mirror of
				https://github.com/containers/podman.git
				synced 2025-10-30 17:38:27 +08:00 
			
		
		
		
	Merge pull request #8947 from Luap99/cleanup-code
Fix problems reported by staticcheck
This commit is contained in:
		| @ -40,7 +40,6 @@ import ( | ||||
| 	"github.com/containers/storage/pkg/idtools" | ||||
| 	securejoin "github.com/cyphar/filepath-securejoin" | ||||
| 	runcuser "github.com/opencontainers/runc/libcontainer/user" | ||||
| 	"github.com/opencontainers/runtime-spec/specs-go" | ||||
| 	spec "github.com/opencontainers/runtime-spec/specs-go" | ||||
| 	"github.com/opencontainers/runtime-tools/generate" | ||||
| 	"github.com/opencontainers/selinux/go-selinux/label" | ||||
| @ -284,7 +283,7 @@ func (c *Container) generateSpec(ctx context.Context) (*spec.Spec, error) { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	g := generate.NewFromSpec(c.config.Spec) | ||||
| 	g := generate.Generator{Config: c.config.Spec} | ||||
|  | ||||
| 	// If network namespace was requested, add it now | ||||
| 	if c.config.CreateNetNS { | ||||
| @ -400,7 +399,7 @@ func (c *Container) generateSpec(ctx context.Context) (*spec.Spec, error) { | ||||
| 			return nil, errors.Wrapf(err, "failed to create TempDir in the %s directory", c.config.StaticDir) | ||||
| 		} | ||||
|  | ||||
| 		var overlayMount specs.Mount | ||||
| 		var overlayMount spec.Mount | ||||
| 		if volume.ReadWrite { | ||||
| 			overlayMount, err = overlay.Mount(contentDir, mountPoint, volume.Dest, c.RootUID(), c.RootGID(), c.runtime.store.GraphOptions()) | ||||
| 		} else { | ||||
| @ -1519,18 +1518,14 @@ func (c *Container) makeBindMounts() error { | ||||
| 	} | ||||
| 	if newPasswd != "" { | ||||
| 		// Make /etc/passwd | ||||
| 		if _, ok := c.state.BindMounts["/etc/passwd"]; ok { | ||||
| 			// If it already exists, delete so we can recreate | ||||
| 			delete(c.state.BindMounts, "/etc/passwd") | ||||
| 		} | ||||
| 		// If it already exists, delete so we can recreate | ||||
| 		delete(c.state.BindMounts, "/etc/passwd") | ||||
| 		c.state.BindMounts["/etc/passwd"] = newPasswd | ||||
| 	} | ||||
| 	if newGroup != "" { | ||||
| 		// Make /etc/group | ||||
| 		if _, ok := c.state.BindMounts["/etc/group"]; ok { | ||||
| 			// If it already exists, delete so we can recreate | ||||
| 			delete(c.state.BindMounts, "/etc/group") | ||||
| 		} | ||||
| 		// If it already exists, delete so we can recreate | ||||
| 		delete(c.state.BindMounts, "/etc/group") | ||||
| 		c.state.BindMounts["/etc/group"] = newGroup | ||||
| 	} | ||||
|  | ||||
|  | ||||
| @ -17,7 +17,6 @@ import ( | ||||
| 	"github.com/containers/common/pkg/retry" | ||||
| 	cp "github.com/containers/image/v5/copy" | ||||
| 	"github.com/containers/image/v5/directory" | ||||
| 	"github.com/containers/image/v5/docker/archive" | ||||
| 	dockerarchive "github.com/containers/image/v5/docker/archive" | ||||
| 	"github.com/containers/image/v5/docker/reference" | ||||
| 	"github.com/containers/image/v5/image" | ||||
| @ -37,7 +36,6 @@ import ( | ||||
| 	"github.com/containers/podman/v2/pkg/util" | ||||
| 	"github.com/containers/storage" | ||||
| 	digest "github.com/opencontainers/go-digest" | ||||
| 	imgspecv1 "github.com/opencontainers/image-spec/specs-go/v1" | ||||
| 	ociv1 "github.com/opencontainers/image-spec/specs-go/v1" | ||||
| 	opentracing "github.com/opentracing/opentracing-go" | ||||
| 	"github.com/pkg/errors" | ||||
| @ -185,7 +183,7 @@ func (ir *Runtime) SaveImages(ctx context.Context, namesOrIDs []string, format s | ||||
|  | ||||
| 	sys := GetSystemContext("", "", false) | ||||
|  | ||||
| 	archWriter, err := archive.NewWriter(sys, outputFile) | ||||
| 	archWriter, err := dockerarchive.NewWriter(sys, outputFile) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -291,7 +289,7 @@ func (ir *Runtime) LoadAllImagesFromDockerArchive(ctx context.Context, fileName | ||||
| 	} | ||||
|  | ||||
| 	sc := GetSystemContext(signaturePolicyPath, "", false) | ||||
| 	reader, err := archive.NewReader(sc, fileName) | ||||
| 	reader, err := dockerarchive.NewReader(sc, fileName) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -1148,7 +1146,7 @@ func (i *Image) GetLabel(ctx context.Context, label string) (string, error) { | ||||
| 	} | ||||
|  | ||||
| 	for k, v := range labels { | ||||
| 		if strings.ToLower(k) == strings.ToLower(label) { | ||||
| 		if strings.EqualFold(k, label) { | ||||
| 			return v, nil | ||||
| 		} | ||||
| 	} | ||||
| @ -1326,7 +1324,7 @@ func (ir *Runtime) Import(ctx context.Context, path, reference string, writer io | ||||
|  | ||||
| 	annotations := make(map[string]string) | ||||
|  | ||||
| 	//	config imgspecv1.Image | ||||
| 	//	config ociv1.Image | ||||
| 	err = updater.ConfigUpdate(imageConfig, annotations) | ||||
| 	if err != nil { | ||||
| 		return nil, errors.Wrapf(err, "error updating image config") | ||||
| @ -1435,7 +1433,7 @@ func (i *Image) IsParent(ctx context.Context) (bool, error) { | ||||
|  | ||||
| // historiesMatch returns the number of entries in the histories which have the | ||||
| // same contents | ||||
| func historiesMatch(a, b []imgspecv1.History) int { | ||||
| func historiesMatch(a, b []ociv1.History) int { | ||||
| 	i := 0 | ||||
| 	for i < len(a) && i < len(b) { | ||||
| 		if a[i].Created != nil && b[i].Created == nil { | ||||
| @ -1468,7 +1466,7 @@ func historiesMatch(a, b []imgspecv1.History) int { | ||||
|  | ||||
| // areParentAndChild checks diff ID and history in the two images and return | ||||
| // true if the second should be considered to be directly based on the first | ||||
| func areParentAndChild(parent, child *imgspecv1.Image) bool { | ||||
| func areParentAndChild(parent, child *ociv1.Image) bool { | ||||
| 	// the child and candidate parent should share all of the | ||||
| 	// candidate parent's diff IDs, which together would have | ||||
| 	// controlled which layers were used | ||||
| @ -1621,7 +1619,7 @@ func (i *Image) Save(ctx context.Context, source, format, output string, moreTag | ||||
| 		if err != nil { | ||||
| 			return errors.Wrapf(err, "error getting the OCI directory ImageReference for (%q, %q)", output, destImageName) | ||||
| 		} | ||||
| 		manifestType = imgspecv1.MediaTypeImageManifest | ||||
| 		manifestType = ociv1.MediaTypeImageManifest | ||||
| 	case "docker-dir": | ||||
| 		destRef, err = directory.NewReference(output) | ||||
| 		if err != nil { | ||||
|  | ||||
| @ -29,7 +29,7 @@ func generatePruneFilterFuncs(filter, filterValue string) (ImageFilter, error) { | ||||
| 				return false | ||||
| 			} | ||||
| 			for labelKey, labelValue := range labels { | ||||
| 				if labelKey == filterKey && ("" == filterValue || labelValue == filterValue) { | ||||
| 				if labelKey == filterKey && (filterValue == "" || labelValue == filterValue) { | ||||
| 					return true | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| @ -11,7 +11,6 @@ import ( | ||||
| 	cp "github.com/containers/image/v5/copy" | ||||
| 	"github.com/containers/image/v5/directory" | ||||
| 	"github.com/containers/image/v5/docker" | ||||
| 	"github.com/containers/image/v5/docker/archive" | ||||
| 	dockerarchive "github.com/containers/image/v5/docker/archive" | ||||
| 	ociarchive "github.com/containers/image/v5/oci/archive" | ||||
| 	oci "github.com/containers/image/v5/oci/layout" | ||||
| @ -130,7 +129,7 @@ func (ir *Runtime) getSinglePullRefPairGoal(srcRef types.ImageReference, destNam | ||||
|  | ||||
| // getPullRefPairsFromDockerArchiveReference returns a slice of pullRefPairs | ||||
| // for the specified docker reference and the corresponding archive.Reader. | ||||
| func (ir *Runtime) getPullRefPairsFromDockerArchiveReference(ctx context.Context, reader *archive.Reader, ref types.ImageReference, sc *types.SystemContext) ([]pullRefPair, error) { | ||||
| func (ir *Runtime) getPullRefPairsFromDockerArchiveReference(ctx context.Context, reader *dockerarchive.Reader, ref types.ImageReference, sc *types.SystemContext) ([]pullRefPair, error) { | ||||
| 	destNames, err := reader.ManifestTagsForReference(ref) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| @ -178,7 +177,7 @@ func (ir *Runtime) pullGoalFromImageReference(ctx context.Context, srcRef types. | ||||
| 	// supports pulling from docker-archive, oci, and registries | ||||
| 	switch srcRef.Transport().Name() { | ||||
| 	case DockerArchive: | ||||
| 		reader, readerRef, err := archive.NewReaderForReference(sc, srcRef) | ||||
| 		reader, readerRef, err := dockerarchive.NewReaderForReference(sc, srcRef) | ||||
| 		if err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| @ -432,7 +431,7 @@ func checkRemoteImageForLabel(ctx context.Context, label string, imageInfo pullR | ||||
| 	} | ||||
| 	// Labels are case insensitive; so we iterate instead of simple lookup | ||||
| 	for k := range remoteInspect.Labels { | ||||
| 		if strings.ToLower(label) == strings.ToLower(k) { | ||||
| 		if strings.EqualFold(label, k) { | ||||
| 			return nil | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| @ -437,12 +437,8 @@ func (s *InMemoryState) RemoveContainer(ctr *Container) error { | ||||
| 	} | ||||
|  | ||||
| 	// Remove our network aliases | ||||
| 	if _, ok := s.ctrNetworkAliases[ctr.ID()]; ok { | ||||
| 		delete(s.ctrNetworkAliases, ctr.ID()) | ||||
| 	} | ||||
| 	if _, ok := s.ctrNetworks[ctr.ID()]; ok { | ||||
| 		delete(s.ctrNetworks, ctr.ID()) | ||||
| 	} | ||||
| 	delete(s.ctrNetworkAliases, ctr.ID()) | ||||
| 	delete(s.ctrNetworks, ctr.ID()) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -680,9 +676,7 @@ func (s *InMemoryState) NetworkDisconnect(ctr *Container, network string) error | ||||
| 		ctrAliases = make(map[string][]string) | ||||
| 		s.ctrNetworkAliases[ctr.ID()] = ctrAliases | ||||
| 	} | ||||
| 	if _, ok := ctrAliases[network]; ok { | ||||
| 		delete(ctrAliases, network) | ||||
| 	} | ||||
| 	delete(ctrAliases, network) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -1523,12 +1517,8 @@ func (s *InMemoryState) RemoveContainerFromPod(pod *Pod, ctr *Container) error { | ||||
| 	} | ||||
|  | ||||
| 	// Remove our network aliases | ||||
| 	if _, ok := s.ctrNetworkAliases[ctr.ID()]; ok { | ||||
| 		delete(s.ctrNetworkAliases, ctr.ID()) | ||||
| 	} | ||||
| 	if _, ok := s.ctrNetworks[ctr.ID()]; ok { | ||||
| 		delete(s.ctrNetworks, ctr.ID()) | ||||
| 	} | ||||
| 	delete(s.ctrNetworkAliases, ctr.ID()) | ||||
| 	delete(s.ctrNetworks, ctr.ID()) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @ -216,7 +216,7 @@ func IfPassesFilter(netconf *libcni.NetworkConfigList, filters map[string][]stri | ||||
| 					filterValue = "" | ||||
| 				} | ||||
| 				for labelKey, labelValue := range labels { | ||||
| 					if labelKey == filterKey && ("" == filterValue || labelValue == filterValue) { | ||||
| 					if labelKey == filterKey && (filterValue == "" || labelValue == filterValue) { | ||||
| 						result = true | ||||
| 						continue outer | ||||
| 					} | ||||
|  | ||||
| @ -1387,6 +1387,7 @@ func (r *ConmonOCIRuntime) sharedConmonArgs(ctr *Container, cuuid, bundlePath, p | ||||
| 		logDriverArg = define.NoLogging | ||||
| 	case define.JSONLogging: | ||||
| 		fallthrough | ||||
| 	//lint:ignore ST1015 the default case has to be here | ||||
| 	default: //nolint-stylecheck | ||||
| 		// No case here should happen except JSONLogging, but keep this here in case the options are extended | ||||
| 		logrus.Errorf("%s logging specified but not supported. Choosing k8s-file logging instead", ctr.LogDriver()) | ||||
|  | ||||
| @ -910,7 +910,7 @@ func WithUserNSFrom(nsCtr *Container) CtrCreateOption { | ||||
| 		ctr.config.UserNsCtr = nsCtr.ID() | ||||
| 		ctr.config.IDMappings = nsCtr.config.IDMappings | ||||
|  | ||||
| 		g := generate.NewFromSpec(ctr.config.Spec) | ||||
| 		g := generate.Generator{Config: ctr.config.Spec} | ||||
|  | ||||
| 		g.ClearLinuxUIDMappings() | ||||
| 		for _, uidmap := range nsCtr.config.IDMappings.UIDMap { | ||||
|  | ||||
		Reference in New Issue
	
	Block a user
	 OpenShift Merge Robot
					OpenShift Merge Robot