id
stringlengths
2
7
text
stringlengths
17
51.2k
title
stringclasses
1 value
c177900
return nil, errors.Errorf(`Invalid image name "%s", unknown transport "%s"`, imgName, parts[0]) } return transport.ParseReference(parts[1]) }
c177901
desc.Size, URLs: desc.URLs, Annotations: desc.Annotations, MediaType: desc.MediaType, } }
c177902
json.Unmarshal(manifest, &oci1); err != nil { return nil, err } return &oci1, nil }
c177903
specs.Versioned{SchemaVersion: 2}, Config: config, Layers: layers, }, } }
c177904
policy namespaces are unclear - should we drop // the tag or the digest first?) _, isTagged := ref.(reference.NamedTagged) _, isDigested := ref.(reference.Canonical) if isTagged && isDigested { return dockerReference{}, errors.Errorf("Docker references with both a tag and digest are currently not supported") } return dockerReference{ ref: ref, }, nil }
c177905
reference.IsNameOnly values. return "", errors.Errorf("Internal inconsistency: Reference %s unexpectedly has neither a digest nor a tag", reference.FamiliarString(ref.ref)) }
c177906
reference to %s (Docker reference %s) would invalidate existing signatures. Explicitly enable signature removal to proceed anyway", transports.ImageName(ic.c.dest.Reference()), destRef.String()) } ic.manifestUpdates.EmbeddedDockerReference = destRef return nil }
c177907
return terminal.IsTerminal(int(f.Fd())) } return false }
c177908
of manifest MIME type candidates. return nil, errors.Errorf("Can not convert image to %s, preparing DiffIDs for this case is not supported", ic.manifestUpdates.ManifestMIMEType) } pi, err := ic.src.UpdatedImage(ctx, *ic.manifestUpdates) if err != nil { return nil, errors.Wrap(err, "Error creating an updated image manifest") } pendingImage = pi } manifest, _, err := pendingImage.Manifest(ctx) if err != nil { return nil, errors.Wrap(err, "Error reading manifest") } if err := ic.c.copyConfig(ctx, pendingImage); err != nil { return nil, err } ic.c.Printf("Writing manifest to image destination\n") if err := ic.c.dest.PutManifest(ctx, manifest); err != nil { return nil, errors.Wrap(err, "Error writing manifest") } return manifest, nil }
c177909
mpb.BarClearOnComplete(), mpb.PrependDecorators( decor.Name(prefix), ), mpb.AppendDecorators( decor.OnComplete(decor.CountersKibiByte("%.1f / %.1f"), " "+onComplete), ), ) if c.progressOutput == ioutil.Discard { c.Printf("Copying %s %s\n", kind, info.Digest) } return bar }
c177910
return types.BlobInfo{}, err } bar.SetTotal(int64(len(configBlob)), true) return destInfo, nil }() if err != nil { return nil } if destInfo.Digest != srcInfo.Digest { return errors.Errorf("Internal error: copying uncompressed config blob %s changed digest to %s", srcInfo.Digest, destInfo.Digest) } } return nil }
c177911
// We do not care to bother the other end of the pipe with other failures; we send them to dest instead. result.digest, result.err = computeDiffID(layerStream, decompressor) }
c177912
return "", err } defer s.Close() stream = s } return digest.Canonical.FromReader(stream) }
c177913
dest.CloseWithError(err)}; we need err to be evaluated lazily. dest.CloseWithError(err) // CloseWithError(nil) is equivalent to Close() }() zipper := pgzip.NewWriter(dest) defer zipper.Close() _, err = io.Copy(zipper, src) // Sets err to nil, i.e. causes dest.Close() }
c177914
would have to call sockets.ConfigureTransport. // // We don't really want to configure anything for unix:// sockets, so just pass a nil *http.Client. // // Similarly, if we want to communicate over plain HTTP on a TCP socket, we also need to set // TLSClientConfig to nil. This can be achieved by using the form `http://` url, err := dockerclient.ParseHostURL(host) if err != nil { return nil, err } var httpClient *http.Client if url.Scheme != "unix" { if url.Scheme == "http" { httpClient = httpConfig() } else { hc, err := tlsConfig(sys) if err != nil { return nil, err } httpClient = hc } } return dockerclient.NewClient(host, defaultAPIVersion, httpClient, nil) }
c177915
{ return filepath.Join(sys.RootForImplicitAbsolutePaths, systemDefaultPolicyPath) } } return systemDefaultPolicyPath }
c177916
{ return nil, errors.Wrapf(err, "invalid policy in %q", fileName) } return policy, nil }
c177917
return nil, InvalidPolicyFormatError(err.Error()) } return &p, nil }
c177918
res = &prInsecureAcceptAnything{} case prTypeReject: res = &prReject{} case prTypeSignedBy: res = &prSignedBy{} case prTypeSignedBaseLayer: res = &prSignedBaseLayer{} default: return nil, InvalidPolicyFormatError(fmt.Sprintf("Unknown policy requirement type \"%s\"", typeField.Type)) } if err := json.Unmarshal(data, &res); err != nil { return nil, err } return res, nil }
c177919
signedIdentity == nil { return nil, InvalidPolicyFormatError("signedIdentity not specified") } return &prSignedBy{ prCommon: prCommon{Type: prTypeSignedBy}, KeyType: keyType, KeyPath: keyPath, KeyData: keyData, SignedIdentity: signedIdentity, }, nil }
c177920
return newPRSignedBy(keyType, keyPath, nil, signedIdentity) }
c177921
return newPRSignedByKeyPath(keyType, keyPath, signedIdentity) }
c177922
return newPRSignedBy(keyType, "", keyData, signedIdentity) }
c177923
return newPRSignedByKeyData(keyType, keyData, signedIdentity) }
c177924
SBKeyTypeX509Certificates, SBKeyTypeSignedByX509CAs: return true default: return false } }
c177925
prCommon: prCommon{Type: prTypeSignedBaseLayer}, BaseLayerIdentity: baseLayerIdentity, }, nil }
c177926
res = &prmExactReference{} case prmTypeExactRepository: res = &prmExactRepository{} default: return nil, InvalidPolicyFormatError(fmt.Sprintf("Unknown policy reference match type \"%s\"", typeField.Type)) } if err := json.Unmarshal(data, &res); err != nil { return nil, err } return res, nil }
c177927
%s", dockerReference, err.Error())) } if reference.IsNameOnly(ref) { return nil, InvalidPolicyFormatError(fmt.Sprintf("dockerReference %s contains neither a tag nor digest", dockerReference)) } return &prmExactReference{ prmCommon: prmCommon{Type: prmTypeExactReference}, DockerReference: dockerReference, }, nil }
c177928
} return &prmExactRepository{ prmCommon: prmCommon{Type: prmTypeExactRepository}, DockerRepository: dockerRepository, }, nil }
c177929
img.Metadata != "" { if err := json.Unmarshal([]byte(img.Metadata), image); err != nil { return nil, errors.Wrap(err, "error decoding metadata for source image") } } return image, nil }
c177930
actually do have multiple layers, otherwise we could // just go ahead and use the first one every time. s.getBlobMutex.Lock() i := s.layerPosition[info.Digest] s.layerPosition[info.Digest] = i + 1 s.getBlobMutex.Unlock() if len(layers) > 0 { layer = layers[i%len(layers)] } // Force the storage layer to not try to match any compression that was used when the layer was first // handed to it. noCompression := archive.Uncompressed diffOptions = &storage.DiffOptions{ Compression: &noCompression, } if layer.UncompressedSize < 0 { n = -1 } else { n = layer.UncompressedSize } logrus.Debugf("exporting filesystem layer %q without compression for blob %q", layer.ID, info.Digest) rc, err = s.imageRef.transport.store.Diff("", layer.ID, diffOptions) if err != nil { return nil, -1, "", err } return rc, n, layer.ID, err }
c177931
return "" } diffIDs = append([]digest.Digest{diffID}, diffIDs...) } case *manifest.Schema2, *manifest.OCI1: // We know the ID calculation for these formats doesn't actually use the diffIDs, // so we don't need to populate the diffID list. default: return "" } id, err := m.ImageID(diffIDs) if err != nil { return "" } return id }
c177932
digested.Digest()) if err != nil { return err } if !matches { return fmt.Errorf("Manifest does not match expected digest %s", digested.Digest()) } } } s.manifest = make([]byte, len(manifestBlob)) copy(s.manifest, manifestBlob) return nil }
c177933
copy(newblob[len(sigblob):], sig) sigblob = newblob } s.signatures = sigblob s.SignatureSizes = sizes return nil }
c177934
nil { return nil, err } size, err := src.getSize() if err != nil { return nil, err } return &storageImageCloser{ImageCloser: img, size: size}, nil }
c177935
:= tempDirRef.deleteTempDir(); err != nil { return nil, errors.Wrapf(err, "error deleting temp directory %q", tempDirRef.tempDirectory) } return nil, err } return &ociArchiveImageSource{ref: ref, unpackedSrc: unpackedSrc, tempDirRef: tempDirRef}, nil }
c177936
} defer tempDirRef.deleteTempDir() descriptor, err := ocilayout.LoadManifestDescriptor(tempDirRef.ociRefExtracted) if err != nil { return imgspecv1.Descriptor{}, errors.Wrap(err, "error loading index") } return descriptor, nil }
c177937
s.tempDirRef.deleteTempDir() return s.unpackedSrc.Close() }
c177938
os.list = append(os.list, s) os.included[s] = struct{}{} } }
c177939
nil { return false, err } return manifest.MIMETypeIsMultiImage(mt), nil }
c177940
else { pl = &pathLock{refCount: 1, mutex: sync.Mutex{}} pathLocks[path] = pl } return pl }() pl.mutex.Lock() }
c177941
unlocking nonexistent lock for path %s", path)) } pl.mutex.Unlock() pl.refCount-- if pl.refCount == 0 { delete(pathLocks, path) } }
c177942
return err } lockPath(bdc.path) defer unlockPath(bdc.path) db, err := bolt.Open(bdc.path, 0600, &bolt.Options{ReadOnly: true}) if err != nil { return err } defer func() { if err := db.Close(); retErr == nil && err != nil { retErr = err } }() return db.View(fn) }
c177943
func() { if err := db.Close(); retErr == nil && err != nil { retErr = err } }() return db.Update(fn) }
c177944
(uncompressed, uncompressed) mappings // when we already record a (compressed, uncompressed) pair. if b := tx.Bucket(digestByUncompressedBucket); b != nil { if b = b.Bucket([]byte(anyDigest.String())); b != nil { c := b.Cursor() if k, _ := c.First(); k != nil { // The bucket is non-empty return anyDigest } } } return "" }
c177945
Digest: digest, Location: types.BICLocationReference{Opaque: string(k)}, }, LastSeen: t, }) return nil }) // FIXME? Log error (but throttle the log volume on repeated accesses)? return candidates }
c177946
true } if os.IsNotExist(err) { return false } return true }
c177947
nil, errors.Errorf("Cannot determine canonical Docker reference for destination %s", transports.ImageName(c.dest.Reference())) } c.Printf("Signing manifest\n") newSig, err := signature.SignDockerManifest(manifest, dockerReference.String(), mech, keyIdentity) if err != nil { return nil, errors.Wrap(err, "Error creating signature") } return newSig, nil }
c177948
:= internal.SplitPathAndImage(reference) return NewReference(dir, image) }
c177949
} if err = internal.ValidateImageName(image); err != nil { return nil, err } return ociReference{dir: dir, resolvedDir: resolved, image: image}, nil }
c177950
:= json.NewDecoder(indexJSON).Decode(index); err != nil { return nil, err } return index, nil }
c177951
if !ok { return imgspecv1.Descriptor{}, errors.Errorf("error typecasting, need type ociRef") } return ociRef.getManifestDescriptor() }
c177952
digest reference %s", digest) } blobDir := filepath.Join(ref.dir, "blobs") if sharedBlobDir != "" { blobDir = sharedBlobDir } return filepath.Join(blobDir, digest.Algorithm().String(), digest.Hex()), nil }
c177953
:= newUntrustedSignature(manifestDigest, dockerReference) return sig.sign(mech, keyIdentity) }
c177954
validateSignedDockerReference: func(signedDockerReference string) error { signedRef, err := reference.ParseNormalizedNamed(signedDockerReference) if err != nil { return InvalidSignatureError{msg: fmt.Sprintf("Invalid docker reference %s in signature", signedDockerReference)} } if signedRef.String() != expectedRef.String() { return InvalidSignatureError{msg: fmt.Sprintf("Docker reference %s does not match %s", signedDockerReference, expectedDockerReference)} } return nil }, validateSignedDockerManifestDigest: func(signedDockerManifestDigest digest.Digest) error { matches, err := manifest.MatchesDigest(unverifiedManifest, signedDockerManifestDigest) if err != nil { return err } if !matches { return InvalidSignatureError{msg: fmt.Sprintf("Signature for docker digest %q does not match", signedDockerManifestDigest)} } return nil }, }) if err != nil { return nil, err } return sig, nil }
c177955
files, so hard-coded these defaults.) logrus.Debugf("restConfig: %#v", restConfig) baseURL, httpClient, err := restClientFor(restConfig) if err != nil { return nil, err } logrus.Debugf("URL: %#v", *baseURL) if httpClient == nil { httpClient = http.DefaultClient } return &openshiftClient{ ref: ref, baseURL: baseURL, httpClient: httpClient, bearerToken: restConfig.BearerToken, username: restConfig.Username, password: restConfig.Password, }, nil }
c177956
var status status statusValid := false if err := json.Unmarshal(body, &status); err == nil && len(status.Status) > 0 { statusValid = true } switch { case res.StatusCode == http.StatusSwitchingProtocols: // FIXME?! No idea why this weird case exists in k8s.io/kubernetes/pkg/client/restclient. if statusValid && status.Status != "Success" { return nil, errors.New(status.Message) } case res.StatusCode >= http.StatusOK && res.StatusCode <= http.StatusPartialContent: // OK. default: if statusValid { return nil, errors.New(status.Message) } return nil, errors.Errorf("HTTP error: status code: %d (%s), body: %s", res.StatusCode, http.StatusText(res.StatusCode), string(body)) } return body, nil }
c177957
return nil, err } // Note: This does absolutely no kind/version checking or conversions. var isi imageStreamImage if err := json.Unmarshal(body, &isi); err != nil { return nil, err } return &isi.Image, nil }
c177958
if len(parts) != 2 { return "", errors.Errorf("Invalid format of docker reference %s: missing '/'", ref) } return reference.Domain(c.ref.dockerReference) + "/" + parts[1], nil }
c177959
} logrus.Debugf("tag event %#v", te) dockerRefString, err := s.client.convertDockerImageReference(te.DockerImageReference) if err != nil { return err } logrus.Debugf("Resolved reference %#v", dockerRefString) dockerRef, err := docker.ParseReference("//" + dockerRefString) if err != nil { return err } d, err := dockerRef.NewImageSource(ctx, s.sys) if err != nil { return err } s.docker = d s.imageStreamImageName = te.Image return nil }
c177960
this point. dockerRefString := fmt.Sprintf("//%s/%s/%s:%s", reference.Domain(client.ref.dockerReference), client.ref.namespace, client.ref.stream, client.ref.dockerReference.Tag()) dockerRef, err := docker.ParseReference(dockerRefString) if err != nil { return nil, err } docker, err := dockerRef.NewImageDestination(ctx, sys) if err != nil { return nil, err } return &openshiftImageDestination{ client: client, docker: docker, }, nil }
c177961
return untrustedSignature{ UntrustedDockerManifestDigest: dockerManifestDigest, UntrustedDockerReference: dockerReference, UntrustedCreatorID: &creatorID, UntrustedTimestamp: &timestamp, } }
c177962
optional["creator"] = *s.UntrustedCreatorID } if s.UntrustedTimestamp != nil { optional["timestamp"] = *s.UntrustedTimestamp } signature := map[string]interface{}{ "critical": critical, "optional": optional, } return json.Marshal(signature) }
c177963
if err != nil { if _, ok := err.(jsonFormatError); ok { err = InvalidSignatureError{msg: err.Error()} } } return err }
c177964
!= nil { return nil, InvalidSignatureError{msg: err.Error()} } if err := rules.validateSignedDockerManifestDigest(unmatchedSignature.UntrustedDockerManifestDigest); err != nil { return nil, err } if err := rules.validateSignedDockerReference(unmatchedSignature.UntrustedDockerReference); err != nil { return nil, err } // signatureAcceptanceRules have accepted this value. return &Signature{ DockerManifestDigest: unmatchedSignature.UntrustedDockerManifestDigest, DockerReference: unmatchedSignature.UntrustedDockerReference, }, nil }
c177965
logrus.Debugf("reference rewritten from '%v' to '%v'", refString, newParsedRef.String()) } if err != nil { return nil, errors.Wrapf(err, "error rewriting reference") } return newParsedRef, nil } return nil, fmt.Errorf("invalid prefix '%v' for reference '%v'", prefix, refString) }
c177966
search registries is also in one of the other lists. for _, search := range config.V1TOMLConfig.Search.Registries { reg, err := getRegistry(search) if err != nil { return nil, err } reg.Search = true } for _, blocked := range config.V1TOMLConfig.Block.Registries { reg, err := getRegistry(blocked) if err != nil { return nil, err } reg.Blocked = true } for _, insecure := range config.V1TOMLConfig.Insecure.Registries { reg, err := getRegistry(insecure) if err != nil { return nil, err } reg.Insecure = true } registries := []Registry{} for _, location := range registryOrder { reg := regMap[location] registries = append(registries, *reg) } return registries, nil }
c177967
confPath = filepath.Join(ctx.RootForImplicitAbsolutePaths, systemRegistriesConfPath) } } return confPath }
c177968
set. Note: if ctx.SystemRegistriesConfPath points to // the default config, we will still return an error. if os.IsNotExist(err) && (ctx == nil || ctx.SystemRegistriesConfPath == "") { return []Registry{}, nil } return nil, err } registries := config.Registries // backwards compatibility for v1 configs v1Registries, err := getV1Registries(config) if err != nil { return nil, err } if len(v1Registries) > 0 { if len(registries) > 0 { return nil, &InvalidRegistries{s: "mixing sysregistry v1/v2 is not supported"} } registries = v1Registries } registries, err = postProcessRegistries(registries) if err != nil { return nil, err } // populate the cache configCache[configPath] = registries return registries, err }
c177969
:= ioutil.ReadFile(configPath) return configBytes, err }
c177970
return i.manifestBlob, i.manifestMIMEType, nil }
c177971
r.annotations = make(map[string]string) } for k, v := range annotations { r.annotations[k] = v } return nil }
c177972
reference match attempted on image %s with no known Docker reference identity", transports.ImageName(image.Reference()))) } r2, err := reference.ParseNormalizedNamed(s2) if err != nil { return nil, nil, err } return r1, r2, nil }
c177973
reference.ParseNormalizedNamed(s2) if err != nil { return nil, nil, err } return r1, r2, nil }
c177974
{ if !deprecated[transport.Name()] { names = append(names, transport.Name()) } } sort.Strings(names) return names }
c177975
defaultOSTreeRepo { resolved = repo } else { return nil, err } } // This is necessary to prevent directory paths returned by PolicyConfigurationNamespaces // from being ambiguous with values of PolicyConfigurationIdentity. if strings.Contains(resolved, ":") { return nil, errors.Errorf("Invalid OSTree reference %s@%s: path %s contains a colon", image, repo, resolved) } return ostreeReference{ image: image, branchName: encodeOStreeRef(image), repo: resolved, }, nil }
c177976
{ return filepath.Join("manifest", fmt.Sprintf("signature-%d", index+1)) }
c177977
{ err = errors.Errorf("Invalid image %s", image) } return err }
c177978
return splitPathAndImageWindows(reference) } return splitPathAndImageNonWindows(reference) }
c177979
} } else { if strings.Contains(path, ":") { return errors.Errorf("Invalid OCI reference: path %s contains a colon", path) } } return nil }
c177980
filepath.Clean(scope) if cleaned != scope { return errors.Errorf(`Invalid scope %s: Uses non-canonical path format, perhaps try with path %s`, scope, cleaned) } return nil }
c177981
Digest: desc.Digest, Size: desc.Size, URLs: desc.URLs, MediaType: desc.MediaType, } }
c177982
json.Unmarshal(manifest, &s2); err != nil { return nil, err } return &s2, nil }
c177983
DockerV2Schema2MediaType, ConfigDescriptor: config, LayersDescriptors: layers, } }
c177984
:= base64.StdEncoding.EncodeToString([]byte(username + ":" + password)) newCreds := dockerAuthConfig{Auth: creds} auths.AuthConfigs[registry] = newCreds return true, nil }) }
c177985
return false, deleteAuthFromCredHelper(ch, registry) } if _, ok := auths.AuthConfigs[registry]; ok { delete(auths.AuthConfigs, registry) } else if _, ok := auths.AuthConfigs[normalizeRegistry(registry)]; ok { delete(auths.AuthConfigs, normalizeRegistry(registry)) } else { return false, ErrNotLoggedIn } return true, nil }) }
c177986
auths.AuthConfigs = make(map[string]dockerAuthConfig) return true, nil }) }
c177987
err } if legacyFormat { if err = json.Unmarshal(raw, &auths.AuthConfigs); err != nil { return dockerConfigFile{}, errors.Wrapf(err, "error unmarshaling JSON at %q", path) } return auths, nil } if err = json.Unmarshal(raw, &auths); err != nil { return dockerConfigFile{}, errors.Wrapf(err, "error unmarshaling JSON at %q", path) } return auths, nil }
c177988
err != nil { return errors.Wrapf(err, "error updating %q", path) } if updated { newData, err := json.MarshalIndent(auths, "", "\t") if err != nil { return errors.Wrapf(err, "error marshaling JSON %q", path) } if err = ioutil.WriteFile(path, newData, 0755); err != nil { return errors.Wrapf(err, "error writing to file %q", path) } } return nil }
c177989
entries first registry = normalizeRegistry(registry) normalizedAuths := map[string]dockerAuthConfig{} for k, v := range auths.AuthConfigs { normalizedAuths[normalizeRegistry(k)] = v } if val, exists := normalizedAuths[registry]; exists { return decodeDockerAuth(val.Auth) } return "", "", nil }
c177990
tar: tar.NewWriter(dest), repoTags: repoTags, blobs: make(map[digest.Digest]types.BlobInfo), } }
c177991
d.repoTags = append(d.repoTags, tags...) }
c177992
root layer doesn't have any parent if lastLayerID != "" { layerConfig["parent"] = lastLayerID } // The root layer configuration file is generated by using subpart of the image configuration if i == len(layerDescriptors)-1 { var config map[string]*json.RawMessage err := json.Unmarshal(d.config, &config) if err != nil { return nil, "", errors.Wrap(err, "Error unmarshaling config") } for _, attr := range [7]string{"architecture", "config", "container", "container_config", "created", "docker_version", "os"} { layerConfig[attr] = config[attr] } } b, err := json.Marshal(layerConfig) if err != nil { return nil, "", errors.Wrap(err, "Error marshaling layer config") } if err := d.sendBytes(filepath.Join(layerID, legacyConfigFileName), b); err != nil { return nil, "", errors.Wrap(err, "Error writing config json file") } lastLayerID = layerID } return layerPaths, lastLayerID, nil }
c177993
logrus.Debugf("Sending as tar link %s -> %s", path, target) return d.tar.WriteHeader(hdr) }
c177994
d.sendFile(path, int64(len(b)), bytes.NewReader(b)) }
c177995
err != nil { return err } // TODO: This can take quite some time, and should ideally be cancellable using a context.Context. size, err := io.Copy(d.tar, stream) if err != nil { return err } if size != expectedSize { return errors.Errorf("Size mismatch when copying %s, expected %d, got %d", path, expectedSize, size) } return nil }
c177996
{ return d.tar.Close() }
c177997
err == nil { if named.Name() == repo { return true } } } return false }
c177998
} } } } } if s.id == "" { logrus.Debugf("reference %q does not resolve to an image ID", s.StringWithinTransport()) return nil, errors.Wrapf(ErrNoSuchImage, "reference %q does not resolve to an image ID", s.StringWithinTransport()) } if loadedImage == nil { img, err := s.transport.store.Image(s.id) if err != nil { return nil, errors.Wrapf(err, "error reading image %q", s.id) } loadedImage = img } if s.named != nil { if !imageMatchesRepo(loadedImage, s.named) { logrus.Errorf("no image matching reference %q found", s.StringWithinTransport()) return nil, ErrNoSuchImage } } // Default to having the image digest that we hand back match the most recently // added manifest... if digest, ok := loadedImage.BigDataDigests[storage.ImageDigestBigDataKey]; ok { loadedImage.Digest = digest } // ... unless the named reference says otherwise, and it matches one of the digests // in the image. For those cases, set the Digest field to that value, for the // sake of older consumers that don't know there's a whole list in there now. if s.named != nil { if digested, ok := s.named.(reference.Digested); ok { for _, digest := range loadedImage.Digests { if digest == digested.Digest() { loadedImage.Digest = digest break } } } } return loadedImage, nil }
c177999
store: s.transport.store, defaultUIDMap: s.transport.defaultUIDMap, defaultGIDMap: s.transport.defaultGIDMap, } }