diff options
author | Daniel J Walsh <dwalsh@redhat.com> | 2018-05-03 08:59:19 -0400 |
---|---|---|
committer | Atomic Bot <atomic-devel@projectatomic.io> | 2018-05-03 13:12:46 +0000 |
commit | fae5033a01b78d3e8f23c1c9438bc5534dfe0fa3 (patch) | |
tree | e2a140a0493f23a8e3a1a6cfff04a826ef9fe12e /vendor | |
parent | e6ec1aaffe791a265ca7716813de47dacc4b70e8 (diff) | |
download | podman-fae5033a01b78d3e8f23c1c9438bc5534dfe0fa3.tar.gz podman-fae5033a01b78d3e8f23c1c9438bc5534dfe0fa3.tar.bz2 podman-fae5033a01b78d3e8f23c1c9438bc5534dfe0fa3.zip |
Make podman commit to localhost rather then docker.io
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Closes: #715
Approved by: mheon
Diffstat (limited to 'vendor')
4 files changed, 106 insertions, 81 deletions
diff --git a/vendor/github.com/projectatomic/buildah/commit.go b/vendor/github.com/projectatomic/buildah/commit.go index d752473fa..da86ee855 100644 --- a/vendor/github.com/projectatomic/buildah/commit.go +++ b/vendor/github.com/projectatomic/buildah/commit.go @@ -78,15 +78,19 @@ type PushOptions struct { // Commit writes the contents of the container, along with its updated // configuration, to a new image in the specified location, and if we know how, -// add any additional tags that were specified. -func (b *Builder) Commit(ctx context.Context, dest types.ImageReference, options CommitOptions) error { - policy, err := signature.DefaultPolicy(getSystemContext(options.SystemContext, options.SignaturePolicyPath)) +// add any additional tags that were specified. Returns the ID of the new image +// if commit was successful and the image destination was local +func (b *Builder) Commit(ctx context.Context, dest types.ImageReference, options CommitOptions) (string, error) { + var imgID string + + systemContext := getSystemContext(options.SystemContext, options.SignaturePolicyPath) + policy, err := signature.DefaultPolicy(systemContext) if err != nil { - return errors.Wrapf(err, "error obtaining default signature policy") + return imgID, errors.Wrapf(err, "error obtaining default signature policy") } policyContext, err := signature.NewPolicyContext(policy) if err != nil { - return errors.Wrapf(err, "error creating new signature policy context") + return imgID, errors.Wrapf(err, "error creating new signature policy context") } defer func() { if err2 := policyContext.Destroy(); err2 != nil { @@ -98,23 +102,23 @@ func (b *Builder) Commit(ctx context.Context, dest types.ImageReference, options exporting := !destIsStorage src, err := b.makeImageRef(options.PreferredManifestType, exporting, options.Compression, options.HistoryTimestamp) if err != nil { - return errors.Wrapf(err, "error computing layer digests and building metadata") + return imgID, errors.Wrapf(err, "error computing layer digests and building metadata") } // "Copy" our image to where it needs to be. - err = cp.Image(ctx, policyContext, dest, src, getCopyOptions(options.ReportWriter, nil, options.SystemContext, "")) + err = cp.Image(ctx, policyContext, dest, src, getCopyOptions(options.ReportWriter, nil, systemContext, "")) if err != nil { - return errors.Wrapf(err, "error copying layers and metadata") + return imgID, errors.Wrapf(err, "error copying layers and metadata") } if len(options.AdditionalTags) > 0 { switch dest.Transport().Name() { case is.Transport.Name(): img, err := is.Transport.GetStoreImage(b.store, dest) if err != nil { - return errors.Wrapf(err, "error locating just-written image %q", transports.ImageName(dest)) + return imgID, errors.Wrapf(err, "error locating just-written image %q", transports.ImageName(dest)) } - err = util.AddImageNames(b.store, img, options.AdditionalTags) + err = util.AddImageNames(b.store, "", systemContext, img, options.AdditionalTags) if err != nil { - return errors.Wrapf(err, "error setting image names to %v", append(img.Names, options.AdditionalTags...)) + return imgID, errors.Wrapf(err, "error setting image names to %v", append(img.Names, options.AdditionalTags...)) } logrus.Debugf("assigned names %v to image %q", img.Names, img.ID) default: @@ -123,16 +127,21 @@ func (b *Builder) Commit(ctx context.Context, dest types.ImageReference, options } img, err := is.Transport.GetStoreImage(b.store, dest) + if err != nil && err != storage.ErrImageUnknown { + return imgID, err + } + if err == nil { + imgID = img.ID + if options.IIDFile != "" { if err := ioutil.WriteFile(options.IIDFile, []byte(img.ID), 0644); err != nil { - return errors.Wrapf(err, "failed to write Image ID File %q", options.IIDFile) + return imgID, errors.Wrapf(err, "failed to write Image ID File %q", options.IIDFile) } - } else { - fmt.Printf("%s\n", img.ID) } } - return nil + + return imgID, nil } // Push copies the contents of the image to a new location. @@ -147,12 +156,12 @@ func Push(ctx context.Context, image string, dest types.ImageReference, options return errors.Wrapf(err, "error creating new signature policy context") } // Look up the image. - src, err := is.Transport.ParseStoreReference(options.Store, image) + src, _, err := util.FindImage(options.Store, "", systemContext, image) if err != nil { - return errors.Wrapf(err, "error parsing reference to image %q", image) + return err } // Copy everything. - err = cp.Image(ctx, policyContext, dest, src, getCopyOptions(options.ReportWriter, nil, options.SystemContext, options.ManifestType)) + err = cp.Image(ctx, policyContext, dest, src, getCopyOptions(options.ReportWriter, nil, systemContext, options.ManifestType)) if err != nil { return errors.Wrapf(err, "error copying layers and metadata") } diff --git a/vendor/github.com/projectatomic/buildah/imagebuildah/build.go b/vendor/github.com/projectatomic/buildah/imagebuildah/build.go index 81e8108a0..dd8421807 100644 --- a/vendor/github.com/projectatomic/buildah/imagebuildah/build.go +++ b/vendor/github.com/projectatomic/buildah/imagebuildah/build.go @@ -23,6 +23,7 @@ import ( "github.com/openshift/imagebuilder" "github.com/pkg/errors" "github.com/projectatomic/buildah" + "github.com/projectatomic/buildah/util" "github.com/sirupsen/logrus" ) @@ -623,22 +624,25 @@ func (b *Executor) Execute(ib *imagebuilder.Builder, node *parser.Node) error { // the name if there is one, generating a unique ID-based one otherwise. func (b *Executor) Commit(ctx context.Context, ib *imagebuilder.Builder) (err error) { var imageRef types.ImageReference + if b.output != "" { imageRef, err = alltransports.ParseImageName(b.output) if err != nil { - imageRef2, err2 := is.Transport.ParseStoreReference(b.store, b.output) - if err2 == nil { - imageRef = imageRef2 - err = nil - } else { - err = err2 + candidates := util.ResolveName(b.output, "", b.systemContext, b.store) + if len(candidates) == 0 { + return errors.Errorf("error parsing target image name %q", b.output) + } + imageRef2, err2 := is.Transport.ParseStoreReference(b.store, candidates[0]) + if err2 != nil { + return errors.Wrapf(err, "error parsing target image name %q", b.output) } + imageRef = imageRef2 } } else { imageRef, err = is.Transport.ParseStoreReference(b.store, "@"+stringid.GenerateRandomID()) - } - if err != nil { - return errors.Wrapf(err, "error parsing reference for image to be written") + if err != nil { + return errors.Wrapf(err, "error parsing reference for image to be written") + } } if ib.Author != "" { b.builder.SetMaintainer(ib.Author) @@ -689,7 +693,14 @@ func (b *Executor) Commit(ctx context.Context, ib *imagebuilder.Builder) (err er PreferredManifestType: b.outputFormat, IIDFile: b.iidfile, } - return b.builder.Commit(ctx, imageRef, options) + imgID, err := b.builder.Commit(ctx, imageRef, options) + if err != nil { + return err + } + if options.IIDFile == "" && imgID != "" { + fmt.Printf("%s\n", imgID) + } + return nil } // Build takes care of the details of running Prepare/Execute/Commit/Delete diff --git a/vendor/github.com/projectatomic/buildah/import.go b/vendor/github.com/projectatomic/buildah/import.go index b98219107..2a48d2c34 100644 --- a/vendor/github.com/projectatomic/buildah/import.go +++ b/vendor/github.com/projectatomic/buildah/import.go @@ -97,27 +97,21 @@ func importBuilder(ctx context.Context, store storage.Store, options ImportOptio } func importBuilderFromImage(ctx context.Context, store storage.Store, options ImportFromImageOptions) (*Builder, error) { - var img *storage.Image - var err error - if options.Image == "" { return nil, errors.Errorf("image name must be specified") } systemContext := getSystemContext(options.SystemContext, options.SignaturePolicyPath) - for _, image := range util.ResolveName(options.Image, "", systemContext, store) { - img, err = util.FindImage(store, image) - if err != nil { - continue - } - - builder, err2 := importBuilderDataFromImage(ctx, store, systemContext, img.ID, "", "") - if err2 != nil { - return nil, errors.Wrapf(err2, "error importing build settings from image %q", options.Image) - } + _, img, err := util.FindImage(store, "", systemContext, options.Image) + if err != nil { + return nil, errors.Wrapf(err, "error locating image %q for importing settings", options.Image) + } - return builder, nil + builder, err := importBuilderDataFromImage(ctx, store, systemContext, img.ID, "", "") + if err != nil { + return nil, errors.Wrapf(err, "error importing build settings from image %q", options.Image) } - return nil, errors.Wrapf(err, "error locating image %q for importing settings", options.Image) + + return builder, nil } diff --git a/vendor/github.com/projectatomic/buildah/util/util.go b/vendor/github.com/projectatomic/buildah/util/util.go index 49d6fcc4e..41bd46cb3 100644 --- a/vendor/github.com/projectatomic/buildah/util/util.go +++ b/vendor/github.com/projectatomic/buildah/util/util.go @@ -6,7 +6,6 @@ import ( "net/url" "path" "strings" - "time" "github.com/containers/image/directory" dockerarchive "github.com/containers/image/docker/archive" @@ -54,8 +53,9 @@ var ( TarballTransport = tarball.Transport.Name() ) -// ResolveName checks if name is a valid image name, and if that name doesn't include a domain -// portion, returns a list of the names which it might correspond to in the registries. +// ResolveName checks if name is a valid image name, and if that name doesn't +// include a domain portion, returns a list of the names which it might +// correspond to in the set of configured registries. func ResolveName(name string, firstRegistry string, sc *types.SystemContext, store storage.Store) []string { if name == "" { return nil @@ -101,8 +101,8 @@ func ResolveName(name string, firstRegistry string, sc *types.SystemContext, sto // Figure out the list of registries. registries, err := sysregistries.GetRegistries(sc) if err != nil { - logrus.Debugf("unable to complete image name %q: %v", name, err) - return []string{name} + logrus.Debugf("unable to read configured registries to complete %q: %v", name, err) + registries = []string{} } if sc.DockerInsecureSkipTLSVerify { if unverifiedRegistries, err := sysregistries.GetInsecureRegistries(sc); err == nil { @@ -111,10 +111,14 @@ func ResolveName(name string, firstRegistry string, sc *types.SystemContext, sto } // Create all of the combinations. Some registries need an additional component added, so - // use our lookaside map to keep track of them. If there are no configured registries, at - // least return the name as it was passed to us. + // use our lookaside map to keep track of them. If there are no configured registries, we'll + // return a name using "localhost" as the registry name. candidates := []string{} - for _, registry := range append([]string{firstRegistry}, registries...) { + initRegistries := []string{"localhost"} + if firstRegistry != "" && firstRegistry != "localhost" { + initRegistries = append([]string{firstRegistry}, initRegistries...) + } + for _, registry := range append(initRegistries, registries...) { if registry == "" { continue } @@ -125,9 +129,6 @@ func ResolveName(name string, firstRegistry string, sc *types.SystemContext, sto candidate := path.Join(registry, middle, name) candidates = append(candidates, candidate) } - if len(candidates) == 0 { - candidates = append(candidates, name) - } return candidates } @@ -135,12 +136,23 @@ func ResolveName(name string, firstRegistry string, sc *types.SystemContext, sto // the fully expanded result, including a tag. Names which don't include a registry // name will be marked for the most-preferred registry (i.e., the first one in our // configuration). -func ExpandNames(names []string) ([]string, error) { +func ExpandNames(names []string, firstRegistry string, systemContext *types.SystemContext, store storage.Store) ([]string, error) { expanded := make([]string, 0, len(names)) for _, n := range names { - name, err := reference.ParseNormalizedNamed(n) - if err != nil { - return nil, errors.Wrapf(err, "error parsing name %q", n) + var name reference.Named + nameList := ResolveName(n, firstRegistry, systemContext, store) + if len(nameList) == 0 { + named, err := reference.ParseNormalizedNamed(n) + if err != nil { + return nil, errors.Wrapf(err, "error parsing name %q", n) + } + name = named + } else { + named, err := reference.ParseNormalizedNamed(nameList[0]) + if err != nil { + return nil, errors.Wrapf(err, "error parsing name %q", nameList[0]) + } + name = named } name = reference.TagNameOnly(name) tag := "" @@ -157,28 +169,36 @@ func ExpandNames(names []string) ([]string, error) { } // FindImage locates the locally-stored image which corresponds to a given name. -func FindImage(store storage.Store, image string) (*storage.Image, error) { +func FindImage(store storage.Store, firstRegistry string, systemContext *types.SystemContext, image string) (types.ImageReference, *storage.Image, error) { + var ref types.ImageReference var img *storage.Image - ref, err := is.Transport.ParseStoreReference(store, image) - if err == nil { + var err error + for _, name := range ResolveName(image, firstRegistry, systemContext, store) { + ref, err = is.Transport.ParseStoreReference(store, name) + if err != nil { + logrus.Debugf("error parsing reference to image %q: %v", name, err) + continue + } img, err = is.Transport.GetStoreImage(store, ref) - } - if err != nil { - img2, err2 := store.Image(image) - if err2 != nil { - if ref == nil { - return nil, errors.Wrapf(err, "error parsing reference to image %q", image) + if err != nil { + img2, err2 := store.Image(name) + if err2 != nil { + logrus.Debugf("error locating image %q: %v", name, err2) + continue } - return nil, errors.Wrapf(err, "unable to locate image %q", image) + img = img2 } - img = img2 + break } - return img, nil + if ref == nil || img == nil { + return nil, nil, errors.Wrapf(err, "error locating image with name %q", image) + } + return ref, img, nil } // AddImageNames adds the specified names to the specified image. -func AddImageNames(store storage.Store, image *storage.Image, addNames []string) error { - names, err := ExpandNames(addNames) +func AddImageNames(store storage.Store, firstRegistry string, systemContext *types.SystemContext, image *storage.Image, addNames []string) error { + names, err := ExpandNames(addNames, firstRegistry, systemContext, store) if err != nil { return err } @@ -203,15 +223,6 @@ func GetFailureCause(err, defaultError error) error { } } -// GetLocalTime discover the UTC offset and then add that to the -// passed in time to arrive at the local time. -func GetLocalTime(localTime time.Time) time.Time { - t := time.Now() - _, offset := t.Local().Zone() - localTime = localTime.Add(time.Second * time.Duration(offset)) - return localTime -} - // WriteError writes `lastError` into `w` if not nil and return the next error `err` func WriteError(w io.Writer, err error, lastError error) error { if lastError != nil { |