summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSebastiaan van Stijn <github@gone.nl>2022-11-08 16:42:13 +0100
committerSebastiaan van Stijn <github@gone.nl>2022-11-08 16:42:13 +0100
commit0f7c9cd27e37bab1a89f3b341ef7e88e09a3fb97 (patch)
tree87825511bacf363681aa42aac8061f1d6a9eb39a
parent4f3c5b2568c28a4e0fd1b69ec6f2e0a0715d8cf5 (diff)
downloaddocker-0f7c9cd27e37bab1a89f3b341ef7e88e09a3fb97.tar.gz
Remove uses of deprecated go-digest.NewDigestFromHex, go-digest.Digest.Hex
Both of these were deprecated in https://github.com/opencontainers/go-digest/commit/55f675811a1b915549933c64571fd86b2676ba76, but the format of the GoDoc comments didn't follow the correct format, which caused them not being picked up by tools as "deprecated". This patch updates uses in the codebase to use the alternatives. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
-rw-r--r--builder/remotecontext/tarsum.go2
-rw-r--r--daemon/images/image_prune.go2
-rw-r--r--distribution/metadata/v2_metadata_service.go4
-rw-r--r--image/fs.go6
-rw-r--r--image/fs_test.go4
-rw-r--r--image/store_test.go4
-rw-r--r--image/tarexport/save.go10
-rw-r--r--integration-cli/docker_cli_pull_local_test.go2
-rw-r--r--integration-cli/docker_cli_save_load_test.go4
-rw-r--r--layer/filestore.go4
-rw-r--r--layer/layer_store.go2
-rw-r--r--layer/layer_test.go4
-rw-r--r--testutil/registry/registry.go2
13 files changed, 25 insertions, 25 deletions
diff --git a/builder/remotecontext/tarsum.go b/builder/remotecontext/tarsum.go
index 566c03c967..b2bd8d9c3f 100644
--- a/builder/remotecontext/tarsum.go
+++ b/builder/remotecontext/tarsum.go
@@ -109,7 +109,7 @@ func (cs *CachableSource) HandleChange(kind fsutil.ChangeKind, p string, fi os.F
}
hfi := &fileInfo{
- sum: h.Digest().Hex(),
+ sum: h.Digest().Encoded(),
}
cs.txn.Insert([]byte(p), hfi)
cs.mu.Unlock()
diff --git a/daemon/images/image_prune.go b/daemon/images/image_prune.go
index d3c4608f72..0e4e22f22b 100644
--- a/daemon/images/image_prune.go
+++ b/daemon/images/image_prune.go
@@ -127,7 +127,7 @@ deleteImagesLoop:
}
}
} else {
- hex := id.Digest().Hex()
+ hex := id.Digest().Encoded()
imgDel, err := i.ImageDelete(ctx, hex, false, true)
if imageDeleteFailed(hex, err) {
continue
diff --git a/distribution/metadata/v2_metadata_service.go b/distribution/metadata/v2_metadata_service.go
index e81c99e8dd..bdb72da157 100644
--- a/distribution/metadata/v2_metadata_service.go
+++ b/distribution/metadata/v2_metadata_service.go
@@ -117,11 +117,11 @@ func (serv *v2MetadataService) digestNamespace() string {
}
func (serv *v2MetadataService) diffIDKey(diffID layer.DiffID) string {
- return string(digest.Digest(diffID).Algorithm()) + "/" + digest.Digest(diffID).Hex()
+ return string(digest.Digest(diffID).Algorithm()) + "/" + digest.Digest(diffID).Encoded()
}
func (serv *v2MetadataService) digestKey(dgst digest.Digest) string {
- return string(dgst.Algorithm()) + "/" + dgst.Hex()
+ return string(dgst.Algorithm()) + "/" + dgst.Encoded()
}
// GetMetadata finds the metadata associated with a layer DiffID.
diff --git a/image/fs.go b/image/fs.go
index 9bb99c3b46..57109efeee 100644
--- a/image/fs.go
+++ b/image/fs.go
@@ -56,11 +56,11 @@ func newFSStore(root string) (*fs, error) {
}
func (s *fs) contentFile(dgst digest.Digest) string {
- return filepath.Join(s.root, contentDirName, string(dgst.Algorithm()), dgst.Hex())
+ return filepath.Join(s.root, contentDirName, string(dgst.Algorithm()), dgst.Encoded())
}
func (s *fs) metadataDir(dgst digest.Digest) string {
- return filepath.Join(s.root, metadataDirName, string(dgst.Algorithm()), dgst.Hex())
+ return filepath.Join(s.root, metadataDirName, string(dgst.Algorithm()), dgst.Encoded())
}
// Walk calls the supplied callback for each image ID in the storage backend.
@@ -73,7 +73,7 @@ func (s *fs) Walk(f DigestWalkFunc) error {
return err
}
for _, v := range dir {
- dgst := digest.NewDigestFromHex(string(digest.Canonical), v.Name())
+ dgst := digest.NewDigestFromEncoded(digest.Canonical, v.Name())
if err := dgst.Validate(); err != nil {
logrus.Debugf("skipping invalid digest %s: %s", dgst, err)
continue
diff --git a/image/fs_test.go b/image/fs_test.go
index 5db5c060d4..f4bb19857d 100644
--- a/image/fs_test.go
+++ b/image/fs_test.go
@@ -31,7 +31,7 @@ func TestFSGetInvalidData(t *testing.T) {
dgst, err := store.Set([]byte("foobar"))
assert.Check(t, err)
- err = os.WriteFile(filepath.Join(store.(*fs).root, contentDirName, string(dgst.Algorithm()), dgst.Hex()), []byte("foobar2"), 0600)
+ err = os.WriteFile(filepath.Join(store.(*fs).root, contentDirName, string(dgst.Algorithm()), dgst.Encoded()), []byte("foobar2"), 0o600)
assert.Check(t, err)
_, err = store.Get(dgst)
@@ -43,7 +43,7 @@ func TestFSInvalidSet(t *testing.T) {
defer cleanup()
id := digest.FromBytes([]byte("foobar"))
- err := os.Mkdir(filepath.Join(store.(*fs).root, contentDirName, string(id.Algorithm()), id.Hex()), 0700)
+ err := os.Mkdir(filepath.Join(store.(*fs).root, contentDirName, string(id.Algorithm()), id.Encoded()), 0o700)
assert.Check(t, err)
_, err = store.Set([]byte("foobar"))
diff --git a/image/store_test.go b/image/store_test.go
index 64a01f23e9..22f2618475 100644
--- a/image/store_test.go
+++ b/image/store_test.go
@@ -64,11 +64,11 @@ func TestRestore(t *testing.T) {
assert.NilError(t, err)
assert.Check(t, is.Equal(ID(id1), sid1))
- sid1, err = imgStore.Search(id1.Hex()[:6])
+ sid1, err = imgStore.Search(id1.Encoded()[:6])
assert.NilError(t, err)
assert.Check(t, is.Equal(ID(id1), sid1))
- invalidPattern := id1.Hex()[1:6]
+ invalidPattern := id1.Encoded()[1:6]
_, err = imgStore.Search(invalidPattern)
assert.ErrorContains(t, err, "No such image")
}
diff --git a/image/tarexport/save.go b/image/tarexport/save.go
index c07d7c983c..a3a0725365 100644
--- a/image/tarexport/save.go
+++ b/image/tarexport/save.go
@@ -216,7 +216,7 @@ func (s *saveSession) save(outStream io.Writer) error {
}
manifest = append(manifest, manifestItem{
- Config: id.Digest().Hex() + ".json",
+ Config: id.Digest().Encoded() + ".json",
RepoTags: repoTags,
Layers: layers,
LayerSources: foreignSrcs,
@@ -304,9 +304,9 @@ func (s *saveSession) saveImage(id image.ID) (map[layer.DiffID]distribution.Desc
return nil, err
}
- v1Img.ID = v1ID.Hex()
+ v1Img.ID = v1ID.Encoded()
if parent != "" {
- v1Img.Parent = parent.Hex()
+ v1Img.Parent = parent.Encoded()
}
v1Img.OS = img.OS
@@ -324,8 +324,8 @@ func (s *saveSession) saveImage(id image.ID) (map[layer.DiffID]distribution.Desc
}
}
- configFile := filepath.Join(s.outDir, id.Digest().Hex()+".json")
- if err := os.WriteFile(configFile, img.RawJSON(), 0644); err != nil {
+ configFile := filepath.Join(s.outDir, id.Digest().Encoded()+".json")
+ if err := os.WriteFile(configFile, img.RawJSON(), 0o644); err != nil {
return nil, err
}
if err := system.Chtimes(configFile, img.Created, img.Created); err != nil {
diff --git a/integration-cli/docker_cli_pull_local_test.go b/integration-cli/docker_cli_pull_local_test.go
index d5c7383659..aa7852a275 100644
--- a/integration-cli/docker_cli_pull_local_test.go
+++ b/integration-cli/docker_cli_pull_local_test.go
@@ -323,7 +323,7 @@ func (s *DockerRegistrySuite) TestPullManifestList(c *testing.T) {
assert.NilError(c, err, "error marshalling manifest list")
manifestListDigest := digest.FromBytes(manifestListJSON)
- hexDigest := manifestListDigest.Hex()
+ hexDigest := manifestListDigest.Encoded()
registryV2Path := s.reg.Path()
diff --git a/integration-cli/docker_cli_save_load_test.go b/integration-cli/docker_cli_save_load_test.go
index 0f9e1d5255..e59283f004 100644
--- a/integration-cli/docker_cli_save_load_test.go
+++ b/integration-cli/docker_cli_save_load_test.go
@@ -123,7 +123,7 @@ func (s *DockerCLISaveLoadSuite) TestSaveCheckTimes(c *testing.T) {
out, err = RunCommandPipelineWithOutput(
exec.Command(dockerBinary, "save", repoName),
exec.Command("tar", "tv"),
- exec.Command("grep", "-E", fmt.Sprintf("%s %s", data[0].Created.Format(tarTvTimeFormat), digest.Digest(data[0].ID).Hex())))
+ exec.Command("grep", "-E", fmt.Sprintf("%s %s", data[0].Created.Format(tarTvTimeFormat), digest.Digest(data[0].ID).Encoded())))
assert.NilError(c, err, "failed to save repo with image ID and 'repositories' file: %s, %v", out, err)
}
@@ -258,7 +258,7 @@ func (s *DockerCLISaveLoadSuite) TestSaveRepoWithMultipleImages(c *testing.T) {
// prefixes are not in tar
for i := range expected {
- expected[i] = digest.Digest(expected[i]).Hex()
+ expected[i] = digest.Digest(expected[i]).Encoded()
}
sort.Strings(actual)
diff --git a/layer/filestore.go b/layer/filestore.go
index ce3a309d8d..f2465b3b04 100644
--- a/layer/filestore.go
+++ b/layer/filestore.go
@@ -49,7 +49,7 @@ func newFSMetadataStore(root string) (*fileMetadataStore, error) {
func (fms *fileMetadataStore) getLayerDirectory(layer ChainID) string {
dgst := digest.Digest(layer)
- return filepath.Join(fms.root, string(dgst.Algorithm()), dgst.Hex())
+ return filepath.Join(fms.root, string(dgst.Algorithm()), dgst.Encoded())
}
func (fms *fileMetadataStore) getLayerFilename(layer ChainID, filename string) string {
@@ -364,7 +364,7 @@ func (fms *fileMetadataStore) List() ([]ChainID, []string, error) {
for _, fi := range fileInfos {
if fi.IsDir() && fi.Name() != "mounts" {
- dgst := digest.NewDigestFromHex(string(algorithm), fi.Name())
+ dgst := digest.NewDigestFromEncoded(algorithm, fi.Name())
if err := dgst.Validate(); err != nil {
logrus.Debugf("Ignoring invalid digest %s:%s", algorithm, fi.Name())
} else {
diff --git a/layer/layer_store.go b/layer/layer_store.go
index 623d494012..342a885049 100644
--- a/layer/layer_store.go
+++ b/layer/layer_store.go
@@ -397,7 +397,7 @@ func (ls *layerStore) deleteLayer(layer *roLayer, metadata *Metadata) error {
var dir string
for {
dgst := digest.Digest(layer.chainID)
- tmpID := fmt.Sprintf("%s-%s-removing", dgst.Hex(), stringid.GenerateRandomID())
+ tmpID := fmt.Sprintf("%s-%s-removing", dgst.Encoded(), stringid.GenerateRandomID())
dir = filepath.Join(ls.store.root, string(dgst.Algorithm()), tmpID)
err := os.Rename(ls.store.getLayerDirectory(layer.chainID), dir)
if os.IsExist(err) {
diff --git a/layer/layer_test.go b/layer/layer_test.go
index 6161e48751..8eeb90f8df 100644
--- a/layer/layer_test.go
+++ b/layer/layer_test.go
@@ -717,13 +717,13 @@ func TestTarStreamVerification(t *testing.T) {
id2 := digest.Digest(layer2.ChainID())
// Replace tar data files
- src, err := os.Open(filepath.Join(tmpdir, id1.Algorithm().String(), id1.Hex(), "tar-split.json.gz"))
+ src, err := os.Open(filepath.Join(tmpdir, id1.Algorithm().String(), id1.Encoded(), "tar-split.json.gz"))
if err != nil {
t.Fatal(err)
}
defer src.Close()
- dst, err := os.Create(filepath.Join(tmpdir, id2.Algorithm().String(), id2.Hex(), "tar-split.json.gz"))
+ dst, err := os.Create(filepath.Join(tmpdir, id2.Algorithm().String(), id2.Encoded(), "tar-split.json.gz"))
if err != nil {
t.Fatal(err)
}
diff --git a/testutil/registry/registry.go b/testutil/registry/registry.go
index 5de61620c0..9213db2ba2 100644
--- a/testutil/registry/registry.go
+++ b/testutil/registry/registry.go
@@ -171,7 +171,7 @@ func (r *V2) Close() {
func (r *V2) getBlobFilename(blobDigest digest.Digest) string {
// Split the digest into its algorithm and hex components.
- dgstAlg, dgstHex := blobDigest.Algorithm(), blobDigest.Hex()
+ dgstAlg, dgstHex := blobDigest.Algorithm(), blobDigest.Encoded()
// The path to the target blob data looks something like:
// baseDir + "docker/registry/v2/blobs/sha256/a3/a3ed...46d4/data"