Vendor containers/common v0.44.2
Signed-off-by: Ashley Cui <acui@redhat.com>
This commit is contained in:
parent
37fe4e86c2
commit
f6ff8fd97b
2
go.mod
2
go.mod
|
@ -5,7 +5,7 @@ go 1.13
|
|||
require (
|
||||
github.com/containerd/containerd v1.5.5
|
||||
github.com/containernetworking/cni v0.8.1
|
||||
github.com/containers/common v0.44.0
|
||||
github.com/containers/common v0.44.2
|
||||
github.com/containers/image/v5 v5.16.0
|
||||
github.com/containers/ocicrypt v1.1.2
|
||||
github.com/containers/storage v1.36.0
|
||||
|
|
4
go.sum
4
go.sum
|
@ -230,8 +230,8 @@ github.com/containernetworking/cni v0.8.1 h1:7zpDnQ3T3s4ucOuJ/ZCLrYBxzkg0AELFfII
|
|||
github.com/containernetworking/cni v0.8.1/go.mod h1:LGwApLUm2FpoOfxTDEeq8T9ipbpZ61X79hmU3w8FmsY=
|
||||
github.com/containernetworking/plugins v0.8.6/go.mod h1:qnw5mN19D8fIwkqW7oHHYDHVlzhJpcY6TQxn/fUyDDM=
|
||||
github.com/containernetworking/plugins v0.9.1/go.mod h1:xP/idU2ldlzN6m4p5LmGiwRDjeJr6FLK6vuiUwoH7P8=
|
||||
github.com/containers/common v0.44.0 h1:YpjfOxmWrnVyxugYgiWV1Vo/Xg8JUfe32QZz3SAMfUk=
|
||||
github.com/containers/common v0.44.0/go.mod h1:7sdP4vmI5Bm6FPFxb3lvAh1Iktb6tiO1MzjUzhxdoGo=
|
||||
github.com/containers/common v0.44.2 h1:mSzW3NFXzQO/AfaMFb2qzDFcIu+vMEncIC33B4Qaag0=
|
||||
github.com/containers/common v0.44.2/go.mod h1:7sdP4vmI5Bm6FPFxb3lvAh1Iktb6tiO1MzjUzhxdoGo=
|
||||
github.com/containers/image/v5 v5.16.0 h1:WQcNSzb7+ngS2cfynx0vUwhk+scpgiKlldVcsF8GPbI=
|
||||
github.com/containers/image/v5 v5.16.0/go.mod h1:XgTpfAPLRGOd1XYyCU5cISFr777bLmOerCSpt/v7+Q4=
|
||||
github.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b h1:Q8ePgVfHDplZ7U33NwHZkrVELsZP5fYj9pM5WBZB2GE=
|
||||
|
|
|
@ -715,10 +715,18 @@ func (i *Image) Size() (int64, error) {
|
|||
return i.runtime.store.ImageSize(i.ID())
|
||||
}
|
||||
|
||||
// HasDifferentDigestOptions allows for customizing the check if another
|
||||
// (remote) image has a different digest.
|
||||
type HasDifferentDigestOptions struct {
|
||||
// containers-auth.json(5) file to use when authenticating against
|
||||
// container registries.
|
||||
AuthFilePath string
|
||||
}
|
||||
|
||||
// HasDifferentDigest returns true if the image specified by `remoteRef` has a
|
||||
// different digest than the local one. This check can be useful to check for
|
||||
// updates on remote registries.
|
||||
func (i *Image) HasDifferentDigest(ctx context.Context, remoteRef types.ImageReference) (bool, error) {
|
||||
func (i *Image) HasDifferentDigest(ctx context.Context, remoteRef types.ImageReference, options *HasDifferentDigestOptions) (bool, error) {
|
||||
// We need to account for the arch that the image uses. It seems
|
||||
// common on ARM to tweak this option to pull the correct image. See
|
||||
// github.com/containers/podman/issues/6613.
|
||||
|
@ -738,6 +746,14 @@ func (i *Image) HasDifferentDigest(ctx context.Context, remoteRef types.ImageRef
|
|||
sys.VariantChoice = inspectInfo.Variant
|
||||
}
|
||||
|
||||
if options != nil && options.AuthFilePath != "" {
|
||||
sys.AuthFilePath = options.AuthFilePath
|
||||
}
|
||||
|
||||
return i.hasDifferentDigestWithSystemContext(ctx, remoteRef, sys)
|
||||
}
|
||||
|
||||
func (i *Image) hasDifferentDigestWithSystemContext(ctx context.Context, remoteRef types.ImageReference, sys *types.SystemContext) (bool, error) {
|
||||
remoteImg, err := remoteRef.NewImage(ctx, sys)
|
||||
if err != nil {
|
||||
return false, err
|
||||
|
|
|
@ -561,7 +561,7 @@ func (r *Runtime) copySingleImageFromRegistry(ctx context.Context, imageName str
|
|||
}
|
||||
|
||||
if pullPolicy == config.PullPolicyNewer && localImage != nil {
|
||||
isNewer, err := localImage.HasDifferentDigest(ctx, srcRef)
|
||||
isNewer, err := localImage.hasDifferentDigestWithSystemContext(ctx, srcRef, c.systemContext)
|
||||
if err != nil {
|
||||
pullErrors = append(pullErrors, err)
|
||||
continue
|
||||
|
|
|
@ -54,6 +54,8 @@ type Config struct {
|
|||
Containers ContainersConfig `toml:"containers"`
|
||||
// Engine specifies how the container engine based on Engine will run
|
||||
Engine EngineConfig `toml:"engine"`
|
||||
// Machine specifies configurations of podman machine VMs
|
||||
Machine MachineConfig `toml:"machine"`
|
||||
// Network section defines the configuration of CNI Plugins
|
||||
Network NetworkConfig `toml:"network"`
|
||||
// Secret section defines configurations for the secret management
|
||||
|
@ -278,9 +280,6 @@ type EngineConfig struct {
|
|||
// MachineEnabled indicates if Podman is running in a podman-machine VM
|
||||
MachineEnabled bool `toml:"machine_enabled,omitempty"`
|
||||
|
||||
// MachineImage is the image used when creating a podman-machine VM
|
||||
MachineImage string `toml:"machine_image,omitempty"`
|
||||
|
||||
// MultiImageArchive - if true, the container engine allows for storing
|
||||
// archives (e.g., of the docker-archive transport) with multiple
|
||||
// images. By default, Podman creates single-image archives.
|
||||
|
@ -477,6 +476,18 @@ type SecretConfig struct {
|
|||
Opts map[string]string `toml:"opts,omitempty"`
|
||||
}
|
||||
|
||||
// MachineConfig represents the "machine" TOML config table
|
||||
type MachineConfig struct {
|
||||
// Number of CPU's a machine is created with.
|
||||
CPUs uint64 `toml:"cpus,omitempty"`
|
||||
// DiskSize is the size of the disk in GB created when init-ing a podman-machine VM
|
||||
DiskSize uint64 `toml:"disk_size,omitempty"`
|
||||
// MachineImage is the image used when init-ing a podman-machine VM
|
||||
Image string `toml:"image,omitempty"`
|
||||
// Memory in MB a machine is created with.
|
||||
Memory uint64 `toml:"memory,omitempty"`
|
||||
}
|
||||
|
||||
// Destination represents destination for remote service
|
||||
type Destination struct {
|
||||
// URI, required. Example: ssh://root@example.com:22/run/podman/podman.sock
|
||||
|
|
|
@ -396,10 +396,6 @@ default_sysctls = [
|
|||
#
|
||||
#machine_enabled = false
|
||||
|
||||
# The image used when creating a podman-machine VM.
|
||||
#
|
||||
#machine_image = "testing"
|
||||
|
||||
# MultiImageArchive - if true, the container engine allows for storing archives
|
||||
# (e.g., of the docker-archive transport) with multiple images. By default,
|
||||
# Podman creates single-image archives.
|
||||
|
@ -544,8 +540,25 @@ default_sysctls = [
|
|||
[engine.volume_plugins]
|
||||
#testplugin = "/run/podman/plugins/test.sock"
|
||||
|
||||
# The [engine.volume_plugins] table MUST be the last entry in this file.
|
||||
[machine]
|
||||
# Number of CPU's a machine is created with.
|
||||
#
|
||||
#cpus=1
|
||||
|
||||
# The size of the disk in GB created when init-ing a podman-machine VM.
|
||||
#
|
||||
#disk_size=10
|
||||
|
||||
# The image used when creating a podman-machine VM.
|
||||
#
|
||||
#image = "testing"
|
||||
|
||||
# Memory in MB a machine is created with.
|
||||
#
|
||||
#memory=2048
|
||||
|
||||
# The [machine] table MUST be the last entry in this file.
|
||||
# (Unless another table is added)
|
||||
# TOML does not provide a way to end a table other than a further table being
|
||||
# defined, so every key hereafter will be part of [volume_plugins] and not the
|
||||
# defined, so every key hereafter will be part of [machine] and not the
|
||||
# main config.
|
||||
|
|
|
@ -209,6 +209,7 @@ func DefaultConfig() (*Config, error) {
|
|||
},
|
||||
Engine: *defaultEngineConfig,
|
||||
Secrets: defaultSecretConfig(),
|
||||
Machine: defaultMachineConfig(),
|
||||
}, nil
|
||||
}
|
||||
|
||||
|
@ -220,6 +221,16 @@ func defaultSecretConfig() SecretConfig {
|
|||
}
|
||||
}
|
||||
|
||||
// defaultMachineConfig returns the default machine configuration.
|
||||
func defaultMachineConfig() MachineConfig {
|
||||
return MachineConfig{
|
||||
CPUs: 1,
|
||||
DiskSize: 10,
|
||||
Image: "testing",
|
||||
Memory: 2048,
|
||||
}
|
||||
}
|
||||
|
||||
// defaultConfigFromMemory returns a default engine configuration. Note that the
|
||||
// config is different for root and rootless. It also parses the storage.conf.
|
||||
func defaultConfigFromMemory() (*EngineConfig, error) {
|
||||
|
@ -336,8 +347,6 @@ func defaultConfigFromMemory() (*EngineConfig, error) {
|
|||
// constants.
|
||||
c.LockType = "shm"
|
||||
c.MachineEnabled = false
|
||||
c.MachineImage = "testing"
|
||||
|
||||
c.ChownCopiedFiles = true
|
||||
|
||||
return c, nil
|
||||
|
@ -557,9 +566,3 @@ func (c *Config) MachineEnabled() bool {
|
|||
func (c *Config) RootlessNetworking() string {
|
||||
return c.Containers.RootlessNetworking
|
||||
}
|
||||
|
||||
// MachineImage returns the image to be
|
||||
// used when creating a podman-machine VM
|
||||
func (c *Config) MachineImage() string {
|
||||
return c.Engine.MachineImage
|
||||
}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
package version
|
||||
|
||||
// Version is the version of the build.
|
||||
const Version = "0.44.0"
|
||||
const Version = "0.44.2"
|
||||
|
|
|
@ -64,7 +64,7 @@ github.com/containernetworking/cni/pkg/types/020
|
|||
github.com/containernetworking/cni/pkg/types/current
|
||||
github.com/containernetworking/cni/pkg/utils
|
||||
github.com/containernetworking/cni/pkg/version
|
||||
# github.com/containers/common v0.44.0
|
||||
# github.com/containers/common v0.44.2
|
||||
github.com/containers/common/libimage
|
||||
github.com/containers/common/libimage/manifests
|
||||
github.com/containers/common/pkg/apparmor
|
||||
|
|
Loading…
Reference in New Issue