|
From 21f5154399fc33959a4f3c42e29cade6757015c9 Mon Sep 17 00:00:00 2001
|
|
From: Valentin Rothberg <rothberg@redhat.com>
|
|
Date: Tue, 5 Jan 2021 10:44:16 +0100
|
|
Subject: [PATCH] vendor containers/psgo@v1.5.2
|
|
|
|
Signed-off-by: Valentin Rothberg <rothberg@redhat.com>
|
|
---
|
|
go.mod | 2 +-
|
|
go.sum | 4 ++--
|
|
.../internal/capabilities/capabilities.go | 2 +-
|
|
.../containers/psgo/internal/dev/tty.go | 5 ++--
|
|
.../containers/psgo/internal/proc/status.go | 2 +-
|
|
.../psgo/internal/process/process.go | 4 ++--
|
|
vendor/github.com/containers/psgo/psgo.go | 24 +++++++++----------
|
|
vendor/modules.txt | 2 +-
|
|
8 files changed, 23 insertions(+), 22 deletions(-)
|
|
|
|
--- a/go.mod
|
|
+++ b/go.mod
|
|
@@ -14,7 +14,7 @@ require (
|
|
github.com/containers/common v0.29.0
|
|
github.com/containers/conmon v2.0.20+incompatible
|
|
github.com/containers/image/v5 v5.9.0
|
|
- github.com/containers/psgo v1.5.1
|
|
+ github.com/containers/psgo v1.5.2
|
|
github.com/containers/storage v1.24.1
|
|
github.com/coreos/go-systemd/v22 v22.1.0
|
|
github.com/cri-o/ocicni v0.2.1-0.20201102180012-75c612fda1a2
|
|
--- a/go.sum
|
|
+++ b/go.sum
|
|
@@ -109,8 +109,8 @@ github.com/containers/libtrust v0.0.0-20
|
|
github.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b/go.mod h1:9rfv8iPl1ZP7aqh9YA68wnZv2NUDbXdcdPHVz0pFbPY=
|
|
github.com/containers/ocicrypt v1.0.3 h1:vYgl+RZ9Q3DPMuTfxmN+qp0X2Bj52uuY2vnt6GzVe1c=
|
|
github.com/containers/ocicrypt v1.0.3/go.mod h1:CUBa+8MRNL/VkpxYIpaMtgn1WgXGyvPQj8jcy0EVG6g=
|
|
-github.com/containers/psgo v1.5.1 h1:MQNb7FLbXqBdqz6u4lI2QWizVz4RSTzs1+Nk9XT1iVA=
|
|
-github.com/containers/psgo v1.5.1/go.mod h1:2ubh0SsreMZjSXW1Hif58JrEcFudQyIy9EzPUWfawVU=
|
|
+github.com/containers/psgo v1.5.2 h1:3aoozst/GIwsrr/5jnFy3FrJay98uujPCu9lTuSZ/Cw=
|
|
+github.com/containers/psgo v1.5.2/go.mod h1:2ubh0SsreMZjSXW1Hif58JrEcFudQyIy9EzPUWfawVU=
|
|
github.com/containers/storage v1.23.6/go.mod h1:haFs0HRowKwyzvWEx9EgI3WsL8XCSnBDb5f8P5CAxJY=
|
|
github.com/containers/storage v1.23.7/go.mod h1:cUT2zHjtx+WlVri30obWmM2gpqpi8jfPsmIzP1TVpEI=
|
|
github.com/containers/storage v1.24.0 h1:Fo2LkF7tkMLmo38sTZ/G8wHjcn8JfUFPfyTxM4WwMfk=
|
|
--- a/vendor/github.com/containers/psgo/internal/capabilities/capabilities.go
|
|
+++ b/vendor/github.com/containers/psgo/internal/capabilities/capabilities.go
|
|
@@ -13,7 +13,7 @@
|
|
// limitations under the License.
|
|
|
|
// Package capabilities provides a mapping from common kernel bit masks to the
|
|
-// alphanumerical represenation of kernel capabilities. See capabilities(7)
|
|
+// alphanumerical representation of kernel capabilities. See capabilities(7)
|
|
// for additional information.
|
|
package capabilities
|
|
|
|
--- a/vendor/github.com/containers/psgo/internal/dev/tty.go
|
|
+++ b/vendor/github.com/containers/psgo/internal/dev/tty.go
|
|
@@ -113,8 +113,9 @@ func TTYs() (*[]TTY, error) {
|
|
}
|
|
s := fi.Sys().(*syscall.Stat_t)
|
|
t := TTY{
|
|
- Minor: minDevNum(s.Rdev),
|
|
- Major: majDevNum(s.Rdev),
|
|
+ // Rdev is type uint32 on mips arch so we have to cast to uint64
|
|
+ Minor: minDevNum(uint64(s.Rdev)),
|
|
+ Major: majDevNum(uint64(s.Rdev)),
|
|
Path: dev,
|
|
}
|
|
ttys = append(ttys, t)
|
|
--- a/vendor/github.com/containers/psgo/internal/proc/status.go
|
|
+++ b/vendor/github.com/containers/psgo/internal/proc/status.go
|
|
@@ -24,7 +24,7 @@ import (
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
-// Status is a direct translation of a `/proc/[pid]/status`, wich provides much
|
|
+// Status is a direct translation of a `/proc/[pid]/status`, which provides much
|
|
// of the information in /proc/[pid]/stat and /proc/[pid]/statm in a format
|
|
// that's easier for humans to parse.
|
|
type Status struct {
|
|
--- a/vendor/github.com/containers/psgo/internal/process/process.go
|
|
+++ b/vendor/github.com/containers/psgo/internal/process/process.go
|
|
@@ -31,9 +31,9 @@ type Process struct {
|
|
Pid string
|
|
// Stat contains data from /proc/$pid/stat.
|
|
Stat proc.Stat
|
|
- // Status containes data from /proc/$pid/status.
|
|
+ // Status contains data from /proc/$pid/status.
|
|
Status proc.Status
|
|
- // CmdLine containes data from /proc/$pid/cmdline.
|
|
+ // CmdLine contains data from /proc/$pid/cmdline.
|
|
CmdLine []string
|
|
// Label containers data from /proc/$pid/attr/current.
|
|
Label string
|
|
--- a/vendor/github.com/containers/psgo/psgo.go
|
|
+++ b/vendor/github.com/containers/psgo/psgo.go
|
|
@@ -482,7 +482,7 @@ func JoinNamespaceAndProcessInfoByPidsWi
|
|
// catch race conditions
|
|
continue
|
|
}
|
|
- return nil, errors.Wrapf(err, "error extracing PID namespace")
|
|
+ return nil, errors.Wrapf(err, "error extracting PID namespace")
|
|
}
|
|
if _, exists := nsMap[ns]; !exists {
|
|
nsMap[ns] = true
|
|
@@ -759,7 +759,7 @@ func processVSZ(p *process.Process, ctx
|
|
}
|
|
|
|
// parseCAP parses cap (a string bit mask) and returns the associated set of
|
|
-// capabilities. If all capabilties are set, "full" is returned. If no
|
|
+// capabilities. If all capabilities are set, "full" is returned. If no
|
|
// capability is enabled, "none" is returned.
|
|
func parseCAP(cap string) (string, error) {
|
|
mask, err := strconv.ParseUint(cap, 16, 64)
|
|
@@ -777,36 +777,36 @@ func parseCAP(cap string) (string, error
|
|
return strings.Join(caps, ","), nil
|
|
}
|
|
|
|
-// processCAPAMB returns the set of ambient capabilties associated with
|
|
-// process p. If all capabilties are set, "full" is returned. If no
|
|
+// processCAPAMB returns the set of ambient capabilities associated with
|
|
+// process p. If all capabilities are set, "full" is returned. If no
|
|
// capability is enabled, "none" is returned.
|
|
func processCAPAMB(p *process.Process, ctx *psContext) (string, error) {
|
|
return parseCAP(p.Status.CapAmb)
|
|
}
|
|
|
|
-// processCAPINH returns the set of inheritable capabilties associated with
|
|
-// process p. If all capabilties are set, "full" is returned. If no
|
|
+// processCAPINH returns the set of inheritable capabilities associated with
|
|
+// process p. If all capabilities are set, "full" is returned. If no
|
|
// capability is enabled, "none" is returned.
|
|
func processCAPINH(p *process.Process, ctx *psContext) (string, error) {
|
|
return parseCAP(p.Status.CapInh)
|
|
}
|
|
|
|
-// processCAPPRM returns the set of permitted capabilties associated with
|
|
-// process p. If all capabilties are set, "full" is returned. If no
|
|
+// processCAPPRM returns the set of permitted capabilities associated with
|
|
+// process p. If all capabilities are set, "full" is returned. If no
|
|
// capability is enabled, "none" is returned.
|
|
func processCAPPRM(p *process.Process, ctx *psContext) (string, error) {
|
|
return parseCAP(p.Status.CapPrm)
|
|
}
|
|
|
|
-// processCAPEFF returns the set of effective capabilties associated with
|
|
-// process p. If all capabilties are set, "full" is returned. If no
|
|
+// processCAPEFF returns the set of effective capabilities associated with
|
|
+// process p. If all capabilities are set, "full" is returned. If no
|
|
// capability is enabled, "none" is returned.
|
|
func processCAPEFF(p *process.Process, ctx *psContext) (string, error) {
|
|
return parseCAP(p.Status.CapEff)
|
|
}
|
|
|
|
-// processCAPBND returns the set of bounding capabilties associated with
|
|
-// process p. If all capabilties are set, "full" is returned. If no
|
|
+// processCAPBND returns the set of bounding capabilities associated with
|
|
+// process p. If all capabilities are set, "full" is returned. If no
|
|
// capability is enabled, "none" is returned.
|
|
func processCAPBND(p *process.Process, ctx *psContext) (string, error) {
|
|
return parseCAP(p.Status.CapBnd)
|
|
--- a/vendor/modules.txt
|
|
+++ b/vendor/modules.txt
|
|
@@ -160,7 +160,7 @@ github.com/containers/ocicrypt/keywrap/p
|
|
github.com/containers/ocicrypt/keywrap/pkcs7
|
|
github.com/containers/ocicrypt/spec
|
|
github.com/containers/ocicrypt/utils
|
|
-# github.com/containers/psgo v1.5.1
|
|
+# github.com/containers/psgo v1.5.2
|
|
github.com/containers/psgo
|
|
github.com/containers/psgo/internal/capabilities
|
|
github.com/containers/psgo/internal/cgroups
|