker-archive)")
|
||||
images, err := r.loadMultiImageDockerArchive(ctx, ref, &options.CopyOptions)
|
||||
return images, dockerArchiveTransport.Transport.Name(), err
|
||||
},
|
||||
} {
|
||||
loadedImages, loadError = f()
|
||||
if loadError == nil {
|
||||
return loadedImages, loadError
|
||||
loadedImages, transportName, err := f()
|
||||
if err == nil {
|
||||
return loadedImages, nil
|
||||
}
|
||||
logrus.Debugf("Error loading %s: %v", path, loadError)
|
||||
logrus.Debugf("Error loading %s (%s): %v", path, transportName, err)
|
||||
loadErrors = append(loadErrors, fmt.Errorf("%s: %v", transportName, err))
|
||||
}
|
||||
|
||||
// Give a decent error message if nothing above worked.
|
||||
loadError := fmt.Errorf("payload does not match any of the supported image formats:")
|
||||
for _, err := range loadErrors {
|
||||
loadError = fmt.Errorf("%v\n * %v", loadError, err)
|
||||
}
|
||||
|
||||
return nil, loadError
|
||||
|
17
vendor/github.com/containers/common/pkg/config/config.go
generated
vendored
17
vendor/github.com/containers/common/pkg/config/config.go
generated
vendored
@ -54,6 +54,8 @@ type Config struct {
|
||||
Containers ContainersConfig `toml:"containers"`
|
||||
// Engine specifies how the container engine based on Engine will run
|
||||
Engine EngineConfig `toml:"engine"`
|
||||
// Machine specifies configurations of podman machine VMs
|
||||
Machine MachineConfig `toml:"machine"`
|
||||
// Network section defines the configuration of CNI Plugins
|
||||
Network NetworkConfig `toml:"network"`
|
||||
// Secret section defines configurations for the secret management
|
||||
@ -281,9 +283,6 @@ type EngineConfig struct {
|
||||
// MachineEnabled indicates if Podman is running in a podman-machine VM
|
||||
MachineEnabled bool `toml:"machine_enabled,omitempty"`
|
||||
|
||||
// MachineImage is the image used when creating a podman-machine VM
|
||||
MachineImage string `toml:"machine_image,omitempty"`
|
||||
|
||||
// MultiImageArchive - if true, the container engine allows for storing
|
||||
// archives (e.g., of the docker-archive transport) with multiple
|
||||
// images. By default, Podman creates single-image archives.
|
||||
@ -490,6 +489,18 @@ type SecretConfig struct {
|
||||
Opts map[string]string `toml:"opts,omitempty"`
|
||||
}
|
||||
|
||||
// MachineConfig represents the "machine" TOML config table
|
||||
type MachineConfig struct {
|
||||
// Number of CPU's a machine is created with.
|
||||
CPUs uint64 `toml:"cpus,omitempty"`
|
||||
// DiskSize is the size of the disk in GB created when init-ing a podman-machine VM
|
||||
DiskSize uint64 `toml:"disk_size,omitempty"`
|
||||
// MachineImage is the image used when init-ing a podman-machine VM
|
||||
Image string `toml:"image,omitempty"`
|
||||
// Memory in MB a machine is created with.
|
||||
Memory uint64 `toml:"memory,omitempty"`
|
||||
}
|
||||
|
||||
// Destination represents destination for remote service
|
||||
type Destination struct {
|
||||
// URI, required. Example: ssh://root@example.com:22/run/podman/podman.sock
|
||||
|
25
vendor/github.com/containers/common/pkg/config/containers.conf
generated
vendored
25
vendor/github.com/containers/common/pkg/config/containers.conf
generated
vendored
@ -396,10 +396,6 @@ default_sysctls = [
|
||||
#
|
||||
#machine_enabled = false
|
||||
|
||||
# The image used when creating a podman-machine VM.
|
||||
#
|
||||
#machine_image = "testing"
|
||||
|
||||
# MultiImageArchive - if true, the container engine allows for storing archives
|
||||
# (e.g., of the docker-archive transport) with multiple images. By default,
|
||||
# Podman creates single-image archives.
|
||||
@ -559,8 +555,25 @@ default_sysctls = [
|
||||
[engine.volume_plugins]
|
||||
#testplugin = "/run/podman/plugins/test.sock"
|
||||
|
||||
# The [engine.volume_plugins] table MUST be the last entry in this file.
|
||||
[machine]
|
||||
# Number of CPU's a machine is created with.
|
||||
#
|
||||
#cpus=1
|
||||
|
||||
# The size of the disk in GB created when init-ing a podman-machine VM.
|
||||
#
|
||||
#disk_size=10
|
||||
|
||||
# The image used when creating a podman-machine VM.
|
||||
#
|
||||
#image = "testing"
|
||||
|
||||
# Memory in MB a machine is created with.
|
||||
#
|
||||
#memory=2048
|
||||
|
||||
# The [machine] table MUST be the last entry in this file.
|
||||
# (Unless another table is added)
|
||||
# TOML does not provide a way to end a table other than a further table being
|
||||
# defined, so every key hereafter will be part of [volume_plugins] and not the
|
||||
# defined, so every key hereafter will be part of [machine] and not the
|
||||
# main config.
|
||||
|
19
vendor/github.com/containers/common/pkg/config/default.go
generated
vendored
19
vendor/github.com/containers/common/pkg/config/default.go
generated
vendored
@ -208,6 +208,7 @@ func DefaultConfig() (*Config, error) {
|
||||
},
|
||||
Engine: *defaultEngineConfig,
|
||||
Secrets: defaultSecretConfig(),
|
||||
Machine: defaultMachineConfig(),
|
||||
}, nil
|
||||
}
|
||||
|
||||
@ -219,6 +220,16 @@ func defaultSecretConfig() SecretConfig {
|
||||
}
|
||||
}
|
||||
|
||||
// defaultMachineConfig returns the default machine configuration.
|
||||
func defaultMachineConfig() MachineConfig {
|
||||
return MachineConfig{
|
||||
CPUs: 1,
|
||||
DiskSize: 10,
|
||||
Image: "testing",
|
||||
Memory: 2048,
|
||||
}
|
||||
}
|
||||
|
||||
// defaultConfigFromMemory returns a default engine configuration. Note that the
|
||||
// config is different for root and rootless. It also parses the storage.conf.
|
||||
func defaultConfigFromMemory() (*EngineConfig, error) {
|
||||
@ -345,8 +356,6 @@ func defaultConfigFromMemory() (*EngineConfig, error) {
|
||||
// constants.
|
||||
c.LockType = "shm"
|
||||
c.MachineEnabled = false
|
||||
c.MachineImage = "testing"
|
||||
|
||||
c.ChownCopiedFiles = true
|
||||
|
||||
return c, nil
|
||||
@ -566,9 +575,3 @@ func (c *Config) MachineEnabled() bool {
|
||||
func (c *Config) RootlessNetworking() string {
|
||||
return c.Containers.RootlessNetworking
|
||||
}
|
||||
|
||||
// MachineImage returns the image to be
|
||||
// used when creating a podman-machine VM
|
||||
func (c *Config) MachineImage() string {
|
||||
return c.Engine.MachineImage
|
||||
}
|
||||
|
2
vendor/github.com/containers/common/version/version.go
generated
vendored
2
vendor/github.com/containers/common/version/version.go
generated
vendored
@ -1,4 +1,4 @@
|
||||
package version
|
||||
|
||||
// Version is the version of the build.
|
||||
const Version = "0.44.1-dev"
|
||||
const Version = "0.46.0"
|
||||
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -97,7 +97,7 @@ github.com/containers/buildah/pkg/rusage
|
||||
github.com/containers/buildah/pkg/sshagent
|
||||
github.com/containers/buildah/pkg/util
|
||||
github.com/containers/buildah/util
|
||||
# github.com/containers/common v0.44.1-0.20210921143342-f2f10e650c73
|
||||
# github.com/containers/common v0.46.0
|
||||
github.com/containers/common/libimage
|
||||
github.com/containers/common/libimage/manifests
|
||||
github.com/containers/common/pkg/apparmor
|
||||
|
Reference in New Issue
Block a user