mirror of
https://github.com/containers/skopeo.git
synced 2025-08-24 09:08:31 +00:00
Update to c/image 5.24.1
... to include an unexpected EOF workaround. Signed-off-by: Miloslav Trmač <mitr@redhat.com>
This commit is contained in:
parent
cc958d3e5d
commit
40dd6507df
2
go.mod
2
go.mod
@ -4,7 +4,7 @@ go 1.17
|
||||
|
||||
require (
|
||||
github.com/containers/common v0.51.0
|
||||
github.com/containers/image/v5 v5.24.0
|
||||
github.com/containers/image/v5 v5.24.1
|
||||
github.com/containers/ocicrypt v1.1.7
|
||||
github.com/containers/storage v1.45.3
|
||||
github.com/docker/distribution v2.8.1+incompatible
|
||||
|
3
go.sum
3
go.sum
@ -909,8 +909,9 @@ github.com/containernetworking/plugins v1.1.1/go.mod h1:Sr5TH/eBsGLXK/h71HeLfX19
|
||||
github.com/containernetworking/plugins v1.2.0/go.mod h1:/VjX4uHecW5vVimFa1wkG4s+r/s9qIfPdqlLF4TW8c4=
|
||||
github.com/containers/common v0.51.0 h1:Ax4YHNTG8cEPHZJcMYRoP7sfBgOISceeyOvmZzmSucg=
|
||||
github.com/containers/common v0.51.0/go.mod h1:3W2WIdalgQfrsX/T5tjX+6CxgT3ThJVN2G9sNuFjuCM=
|
||||
github.com/containers/image/v5 v5.24.0 h1:2Pu8ztTntqNxteVN15bORCQnM8rfnbYuyKwUiiKUBuc=
|
||||
github.com/containers/image/v5 v5.24.0/go.mod h1:oss5F6ssGQz8ZtC79oY+fuzYA3m3zBek9tq9gmhuvHc=
|
||||
github.com/containers/image/v5 v5.24.1 h1:XaRw3FJmvZtI297uBVTJluUVH4AQJ//YpHviaOw0C4M=
|
||||
github.com/containers/image/v5 v5.24.1/go.mod h1:oss5F6ssGQz8ZtC79oY+fuzYA3m3zBek9tq9gmhuvHc=
|
||||
github.com/containers/libtrust v0.0.0-20230121012942-c1716e8a8d01 h1:Qzk5C6cYglewc+UyGf6lc8Mj2UaPTHy/iF2De0/77CA=
|
||||
github.com/containers/libtrust v0.0.0-20230121012942-c1716e8a8d01/go.mod h1:9rfv8iPl1ZP7aqh9YA68wnZv2NUDbXdcdPHVz0pFbPY=
|
||||
github.com/containers/ocicrypt v1.0.1/go.mod h1:MeJDzk1RJHv89LjsH0Sp5KTY3ZYkjXO/C+bKAeWFIrc=
|
||||
|
234
vendor/github.com/containers/image/v5/docker/body_reader.go
generated
vendored
Normal file
234
vendor/github.com/containers/image/v5/docker/body_reader.go
generated
vendored
Normal file
@ -0,0 +1,234 @@
|
||||
package docker
|
||||
|
||||
import (
|
||||
"context"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
"math"
|
||||
"math/rand"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"strconv"
|
||||
"strings"
|
||||
"syscall"
|
||||
"time"
|
||||
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
// bodyReaderMinimumProgress is the minimum progress we want to see before we retry
|
||||
const bodyReaderMinimumProgress = 1 * 1024 * 1024
|
||||
|
||||
// bodyReader is an io.ReadCloser returned by dockerImageSource.GetBlob,
|
||||
// which can transparently resume some (very limited) kinds of aborted connections.
|
||||
type bodyReader struct {
|
||||
ctx context.Context
|
||||
c *dockerClient
|
||||
|
||||
path string // path to pass to makeRequest to retry
|
||||
logURL *url.URL // a string to use in error messages
|
||||
body io.ReadCloser // The currently open connection we use to read data, or nil if there is nothing to read from / close.
|
||||
lastRetryOffset int64
|
||||
offset int64 // Current offset within the blob
|
||||
firstConnectionTime time.Time
|
||||
lastSuccessTime time.Time // time.Time{} if N/A
|
||||
}
|
||||
|
||||
// newBodyReader creates a bodyReader for request path in c.
|
||||
// firstBody is an already correctly opened body for the blob, returing the full blob from the start.
|
||||
// If reading from firstBody fails, bodyReader may heuristically decide to resume.
|
||||
func newBodyReader(ctx context.Context, c *dockerClient, path string, firstBody io.ReadCloser) (io.ReadCloser, error) {
|
||||
logURL, err := c.resolveRequestURL(path)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
res := &bodyReader{
|
||||
ctx: ctx,
|
||||
c: c,
|
||||
|
||||
path: path,
|
||||
logURL: logURL,
|
||||
body: firstBody,
|
||||
lastRetryOffset: 0,
|
||||
offset: 0,
|
||||
firstConnectionTime: time.Now(),
|
||||
}
|
||||
return res, nil
|
||||
}
|
||||
|
||||
// parseDecimalInString ensures that s[start:] starts with a non-negative decimal number, and returns that number and the offset after the number.
|
||||
func parseDecimalInString(s string, start int) (int64, int, error) {
|
||||
i := start
|
||||
for i < len(s) && s[i] >= '0' && s[i] <= '9' {
|
||||
i++
|
||||
}
|
||||
if i == start {
|
||||
return -1, -1, errors.New("missing decimal number")
|
||||
}
|
||||
v, err := strconv.ParseInt(s[start:i], 10, 64)
|
||||
if err != nil {
|
||||
return -1, -1, fmt.Errorf("parsing number: %w", err)
|
||||
}
|
||||
return v, i, nil
|
||||
}
|
||||
|
||||
// parseExpectedChar ensures that s[pos] is the expected byte, and returns the offset after it.
|
||||
func parseExpectedChar(s string, pos int, expected byte) (int, error) {
|
||||
if pos == len(s) || s[pos] != expected {
|
||||
return -1, fmt.Errorf("missing expected %q", expected)
|
||||
}
|
||||
return pos + 1, nil
|
||||
}
|
||||
|
||||
// parseContentRange ensures that res contains a Content-Range header with a byte range, and returns (first, last, completeLength) on success. Size can be -1.
|
||||
func parseContentRange(res *http.Response) (int64, int64, int64, error) {
|
||||
hdrs := res.Header.Values("Content-Range")
|
||||
switch len(hdrs) {
|
||||
case 0:
|
||||
return -1, -1, -1, errors.New("missing Content-Range: header")
|
||||
case 1:
|
||||
break
|
||||
default:
|
||||
return -1, -1, -1, fmt.Errorf("ambiguous Content-Range:, %d header values", len(hdrs))
|
||||
}
|
||||
hdr := hdrs[0]
|
||||
expectedPrefix := "bytes "
|
||||
if !strings.HasPrefix(hdr, expectedPrefix) {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q, missing prefix %q", hdr, expectedPrefix)
|
||||
}
|
||||
first, pos, err := parseDecimalInString(hdr, len(expectedPrefix))
|
||||
if err != nil {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q, parsing first-pos: %w", hdr, err)
|
||||
}
|
||||
pos, err = parseExpectedChar(hdr, pos, '-')
|
||||
if err != nil {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q: %w", hdr, err)
|
||||
}
|
||||
last, pos, err := parseDecimalInString(hdr, pos)
|
||||
if err != nil {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q, parsing last-pos: %w", hdr, err)
|
||||
}
|
||||
pos, err = parseExpectedChar(hdr, pos, '/')
|
||||
if err != nil {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q: %w", hdr, err)
|
||||
}
|
||||
completeLength := int64(-1)
|
||||
if pos < len(hdr) && hdr[pos] == '*' {
|
||||
pos++
|
||||
} else {
|
||||
completeLength, pos, err = parseDecimalInString(hdr, pos)
|
||||
if err != nil {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q, parsing complete-length: %w", hdr, err)
|
||||
}
|
||||
}
|
||||
if pos < len(hdr) {
|
||||
return -1, -1, -1, fmt.Errorf("invalid Content-Range: %q, unexpected trailing content", hdr)
|
||||
}
|
||||
return first, last, completeLength, nil
|
||||
}
|
||||
|
||||
// Read implements io.ReadCloser
|
||||
func (br *bodyReader) Read(p []byte) (int, error) {
|
||||
if br.body == nil {
|
||||
return 0, fmt.Errorf("internal error: bodyReader.Read called on a closed object for %s", br.logURL.Redacted())
|
||||
}
|
||||
n, err := br.body.Read(p)
|
||||
br.offset += int64(n)
|
||||
switch {
|
||||
case err == nil || err == io.EOF:
|
||||
br.lastSuccessTime = time.Now()
|
||||
return n, err // Unlike the default: case, don’t log anything.
|
||||
|
||||
case errors.Is(err, io.ErrUnexpectedEOF) || errors.Is(err, syscall.ECONNRESET):
|
||||
originalErr := err
|
||||
redactedURL := br.logURL.Redacted()
|
||||
if err := br.errorIfNotReconnecting(originalErr, redactedURL); err != nil {
|
||||
return n, err
|
||||
}
|
||||
|
||||
if err := br.body.Close(); err != nil {
|
||||
logrus.Debugf("Error closing blob body: %v", err) // … and ignore err otherwise
|
||||
}
|
||||
br.body = nil
|
||||
time.Sleep(1*time.Second + time.Duration(rand.Intn(100_000))*time.Microsecond) // Some jitter so that a failure blip doesn’t cause a deterministic stampede
|
||||
|
||||
headers := map[string][]string{
|
||||
"Range": {fmt.Sprintf("bytes=%d-", br.offset)},
|
||||
}
|
||||
res, err := br.c.makeRequest(br.ctx, http.MethodGet, br.path, headers, nil, v2Auth, nil)
|
||||
if err != nil {
|
||||
return n, fmt.Errorf("%w (while reconnecting: %v)", originalErr, err)
|
||||
}
|
||||
consumedBody := false
|
||||
defer func() {
|
||||
if !consumedBody {
|
||||
res.Body.Close()
|
||||
}
|
||||
}()
|
||||
switch res.StatusCode {
|
||||
case http.StatusPartialContent: // OK
|
||||
// A client MUST inspect a 206 response's Content-Type and Content-Range field(s) to determine what parts are enclosed and whether additional requests are needed.
|
||||
// The recipient of an invalid Content-Range MUST NOT attempt to recombine the received content with a stored representation.
|
||||
first, last, completeLength, err := parseContentRange(res)
|
||||
if err != nil {
|
||||
return n, fmt.Errorf("%w (after reconnecting, invalid Content-Range header: %v)", originalErr, err)
|
||||
}
|
||||
// We don’t handle responses that start at an unrequested offset, nor responses that terminate before the end of the full blob.
|
||||
if first != br.offset || (completeLength != -1 && last+1 != completeLength) {
|
||||
return n, fmt.Errorf("%w (after reconnecting at offset %d, got unexpected Content-Range %d-%d/%d)", originalErr, br.offset, first, last, completeLength)
|
||||
}
|
||||
// Continue below
|
||||
case http.StatusOK:
|
||||
return n, fmt.Errorf("%w (after reconnecting, server did not process a Range: header, status %d)", originalErr, http.StatusOK)
|
||||
default:
|
||||
err := registryHTTPResponseToError(res)
|
||||
return n, fmt.Errorf("%w (after reconnecting, fetching blob: %v)", originalErr, err)
|
||||
}
|
||||
|
||||
logrus.Debugf("Succesfully reconnected to %s", redactedURL)
|
||||
consumedBody = true
|
||||
br.body = res.Body
|
||||
br.lastRetryOffset = br.offset
|
||||
return n, nil
|
||||
|
||||
default:
|
||||
logrus.Debugf("Error reading blob body from %s: %#v", br.logURL.Redacted(), err)
|
||||
return n, err
|
||||
}
|
||||
}
|
||||
|
||||
// millisecondsSince is like time.Since(tm).Milliseconds, but it returns a floating-point value
|
||||
func millisecondsSince(tm time.Time) float64 {
|
||||
return float64(time.Since(tm).Nanoseconds()) / 1_000_000.0
|
||||
}
|
||||
|
||||
// errorIfNotReconnecting makes a heuristic decision whether we should reconnect after err at redactedURL; if so, it returns nil,
|
||||
// otherwise it returns an appropriate error to return to the caller (possibly augmented with data about the heuristic)
|
||||
func (br *bodyReader) errorIfNotReconnecting(originalErr error, redactedURL string) error {
|
||||
totalTime := millisecondsSince(br.firstConnectionTime)
|
||||
failureTime := math.NaN()
|
||||
if (br.lastSuccessTime != time.Time{}) {
|
||||
failureTime = millisecondsSince(br.lastSuccessTime)
|
||||
}
|
||||
logrus.Debugf("Reading blob body from %s failed (%#v), decision inputs: lastRetryOffset %d, offset %d, %.3f ms since first connection, %.3f ms since last progress",
|
||||
redactedURL, originalErr, br.lastRetryOffset, br.offset, totalTime, failureTime)
|
||||
progress := br.offset - br.lastRetryOffset
|
||||
if progress < bodyReaderMinimumProgress {
|
||||
logrus.Debugf("Not reconnecting to %s because only %d bytes progress made", redactedURL, progress)
|
||||
return fmt.Errorf("(heuristic tuning data: last retry %d, current offset %d; %.3f ms total, %.3f ms since progress): %w",
|
||||
br.lastRetryOffset, br.offset, totalTime, failureTime, originalErr)
|
||||
}
|
||||
logrus.Infof("Reading blob body from %s failed (%v), reconnecting…", redactedURL, originalErr)
|
||||
return nil
|
||||
}
|
||||
|
||||
// Close implements io.ReadCloser
|
||||
func (br *bodyReader) Close() error {
|
||||
if br.body == nil {
|
||||
return nil
|
||||
}
|
||||
err := br.body.Close()
|
||||
br.body = nil
|
||||
return err
|
||||
}
|
23
vendor/github.com/containers/image/v5/docker/docker_client.go
generated
vendored
23
vendor/github.com/containers/image/v5/docker/docker_client.go
generated
vendored
@ -472,14 +472,24 @@ func (c *dockerClient) makeRequest(ctx context.Context, method, path string, hea
|
||||
return nil, err
|
||||
}
|
||||
|
||||
urlString := fmt.Sprintf("%s://%s%s", c.scheme, c.registry, path)
|
||||
requestURL, err := url.Parse(urlString)
|
||||
requestURL, err := c.resolveRequestURL(path)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return c.makeRequestToResolvedURL(ctx, method, requestURL, headers, stream, -1, auth, extraScope)
|
||||
}
|
||||
|
||||
// resolveRequestURL turns a path for c.makeRequest into a full URL.
|
||||
// Most users should call makeRequest directly, this exists basically to make the URL available for debug logs.
|
||||
func (c *dockerClient) resolveRequestURL(path string) (*url.URL, error) {
|
||||
urlString := fmt.Sprintf("%s://%s%s", c.scheme, c.registry, path)
|
||||
res, err := url.Parse(urlString)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return res, nil
|
||||
}
|
||||
|
||||
// Checks if the auth headers in the response contain an indication of a failed
|
||||
// authorizdation because of an "insufficient_scope" error. If that's the case,
|
||||
// returns the required scope to be used for fetching a new token.
|
||||
@ -965,7 +975,14 @@ func (c *dockerClient) getBlob(ctx context.Context, ref dockerReference, info ty
|
||||
return nil, 0, fmt.Errorf("fetching blob: %w", err)
|
||||
}
|
||||
cache.RecordKnownLocation(ref.Transport(), bicTransportScope(ref), info.Digest, newBICLocationReference(ref))
|
||||
return res.Body, getBlobSize(res), nil
|
||||
blobSize := getBlobSize(res)
|
||||
|
||||
reconnectingReader, err := newBodyReader(ctx, c, path, res.Body)
|
||||
if err != nil {
|
||||
res.Body.Close()
|
||||
return nil, 0, err
|
||||
}
|
||||
return reconnectingReader, blobSize, nil
|
||||
}
|
||||
|
||||
// getOCIDescriptorContents returns the contents a blob spcified by descriptor in ref, which must fit within limit.
|
||||
|
2
vendor/github.com/containers/image/v5/version/version.go
generated
vendored
2
vendor/github.com/containers/image/v5/version/version.go
generated
vendored
@ -8,7 +8,7 @@ const (
|
||||
// VersionMinor is for functionality in a backwards-compatible manner
|
||||
VersionMinor = 24
|
||||
// VersionPatch is for backwards-compatible bug fixes
|
||||
VersionPatch = 0
|
||||
VersionPatch = 1
|
||||
|
||||
// VersionDev indicates development branch. Releases will be empty string.
|
||||
VersionDev = ""
|
||||
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -59,7 +59,7 @@ github.com/containers/common/pkg/flag
|
||||
github.com/containers/common/pkg/report
|
||||
github.com/containers/common/pkg/report/camelcase
|
||||
github.com/containers/common/pkg/retry
|
||||
# github.com/containers/image/v5 v5.24.0
|
||||
# github.com/containers/image/v5 v5.24.1
|
||||
## explicit; go 1.17
|
||||
github.com/containers/image/v5/copy
|
||||
github.com/containers/image/v5/directory
|
||||
|
Loading…
Reference in New Issue
Block a user