Update containerd to include the gcr private registry fix
Signed-off-by: Lantao Liu <lantaol@google.com>
This commit is contained in:
parent
a8d4940285
commit
91ca178275
@ -1,5 +1,5 @@
|
|||||||
RUNC_VERSION=593914b8bd5448a93f7c3e4902a03408b6d5c0ce
|
RUNC_VERSION=593914b8bd5448a93f7c3e4902a03408b6d5c0ce
|
||||||
CNI_VERSION=v0.6.0
|
CNI_VERSION=v0.6.0
|
||||||
CONTAINERD_VERSION=9f28040426990a8a640019b2a69b4cacb6991c01
|
CONTAINERD_VERSION=0cb2c961b2d41e46fbb94bfa165db6d6731b73d2
|
||||||
CRITEST_VERSION=3028b837818133b4e83758cf9aee867f0a3ff6d2
|
CRITEST_VERSION=3028b837818133b4e83758cf9aee867f0a3ff6d2
|
||||||
KUBERNETES_VERSION=11a836078d0c78a4253a77a3ff6f4a555c4121f9
|
KUBERNETES_VERSION=11a836078d0c78a4253a77a3ff6f4a555c4121f9
|
||||||
|
14
vendor.conf
14
vendor.conf
@ -1,23 +1,24 @@
|
|||||||
github.com/blang/semver v3.1.0
|
github.com/blang/semver v3.1.0
|
||||||
github.com/boltdb/bolt e9cf4fae01b5a8ff89d0ec6b32f0d9c9f79aefdd
|
github.com/boltdb/bolt e9cf4fae01b5a8ff89d0ec6b32f0d9c9f79aefdd
|
||||||
github.com/BurntSushi/toml a368813c5e648fee92e5f6c30e3944ff9d5e8895
|
github.com/BurntSushi/toml a368813c5e648fee92e5f6c30e3944ff9d5e8895
|
||||||
github.com/containerd/containerd 9f28040426990a8a640019b2a69b4cacb6991c01
|
github.com/containerd/cgroups 5933ab4dc4f7caa3a73a1dc141bd11f42b5c9163
|
||||||
|
github.com/containerd/containerd 0cb2c961b2d41e46fbb94bfa165db6d6731b73d2
|
||||||
github.com/containerd/continuity cf279e6ac893682272b4479d4c67fd3abf878b4e
|
github.com/containerd/continuity cf279e6ac893682272b4479d4c67fd3abf878b4e
|
||||||
github.com/containerd/fifo fbfb6a11ec671efbe94ad1c12c2e98773f19e1e6
|
github.com/containerd/fifo fbfb6a11ec671efbe94ad1c12c2e98773f19e1e6
|
||||||
github.com/containerd/cgroups 5933ab4dc4f7caa3a73a1dc141bd11f42b5c9163
|
|
||||||
github.com/coreos/go-systemd 48702e0da86bd25e76cfef347e2adeb434a0d0a6
|
|
||||||
github.com/containernetworking/cni v0.6.0
|
github.com/containernetworking/cni v0.6.0
|
||||||
github.com/containernetworking/plugins v0.6.0
|
github.com/containernetworking/plugins v0.6.0
|
||||||
|
github.com/coreos/go-systemd 48702e0da86bd25e76cfef347e2adeb434a0d0a6
|
||||||
github.com/cri-o/ocicni 73f1309d6bc5c3eac78c1382408921cd771ff22e
|
github.com/cri-o/ocicni 73f1309d6bc5c3eac78c1382408921cd771ff22e
|
||||||
github.com/davecgh/go-spew v1.1.0
|
github.com/davecgh/go-spew v1.1.0
|
||||||
github.com/docker/distribution b38e5838b7b2f2ad48e06ec4b500011976080621
|
github.com/docker/distribution b38e5838b7b2f2ad48e06ec4b500011976080621
|
||||||
github.com/docker/docker cc4da8112814cdbb00dbf23370f9ed764383de1f
|
github.com/docker/docker cc4da8112814cdbb00dbf23370f9ed764383de1f
|
||||||
github.com/docker/go-events 9461782956ad83b30282bf90e31fa6a70c255ba9
|
github.com/docker/go-events 9461782956ad83b30282bf90e31fa6a70c255ba9
|
||||||
github.com/docker/spdystream 449fdfce4d962303d702fec724ef0ad181c92528
|
|
||||||
github.com/docker/go-units 0dadbb0345b35ec7ef35e228dabb8de89a65bf52
|
github.com/docker/go-units 0dadbb0345b35ec7ef35e228dabb8de89a65bf52
|
||||||
|
github.com/docker/spdystream 449fdfce4d962303d702fec724ef0ad181c92528
|
||||||
github.com/emicklei/go-restful ff4f55a206334ef123e4f79bbf348980da81ca46
|
github.com/emicklei/go-restful ff4f55a206334ef123e4f79bbf348980da81ca46
|
||||||
github.com/fsnotify/fsnotify 7d7316ed6e1ed2de075aab8dfc76de5d158d66e1
|
github.com/fsnotify/fsnotify 7d7316ed6e1ed2de075aab8dfc76de5d158d66e1
|
||||||
github.com/ghodss/yaml 73d445a93680fa1a78ae23a5839bad48f32ba1ee
|
github.com/ghodss/yaml 73d445a93680fa1a78ae23a5839bad48f32ba1ee
|
||||||
|
github.com/godbus/dbus 97646858c46433e4afb3432ad28c12e968efa298
|
||||||
github.com/gogo/protobuf d2e1ade2d719b78fe5b061b4c18a9f7111b5bdc8
|
github.com/gogo/protobuf d2e1ade2d719b78fe5b061b4c18a9f7111b5bdc8
|
||||||
github.com/golang/glog 44145f04b68cf362d9c4df2182967c2275eaefed
|
github.com/golang/glog 44145f04b68cf362d9c4df2182967c2275eaefed
|
||||||
github.com/golang/protobuf 5a0f697c9ed9d68fef0116532c6e05cfeae00e55
|
github.com/golang/protobuf 5a0f697c9ed9d68fef0116532c6e05cfeae00e55
|
||||||
@ -26,7 +27,6 @@ github.com/go-openapi/jsonpointer 46af16f9f7b149af66e5d1bd010e3574dc06de98
|
|||||||
github.com/go-openapi/jsonreference 13c6e3589ad90f49bd3e3bbe2c2cb3d7a4142272
|
github.com/go-openapi/jsonreference 13c6e3589ad90f49bd3e3bbe2c2cb3d7a4142272
|
||||||
github.com/go-openapi/spec 6aced65f8501fe1217321abf0749d354824ba2ff
|
github.com/go-openapi/spec 6aced65f8501fe1217321abf0749d354824ba2ff
|
||||||
github.com/go-openapi/swag 1d0bd113de87027671077d3c71eb3ac5d7dbba72
|
github.com/go-openapi/swag 1d0bd113de87027671077d3c71eb3ac5d7dbba72
|
||||||
github.com/godbus/dbus 97646858c46433e4afb3432ad28c12e968efa298
|
|
||||||
github.com/hashicorp/errwrap 7554cd9344cec97297fa6649b055a8c98c2a1e55
|
github.com/hashicorp/errwrap 7554cd9344cec97297fa6649b055a8c98c2a1e55
|
||||||
github.com/hashicorp/go-multierror ed905158d87462226a13fe39ddf685ea65f1c11f
|
github.com/hashicorp/go-multierror ed905158d87462226a13fe39ddf685ea65f1c11f
|
||||||
github.com/juju/ratelimit 5b9ff866471762aa2ab2dced63c9fb6f53921342
|
github.com/juju/ratelimit 5b9ff866471762aa2ab2dced63c9fb6f53921342
|
||||||
@ -34,7 +34,7 @@ github.com/mailru/easyjson d5b7844b561a7bc640052f1b935f7b800330d7e0
|
|||||||
github.com/Microsoft/go-winio v0.4.4
|
github.com/Microsoft/go-winio v0.4.4
|
||||||
github.com/opencontainers/go-digest 21dfd564fd89c944783d00d069f33e3e7123c448
|
github.com/opencontainers/go-digest 21dfd564fd89c944783d00d069f33e3e7123c448
|
||||||
github.com/opencontainers/image-spec v1.0.0
|
github.com/opencontainers/image-spec v1.0.0
|
||||||
github.com/opencontainers/runc e775f0fba3ea329b8b766451c892c41a3d49594d
|
github.com/opencontainers/runc 593914b8bd5448a93f7c3e4902a03408b6d5c0ce
|
||||||
github.com/opencontainers/runtime-spec v1.0.0
|
github.com/opencontainers/runtime-spec v1.0.0
|
||||||
github.com/opencontainers/runtime-tools 6073aff4ac61897f75895123f7e24135204a404d
|
github.com/opencontainers/runtime-tools 6073aff4ac61897f75895123f7e24135204a404d
|
||||||
github.com/opencontainers/selinux 4a2974bf1ee960774ffd517717f1f45325af0206
|
github.com/opencontainers/selinux 4a2974bf1ee960774ffd517717f1f45325af0206
|
||||||
@ -59,6 +59,6 @@ k8s.io/api f30e293246921de7f4ee46bb65b8762b2f890fc4
|
|||||||
k8s.io/apimachinery b166f81f5c4c88402ae23a0d0944c6ad08bffd3b
|
k8s.io/apimachinery b166f81f5c4c88402ae23a0d0944c6ad08bffd3b
|
||||||
k8s.io/apiserver b2a8ad67a002d27c8945573abb80b4be543f2a1f
|
k8s.io/apiserver b2a8ad67a002d27c8945573abb80b4be543f2a1f
|
||||||
k8s.io/client-go db8228460e2de17f5d3a9a453f61dde0ba86545a
|
k8s.io/client-go db8228460e2de17f5d3a9a453f61dde0ba86545a
|
||||||
|
k8s.io/kube-openapi 2fbf05e337e56c983d9df1220b9e67cf132a1669
|
||||||
k8s.io/kubernetes 11a836078d0c78a4253a77a3ff6f4a555c4121f9
|
k8s.io/kubernetes 11a836078d0c78a4253a77a3ff6f4a555c4121f9
|
||||||
k8s.io/utils 1f5ba483856f60b34bb29864d4129a8065d1c83b
|
k8s.io/utils 1f5ba483856f60b34bb29864d4129a8065d1c83b
|
||||||
k8s.io/kube-openapi 2fbf05e337e56c983d9df1220b9e67cf132a1669
|
|
||||||
|
7
vendor/github.com/containerd/containerd/README.md
generated
vendored
7
vendor/github.com/containerd/containerd/README.md
generated
vendored
@ -79,7 +79,7 @@ You can specify options when creating a container about how to modify the specif
|
|||||||
redis, err := client.NewContainer(context, "redis-master", containerd.WithNewSpec(containerd.WithImageConfig(image)))
|
redis, err := client.NewContainer(context, "redis-master", containerd.WithNewSpec(containerd.WithImageConfig(image)))
|
||||||
```
|
```
|
||||||
|
|
||||||
## Root Filesystems
|
### Root Filesystems
|
||||||
|
|
||||||
containerd allows you to use overlay or snapshot filesystems with your containers. It comes with builtin support for overlayfs and btrfs.
|
containerd allows you to use overlay or snapshot filesystems with your containers. It comes with builtin support for overlayfs and btrfs.
|
||||||
|
|
||||||
@ -148,7 +148,7 @@ defer task.Delete(context)
|
|||||||
err := task.Start(context)
|
err := task.Start(context)
|
||||||
```
|
```
|
||||||
|
|
||||||
### Developer Quick-Start
|
## Developer Quick-Start
|
||||||
|
|
||||||
To build the daemon and `ctr` simple test client, the following build system dependencies are required:
|
To build the daemon and `ctr` simple test client, the following build system dependencies are required:
|
||||||
|
|
||||||
@ -194,8 +194,7 @@ For sync communication we have a community slack with a #containerd channel that
|
|||||||
|
|
||||||
### Reporting security issues
|
### Reporting security issues
|
||||||
|
|
||||||
__If you are reporting a security issue, please follow the responsible
|
__If you are reporting a security issue, please reach out discreetly at containerd-security@googlegroups.com__.
|
||||||
disclosure guidelines and reach out discreetly at containerd-security@googlegroups.com__.
|
|
||||||
|
|
||||||
## Copyright and license
|
## Copyright and license
|
||||||
|
|
||||||
|
302
vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go
generated
vendored
302
vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go
generated
vendored
@ -94,6 +94,16 @@ type Container struct {
|
|||||||
CreatedAt time.Time `protobuf:"bytes,8,opt,name=created_at,json=createdAt,stdtime" json:"created_at"`
|
CreatedAt time.Time `protobuf:"bytes,8,opt,name=created_at,json=createdAt,stdtime" json:"created_at"`
|
||||||
// UpdatedAt is the last time the container was mutated.
|
// UpdatedAt is the last time the container was mutated.
|
||||||
UpdatedAt time.Time `protobuf:"bytes,9,opt,name=updated_at,json=updatedAt,stdtime" json:"updated_at"`
|
UpdatedAt time.Time `protobuf:"bytes,9,opt,name=updated_at,json=updatedAt,stdtime" json:"updated_at"`
|
||||||
|
// Extensions allow clients to provide zero or more blobs that are directly
|
||||||
|
// associated with the container. One may provide protobuf, json, or other
|
||||||
|
// encoding formats. The primary use of this is to further decorate the
|
||||||
|
// container object with fields that may be specific to a client integration.
|
||||||
|
//
|
||||||
|
// The key portion of this map should identify a "name" for the extension
|
||||||
|
// that should be unique against other extensions. When updating extension
|
||||||
|
// data, one should only update the specified extension using field paths
|
||||||
|
// to select a specific map key.
|
||||||
|
Extensions map[string]google_protobuf1.Any `protobuf:"bytes,10,rep,name=extensions" json:"extensions" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Container) Reset() { *m = Container{} }
|
func (m *Container) Reset() { *m = Container{} }
|
||||||
@ -518,6 +528,32 @@ func (m *Container) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n4
|
i += n4
|
||||||
|
if len(m.Extensions) > 0 {
|
||||||
|
for k, _ := range m.Extensions {
|
||||||
|
dAtA[i] = 0x52
|
||||||
|
i++
|
||||||
|
v := m.Extensions[k]
|
||||||
|
msgSize := 0
|
||||||
|
if (&v) != nil {
|
||||||
|
msgSize = (&v).Size()
|
||||||
|
msgSize += 1 + sovContainers(uint64(msgSize))
|
||||||
|
}
|
||||||
|
mapSize := 1 + len(k) + sovContainers(uint64(len(k))) + msgSize
|
||||||
|
i = encodeVarintContainers(dAtA, i, uint64(mapSize))
|
||||||
|
dAtA[i] = 0xa
|
||||||
|
i++
|
||||||
|
i = encodeVarintContainers(dAtA, i, uint64(len(k)))
|
||||||
|
i += copy(dAtA[i:], k)
|
||||||
|
dAtA[i] = 0x12
|
||||||
|
i++
|
||||||
|
i = encodeVarintContainers(dAtA, i, uint64((&v).Size()))
|
||||||
|
n5, err := (&v).MarshalTo(dAtA[i:])
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
i += n5
|
||||||
|
}
|
||||||
|
}
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -546,11 +582,11 @@ func (m *Container_Runtime) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
dAtA[i] = 0x12
|
dAtA[i] = 0x12
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.Options.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.Options.Size()))
|
||||||
n5, err := m.Options.MarshalTo(dAtA[i:])
|
n6, err := m.Options.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n5
|
i += n6
|
||||||
}
|
}
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
@ -597,11 +633,11 @@ func (m *GetContainerResponse) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
dAtA[i] = 0xa
|
dAtA[i] = 0xa
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
||||||
n6, err := m.Container.MarshalTo(dAtA[i:])
|
n7, err := m.Container.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n6
|
i += n7
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -686,11 +722,11 @@ func (m *CreateContainerRequest) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
dAtA[i] = 0xa
|
dAtA[i] = 0xa
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
||||||
n7, err := m.Container.MarshalTo(dAtA[i:])
|
n8, err := m.Container.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n7
|
i += n8
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -712,11 +748,11 @@ func (m *CreateContainerResponse) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
dAtA[i] = 0xa
|
dAtA[i] = 0xa
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
||||||
n8, err := m.Container.MarshalTo(dAtA[i:])
|
n9, err := m.Container.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n8
|
i += n9
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -738,20 +774,20 @@ func (m *UpdateContainerRequest) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
dAtA[i] = 0xa
|
dAtA[i] = 0xa
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
||||||
n9, err := m.Container.MarshalTo(dAtA[i:])
|
n10, err := m.Container.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n9
|
i += n10
|
||||||
if m.UpdateMask != nil {
|
if m.UpdateMask != nil {
|
||||||
dAtA[i] = 0x12
|
dAtA[i] = 0x12
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.UpdateMask.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.UpdateMask.Size()))
|
||||||
n10, err := m.UpdateMask.MarshalTo(dAtA[i:])
|
n11, err := m.UpdateMask.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n10
|
i += n11
|
||||||
}
|
}
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
@ -774,11 +810,11 @@ func (m *UpdateContainerResponse) MarshalTo(dAtA []byte) (int, error) {
|
|||||||
dAtA[i] = 0xa
|
dAtA[i] = 0xa
|
||||||
i++
|
i++
|
||||||
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
i = encodeVarintContainers(dAtA, i, uint64(m.Container.Size()))
|
||||||
n11, err := m.Container.MarshalTo(dAtA[i:])
|
n12, err := m.Container.MarshalTo(dAtA[i:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
i += n11
|
i += n12
|
||||||
return i, nil
|
return i, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -872,6 +908,15 @@ func (m *Container) Size() (n int) {
|
|||||||
n += 1 + l + sovContainers(uint64(l))
|
n += 1 + l + sovContainers(uint64(l))
|
||||||
l = github_com_gogo_protobuf_types.SizeOfStdTime(m.UpdatedAt)
|
l = github_com_gogo_protobuf_types.SizeOfStdTime(m.UpdatedAt)
|
||||||
n += 1 + l + sovContainers(uint64(l))
|
n += 1 + l + sovContainers(uint64(l))
|
||||||
|
if len(m.Extensions) > 0 {
|
||||||
|
for k, v := range m.Extensions {
|
||||||
|
_ = k
|
||||||
|
_ = v
|
||||||
|
l = v.Size()
|
||||||
|
mapEntrySize := 1 + len(k) + sovContainers(uint64(len(k))) + 1 + l + sovContainers(uint64(l))
|
||||||
|
n += mapEntrySize + 1 + sovContainers(uint64(mapEntrySize))
|
||||||
|
}
|
||||||
|
}
|
||||||
return n
|
return n
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1004,6 +1049,16 @@ func (this *Container) String() string {
|
|||||||
mapStringForLabels += fmt.Sprintf("%v: %v,", k, this.Labels[k])
|
mapStringForLabels += fmt.Sprintf("%v: %v,", k, this.Labels[k])
|
||||||
}
|
}
|
||||||
mapStringForLabels += "}"
|
mapStringForLabels += "}"
|
||||||
|
keysForExtensions := make([]string, 0, len(this.Extensions))
|
||||||
|
for k, _ := range this.Extensions {
|
||||||
|
keysForExtensions = append(keysForExtensions, k)
|
||||||
|
}
|
||||||
|
github_com_gogo_protobuf_sortkeys.Strings(keysForExtensions)
|
||||||
|
mapStringForExtensions := "map[string]google_protobuf1.Any{"
|
||||||
|
for _, k := range keysForExtensions {
|
||||||
|
mapStringForExtensions += fmt.Sprintf("%v: %v,", k, this.Extensions[k])
|
||||||
|
}
|
||||||
|
mapStringForExtensions += "}"
|
||||||
s := strings.Join([]string{`&Container{`,
|
s := strings.Join([]string{`&Container{`,
|
||||||
`ID:` + fmt.Sprintf("%v", this.ID) + `,`,
|
`ID:` + fmt.Sprintf("%v", this.ID) + `,`,
|
||||||
`Labels:` + mapStringForLabels + `,`,
|
`Labels:` + mapStringForLabels + `,`,
|
||||||
@ -1014,6 +1069,7 @@ func (this *Container) String() string {
|
|||||||
`SnapshotKey:` + fmt.Sprintf("%v", this.SnapshotKey) + `,`,
|
`SnapshotKey:` + fmt.Sprintf("%v", this.SnapshotKey) + `,`,
|
||||||
`CreatedAt:` + strings.Replace(strings.Replace(this.CreatedAt.String(), "Timestamp", "google_protobuf4.Timestamp", 1), `&`, ``, 1) + `,`,
|
`CreatedAt:` + strings.Replace(strings.Replace(this.CreatedAt.String(), "Timestamp", "google_protobuf4.Timestamp", 1), `&`, ``, 1) + `,`,
|
||||||
`UpdatedAt:` + strings.Replace(strings.Replace(this.UpdatedAt.String(), "Timestamp", "google_protobuf4.Timestamp", 1), `&`, ``, 1) + `,`,
|
`UpdatedAt:` + strings.Replace(strings.Replace(this.UpdatedAt.String(), "Timestamp", "google_protobuf4.Timestamp", 1), `&`, ``, 1) + `,`,
|
||||||
|
`Extensions:` + mapStringForExtensions + `,`,
|
||||||
`}`,
|
`}`,
|
||||||
}, "")
|
}, "")
|
||||||
return s
|
return s
|
||||||
@ -1515,6 +1571,127 @@ func (m *Container) Unmarshal(dAtA []byte) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
iNdEx = postIndex
|
iNdEx = postIndex
|
||||||
|
case 10:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field Extensions", wireType)
|
||||||
|
}
|
||||||
|
var msglen int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowContainers
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
msglen |= (int(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if msglen < 0 {
|
||||||
|
return ErrInvalidLengthContainers
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + msglen
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
var keykey uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowContainers
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
keykey |= (uint64(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
var stringLenmapkey uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowContainers
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
stringLenmapkey |= (uint64(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
intStringLenmapkey := int(stringLenmapkey)
|
||||||
|
if intStringLenmapkey < 0 {
|
||||||
|
return ErrInvalidLengthContainers
|
||||||
|
}
|
||||||
|
postStringIndexmapkey := iNdEx + intStringLenmapkey
|
||||||
|
if postStringIndexmapkey > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
mapkey := string(dAtA[iNdEx:postStringIndexmapkey])
|
||||||
|
iNdEx = postStringIndexmapkey
|
||||||
|
if m.Extensions == nil {
|
||||||
|
m.Extensions = make(map[string]google_protobuf1.Any)
|
||||||
|
}
|
||||||
|
if iNdEx < postIndex {
|
||||||
|
var valuekey uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowContainers
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
valuekey |= (uint64(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
var mapmsglen int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowContainers
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
mapmsglen |= (int(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if mapmsglen < 0 {
|
||||||
|
return ErrInvalidLengthContainers
|
||||||
|
}
|
||||||
|
postmsgIndex := iNdEx + mapmsglen
|
||||||
|
if mapmsglen < 0 {
|
||||||
|
return ErrInvalidLengthContainers
|
||||||
|
}
|
||||||
|
if postmsgIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
mapvalue := &google_protobuf1.Any{}
|
||||||
|
if err := mapvalue.Unmarshal(dAtA[iNdEx:postmsgIndex]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
iNdEx = postmsgIndex
|
||||||
|
m.Extensions[mapkey] = *mapvalue
|
||||||
|
} else {
|
||||||
|
var mapvalue google_protobuf1.Any
|
||||||
|
m.Extensions[mapkey] = mapvalue
|
||||||
|
}
|
||||||
|
iNdEx = postIndex
|
||||||
default:
|
default:
|
||||||
iNdEx = preIndex
|
iNdEx = preIndex
|
||||||
skippy, err := skipContainers(dAtA[iNdEx:])
|
skippy, err := skipContainers(dAtA[iNdEx:])
|
||||||
@ -2509,51 +2686,54 @@ func init() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
var fileDescriptorContainers = []byte{
|
var fileDescriptorContainers = []byte{
|
||||||
// 730 bytes of a gzipped FileDescriptorProto
|
// 776 bytes of a gzipped FileDescriptorProto
|
||||||
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xb4, 0x56, 0xcb, 0x72, 0x12, 0x41,
|
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xb4, 0x56, 0xcd, 0x72, 0x12, 0x5b,
|
||||||
0x14, 0xcd, 0xc0, 0x04, 0xc2, 0xc5, 0x85, 0xd5, 0x22, 0x8e, 0x63, 0x15, 0x10, 0x56, 0x2c, 0x74,
|
0x10, 0xce, 0x00, 0x81, 0xd0, 0xdc, 0xaa, 0x7b, 0xeb, 0x5c, 0x2e, 0x77, 0x1c, 0xab, 0x80, 0xb0,
|
||||||
0x30, 0x68, 0x69, 0x1e, 0xab, 0x90, 0x57, 0x59, 0x26, 0x56, 0xaa, 0x4b, 0x37, 0xba, 0x88, 0x0d,
|
0xa2, 0x2c, 0x1d, 0x0c, 0x5a, 0x9a, 0x1f, 0x37, 0x21, 0x7f, 0x65, 0x99, 0x58, 0xa9, 0x51, 0x37,
|
||||||
0x74, 0xc8, 0xc8, 0xbc, 0x9c, 0x6e, 0xa8, 0xa2, 0x5c, 0xe8, 0x27, 0xf8, 0x17, 0xfe, 0x4a, 0x96,
|
0xba, 0x88, 0x03, 0x74, 0xc8, 0xc8, 0xfc, 0x39, 0xe7, 0x40, 0x49, 0xb9, 0xd0, 0x47, 0x70, 0xe7,
|
||||||
0x2e, 0x5d, 0xc5, 0x84, 0x2f, 0xb1, 0xba, 0x67, 0x26, 0x43, 0x78, 0x94, 0x10, 0x65, 0x77, 0x2f,
|
0x23, 0xf8, 0x2a, 0x59, 0xba, 0x74, 0x15, 0x13, 0x9e, 0xc4, 0x9a, 0x33, 0x33, 0xcc, 0x04, 0x06,
|
||||||
0x7d, 0xcf, 0xbd, 0x67, 0x4e, 0x9f, 0x3b, 0x0c, 0x1c, 0xb6, 0x4d, 0x7e, 0xd6, 0x6d, 0x18, 0x4d,
|
0x85, 0x68, 0x76, 0xa7, 0x39, 0xfd, 0x7d, 0xfd, 0xf1, 0x75, 0xf7, 0x01, 0xd8, 0xef, 0x68, 0xec,
|
||||||
0xd7, 0xae, 0x36, 0x5d, 0x87, 0x13, 0xd3, 0xa1, 0x7e, 0x6b, 0x38, 0x24, 0x9e, 0x59, 0x65, 0xd4,
|
0xa4, 0xd7, 0x94, 0x5b, 0x96, 0x51, 0x6b, 0x59, 0x26, 0x53, 0x35, 0x13, 0x9d, 0x76, 0xf4, 0xa8,
|
||||||
0xef, 0x99, 0x4d, 0xca, 0xe2, 0xdf, 0x59, 0xb5, 0xb7, 0x36, 0x94, 0x19, 0x9e, 0xef, 0x72, 0x17,
|
0xda, 0x5a, 0x8d, 0xa2, 0xd3, 0xd7, 0x5a, 0x48, 0xc3, 0xcf, 0x69, 0xad, 0xbf, 0x12, 0x89, 0x64,
|
||||||
0xad, 0xc6, 0x38, 0x23, 0xc2, 0x18, 0x43, 0x55, 0xbd, 0x35, 0x3d, 0xd7, 0x76, 0xdb, 0xae, 0xac,
|
0xdb, 0xb1, 0x98, 0x45, 0x96, 0x43, 0x9c, 0x1c, 0x60, 0xe4, 0x48, 0x56, 0x7f, 0x45, 0xca, 0x77,
|
||||||
0xae, 0x8a, 0x28, 0x00, 0xea, 0x0f, 0xdb, 0xae, 0xdb, 0xb6, 0x68, 0x55, 0x66, 0x8d, 0xee, 0x69,
|
0xac, 0x8e, 0xc5, 0xb3, 0x6b, 0xee, 0xc9, 0x03, 0x4a, 0x37, 0x3a, 0x96, 0xd5, 0xd1, 0xb1, 0xc6,
|
||||||
0x95, 0x38, 0xfd, 0xf0, 0xe8, 0xd1, 0xe8, 0x11, 0xb5, 0x3d, 0x1e, 0x1d, 0x96, 0x46, 0x0f, 0x4f,
|
0xa3, 0x66, 0xef, 0xb8, 0xa6, 0x9a, 0x03, 0xff, 0xea, 0xe6, 0xf8, 0x15, 0x1a, 0x36, 0x0b, 0x2e,
|
||||||
0x4d, 0x6a, 0xb5, 0x4e, 0x6c, 0xc2, 0x3a, 0x61, 0x45, 0x71, 0xb4, 0x82, 0x9b, 0x36, 0x65, 0x9c,
|
0xcb, 0xe3, 0x97, 0xc7, 0x1a, 0xea, 0xed, 0x23, 0x43, 0xa5, 0x5d, 0x3f, 0xa3, 0x34, 0x9e, 0xc1,
|
||||||
0xd8, 0x5e, 0x50, 0x50, 0xbe, 0x50, 0x21, 0xb3, 0x13, 0x51, 0x44, 0x79, 0x48, 0x98, 0x2d, 0x4d,
|
0x34, 0x03, 0x29, 0x53, 0x0d, 0xdb, 0x4b, 0xa8, 0x7c, 0x4e, 0x43, 0x76, 0x2b, 0x90, 0x48, 0x0a,
|
||||||
0x29, 0x29, 0x95, 0x4c, 0x3d, 0x35, 0xb8, 0x28, 0x26, 0x5e, 0xed, 0xe2, 0x84, 0xd9, 0x42, 0xc7,
|
0x90, 0xd0, 0xda, 0xa2, 0x50, 0x16, 0xaa, 0xd9, 0x46, 0x7a, 0x78, 0x56, 0x4a, 0x3c, 0xde, 0x56,
|
||||||
0x90, 0xb2, 0x48, 0x83, 0x5a, 0x4c, 0x4b, 0x94, 0x92, 0x95, 0x6c, 0x6d, 0xdd, 0xf8, 0xeb, 0xa3,
|
0x12, 0x5a, 0x9b, 0x1c, 0x42, 0x5a, 0x57, 0x9b, 0xa8, 0x53, 0x31, 0x51, 0x4e, 0x56, 0x73, 0xf5,
|
||||||
0x1a, 0xd7, 0x5d, 0x8d, 0x43, 0x09, 0xdd, 0x73, 0xb8, 0xdf, 0xc7, 0x61, 0x1f, 0x94, 0x83, 0x65,
|
0x55, 0xf9, 0x97, 0x5f, 0x55, 0x1e, 0xb1, 0xca, 0xfb, 0x1c, 0xba, 0x63, 0x32, 0x67, 0xa0, 0xf8,
|
||||||
0xd3, 0x26, 0x6d, 0xaa, 0x25, 0xc5, 0x30, 0x1c, 0x24, 0xe8, 0x0d, 0xa4, 0xfd, 0xae, 0x23, 0x38,
|
0x3c, 0x24, 0x0f, 0x8b, 0x9a, 0xa1, 0x76, 0x50, 0x4c, 0xba, 0xc5, 0x14, 0x2f, 0x20, 0x4f, 0x21,
|
||||||
0x6a, 0x6a, 0x49, 0xa9, 0x64, 0x6b, 0xcf, 0xe7, 0x1a, 0x84, 0x03, 0x2c, 0x8e, 0x9a, 0xa0, 0x0a,
|
0xe3, 0xf4, 0x4c, 0x57, 0xa3, 0x98, 0x2a, 0x0b, 0xd5, 0x5c, 0xfd, 0xfe, 0x5c, 0x85, 0x14, 0x0f,
|
||||||
0xa8, 0xcc, 0xa3, 0x4d, 0x6d, 0x59, 0x36, 0xcb, 0x19, 0x81, 0x1a, 0x46, 0xa4, 0x86, 0xb1, 0xed,
|
0xab, 0x04, 0x24, 0xa4, 0x0a, 0x29, 0x6a, 0x63, 0x4b, 0x5c, 0xe4, 0x64, 0x79, 0xd9, 0x73, 0x43,
|
||||||
0xf4, 0xb1, 0xac, 0x40, 0x25, 0xc8, 0x32, 0x87, 0x78, 0xec, 0xcc, 0xe5, 0x9c, 0xfa, 0x5a, 0x4a,
|
0x0e, 0xdc, 0x90, 0x37, 0xcd, 0x81, 0xc2, 0x33, 0x48, 0x19, 0x72, 0xd4, 0x54, 0x6d, 0x7a, 0x62,
|
||||||
0xb2, 0x1a, 0xfe, 0x09, 0xad, 0xc2, 0x9d, 0x28, 0x3d, 0xe9, 0xd0, 0xbe, 0x96, 0xbe, 0x59, 0xf2,
|
0x31, 0x86, 0x8e, 0x98, 0xe6, 0xaa, 0xa2, 0x1f, 0x91, 0x65, 0xf8, 0x2b, 0x08, 0x8f, 0xba, 0x38,
|
||||||
0x9a, 0xf6, 0xd1, 0x0e, 0x40, 0xd3, 0xa7, 0x84, 0xd3, 0xd6, 0x09, 0xe1, 0xda, 0x8a, 0x1c, 0xaa,
|
0x10, 0x33, 0x97, 0x53, 0x9e, 0xe0, 0x80, 0x6c, 0x01, 0xb4, 0x1c, 0x54, 0x19, 0xb6, 0x8f, 0x54,
|
||||||
0x8f, 0x0d, 0x7d, 0x1b, 0x5d, 0x41, 0x7d, 0xe5, 0xfc, 0xa2, 0xb8, 0xf4, 0xfd, 0x77, 0x51, 0xc1,
|
0x26, 0x2e, 0xf1, 0xa2, 0xd2, 0x44, 0xd1, 0xe7, 0x41, 0x0b, 0x1a, 0x4b, 0xa7, 0x67, 0xa5, 0x85,
|
||||||
0x99, 0x10, 0xb7, 0xcd, 0x45, 0x93, 0xae, 0xd7, 0x8a, 0x9a, 0x64, 0xe6, 0x69, 0x12, 0xe2, 0xb6,
|
0x4f, 0xdf, 0x4b, 0x82, 0x92, 0xf5, 0x71, 0x9b, 0xcc, 0x25, 0xe9, 0xd9, 0xed, 0x80, 0x24, 0x3b,
|
||||||
0xb9, 0xbe, 0x01, 0xd9, 0x21, 0xd5, 0xd1, 0x5d, 0x48, 0x0a, 0xca, 0xf2, 0x62, 0xb1, 0x08, 0x85,
|
0x0f, 0x89, 0x8f, 0xdb, 0x64, 0xa4, 0x09, 0x80, 0xef, 0x18, 0x9a, 0x54, 0xb3, 0x4c, 0x2a, 0x02,
|
||||||
0xfe, 0x3d, 0x62, 0x75, 0xa9, 0x96, 0x08, 0xf4, 0x97, 0xc9, 0x66, 0x62, 0x5d, 0xd1, 0x8f, 0x20,
|
0x6f, 0xda, 0xa3, 0xb9, 0xbc, 0xdc, 0x19, 0xc1, 0x79, 0xe3, 0x1a, 0x29, 0xb7, 0x8c, 0x12, 0x61,
|
||||||
0x1d, 0xea, 0x88, 0x10, 0xa8, 0x0e, 0xb1, 0x69, 0x88, 0x93, 0x31, 0x32, 0x20, 0xed, 0x7a, 0xdc,
|
0x95, 0xd6, 0x20, 0x17, 0xe9, 0x2c, 0xf9, 0x07, 0x92, 0xae, 0x2d, 0x7c, 0x78, 0x14, 0xf7, 0xe8,
|
||||||
0x74, 0x1d, 0x26, 0xa1, 0xd3, 0x54, 0x8d, 0x8a, 0xca, 0x4f, 0xe0, 0xde, 0x01, 0xe5, 0xd7, 0x77,
|
0xf6, 0xb8, 0xaf, 0xea, 0x3d, 0x14, 0x13, 0x5e, 0x8f, 0x79, 0xb0, 0x9e, 0x58, 0x15, 0xa4, 0x03,
|
||||||
0x84, 0xe9, 0xe7, 0x2e, 0x65, 0x7c, 0x9a, 0xd3, 0xca, 0x67, 0x90, 0xbb, 0x59, 0xce, 0x3c, 0xd7,
|
0xc8, 0xf8, 0xbd, 0x22, 0x04, 0x52, 0xa6, 0x6a, 0xa0, 0x8f, 0xe3, 0x67, 0x22, 0x43, 0xc6, 0xb2,
|
||||||
0x61, 0x14, 0x1d, 0x43, 0xe6, 0xfa, 0xd6, 0x25, 0x2c, 0x5b, 0x7b, 0x3c, 0x8f, 0x37, 0xea, 0xaa,
|
0x19, 0x97, 0x9e, 0xf8, 0x49, 0xe7, 0x82, 0x24, 0xe9, 0x19, 0xfc, 0x3d, 0x26, 0x37, 0x46, 0xcd,
|
||||||
0x90, 0x09, 0xc7, 0x4d, 0xca, 0x6b, 0x70, 0xff, 0xd0, 0x64, 0xf1, 0x28, 0x16, 0x51, 0xd3, 0x20,
|
0xad, 0xa8, 0x9a, 0x69, 0x94, 0xa1, 0xc6, 0xca, 0x1d, 0xf8, 0x77, 0x0f, 0xd9, 0xc8, 0x10, 0x05,
|
||||||
0x7d, 0x6a, 0x5a, 0x9c, 0xfa, 0x4c, 0x53, 0x4a, 0xc9, 0x4a, 0x06, 0x47, 0x69, 0xd9, 0x82, 0xfc,
|
0xdf, 0xf6, 0x90, 0xb2, 0x69, 0x2b, 0x52, 0x39, 0x81, 0xfc, 0xe5, 0x74, 0x6a, 0x5b, 0x26, 0x45,
|
||||||
0x28, 0x24, 0xa4, 0x87, 0x01, 0xe2, 0xc1, 0x12, 0x76, 0x3b, 0x7e, 0x43, 0x5d, 0xca, 0x9f, 0x20,
|
0x72, 0x08, 0xd9, 0x91, 0xc5, 0x1c, 0x96, 0xab, 0xdf, 0x9e, 0xa7, 0x11, 0xbe, 0xf1, 0x21, 0x49,
|
||||||
0xbf, 0x23, 0x5d, 0x31, 0x26, 0xde, 0xff, 0x17, 0xa3, 0x03, 0x0f, 0xc6, 0x66, 0x2d, 0x4c, 0xf9,
|
0x65, 0x05, 0xfe, 0xdb, 0xd7, 0x68, 0x58, 0x8a, 0x06, 0xd2, 0x44, 0xc8, 0x1c, 0x6b, 0x3a, 0x43,
|
||||||
0x1f, 0x0a, 0xe4, 0xdf, 0x49, 0xab, 0x2e, 0xfe, 0xc9, 0xd0, 0x16, 0x64, 0x83, 0xb5, 0x90, 0xaf,
|
0x87, 0x8a, 0x42, 0x39, 0x59, 0xcd, 0x2a, 0x41, 0x58, 0xd1, 0xa1, 0x30, 0x0e, 0xf1, 0xe5, 0x29,
|
||||||
0xc5, 0xd0, 0xb3, 0xe3, 0xfb, 0xb4, 0x2f, 0xde, 0x9c, 0x47, 0x84, 0x75, 0x70, 0xb8, 0x7d, 0x22,
|
0x00, 0x61, 0x61, 0x0e, 0xbb, 0x9a, 0xbe, 0x08, 0x4b, 0xe5, 0x0d, 0x14, 0xb6, 0xf8, 0x38, 0x4f,
|
||||||
0x16, 0xb2, 0x8c, 0x11, 0x5d, 0x98, 0x2c, 0x4f, 0x21, 0xbf, 0x4b, 0x2d, 0x3a, 0x41, 0x95, 0x29,
|
0x98, 0xf7, 0xe7, 0xcd, 0xe8, 0xc2, 0xff, 0x13, 0xb5, 0xae, 0xcd, 0xf9, 0x2f, 0x02, 0x14, 0x5e,
|
||||||
0xcb, 0x52, 0xbb, 0x54, 0x01, 0x62, 0x33, 0xa2, 0x1e, 0x24, 0x0f, 0x28, 0x47, 0x2f, 0x66, 0xa0,
|
0xf0, 0x1d, 0xbb, 0xfe, 0x6f, 0x46, 0x36, 0x20, 0xe7, 0xed, 0x33, 0x7f, 0xcf, 0xfd, 0xa9, 0x9d,
|
||||||
0x31, 0x61, 0x25, 0xf5, 0x97, 0x73, 0xe3, 0x42, 0x29, 0xbe, 0x80, 0x2a, 0xd6, 0x02, 0xcd, 0xf2,
|
0x7c, 0x08, 0x76, 0xdd, 0x27, 0xff, 0x40, 0xa5, 0x5d, 0xc5, 0x7f, 0x36, 0xdc, 0xb3, 0x6b, 0xcb,
|
||||||
0xaf, 0x30, 0x71, 0xe5, 0xf4, 0x8d, 0x5b, 0x20, 0xc3, 0xe1, 0x5f, 0x21, 0x15, 0x38, 0x17, 0xcd,
|
0x84, 0xd0, 0x6b, 0xb3, 0xe5, 0x2e, 0x14, 0xb6, 0x51, 0xc7, 0x18, 0x57, 0xa6, 0x2c, 0x4b, 0xfd,
|
||||||
0xd2, 0x64, 0xf2, 0x42, 0xe9, 0x9b, 0xb7, 0x81, 0xc6, 0x04, 0x02, 0x8f, 0xcc, 0x44, 0x60, 0xb2,
|
0x3c, 0x05, 0x10, 0x0e, 0x23, 0xe9, 0x43, 0x72, 0x0f, 0x19, 0x79, 0x30, 0x83, 0x8c, 0x98, 0x95,
|
||||||
0xef, 0x67, 0x22, 0x30, 0xcd, 0x89, 0x1f, 0x20, 0x15, 0xf8, 0x66, 0x26, 0x02, 0x93, 0x2d, 0xa6,
|
0x94, 0x1e, 0xce, 0x8d, 0xf3, 0xad, 0x78, 0x0f, 0x29, 0x77, 0x2d, 0xc8, 0x2c, 0x3f, 0x67, 0xb1,
|
||||||
0xe7, 0xc7, 0x36, 0x62, 0x4f, 0x7c, 0x68, 0xd4, 0x3f, 0x9e, 0x5f, 0x15, 0x96, 0x7e, 0x5d, 0x15,
|
0x2b, 0x27, 0xad, 0x5d, 0x01, 0xe9, 0x17, 0xff, 0x00, 0x69, 0x6f, 0x72, 0xc9, 0x2c, 0x24, 0xf1,
|
||||||
0x96, 0xbe, 0x0d, 0x0a, 0xca, 0xf9, 0xa0, 0xa0, 0xfc, 0x1c, 0x14, 0x94, 0xcb, 0x41, 0x41, 0x79,
|
0x0b, 0x25, 0xad, 0x5f, 0x05, 0x1a, 0x0a, 0xf0, 0x66, 0x64, 0x26, 0x01, 0xf1, 0x73, 0x3f, 0x93,
|
||||||
0xbf, 0xff, 0x0f, 0xdf, 0x4e, 0x5b, 0x71, 0xd6, 0x48, 0xc9, 0x89, 0xcf, 0xfe, 0x04, 0x00, 0x00,
|
0x80, 0x69, 0x93, 0xf8, 0x0a, 0xd2, 0xde, 0xdc, 0xcc, 0x24, 0x20, 0x7e, 0xc4, 0xa4, 0xc2, 0xc4,
|
||||||
0xff, 0xff, 0x7e, 0x6d, 0xca, 0xbd, 0x8c, 0x09, 0x00, 0x00,
|
0x46, 0xec, 0xb8, 0xff, 0x90, 0x1a, 0xaf, 0x4f, 0x2f, 0x8a, 0x0b, 0xdf, 0x2e, 0x8a, 0x0b, 0x1f,
|
||||||
|
0x87, 0x45, 0xe1, 0x74, 0x58, 0x14, 0xbe, 0x0e, 0x8b, 0xc2, 0xf9, 0xb0, 0x28, 0xbc, 0xdc, 0xfd,
|
||||||
|
0x8d, 0x3f, 0x7d, 0x1b, 0x61, 0xd4, 0x4c, 0xf3, 0x8a, 0xf7, 0x7e, 0x04, 0x00, 0x00, 0xff, 0xff,
|
||||||
|
0x17, 0x73, 0xba, 0x43, 0x45, 0x0a, 0x00, 0x00,
|
||||||
}
|
}
|
||||||
|
11
vendor/github.com/containerd/containerd/api/services/containers/v1/containers.proto
generated
vendored
11
vendor/github.com/containerd/containerd/api/services/containers/v1/containers.proto
generated
vendored
@ -84,6 +84,17 @@ message Container {
|
|||||||
|
|
||||||
// UpdatedAt is the last time the container was mutated.
|
// UpdatedAt is the last time the container was mutated.
|
||||||
google.protobuf.Timestamp updated_at = 9 [(gogoproto.stdtime) = true, (gogoproto.nullable) = false];
|
google.protobuf.Timestamp updated_at = 9 [(gogoproto.stdtime) = true, (gogoproto.nullable) = false];
|
||||||
|
|
||||||
|
// Extensions allow clients to provide zero or more blobs that are directly
|
||||||
|
// associated with the container. One may provide protobuf, json, or other
|
||||||
|
// encoding formats. The primary use of this is to further decorate the
|
||||||
|
// container object with fields that may be specific to a client integration.
|
||||||
|
//
|
||||||
|
// The key portion of this map should identify a "name" for the extension
|
||||||
|
// that should be unique against other extensions. When updating extension
|
||||||
|
// data, one should only update the specified extension using field paths
|
||||||
|
// to select a specific map key.
|
||||||
|
map<string, google.protobuf.Any> extensions = 10 [(gogoproto.nullable) = false];
|
||||||
}
|
}
|
||||||
|
|
||||||
message GetContainerRequest {
|
message GetContainerRequest {
|
||||||
|
9
vendor/github.com/containerd/containerd/container.go
generated
vendored
9
vendor/github.com/containerd/containerd/container.go
generated
vendored
@ -12,6 +12,7 @@ import (
|
|||||||
"github.com/containerd/containerd/containers"
|
"github.com/containerd/containerd/containers"
|
||||||
"github.com/containerd/containerd/errdefs"
|
"github.com/containerd/containerd/errdefs"
|
||||||
"github.com/containerd/containerd/typeurl"
|
"github.com/containerd/containerd/typeurl"
|
||||||
|
prototypes "github.com/gogo/protobuf/types"
|
||||||
specs "github.com/opencontainers/runtime-spec/specs-go"
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
@ -42,6 +43,8 @@ type Container interface {
|
|||||||
Labels(context.Context) (map[string]string, error)
|
Labels(context.Context) (map[string]string, error)
|
||||||
// SetLabels sets the provided labels for the container and returns the final label set
|
// SetLabels sets the provided labels for the container and returns the final label set
|
||||||
SetLabels(context.Context, map[string]string) (map[string]string, error)
|
SetLabels(context.Context, map[string]string) (map[string]string, error)
|
||||||
|
// Extensions returns the extensions set on the container
|
||||||
|
Extensions() map[string]prototypes.Any
|
||||||
}
|
}
|
||||||
|
|
||||||
func containerFromRecord(client *Client, c containers.Container) *container {
|
func containerFromRecord(client *Client, c containers.Container) *container {
|
||||||
@ -158,6 +161,12 @@ func (c *container) Image(ctx context.Context) (Image, error) {
|
|||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *container) Extensions() map[string]prototypes.Any {
|
||||||
|
c.mu.Lock()
|
||||||
|
defer c.mu.Unlock()
|
||||||
|
return c.c.Extensions
|
||||||
|
}
|
||||||
|
|
||||||
func (c *container) NewTask(ctx context.Context, ioCreate IOCreation, opts ...NewTaskOpts) (Task, error) {
|
func (c *container) NewTask(ctx context.Context, ioCreate IOCreation, opts ...NewTaskOpts) (Task, error) {
|
||||||
c.mu.Lock()
|
c.mu.Lock()
|
||||||
defer c.mu.Unlock()
|
defer c.mu.Unlock()
|
||||||
|
25
vendor/github.com/containerd/containerd/container_opts.go
generated
vendored
25
vendor/github.com/containerd/containerd/container_opts.go
generated
vendored
@ -128,3 +128,28 @@ func setSnapshotterIfEmpty(c *containers.Container) {
|
|||||||
c.Snapshotter = DefaultSnapshotter
|
c.Snapshotter = DefaultSnapshotter
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WithContainerExtension appends extension data to the container object.
|
||||||
|
// Use this to decorate the container object with additional data for the client
|
||||||
|
// integration.
|
||||||
|
//
|
||||||
|
// Make sure to register the type of `extension` in the typeurl package via
|
||||||
|
// `typeurl.Register` otherwise the type data will be inferred, including how
|
||||||
|
// to encode and decode the object.
|
||||||
|
func WithContainerExtension(name string, extension interface{}) NewContainerOpts {
|
||||||
|
return func(ctx context.Context, client *Client, c *containers.Container) error {
|
||||||
|
any, err := typeurl.MarshalAny(extension)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if name == "" {
|
||||||
|
return errors.Wrapf(errdefs.ErrInvalidArgument, "extension key must not be zero-length")
|
||||||
|
}
|
||||||
|
if c.Extensions == nil {
|
||||||
|
c.Extensions = make(map[string]types.Any)
|
||||||
|
}
|
||||||
|
c.Extensions[name] = *any
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
3
vendor/github.com/containerd/containerd/containers/containers.go
generated
vendored
3
vendor/github.com/containerd/containerd/containers/containers.go
generated
vendored
@ -57,6 +57,9 @@ type Container struct {
|
|||||||
|
|
||||||
// UpdatedAt is the time at which the container was updated.
|
// UpdatedAt is the time at which the container was updated.
|
||||||
UpdatedAt time.Time
|
UpdatedAt time.Time
|
||||||
|
|
||||||
|
// Extensions stores client-specified metadata
|
||||||
|
Extensions map[string]types.Any
|
||||||
}
|
}
|
||||||
|
|
||||||
type RuntimeInfo struct {
|
type RuntimeInfo struct {
|
||||||
|
2
vendor/github.com/containerd/containerd/containerstore.go
generated
vendored
2
vendor/github.com/containerd/containerd/containerstore.go
generated
vendored
@ -97,6 +97,7 @@ func containerToProto(container *containers.Container) containersapi.Container {
|
|||||||
Spec: container.Spec,
|
Spec: container.Spec,
|
||||||
Snapshotter: container.Snapshotter,
|
Snapshotter: container.Snapshotter,
|
||||||
SnapshotKey: container.SnapshotKey,
|
SnapshotKey: container.SnapshotKey,
|
||||||
|
Extensions: container.Extensions,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -116,6 +117,7 @@ func containerFromProto(containerpb *containersapi.Container) containers.Contain
|
|||||||
Spec: containerpb.Spec,
|
Spec: containerpb.Spec,
|
||||||
Snapshotter: containerpb.Snapshotter,
|
Snapshotter: containerpb.Snapshotter,
|
||||||
SnapshotKey: containerpb.SnapshotKey,
|
SnapshotKey: containerpb.SnapshotKey,
|
||||||
|
Extensions: containerpb.Extensions,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
11
vendor/github.com/containerd/containerd/contrib/README.md
generated
vendored
Normal file
11
vendor/github.com/containerd/containerd/contrib/README.md
generated
vendored
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# contrib
|
||||||
|
|
||||||
|
The `contrib` directory contains packages that do not belong in the core containerd packages but still contribute to overall containerd usability.
|
||||||
|
|
||||||
|
Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and often require higher level tools and profiles to work.
|
||||||
|
|
||||||
|
Packaging and other built tools can be added to `contrib` to aid in packaging containerd for various distributions.
|
||||||
|
|
||||||
|
## Testing
|
||||||
|
|
||||||
|
Code in the `contrib` directory may or may not have been tested in the normal test pipeline for core components.
|
1
vendor/github.com/containerd/containerd/metadata/buckets.go
generated
vendored
1
vendor/github.com/containerd/containerd/metadata/buckets.go
generated
vendored
@ -50,6 +50,7 @@ var (
|
|||||||
bucketKeySnapshotKey = []byte("snapshotKey")
|
bucketKeySnapshotKey = []byte("snapshotKey")
|
||||||
bucketKeySnapshotter = []byte("snapshotter")
|
bucketKeySnapshotter = []byte("snapshotter")
|
||||||
bucketKeyTarget = []byte("target")
|
bucketKeyTarget = []byte("target")
|
||||||
|
bucketKeyExtensions = []byte("extensions")
|
||||||
)
|
)
|
||||||
|
|
||||||
func getBucket(tx *bolt.Tx, keys ...[]byte) *bolt.Bucket {
|
func getBucket(tx *bolt.Tx, keys ...[]byte) *bolt.Bucket {
|
||||||
|
58
vendor/github.com/containerd/containerd/metadata/containers.go
generated
vendored
58
vendor/github.com/containerd/containerd/metadata/containers.go
generated
vendored
@ -146,7 +146,7 @@ func (s *containerStore) Update(ctx context.Context, container containers.Contai
|
|||||||
|
|
||||||
if len(fieldpaths) == 0 {
|
if len(fieldpaths) == 0 {
|
||||||
// only allow updates to these field on full replace.
|
// only allow updates to these field on full replace.
|
||||||
fieldpaths = []string{"labels", "spec"}
|
fieldpaths = []string{"labels", "spec", "extensions"}
|
||||||
|
|
||||||
// Fields that are immutable must cause an error when no field paths
|
// Fields that are immutable must cause an error when no field paths
|
||||||
// are provided. This allows these fields to become mutable in the
|
// are provided. This allows these fields to become mutable in the
|
||||||
@ -181,11 +181,22 @@ func (s *containerStore) Update(ctx context.Context, container containers.Contai
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if strings.HasPrefix(path, "extensions.") {
|
||||||
|
if updated.Extensions == nil {
|
||||||
|
updated.Extensions = map[string]types.Any{}
|
||||||
|
}
|
||||||
|
key := strings.TrimPrefix(path, "extensions.")
|
||||||
|
updated.Extensions[key] = container.Extensions[key]
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
switch path {
|
switch path {
|
||||||
case "labels":
|
case "labels":
|
||||||
updated.Labels = container.Labels
|
updated.Labels = container.Labels
|
||||||
case "spec":
|
case "spec":
|
||||||
updated.Spec = container.Spec
|
updated.Spec = container.Spec
|
||||||
|
case "extensions":
|
||||||
|
updated.Extensions = container.Extensions
|
||||||
default:
|
default:
|
||||||
return containers.Container{}, errors.Wrapf(errdefs.ErrInvalidArgument, "cannot update %q field on %q", path, container.ID)
|
return containers.Container{}, errors.Wrapf(errdefs.ErrInvalidArgument, "cannot update %q field on %q", path, container.ID)
|
||||||
}
|
}
|
||||||
@ -226,6 +237,12 @@ func validateContainer(container *containers.Container) error {
|
|||||||
return errors.Wrapf(err, "container.ID validation error")
|
return errors.Wrapf(err, "container.ID validation error")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
for k := range container.Extensions {
|
||||||
|
if k == "" {
|
||||||
|
return errors.Wrapf(errdefs.ErrInvalidArgument, "container.Extension keys must not be zero-length")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// labels and image have no validation
|
// labels and image have no validation
|
||||||
if container.Runtime.Name == "" {
|
if container.Runtime.Name == "" {
|
||||||
return errors.Wrapf(errdefs.ErrInvalidArgument, "container.Runtime.Name must be set")
|
return errors.Wrapf(errdefs.ErrInvalidArgument, "container.Runtime.Name must be set")
|
||||||
@ -288,6 +305,27 @@ func readContainer(container *containers.Container, bkt *bolt.Bucket) error {
|
|||||||
container.SnapshotKey = string(v)
|
container.SnapshotKey = string(v)
|
||||||
case string(bucketKeySnapshotter):
|
case string(bucketKeySnapshotter):
|
||||||
container.Snapshotter = string(v)
|
container.Snapshotter = string(v)
|
||||||
|
case string(bucketKeyExtensions):
|
||||||
|
ebkt := bkt.Bucket(bucketKeyExtensions)
|
||||||
|
if ebkt == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
extensions := make(map[string]types.Any)
|
||||||
|
if err := ebkt.ForEach(func(k, v []byte) error {
|
||||||
|
var a types.Any
|
||||||
|
if err := proto.Unmarshal(v, &a); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
extensions[string(k)] = a
|
||||||
|
return nil
|
||||||
|
}); err != nil {
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
container.Extensions = extensions
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -335,6 +373,24 @@ func writeContainer(bkt *bolt.Bucket, container *containers.Container) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if len(container.Extensions) > 0 {
|
||||||
|
ebkt, err := bkt.CreateBucketIfNotExists(bucketKeyExtensions)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for name, ext := range container.Extensions {
|
||||||
|
p, err := proto.Marshal(&ext)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ebkt.Put([]byte(name), p); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if container.Runtime.Options != nil {
|
if container.Runtime.Options != nil {
|
||||||
data, err := proto.Marshal(container.Runtime.Options)
|
data, err := proto.Marshal(container.Runtime.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
9
vendor/github.com/containerd/containerd/mount/mountinfo_solaris.go
generated
vendored
9
vendor/github.com/containerd/containerd/mount/mountinfo_solaris.go
generated
vendored
@ -4,17 +4,24 @@ package mount
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <sys/mnttab.h>
|
#include <sys/mnttab.h>
|
||||||
*/
|
*/
|
||||||
import "C"
|
import "C"
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"unsafe"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Self retrieves a list of mounts for the current running process.
|
// Self retrieves a list of mounts for the current running process.
|
||||||
func Self() ([]Info, error) {
|
func Self() ([]Info, error) {
|
||||||
mnttab := C.fopen(C.CString(C.MNTTAB), C.CString("r"))
|
path := C.CString(C.MNTTAB)
|
||||||
|
defer C.free(unsafe.Pointer(path))
|
||||||
|
mode := C.CString("r")
|
||||||
|
defer C.free(unsafe.Pointer(mode))
|
||||||
|
|
||||||
|
mnttab := C.fopen(path, mode)
|
||||||
if mnttab == nil {
|
if mnttab == nil {
|
||||||
return nil, fmt.Errorf("Failed to open %s", C.MNTTAB)
|
return nil, fmt.Errorf("Failed to open %s", C.MNTTAB)
|
||||||
}
|
}
|
||||||
|
5
vendor/github.com/containerd/containerd/remotes/docker/fetcher.go
generated
vendored
5
vendor/github.com/containerd/containerd/remotes/docker/fetcher.go
generated
vendored
@ -31,6 +31,11 @@ func (r dockerFetcher) Fetch(ctx context.Context, desc ocispec.Descriptor) (io.R
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ctx, err = contextWithRepositoryScope(ctx, r.refspec, false)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
for _, path := range paths {
|
for _, path := range paths {
|
||||||
u := r.url(path)
|
u := r.url(path)
|
||||||
|
|
||||||
|
4
vendor/github.com/containerd/containerd/remotes/docker/pusher.go
generated
vendored
4
vendor/github.com/containerd/containerd/remotes/docker/pusher.go
generated
vendored
@ -28,6 +28,10 @@ type dockerPusher struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (p dockerPusher) Push(ctx context.Context, desc ocispec.Descriptor) (content.Writer, error) {
|
func (p dockerPusher) Push(ctx context.Context, desc ocispec.Descriptor) (content.Writer, error) {
|
||||||
|
ctx, err := contextWithRepositoryScope(ctx, p.refspec, true)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
ref := remotes.MakeRefKey(ctx, desc)
|
ref := remotes.MakeRefKey(ctx, desc)
|
||||||
status, err := p.tracker.GetStatus(ref)
|
status, err := p.tracker.GetStatus(ref)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
|
23
vendor/github.com/containerd/containerd/remotes/docker/resolver.go
generated
vendored
23
vendor/github.com/containerd/containerd/remotes/docker/resolver.go
generated
vendored
@ -116,6 +116,10 @@ func (r *dockerResolver) Resolve(ctx context.Context, ref string) (string, ocisp
|
|||||||
urls = append(urls, fetcher.url("manifests", refspec.Object))
|
urls = append(urls, fetcher.url("manifests", refspec.Object))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ctx, err = contextWithRepositoryScope(ctx, refspec, false)
|
||||||
|
if err != nil {
|
||||||
|
return "", ocispec.Descriptor{}, err
|
||||||
|
}
|
||||||
for _, u := range urls {
|
for _, u := range urls {
|
||||||
req, err := http.NewRequest(http.MethodHead, u, nil)
|
req, err := http.NewRequest(http.MethodHead, u, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -228,8 +232,9 @@ func (r *dockerResolver) Pusher(ctx context.Context, ref string) (remotes.Pusher
|
|||||||
}
|
}
|
||||||
|
|
||||||
type dockerBase struct {
|
type dockerBase struct {
|
||||||
base url.URL
|
refspec reference.Spec
|
||||||
token string
|
base url.URL
|
||||||
|
token string
|
||||||
|
|
||||||
client *http.Client
|
client *http.Client
|
||||||
useBasic bool
|
useBasic bool
|
||||||
@ -268,6 +273,7 @@ func (r *dockerResolver) base(refspec reference.Spec) (*dockerBase, error) {
|
|||||||
base.Path = path.Join("/v2", prefix)
|
base.Path = path.Join("/v2", prefix)
|
||||||
|
|
||||||
return &dockerBase{
|
return &dockerBase{
|
||||||
|
refspec: refspec,
|
||||||
base: base,
|
base: base,
|
||||||
client: r.client,
|
client: r.client,
|
||||||
username: username,
|
username: username,
|
||||||
@ -430,14 +436,10 @@ func (r *dockerBase) setTokenAuth(ctx context.Context, params map[string]string)
|
|||||||
service: params["service"],
|
service: params["service"],
|
||||||
}
|
}
|
||||||
|
|
||||||
scope, ok := params["scope"]
|
to.scopes = getTokenScopes(ctx, params)
|
||||||
if !ok {
|
if len(to.scopes) == 0 {
|
||||||
return errors.Errorf("no scope specified for token auth challenge")
|
return errors.Errorf("no scope specified for token auth challenge")
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Get added scopes from context
|
|
||||||
to.scopes = []string{scope}
|
|
||||||
|
|
||||||
if r.secret != "" {
|
if r.secret != "" {
|
||||||
// Credential information is provided, use oauth POST endpoint
|
// Credential information is provided, use oauth POST endpoint
|
||||||
r.token, err = r.fetchTokenWithOAuth(ctx, to)
|
r.token, err = r.fetchTokenWithOAuth(ctx, to)
|
||||||
@ -491,8 +493,9 @@ func (r *dockerBase) fetchTokenWithOAuth(ctx context.Context, to tokenOptions) (
|
|||||||
}
|
}
|
||||||
defer resp.Body.Close()
|
defer resp.Body.Close()
|
||||||
|
|
||||||
if resp.StatusCode == 405 && r.username != "" {
|
// Registries without support for POST may return 404 for POST /v2/token.
|
||||||
// It would be nice if registries would implement the specifications
|
// As of September 2017, GCR is known to return 404.
|
||||||
|
if (resp.StatusCode == 405 && r.username != "") || resp.StatusCode == 404 {
|
||||||
return r.getToken(ctx, to)
|
return r.getToken(ctx, to)
|
||||||
} else if resp.StatusCode < 200 || resp.StatusCode >= 400 {
|
} else if resp.StatusCode < 200 || resp.StatusCode >= 400 {
|
||||||
b, _ := ioutil.ReadAll(resp.Body)
|
b, _ := ioutil.ReadAll(resp.Body)
|
||||||
|
60
vendor/github.com/containerd/containerd/remotes/docker/scope.go
generated
vendored
Normal file
60
vendor/github.com/containerd/containerd/remotes/docker/scope.go
generated
vendored
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net/url"
|
||||||
|
"sort"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/containerd/containerd/reference"
|
||||||
|
)
|
||||||
|
|
||||||
|
// repositoryScope returns a repository scope string such as "repository:foo/bar:pull"
|
||||||
|
// for "host/foo/bar:baz".
|
||||||
|
// When push is true, both pull and push are added to the scope.
|
||||||
|
func repositoryScope(refspec reference.Spec, push bool) (string, error) {
|
||||||
|
u, err := url.Parse("dummy://" + refspec.Locator)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
s := "repository:" + strings.TrimPrefix(u.Path, "/") + ":pull"
|
||||||
|
if push {
|
||||||
|
s += ",push"
|
||||||
|
}
|
||||||
|
return s, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// tokenScopesKey is used for the key for context.WithValue().
|
||||||
|
// value: []string (e.g. {"registry:foo/bar:pull"})
|
||||||
|
type tokenScopesKey struct{}
|
||||||
|
|
||||||
|
// contextWithRepositoryScope returns a context with tokenScopesKey{} and the repository scope value.
|
||||||
|
func contextWithRepositoryScope(ctx context.Context, refspec reference.Spec, push bool) (context.Context, error) {
|
||||||
|
s, err := repositoryScope(refspec, push)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return context.WithValue(ctx, tokenScopesKey{}, []string{s}), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getTokenScopes returns deduplicated and sorted scopes from ctx.Value(tokenScopesKey{}) and params["scope"].
|
||||||
|
func getTokenScopes(ctx context.Context, params map[string]string) []string {
|
||||||
|
var scopes []string
|
||||||
|
if x := ctx.Value(tokenScopesKey{}); x != nil {
|
||||||
|
scopes = append(scopes, x.([]string)...)
|
||||||
|
}
|
||||||
|
if scope, ok := params["scope"]; ok {
|
||||||
|
for _, s := range scopes {
|
||||||
|
// Note: this comparison is unaware of the scope grammar (https://docs.docker.com/registry/spec/auth/scope/)
|
||||||
|
// So, "repository:foo/bar:pull,push" != "repository:foo/bar:push,pull", although semantically they are equal.
|
||||||
|
if s == scope {
|
||||||
|
// already appended
|
||||||
|
goto Sort
|
||||||
|
}
|
||||||
|
}
|
||||||
|
scopes = append(scopes, scope)
|
||||||
|
}
|
||||||
|
Sort:
|
||||||
|
sort.Strings(scopes)
|
||||||
|
return scopes
|
||||||
|
}
|
2
vendor/github.com/containerd/containerd/services/diff/service.go
generated
vendored
2
vendor/github.com/containerd/containerd/services/diff/service.go
generated
vendored
@ -19,7 +19,7 @@ type config struct {
|
|||||||
// respected for which is choosen. Each differ should return the same
|
// respected for which is choosen. Each differ should return the same
|
||||||
// correct output, allowing any ordering to be used to prefer
|
// correct output, allowing any ordering to be used to prefer
|
||||||
// more optimimal implementations.
|
// more optimimal implementations.
|
||||||
Order []string `toml:"default,omitempty"`
|
Order []string `toml:"default"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
4
vendor/github.com/opencontainers/runc/libcontainer/configs/config.go
generated
vendored
4
vendor/github.com/opencontainers/runc/libcontainer/configs/config.go
generated
vendored
@ -187,6 +187,10 @@ type Config struct {
|
|||||||
|
|
||||||
// Rootless specifies whether the container is a rootless container.
|
// Rootless specifies whether the container is a rootless container.
|
||||||
Rootless bool `json:"rootless"`
|
Rootless bool `json:"rootless"`
|
||||||
|
|
||||||
|
// IntelRdt specifies settings for Intel RDT/CAT group that the container is placed into
|
||||||
|
// to limit the resources (e.g., L3 cache) the container has available
|
||||||
|
IntelRdt *IntelRdt `json:"intel_rdt,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type Hooks struct {
|
type Hooks struct {
|
||||||
|
7
vendor/github.com/opencontainers/runc/libcontainer/configs/intelrdt.go
generated
vendored
Normal file
7
vendor/github.com/opencontainers/runc/libcontainer/configs/intelrdt.go
generated
vendored
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
package configs
|
||||||
|
|
||||||
|
type IntelRdt struct {
|
||||||
|
// The schema for L3 cache id and capacity bitmask (CBM)
|
||||||
|
// Format: "L3:<cache_id0>=<cbm0>;<cache_id1>=<cbm1>;..."
|
||||||
|
L3CacheSchema string `json:"l3_cache_schema,omitempty"`
|
||||||
|
}
|
3
vendor/github.com/opencontainers/runc/libcontainer/configs/namespaces_linux.go
generated
vendored
3
vendor/github.com/opencontainers/runc/libcontainer/configs/namespaces_linux.go
generated
vendored
@ -79,9 +79,6 @@ type Namespace struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (n *Namespace) GetPath(pid int) string {
|
func (n *Namespace) GetPath(pid int) string {
|
||||||
if n.Path != "" {
|
|
||||||
return n.Path
|
|
||||||
}
|
|
||||||
return fmt.Sprintf("/proc/%d/ns/%s", pid, NsName(n.Type))
|
return fmt.Sprintf("/proc/%d/ns/%s", pid, NsName(n.Type))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
24
vendor/github.com/opencontainers/runc/libcontainer/devices/devices_linux.go
generated
vendored
24
vendor/github.com/opencontainers/runc/libcontainer/devices/devices_linux.go
generated
vendored
@ -28,30 +28,34 @@ func DeviceFromPath(path, permissions string) (*configs.Device, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
devNumber = int(stat.Rdev)
|
||||||
|
major = Major(devNumber)
|
||||||
|
)
|
||||||
|
if major == 0 {
|
||||||
|
return nil, ErrNotADevice
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
devType rune
|
devType rune
|
||||||
mode = stat.Mode
|
mode = stat.Mode
|
||||||
)
|
)
|
||||||
switch {
|
switch {
|
||||||
case mode&unix.S_IFBLK != 0:
|
case mode&unix.S_IFBLK == unix.S_IFBLK:
|
||||||
devType = 'b'
|
devType = 'b'
|
||||||
case mode&unix.S_IFCHR != 0:
|
case mode&unix.S_IFCHR == unix.S_IFCHR:
|
||||||
devType = 'c'
|
devType = 'c'
|
||||||
default:
|
|
||||||
return nil, ErrNotADevice
|
|
||||||
}
|
}
|
||||||
devNumber := int(stat.Rdev)
|
|
||||||
uid := stat.Uid
|
|
||||||
gid := stat.Gid
|
|
||||||
return &configs.Device{
|
return &configs.Device{
|
||||||
Type: devType,
|
Type: devType,
|
||||||
Path: path,
|
Path: path,
|
||||||
Major: Major(devNumber),
|
Major: major,
|
||||||
Minor: Minor(devNumber),
|
Minor: Minor(devNumber),
|
||||||
Permissions: permissions,
|
Permissions: permissions,
|
||||||
FileMode: os.FileMode(mode),
|
FileMode: os.FileMode(mode),
|
||||||
Uid: uid,
|
Uid: stat.Uid,
|
||||||
Gid: gid,
|
Gid: stat.Gid,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
138
vendor/github.com/opencontainers/runc/libcontainer/nsenter/nsexec.c
generated
vendored
138
vendor/github.com/opencontainers/runc/libcontainer/nsenter/nsexec.c
generated
vendored
@ -1,3 +1,4 @@
|
|||||||
|
|
||||||
#define _GNU_SOURCE
|
#define _GNU_SOURCE
|
||||||
#include <endian.h>
|
#include <endian.h>
|
||||||
#include <errno.h>
|
#include <errno.h>
|
||||||
@ -19,6 +20,8 @@
|
|||||||
#include <sys/prctl.h>
|
#include <sys/prctl.h>
|
||||||
#include <sys/socket.h>
|
#include <sys/socket.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
|
#include <sys/wait.h>
|
||||||
|
|
||||||
|
|
||||||
#include <linux/limits.h>
|
#include <linux/limits.h>
|
||||||
#include <linux/netlink.h>
|
#include <linux/netlink.h>
|
||||||
@ -64,7 +67,13 @@ struct clone_t {
|
|||||||
|
|
||||||
struct nlconfig_t {
|
struct nlconfig_t {
|
||||||
char *data;
|
char *data;
|
||||||
|
|
||||||
|
/* Process settings. */
|
||||||
uint32_t cloneflags;
|
uint32_t cloneflags;
|
||||||
|
char *oom_score_adj;
|
||||||
|
size_t oom_score_adj_len;
|
||||||
|
|
||||||
|
/* User namespace settings.*/
|
||||||
char *uidmap;
|
char *uidmap;
|
||||||
size_t uidmap_len;
|
size_t uidmap_len;
|
||||||
char *gidmap;
|
char *gidmap;
|
||||||
@ -72,9 +81,13 @@ struct nlconfig_t {
|
|||||||
char *namespaces;
|
char *namespaces;
|
||||||
size_t namespaces_len;
|
size_t namespaces_len;
|
||||||
uint8_t is_setgroup;
|
uint8_t is_setgroup;
|
||||||
|
|
||||||
|
/* Rootless container settings.*/
|
||||||
uint8_t is_rootless;
|
uint8_t is_rootless;
|
||||||
char *oom_score_adj;
|
char *uidmappath;
|
||||||
size_t oom_score_adj_len;
|
size_t uidmappath_len;
|
||||||
|
char *gidmappath;
|
||||||
|
size_t gidmappath_len;
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -89,6 +102,8 @@ struct nlconfig_t {
|
|||||||
#define SETGROUP_ATTR 27285
|
#define SETGROUP_ATTR 27285
|
||||||
#define OOM_SCORE_ADJ_ATTR 27286
|
#define OOM_SCORE_ADJ_ATTR 27286
|
||||||
#define ROOTLESS_ATTR 27287
|
#define ROOTLESS_ATTR 27287
|
||||||
|
#define UIDMAPPATH_ATTR 27288
|
||||||
|
#define GIDMAPPATH_ATTR 27289
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Use the raw syscall for versions of glibc which don't include a function for
|
* Use the raw syscall for versions of glibc which don't include a function for
|
||||||
@ -191,22 +206,96 @@ static void update_setgroups(int pid, enum policy_t setgroup)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static void update_uidmap(int pid, char *map, size_t map_len)
|
static int try_mapping_tool(const char *app, int pid, char *map, size_t map_len)
|
||||||
{
|
{
|
||||||
if (map == NULL || map_len <= 0)
|
int child;
|
||||||
return;
|
|
||||||
|
|
||||||
if (write_file(map, map_len, "/proc/%d/uid_map", pid) < 0)
|
/*
|
||||||
bail("failed to update /proc/%d/uid_map", pid);
|
* If @app is NULL, execve will segfault. Just check it here and bail (if
|
||||||
|
* we're in this path, the caller is already getting desparate and there
|
||||||
|
* isn't a backup to this failing). This usually would be a configuration
|
||||||
|
* or programming issue.
|
||||||
|
*/
|
||||||
|
if (!app)
|
||||||
|
bail("mapping tool not present");
|
||||||
|
|
||||||
|
child = fork();
|
||||||
|
if (child < 0)
|
||||||
|
bail("failed to fork");
|
||||||
|
|
||||||
|
if (!child) {
|
||||||
|
#define MAX_ARGV 20
|
||||||
|
char *argv[MAX_ARGV];
|
||||||
|
char *envp[] = {NULL};
|
||||||
|
char pid_fmt[16];
|
||||||
|
int argc = 0;
|
||||||
|
char *next;
|
||||||
|
|
||||||
|
snprintf(pid_fmt, 16, "%d", pid);
|
||||||
|
|
||||||
|
argv[argc++] = (char *) app;
|
||||||
|
argv[argc++] = pid_fmt;
|
||||||
|
/*
|
||||||
|
* Convert the map string into a list of argument that
|
||||||
|
* newuidmap/newgidmap can understand.
|
||||||
|
*/
|
||||||
|
|
||||||
|
while (argc < MAX_ARGV) {
|
||||||
|
if (*map == '\0') {
|
||||||
|
argv[argc++] = NULL;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argv[argc++] = map;
|
||||||
|
next = strpbrk(map, "\n ");
|
||||||
|
if (next == NULL)
|
||||||
|
break;
|
||||||
|
*next++ = '\0';
|
||||||
|
map = next + strspn(next, "\n ");
|
||||||
|
}
|
||||||
|
|
||||||
|
execve(app, argv, envp);
|
||||||
|
bail("failed to execv");
|
||||||
|
} else {
|
||||||
|
int status;
|
||||||
|
|
||||||
|
while (true) {
|
||||||
|
if (waitpid(child, &status, 0) < 0) {
|
||||||
|
if (errno == EINTR)
|
||||||
|
continue;
|
||||||
|
bail("failed to waitpid");
|
||||||
|
}
|
||||||
|
if (WIFEXITED(status) || WIFSIGNALED(status))
|
||||||
|
return WEXITSTATUS(status);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void update_gidmap(int pid, char *map, size_t map_len)
|
static void update_uidmap(const char *path, int pid, char *map, size_t map_len)
|
||||||
{
|
{
|
||||||
if (map == NULL || map_len <= 0)
|
if (map == NULL || map_len <= 0)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
if (write_file(map, map_len, "/proc/%d/gid_map", pid) < 0)
|
if (write_file(map, map_len, "/proc/%d/uid_map", pid) < 0) {
|
||||||
bail("failed to update /proc/%d/gid_map", pid);
|
if (errno != EPERM)
|
||||||
|
bail("failed to update /proc/%d/uid_map", pid);
|
||||||
|
if (try_mapping_tool(path, pid, map, map_len))
|
||||||
|
bail("failed to use newuid map on %d", pid);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void update_gidmap(const char *path, int pid, char *map, size_t map_len)
|
||||||
|
{
|
||||||
|
if (map == NULL || map_len <= 0)
|
||||||
|
return;
|
||||||
|
|
||||||
|
if (write_file(map, map_len, "/proc/%d/gid_map", pid) < 0) {
|
||||||
|
if (errno != EPERM)
|
||||||
|
bail("failed to update /proc/%d/gid_map", pid);
|
||||||
|
if (try_mapping_tool(path, pid, map, map_len))
|
||||||
|
bail("failed to use newgid map on %d", pid);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static void update_oom_score_adj(char *data, size_t len)
|
static void update_oom_score_adj(char *data, size_t len)
|
||||||
@ -350,6 +439,14 @@ static void nl_parse(int fd, struct nlconfig_t *config)
|
|||||||
config->gidmap = current;
|
config->gidmap = current;
|
||||||
config->gidmap_len = payload_len;
|
config->gidmap_len = payload_len;
|
||||||
break;
|
break;
|
||||||
|
case UIDMAPPATH_ATTR:
|
||||||
|
config->uidmappath = current;
|
||||||
|
config->uidmappath_len = payload_len;
|
||||||
|
break;
|
||||||
|
case GIDMAPPATH_ATTR:
|
||||||
|
config->gidmappath = current;
|
||||||
|
config->gidmappath_len = payload_len;
|
||||||
|
break;
|
||||||
case SETGROUP_ATTR:
|
case SETGROUP_ATTR:
|
||||||
config->is_setgroup = readint8(current);
|
config->is_setgroup = readint8(current);
|
||||||
break;
|
break;
|
||||||
@ -542,7 +639,7 @@ void nsexec(void)
|
|||||||
*/
|
*/
|
||||||
case JUMP_PARENT: {
|
case JUMP_PARENT: {
|
||||||
int len;
|
int len;
|
||||||
pid_t child;
|
pid_t child, first_child = -1;
|
||||||
char buf[JSON_MAX];
|
char buf[JSON_MAX];
|
||||||
bool ready = false;
|
bool ready = false;
|
||||||
|
|
||||||
@ -596,8 +693,8 @@ void nsexec(void)
|
|||||||
update_setgroups(child, SETGROUPS_DENY);
|
update_setgroups(child, SETGROUPS_DENY);
|
||||||
|
|
||||||
/* Set up mappings. */
|
/* Set up mappings. */
|
||||||
update_uidmap(child, config.uidmap, config.uidmap_len);
|
update_uidmap(config.uidmappath, child, config.uidmap, config.uidmap_len);
|
||||||
update_gidmap(child, config.gidmap, config.gidmap_len);
|
update_gidmap(config.gidmappath, child, config.gidmap, config.gidmap_len);
|
||||||
|
|
||||||
s = SYNC_USERMAP_ACK;
|
s = SYNC_USERMAP_ACK;
|
||||||
if (write(syncfd, &s, sizeof(s)) != sizeof(s)) {
|
if (write(syncfd, &s, sizeof(s)) != sizeof(s)) {
|
||||||
@ -606,18 +703,18 @@ void nsexec(void)
|
|||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case SYNC_RECVPID_PLS: {
|
case SYNC_RECVPID_PLS: {
|
||||||
pid_t old = child;
|
first_child = child;
|
||||||
|
|
||||||
/* Get the init_func pid. */
|
/* Get the init_func pid. */
|
||||||
if (read(syncfd, &child, sizeof(child)) != sizeof(child)) {
|
if (read(syncfd, &child, sizeof(child)) != sizeof(child)) {
|
||||||
kill(old, SIGKILL);
|
kill(first_child, SIGKILL);
|
||||||
bail("failed to sync with child: read(childpid)");
|
bail("failed to sync with child: read(childpid)");
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Send ACK. */
|
/* Send ACK. */
|
||||||
s = SYNC_RECVPID_ACK;
|
s = SYNC_RECVPID_ACK;
|
||||||
if (write(syncfd, &s, sizeof(s)) != sizeof(s)) {
|
if (write(syncfd, &s, sizeof(s)) != sizeof(s)) {
|
||||||
kill(old, SIGKILL);
|
kill(first_child, SIGKILL);
|
||||||
kill(child, SIGKILL);
|
kill(child, SIGKILL);
|
||||||
bail("failed to sync with child: write(SYNC_RECVPID_ACK)");
|
bail("failed to sync with child: write(SYNC_RECVPID_ACK)");
|
||||||
}
|
}
|
||||||
@ -665,8 +762,13 @@ void nsexec(void)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Send the init_func pid back to our parent. */
|
/*
|
||||||
len = snprintf(buf, JSON_MAX, "{\"pid\": %d}\n", child);
|
* Send the init_func pid and the pid of the first child back to our parent.
|
||||||
|
*
|
||||||
|
* We need to send both back because we can't reap the first child we created (CLONE_PARENT).
|
||||||
|
* It becomes the responsibility of our parent to reap the first child.
|
||||||
|
*/
|
||||||
|
len = snprintf(buf, JSON_MAX, "{\"pid\": %d, \"pid_first\": %d}\n", child, first_child);
|
||||||
if (len < 0) {
|
if (len < 0) {
|
||||||
kill(child, SIGKILL);
|
kill(child, SIGKILL);
|
||||||
bail("unable to generate JSON for child pid");
|
bail("unable to generate JSON for child pid");
|
||||||
|
16
vendor/github.com/opencontainers/runc/libcontainer/user/lookup.go
generated
vendored
16
vendor/github.com/opencontainers/runc/libcontainer/user/lookup.go
generated
vendored
@ -2,8 +2,6 @@ package user
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
|
|
||||||
"golang.org/x/sys/unix"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@ -37,13 +35,6 @@ func lookupUser(filter func(u User) bool) (User, error) {
|
|||||||
return users[0], nil
|
return users[0], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// CurrentUser looks up the current user by their user id in /etc/passwd. If the
|
|
||||||
// user cannot be found (or there is no /etc/passwd file on the filesystem),
|
|
||||||
// then CurrentUser returns an error.
|
|
||||||
func CurrentUser() (User, error) {
|
|
||||||
return LookupUid(unix.Getuid())
|
|
||||||
}
|
|
||||||
|
|
||||||
// LookupUser looks up a user by their username in /etc/passwd. If the user
|
// LookupUser looks up a user by their username in /etc/passwd. If the user
|
||||||
// cannot be found (or there is no /etc/passwd file on the filesystem), then
|
// cannot be found (or there is no /etc/passwd file on the filesystem), then
|
||||||
// LookupUser returns an error.
|
// LookupUser returns an error.
|
||||||
@ -85,13 +76,6 @@ func lookupGroup(filter func(g Group) bool) (Group, error) {
|
|||||||
return groups[0], nil
|
return groups[0], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// CurrentGroup looks up the current user's group by their primary group id's
|
|
||||||
// entry in /etc/passwd. If the group cannot be found (or there is no
|
|
||||||
// /etc/group file on the filesystem), then CurrentGroup returns an error.
|
|
||||||
func CurrentGroup() (Group, error) {
|
|
||||||
return LookupGid(unix.Getgid())
|
|
||||||
}
|
|
||||||
|
|
||||||
// LookupGroup looks up a group by its name in /etc/group. If the group cannot
|
// LookupGroup looks up a group by its name in /etc/group. If the group cannot
|
||||||
// be found (or there is no /etc/group file on the filesystem), then LookupGroup
|
// be found (or there is no /etc/group file on the filesystem), then LookupGroup
|
||||||
// returns an error.
|
// returns an error.
|
||||||
|
16
vendor/github.com/opencontainers/runc/libcontainer/user/lookup_unix.go
generated
vendored
16
vendor/github.com/opencontainers/runc/libcontainer/user/lookup_unix.go
generated
vendored
@ -5,6 +5,8 @@ package user
|
|||||||
import (
|
import (
|
||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Unix-specific path to the passwd and group formatted files.
|
// Unix-specific path to the passwd and group formatted files.
|
||||||
@ -28,3 +30,17 @@ func GetGroupPath() (string, error) {
|
|||||||
func GetGroup() (io.ReadCloser, error) {
|
func GetGroup() (io.ReadCloser, error) {
|
||||||
return os.Open(unixGroupPath)
|
return os.Open(unixGroupPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CurrentUser looks up the current user by their user id in /etc/passwd. If the
|
||||||
|
// user cannot be found (or there is no /etc/passwd file on the filesystem),
|
||||||
|
// then CurrentUser returns an error.
|
||||||
|
func CurrentUser() (User, error) {
|
||||||
|
return LookupUid(unix.Getuid())
|
||||||
|
}
|
||||||
|
|
||||||
|
// CurrentGroup looks up the current user's group by their primary group id's
|
||||||
|
// entry in /etc/passwd. If the group cannot be found (or there is no
|
||||||
|
// /etc/group file on the filesystem), then CurrentGroup returns an error.
|
||||||
|
func CurrentGroup() (Group, error) {
|
||||||
|
return LookupGid(unix.Getgid())
|
||||||
|
}
|
||||||
|
19
vendor/github.com/opencontainers/runc/libcontainer/user/lookup_unsupported.go
generated
vendored
19
vendor/github.com/opencontainers/runc/libcontainer/user/lookup_unsupported.go
generated
vendored
@ -2,7 +2,10 @@
|
|||||||
|
|
||||||
package user
|
package user
|
||||||
|
|
||||||
import "io"
|
import (
|
||||||
|
"io"
|
||||||
|
"syscall"
|
||||||
|
)
|
||||||
|
|
||||||
func GetPasswdPath() (string, error) {
|
func GetPasswdPath() (string, error) {
|
||||||
return "", ErrUnsupported
|
return "", ErrUnsupported
|
||||||
@ -19,3 +22,17 @@ func GetGroupPath() (string, error) {
|
|||||||
func GetGroup() (io.ReadCloser, error) {
|
func GetGroup() (io.ReadCloser, error) {
|
||||||
return nil, ErrUnsupported
|
return nil, ErrUnsupported
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CurrentUser looks up the current user by their user id in /etc/passwd. If the
|
||||||
|
// user cannot be found (or there is no /etc/passwd file on the filesystem),
|
||||||
|
// then CurrentUser returns an error.
|
||||||
|
func CurrentUser() (User, error) {
|
||||||
|
return LookupUid(syscall.Getuid())
|
||||||
|
}
|
||||||
|
|
||||||
|
// CurrentGroup looks up the current user's group by their primary group id's
|
||||||
|
// entry in /etc/passwd. If the group cannot be found (or there is no
|
||||||
|
// /etc/group file on the filesystem), then CurrentGroup returns an error.
|
||||||
|
func CurrentGroup() (Group, error) {
|
||||||
|
return LookupGid(syscall.Getgid())
|
||||||
|
}
|
||||||
|
4
vendor/github.com/opencontainers/runc/libcontainer/user/user.go
generated
vendored
4
vendor/github.com/opencontainers/runc/libcontainer/user/user.go
generated
vendored
@ -358,8 +358,8 @@ func GetExecUser(userSpec string, defaults *ExecUser, passwd, group io.Reader) (
|
|||||||
|
|
||||||
// Okay, so it's numeric. We can just roll with this.
|
// Okay, so it's numeric. We can just roll with this.
|
||||||
}
|
}
|
||||||
} else if len(groups) > 0 && uidErr != nil {
|
} else if len(groups) > 0 {
|
||||||
// Supplementary group ids only make sense if in the implicit form for non-numeric users.
|
// Supplementary group ids only make sense if in the implicit form.
|
||||||
user.Sgids = make([]int, len(groups))
|
user.Sgids = make([]int, len(groups))
|
||||||
for i, group := range groups {
|
for i, group := range groups {
|
||||||
user.Sgids[i] = group.Gid
|
user.Sgids[i] = group.Gid
|
||||||
|
5
vendor/github.com/opencontainers/runc/vendor.conf
generated
vendored
5
vendor/github.com/opencontainers/runc/vendor.conf
generated
vendored
@ -19,3 +19,8 @@ github.com/docker/docker 0f5c9d301b9b1cca66b3ea0f9dec3b5317d3686d
|
|||||||
github.com/docker/go-units v0.2.0
|
github.com/docker/go-units v0.2.0
|
||||||
github.com/urfave/cli d53eb991652b1d438abdd34ce4bfa3ef1539108e
|
github.com/urfave/cli d53eb991652b1d438abdd34ce4bfa3ef1539108e
|
||||||
golang.org/x/sys 0e0164865330d5cf1c00247be08330bf96e2f87c https://github.com/golang/sys
|
golang.org/x/sys 0e0164865330d5cf1c00247be08330bf96e2f87c https://github.com/golang/sys
|
||||||
|
|
||||||
|
# console dependencies
|
||||||
|
github.com/containerd/console 2ce1c681f3c3c0dfa7d0af289428d36567c9a6bc
|
||||||
|
github.com/Azure/go-ansiterm fa152c58bc15761d0200cb75fe958b89a9d4888e
|
||||||
|
github.com/pkg/errors v0.8.0
|
||||||
|
Loading…
Reference in New Issue
Block a user