mirror of
https://github.com/containers/skopeo.git
synced 2025-09-19 00:46:17 +00:00
vendor: update containers/storage and containers/image
some tests I've done to try out the difference in performance: I am using a directory repository so to not depend on the network. User time (seconds): 39.40 System time (seconds): 6.83 Percent of CPU this job got: 121% Elapsed (wall clock) time (h:mm:ss or m:ss): 0:38.07 User time (seconds): 8.32 System time (seconds): 1.62 Percent of CPU this job got: 128% Elapsed (wall clock) time (h:mm:ss or m:ss): 0:07.72 User time (seconds): 42.68 System time (seconds): 6.64 Percent of CPU this job got: 162% Elapsed (wall clock) time (h:mm:ss or m:ss): 0:30.44 User time (seconds): 8.94 System time (seconds): 1.51 Percent of CPU this job got: 178% Elapsed (wall clock) time (h:mm:ss or m:ss): 0:05.85 Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
This commit is contained in:
2
vendor/github.com/containers/storage/drivers/devmapper/device_setup.go
generated
vendored
2
vendor/github.com/containers/storage/drivers/devmapper/device_setup.go
generated
vendored
@@ -26,7 +26,7 @@ type directLVMConfig struct {
|
||||
var (
|
||||
errThinpPercentMissing = errors.New("must set both `dm.thinp_percent` and `dm.thinp_metapercent` if either is specified")
|
||||
errThinpPercentTooBig = errors.New("combined `dm.thinp_percent` and `dm.thinp_metapercent` must not be greater than 100")
|
||||
errMissingSetupDevice = errors.New("must provide device path in `dm.setup_device` in order to configure direct-lvm")
|
||||
errMissingSetupDevice = errors.New("must provide device path in `dm.directlvm_device` in order to configure direct-lvm")
|
||||
)
|
||||
|
||||
func validateLVMConfig(cfg directLVMConfig) error {
|
||||
|
8
vendor/github.com/containers/storage/layers.go
generated
vendored
8
vendor/github.com/containers/storage/layers.go
generated
vendored
@@ -2,7 +2,6 @@ package storage
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"compress/gzip"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io"
|
||||
@@ -20,6 +19,7 @@ import (
|
||||
"github.com/containers/storage/pkg/stringid"
|
||||
"github.com/containers/storage/pkg/system"
|
||||
"github.com/containers/storage/pkg/truncindex"
|
||||
"github.com/klauspost/pgzip"
|
||||
digest "github.com/opencontainers/go-digest"
|
||||
"github.com/opencontainers/selinux/go-selinux/label"
|
||||
"github.com/pkg/errors"
|
||||
@@ -1055,7 +1055,7 @@ func (r *layerStore) Diff(from, to string, options *DiffOptions) (io.ReadCloser,
|
||||
}
|
||||
defer tsfile.Close()
|
||||
|
||||
decompressor, err := gzip.NewReader(tsfile)
|
||||
decompressor, err := pgzip.NewReader(tsfile)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@@ -1116,9 +1116,9 @@ func (r *layerStore) ApplyDiff(to string, diff io.Reader) (size int64, err error
|
||||
defragmented := io.TeeReader(io.MultiReader(bytes.NewBuffer(header[:n]), diff), compressedCounter)
|
||||
|
||||
tsdata := bytes.Buffer{}
|
||||
compressor, err := gzip.NewWriterLevel(&tsdata, gzip.BestSpeed)
|
||||
compressor, err := pgzip.NewWriterLevel(&tsdata, pgzip.BestSpeed)
|
||||
if err != nil {
|
||||
compressor = gzip.NewWriter(&tsdata)
|
||||
compressor = pgzip.NewWriter(&tsdata)
|
||||
}
|
||||
metadata := storage.NewJSONPacker(compressor)
|
||||
uncompressed, err := archive.DecompressStream(defragmented)
|
||||
|
9
vendor/github.com/containers/storage/pkg/archive/archive.go
generated
vendored
9
vendor/github.com/containers/storage/pkg/archive/archive.go
generated
vendored
@@ -5,7 +5,6 @@ import (
|
||||
"bufio"
|
||||
"bytes"
|
||||
"compress/bzip2"
|
||||
"compress/gzip"
|
||||
"fmt"
|
||||
"io"
|
||||
"io/ioutil"
|
||||
@@ -22,6 +21,7 @@ import (
|
||||
"github.com/containers/storage/pkg/pools"
|
||||
"github.com/containers/storage/pkg/promise"
|
||||
"github.com/containers/storage/pkg/system"
|
||||
gzip "github.com/klauspost/pgzip"
|
||||
rsystem "github.com/opencontainers/runc/libcontainer/system"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
@@ -499,6 +499,8 @@ func (ta *tarAppender) addTarFile(path, name string) error {
|
||||
hdr.Gid = ta.ChownOpts.GID
|
||||
}
|
||||
|
||||
maybeTruncateHeaderModTime(hdr)
|
||||
|
||||
if ta.WhiteoutConverter != nil {
|
||||
wo, err := ta.WhiteoutConverter.ConvertWrite(hdr, path, fi)
|
||||
if err != nil {
|
||||
@@ -640,11 +642,12 @@ func createTarFile(path, extractDir string, hdr *tar.Header, reader io.Reader, L
|
||||
var errors []string
|
||||
for key, value := range hdr.Xattrs {
|
||||
if err := system.Lsetxattr(path, key, []byte(value), 0); err != nil {
|
||||
if err == syscall.ENOTSUP {
|
||||
if err == syscall.ENOTSUP || (err == syscall.EPERM && inUserns) {
|
||||
// We ignore errors here because not all graphdrivers support
|
||||
// xattrs *cough* old versions of AUFS *cough*. However only
|
||||
// ENOTSUP should be emitted in that case, otherwise we still
|
||||
// bail.
|
||||
// bail. We also ignore EPERM errors if we are running in a
|
||||
// user namespace.
|
||||
errors = append(errors, err.Error())
|
||||
continue
|
||||
}
|
||||
|
11
vendor/github.com/containers/storage/pkg/archive/archive_110.go
generated
vendored
11
vendor/github.com/containers/storage/pkg/archive/archive_110.go
generated
vendored
@@ -4,8 +4,19 @@ package archive
|
||||
|
||||
import (
|
||||
"archive/tar"
|
||||
"time"
|
||||
)
|
||||
|
||||
func copyPassHeader(hdr *tar.Header) {
|
||||
hdr.Format = tar.FormatPAX
|
||||
}
|
||||
|
||||
func maybeTruncateHeaderModTime(hdr *tar.Header) {
|
||||
if hdr.Format == tar.FormatUnknown {
|
||||
// one of the first things archive/tar does is round this
|
||||
// value, possibly up, if the format isn't specified, while we
|
||||
// are much better equipped to handle truncation when scanning
|
||||
// for changes between source and an extracted copy of this
|
||||
hdr.ModTime = hdr.ModTime.Truncate(time.Second)
|
||||
}
|
||||
}
|
||||
|
3
vendor/github.com/containers/storage/pkg/archive/archive_19.go
generated
vendored
3
vendor/github.com/containers/storage/pkg/archive/archive_19.go
generated
vendored
@@ -8,3 +8,6 @@ import (
|
||||
|
||||
func copyPassHeader(hdr *tar.Header) {
|
||||
}
|
||||
|
||||
func maybeTruncateHeaderModTime(hdr *tar.Header) {
|
||||
}
|
||||
|
2
vendor/github.com/containers/storage/pkg/archive/archive_ffjson.go
generated
vendored
2
vendor/github.com/containers/storage/pkg/archive/archive_ffjson.go
generated
vendored
@@ -1,5 +1,5 @@
|
||||
// Code generated by ffjson <https://github.com/pquerna/ffjson>. DO NOT EDIT.
|
||||
// source: pkg/archive/archive.go
|
||||
// source: ./pkg/archive/archive.go
|
||||
|
||||
package archive
|
||||
|
||||
|
2
vendor/github.com/containers/storage/store.go
generated
vendored
2
vendor/github.com/containers/storage/store.go
generated
vendored
@@ -1070,7 +1070,7 @@ func (s *store) imageTopLayerForMapping(image *Image, ristore ROImageStore, read
|
||||
}
|
||||
mappedLayer, _, err := rlstore.Put("", parentLayer, nil, layer.MountLabel, nil, &layerOptions, false, nil, rc)
|
||||
if err != nil {
|
||||
return nil, errors.Wrapf(err, "error creating ID-mapped copy of layer %q", parentLayer.ID)
|
||||
return nil, errors.Wrapf(err, "error creating ID-mapped copy of layer %q", layer.ID)
|
||||
}
|
||||
if err = istore.addMappedTopLayer(image.ID, mappedLayer.ID); err != nil {
|
||||
if err2 := rlstore.Delete(mappedLayer.ID); err2 != nil {
|
||||
|
3
vendor/github.com/containers/storage/vendor.conf
generated
vendored
3
vendor/github.com/containers/storage/vendor.conf
generated
vendored
@@ -23,3 +23,6 @@ golang.org/x/net 7dcfb8076726a3fdd9353b6b8a1f1b6be6811bd6
|
||||
golang.org/x/sys 07c182904dbd53199946ba614a412c61d3c548f5
|
||||
gotest.tools master
|
||||
github.com/google/go-cmp master
|
||||
github.com/klauspost/pgzip v1.2.1
|
||||
github.com/klauspost/compress v1.4.1
|
||||
github.com/klauspost/cpuid v1.2.0
|
||||
|
Reference in New Issue
Block a user