mirror of
https://github.com/containers/podman.git
synced 2025-11-16 11:07:44 +08:00
vendor c/common@main
In hope to fix a CI flake. Signed-off-by: Valentin Rothberg <vrothberg@redhat.com>
This commit is contained in:
5
vendor/github.com/containers/common/pkg/secrets/filedriver/filedriver.go
generated
vendored
5
vendor/github.com/containers/common/pkg/secrets/filedriver/filedriver.go
generated
vendored
@@ -55,7 +55,7 @@ func (d *Driver) List() ([]string, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
var allID []string
|
||||
allID := make([]string, 0, len(secretData))
|
||||
for k := range secretData {
|
||||
allID = append(allID, k)
|
||||
}
|
||||
@@ -134,9 +134,8 @@ func (d *Driver) getAllData() (map[string][]byte, error) {
|
||||
if os.IsNotExist(err) {
|
||||
// the file will be created later on a store()
|
||||
return make(map[string][]byte), nil
|
||||
} else {
|
||||
return nil, err
|
||||
}
|
||||
return nil, err
|
||||
}
|
||||
|
||||
file, err := os.Open(d.secretsDataFilePath)
|
||||
|
||||
11
vendor/github.com/containers/common/pkg/secrets/secrets.go
generated
vendored
11
vendor/github.com/containers/common/pkg/secrets/secrets.go
generated
vendored
@@ -53,6 +53,9 @@ var secretsFile = "secrets.json"
|
||||
var secretNameRegexp = regexp.MustCompile(`^[a-zA-Z0-9][a-zA-Z0-9_.-]*$`)
|
||||
|
||||
// SecretsManager holds information on handling secrets
|
||||
//
|
||||
// revive does not like the name because the package is already called secrets
|
||||
//nolint:revive
|
||||
type SecretsManager struct {
|
||||
// secretsPath is the path to the db file where secrets are stored
|
||||
secretsDBPath string
|
||||
@@ -82,6 +85,9 @@ type Secret struct {
|
||||
// The driver stores the actual bytes of secret data, as opposed to
|
||||
// the secret metadata.
|
||||
// Currently only the unencrypted filedriver is implemented.
|
||||
//
|
||||
// revive does not like the name because the package is already called secrets
|
||||
//nolint:revive
|
||||
type SecretsDriver interface {
|
||||
// List lists all secret ids in the secrets data store
|
||||
List() ([]string, error)
|
||||
@@ -234,7 +240,7 @@ func (s *SecretsManager) List() ([]Secret, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
var ls []Secret
|
||||
ls := make([]Secret, 0, len(secrets))
|
||||
for _, v := range secrets {
|
||||
ls = append(ls, v)
|
||||
}
|
||||
@@ -276,9 +282,8 @@ func getDriver(name string, opts map[string]string) (SecretsDriver, error) {
|
||||
case "file":
|
||||
if path, ok := opts["path"]; ok {
|
||||
return filedriver.NewDriver(path)
|
||||
} else {
|
||||
return nil, errors.Wrap(errInvalidDriverOpt, "need path for filedriver")
|
||||
}
|
||||
return nil, errors.Wrap(errInvalidDriverOpt, "need path for filedriver")
|
||||
case "pass":
|
||||
return passdriver.NewDriver(opts)
|
||||
case "shell":
|
||||
|
||||
3
vendor/github.com/containers/common/pkg/secrets/secretsdb.go
generated
vendored
3
vendor/github.com/containers/common/pkg/secrets/secretsdb.go
generated
vendored
@@ -31,9 +31,8 @@ func (s *SecretsManager) loadDB() error {
|
||||
// the db cache will show no entries anyway.
|
||||
// The file will be created later on a store()
|
||||
return nil
|
||||
} else {
|
||||
return err
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
// We check if the file has been modified after the last time it was loaded into the cache.
|
||||
|
||||
Reference in New Issue
Block a user