id
stringlengths
2
7
text
stringlengths
17
51.2k
title
stringclasses
1 value
c177900
return nil, errors.Errorf(`Invalid image name "%s", unknown transport "%s"`, imgName, parts[0]) } return transport.ParseReference(parts[1]) }
c177901
desc.Size, URLs: desc.URLs, Annotations: desc.Annotations, MediaType: desc.MediaType, } }
c177902
json.Unmarshal(manifest, &oci1); err != nil { return nil, err } return &oci1, nil }
c177903
specs.Versioned{SchemaVersion: 2}, Config: config, Layers: layers, }, } }
c177904
policy namespaces are unclear - should we drop // the tag or the digest first?) _, isTagged := ref.(reference.NamedTagged) _, isDigested := ref.(reference.Canonical) if isTagged && isDigested { return dockerReference{}, errors.Errorf("Docker references with both a tag and digest are currently not supported") } ...
c177905
reference.IsNameOnly values. return "", errors.Errorf("Internal inconsistency: Reference %s unexpectedly has neither a digest nor a tag", reference.FamiliarString(ref.ref)) }
c177906
reference to %s (Docker reference %s) would invalidate existing signatures. Explicitly enable signature removal to proceed anyway", transports.ImageName(ic.c.dest.Reference()), destRef.String()) } ic.manifestUpdates.EmbeddedDockerReference = destRef return nil }
c177907
return terminal.IsTerminal(int(f.Fd())) } return false }
c177908
of manifest MIME type candidates. return nil, errors.Errorf("Can not convert image to %s, preparing DiffIDs for this case is not supported", ic.manifestUpdates.ManifestMIMEType) } pi, err := ic.src.UpdatedImage(ctx, *ic.manifestUpdates) if err != nil { return nil, errors.Wrap(err, "Error creating an update...
c177909
mpb.BarClearOnComplete(), mpb.PrependDecorators( decor.Name(prefix), ), mpb.AppendDecorators( decor.OnComplete(decor.CountersKibiByte("%.1f / %.1f"), " "+onComplete), ), ) if c.progressOutput == ioutil.Discard { c.Printf("Copying %s %s\n", kind, info.Digest) } return bar }
c177910
return types.BlobInfo{}, err } bar.SetTotal(int64(len(configBlob)), true) return destInfo, nil }() if err != nil { return nil } if destInfo.Digest != srcInfo.Digest { return errors.Errorf("Internal error: copying uncompressed config blob %s changed digest to %s", srcInfo.Digest, destInfo.Dige...
c177911
// We do not care to bother the other end of the pipe with other failures; we send them to dest instead. result.digest, result.err = computeDiffID(layerStream, decompressor) }
c177912
return "", err } defer s.Close() stream = s } return digest.Canonical.FromReader(stream) }
c177913
dest.CloseWithError(err)}; we need err to be evaluated lazily. dest.CloseWithError(err) // CloseWithError(nil) is equivalent to Close() }() zipper := pgzip.NewWriter(dest) defer zipper.Close() _, err = io.Copy(zipper, src) // Sets err to nil, i.e. causes dest.Close() }
c177914
would have to call sockets.ConfigureTransport. // // We don't really want to configure anything for unix:// sockets, so just pass a nil *http.Client. // // Similarly, if we want to communicate over plain HTTP on a TCP socket, we also need to set // TLSClientConfig to nil. This can be achieved by using the form `h...
c177915
{ return filepath.Join(sys.RootForImplicitAbsolutePaths, systemDefaultPolicyPath) } } return systemDefaultPolicyPath }
c177916
{ return nil, errors.Wrapf(err, "invalid policy in %q", fileName) } return policy, nil }
c177917
return nil, InvalidPolicyFormatError(err.Error()) } return &p, nil }
c177918
res = &prInsecureAcceptAnything{} case prTypeReject: res = &prReject{} case prTypeSignedBy: res = &prSignedBy{} case prTypeSignedBaseLayer: res = &prSignedBaseLayer{} default: return nil, InvalidPolicyFormatError(fmt.Sprintf("Unknown policy requirement type \"%s\"", typeField.Type)) } if err := json.Unma...
c177919
signedIdentity == nil { return nil, InvalidPolicyFormatError("signedIdentity not specified") } return &prSignedBy{ prCommon: prCommon{Type: prTypeSignedBy}, KeyType: keyType, KeyPath: keyPath, KeyData: keyData, SignedIdentity: signedIdentity, }, nil }
c177920
return newPRSignedBy(keyType, keyPath, nil, signedIdentity) }
c177921
return newPRSignedByKeyPath(keyType, keyPath, signedIdentity) }
c177922
return newPRSignedBy(keyType, "", keyData, signedIdentity) }
c177923
return newPRSignedByKeyData(keyType, keyData, signedIdentity) }
c177924
SBKeyTypeX509Certificates, SBKeyTypeSignedByX509CAs: return true default: return false } }
c177925
prCommon: prCommon{Type: prTypeSignedBaseLayer}, BaseLayerIdentity: baseLayerIdentity, }, nil }
c177926
res = &prmExactReference{} case prmTypeExactRepository: res = &prmExactRepository{} default: return nil, InvalidPolicyFormatError(fmt.Sprintf("Unknown policy reference match type \"%s\"", typeField.Type)) } if err := json.Unmarshal(data, &res); err != nil { return nil, err } return res, nil }
c177927
%s", dockerReference, err.Error())) } if reference.IsNameOnly(ref) { return nil, InvalidPolicyFormatError(fmt.Sprintf("dockerReference %s contains neither a tag nor digest", dockerReference)) } return &prmExactReference{ prmCommon: prmCommon{Type: prmTypeExactReference}, DockerReference: dockerReferenc...
c177928
} return &prmExactRepository{ prmCommon: prmCommon{Type: prmTypeExactRepository}, DockerRepository: dockerRepository, }, nil }
c177929
img.Metadata != "" { if err := json.Unmarshal([]byte(img.Metadata), image); err != nil { return nil, errors.Wrap(err, "error decoding metadata for source image") } } return image, nil }
c177930
actually do have multiple layers, otherwise we could // just go ahead and use the first one every time. s.getBlobMutex.Lock() i := s.layerPosition[info.Digest] s.layerPosition[info.Digest] = i + 1 s.getBlobMutex.Unlock() if len(layers) > 0 { layer = layers[i%len(layers)] } // Force the storage layer to not t...
c177931
return "" } diffIDs = append([]digest.Digest{diffID}, diffIDs...) } case *manifest.Schema2, *manifest.OCI1: // We know the ID calculation for these formats doesn't actually use the diffIDs, // so we don't need to populate the diffID list. default: return "" } id, err := m.ImageID(diffIDs) if err !...
c177932
digested.Digest()) if err != nil { return err } if !matches { return fmt.Errorf("Manifest does not match expected digest %s", digested.Digest()) } } } s.manifest = make([]byte, len(manifestBlob)) copy(s.manifest, manifestBlob) return nil }
c177933
copy(newblob[len(sigblob):], sig) sigblob = newblob } s.signatures = sigblob s.SignatureSizes = sizes return nil }
c177934
nil { return nil, err } size, err := src.getSize() if err != nil { return nil, err } return &storageImageCloser{ImageCloser: img, size: size}, nil }
c177935
:= tempDirRef.deleteTempDir(); err != nil { return nil, errors.Wrapf(err, "error deleting temp directory %q", tempDirRef.tempDirectory) } return nil, err } return &ociArchiveImageSource{ref: ref, unpackedSrc: unpackedSrc, tempDirRef: tempDirRef}, nil }
c177936
} defer tempDirRef.deleteTempDir() descriptor, err := ocilayout.LoadManifestDescriptor(tempDirRef.ociRefExtracted) if err != nil { return imgspecv1.Descriptor{}, errors.Wrap(err, "error loading index") } return descriptor, nil }
c177937
s.tempDirRef.deleteTempDir() return s.unpackedSrc.Close() }
c177938
os.list = append(os.list, s) os.included[s] = struct{}{} } }
c177939
nil { return false, err } return manifest.MIMETypeIsMultiImage(mt), nil }
c177940
else { pl = &pathLock{refCount: 1, mutex: sync.Mutex{}} pathLocks[path] = pl } return pl }() pl.mutex.Lock() }
c177941
unlocking nonexistent lock for path %s", path)) } pl.mutex.Unlock() pl.refCount-- if pl.refCount == 0 { delete(pathLocks, path) } }
c177942
return err } lockPath(bdc.path) defer unlockPath(bdc.path) db, err := bolt.Open(bdc.path, 0600, &bolt.Options{ReadOnly: true}) if err != nil { return err } defer func() { if err := db.Close(); retErr == nil && err != nil { retErr = err } }() return db.View(fn) }
c177943
func() { if err := db.Close(); retErr == nil && err != nil { retErr = err } }() return db.Update(fn) }
c177944
(uncompressed, uncompressed) mappings // when we already record a (compressed, uncompressed) pair. if b := tx.Bucket(digestByUncompressedBucket); b != nil { if b = b.Bucket([]byte(anyDigest.String())); b != nil { c := b.Cursor() if k, _ := c.First(); k != nil { // The bucket is non-empty return anyDigest...
c177945
Digest: digest, Location: types.BICLocationReference{Opaque: string(k)}, }, LastSeen: t, }) return nil }) // FIXME? Log error (but throttle the log volume on repeated accesses)? return candidates }
c177946
true } if os.IsNotExist(err) { return false } return true }
c177947
nil, errors.Errorf("Cannot determine canonical Docker reference for destination %s", transports.ImageName(c.dest.Reference())) } c.Printf("Signing manifest\n") newSig, err := signature.SignDockerManifest(manifest, dockerReference.String(), mech, keyIdentity) if err != nil { return nil, errors.Wrap(err, "Error c...
c177948
:= internal.SplitPathAndImage(reference) return NewReference(dir, image) }
c177949
} if err = internal.ValidateImageName(image); err != nil { return nil, err } return ociReference{dir: dir, resolvedDir: resolved, image: image}, nil }
c177950
:= json.NewDecoder(indexJSON).Decode(index); err != nil { return nil, err } return index, nil }
c177951
if !ok { return imgspecv1.Descriptor{}, errors.Errorf("error typecasting, need type ociRef") } return ociRef.getManifestDescriptor() }
c177952
digest reference %s", digest) } blobDir := filepath.Join(ref.dir, "blobs") if sharedBlobDir != "" { blobDir = sharedBlobDir } return filepath.Join(blobDir, digest.Algorithm().String(), digest.Hex()), nil }
c177953
:= newUntrustedSignature(manifestDigest, dockerReference) return sig.sign(mech, keyIdentity) }
c177954
validateSignedDockerReference: func(signedDockerReference string) error { signedRef, err := reference.ParseNormalizedNamed(signedDockerReference) if err != nil { return InvalidSignatureError{msg: fmt.Sprintf("Invalid docker reference %s in signature", signedDockerReference)} } if signedRef.String() !...
c177955
files, so hard-coded these defaults.) logrus.Debugf("restConfig: %#v", restConfig) baseURL, httpClient, err := restClientFor(restConfig) if err != nil { return nil, err } logrus.Debugf("URL: %#v", *baseURL) if httpClient == nil { httpClient = http.DefaultClient } return &openshiftClient{ ref: r...
c177956
var status status statusValid := false if err := json.Unmarshal(body, &status); err == nil && len(status.Status) > 0 { statusValid = true } switch { case res.StatusCode == http.StatusSwitchingProtocols: // FIXME?! No idea why this weird case exists in k8s.io/kubernetes/pkg/client/restclient. if statusValid...
c177957
return nil, err } // Note: This does absolutely no kind/version checking or conversions. var isi imageStreamImage if err := json.Unmarshal(body, &isi); err != nil { return nil, err } return &isi.Image, nil }
c177958
if len(parts) != 2 { return "", errors.Errorf("Invalid format of docker reference %s: missing '/'", ref) } return reference.Domain(c.ref.dockerReference) + "/" + parts[1], nil }
c177959
} logrus.Debugf("tag event %#v", te) dockerRefString, err := s.client.convertDockerImageReference(te.DockerImageReference) if err != nil { return err } logrus.Debugf("Resolved reference %#v", dockerRefString) dockerRef, err := docker.ParseReference("//" + dockerRefString) if err != nil { return err } d, e...
c177960
this point. dockerRefString := fmt.Sprintf("//%s/%s/%s:%s", reference.Domain(client.ref.dockerReference), client.ref.namespace, client.ref.stream, client.ref.dockerReference.Tag()) dockerRef, err := docker.ParseReference(dockerRefString) if err != nil { return nil, err } docker, err := dockerRef.NewImageDestina...
c177961
return untrustedSignature{ UntrustedDockerManifestDigest: dockerManifestDigest, UntrustedDockerReference: dockerReference, UntrustedCreatorID: &creatorID, UntrustedTimestamp: &timestamp, } }
c177962
optional["creator"] = *s.UntrustedCreatorID } if s.UntrustedTimestamp != nil { optional["timestamp"] = *s.UntrustedTimestamp } signature := map[string]interface{}{ "critical": critical, "optional": optional, } return json.Marshal(signature) }
c177963
if err != nil { if _, ok := err.(jsonFormatError); ok { err = InvalidSignatureError{msg: err.Error()} } } return err }
c177964
!= nil { return nil, InvalidSignatureError{msg: err.Error()} } if err := rules.validateSignedDockerManifestDigest(unmatchedSignature.UntrustedDockerManifestDigest); err != nil { return nil, err } if err := rules.validateSignedDockerReference(unmatchedSignature.UntrustedDockerReference); err != nil { return n...
c177965
logrus.Debugf("reference rewritten from '%v' to '%v'", refString, newParsedRef.String()) } if err != nil { return nil, errors.Wrapf(err, "error rewriting reference") } return newParsedRef, nil } return nil, fmt.Errorf("invalid prefix '%v' for reference '%v'", prefix, refString) }
c177966
search registries is also in one of the other lists. for _, search := range config.V1TOMLConfig.Search.Registries { reg, err := getRegistry(search) if err != nil { return nil, err } reg.Search = true } for _, blocked := range config.V1TOMLConfig.Block.Registries { reg, err := getRegistry(blocked) if ...
c177967
confPath = filepath.Join(ctx.RootForImplicitAbsolutePaths, systemRegistriesConfPath) } } return confPath }
c177968
set. Note: if ctx.SystemRegistriesConfPath points to // the default config, we will still return an error. if os.IsNotExist(err) && (ctx == nil || ctx.SystemRegistriesConfPath == "") { return []Registry{}, nil } return nil, err } registries := config.Registries // backwards compatibility for v1 config...
c177969
:= ioutil.ReadFile(configPath) return configBytes, err }
c177970
return i.manifestBlob, i.manifestMIMEType, nil }
c177971
r.annotations = make(map[string]string) } for k, v := range annotations { r.annotations[k] = v } return nil }
c177972
reference match attempted on image %s with no known Docker reference identity", transports.ImageName(image.Reference()))) } r2, err := reference.ParseNormalizedNamed(s2) if err != nil { return nil, nil, err } return r1, r2, nil }
c177973
reference.ParseNormalizedNamed(s2) if err != nil { return nil, nil, err } return r1, r2, nil }
c177974
{ if !deprecated[transport.Name()] { names = append(names, transport.Name()) } } sort.Strings(names) return names }
c177975
defaultOSTreeRepo { resolved = repo } else { return nil, err } } // This is necessary to prevent directory paths returned by PolicyConfigurationNamespaces // from being ambiguous with values of PolicyConfigurationIdentity. if strings.Contains(resolved, ":") { return nil, errors.Errorf("Invalid OSTree r...
c177976
{ return filepath.Join("manifest", fmt.Sprintf("signature-%d", index+1)) }
c177977
{ err = errors.Errorf("Invalid image %s", image) } return err }
c177978
return splitPathAndImageWindows(reference) } return splitPathAndImageNonWindows(reference) }
c177979
} } else { if strings.Contains(path, ":") { return errors.Errorf("Invalid OCI reference: path %s contains a colon", path) } } return nil }
c177980
filepath.Clean(scope) if cleaned != scope { return errors.Errorf(`Invalid scope %s: Uses non-canonical path format, perhaps try with path %s`, scope, cleaned) } return nil }
c177981
Digest: desc.Digest, Size: desc.Size, URLs: desc.URLs, MediaType: desc.MediaType, } }
c177982
json.Unmarshal(manifest, &s2); err != nil { return nil, err } return &s2, nil }
c177983
DockerV2Schema2MediaType, ConfigDescriptor: config, LayersDescriptors: layers, } }
c177984
:= base64.StdEncoding.EncodeToString([]byte(username + ":" + password)) newCreds := dockerAuthConfig{Auth: creds} auths.AuthConfigs[registry] = newCreds return true, nil }) }
c177985
return false, deleteAuthFromCredHelper(ch, registry) } if _, ok := auths.AuthConfigs[registry]; ok { delete(auths.AuthConfigs, registry) } else if _, ok := auths.AuthConfigs[normalizeRegistry(registry)]; ok { delete(auths.AuthConfigs, normalizeRegistry(registry)) } else { return false, ErrNotLoggedIn...
c177986
auths.AuthConfigs = make(map[string]dockerAuthConfig) return true, nil }) }
c177987
err } if legacyFormat { if err = json.Unmarshal(raw, &auths.AuthConfigs); err != nil { return dockerConfigFile{}, errors.Wrapf(err, "error unmarshaling JSON at %q", path) } return auths, nil } if err = json.Unmarshal(raw, &auths); err != nil { return dockerConfigFile{}, errors.Wrapf(err, "error unmars...
c177988
err != nil { return errors.Wrapf(err, "error updating %q", path) } if updated { newData, err := json.MarshalIndent(auths, "", "\t") if err != nil { return errors.Wrapf(err, "error marshaling JSON %q", path) } if err = ioutil.WriteFile(path, newData, 0755); err != nil { return errors.Wrapf(err, "erro...
c177989
entries first registry = normalizeRegistry(registry) normalizedAuths := map[string]dockerAuthConfig{} for k, v := range auths.AuthConfigs { normalizedAuths[normalizeRegistry(k)] = v } if val, exists := normalizedAuths[registry]; exists { return decodeDockerAuth(val.Auth) } return "", "", nil }
c177990
tar: tar.NewWriter(dest), repoTags: repoTags, blobs: make(map[digest.Digest]types.BlobInfo), } }
c177991
d.repoTags = append(d.repoTags, tags...) }
c177992
root layer doesn't have any parent if lastLayerID != "" { layerConfig["parent"] = lastLayerID } // The root layer configuration file is generated by using subpart of the image configuration if i == len(layerDescriptors)-1 { var config map[string]*json.RawMessage err := json.Unmarshal(d.config, &config...
c177993
logrus.Debugf("Sending as tar link %s -> %s", path, target) return d.tar.WriteHeader(hdr) }
c177994
d.sendFile(path, int64(len(b)), bytes.NewReader(b)) }
c177995
err != nil { return err } // TODO: This can take quite some time, and should ideally be cancellable using a context.Context. size, err := io.Copy(d.tar, stream) if err != nil { return err } if size != expectedSize { return errors.Errorf("Size mismatch when copying %s, expected %d, got %d", path, expectedSi...
c177996
{ return d.tar.Close() }
c177997
err == nil { if named.Name() == repo { return true } } } return false }
c177998
} } } } } if s.id == "" { logrus.Debugf("reference %q does not resolve to an image ID", s.StringWithinTransport()) return nil, errors.Wrapf(ErrNoSuchImage, "reference %q does not resolve to an image ID", s.StringWithinTransport()) } if loadedImage == nil { img, err := s.transport.store.Image(s.i...
c177999
store: s.transport.store, defaultUIDMap: s.transport.defaultUIDMap, defaultGIDMap: s.transport.defaultGIDMap, } }