Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Aug 25, 2021

Bumps github.com/containers/image/v5 from 5.12.0 to 5.16.0.

Release notes

Sourced from github.com/containers/image/v5's releases.

v5.16.0

  • Don't cancel a mpb.Progress using a context
  • Don't recompress non-gzip data without an explicit request
  • accept identity tokens from credential helpers
  • Add codespell fixes
  • Don't initialize a digest.Canonical.Digester if it is not necessary
  • Don't compute the (compressed) digest in PutBlob if the caller provides it
  • Don't call digest.Digester.Hash() on every digeringReader.Read()
  • Pass OriginalDigest and UncompressedDigest to c/storage.Store.PutLayer
  • Document that PutBlob callers must only provide validated digests
  • Consistently compare docker.Digest with "" without Digest.String()
  • Don't unnecessarily compute the blob digest in PutBlob
  • copy.Options: semaphore to limit parallel pulls globally

v5.15.2

  • Bump c/storage to v1.34.1

v5.15.1

  • [release-5.15] v5.15.1
  • [release-5.15] Bump to v5.15.2-dev

v5.15.0

  • copy: move error message to debug
  • copy: drop FetchPartialBlobs option
  • Use http.Method* constants instead of hard-coded strings
  • Use http.NewRequestWithContext() instead of http.NewRequest().WithContext()
  • Note that this module requires Go 1.13
  • Don't unnecessarily strip schema:// and /path from registry on search
  • Don't build a map just to access one element
  • Prevent simultaneous compression and decompression
  • refactoring per PR comments
  • Add support for decompressing while copying to dir://
  • build(deps): bump github.com/containers/storage from 1.32.6 to 1.33.0
  • Return an actual error instead of nil when registry returns bad status code
  • Reduce the dependency of pkg/compression on c/storage/pkg/chunked
  • Update c/storage to v1.33.0
  • Use pkg/compression/types where possible
  • Add pkg/compression/types.*AlgorithmName constants
  • Don't change InternalUnstableUndocumentedMIMEQuestionMark of Xz
  • Fold the algorithm initializers
  • Refer to compression.Gzip instead of looking it up by name
  • Fix unpredictable outcome of compression.DetectCompression*
  • Use quay.io in docker unit tests instead of docker.io
  • Cirrus: Sync. skopeo test to skopeo repo.
  • Remove GetCredentials deprecation

v5.14.0

Add a case to TestNormalizedMIMEType
Add support for registry paths in auth.json
Add tests for copier.determineListConversion

... (truncated)

Commits
  • 3ed4f40 v5.16.0
  • 17bb73d Merge pull request #1359 from giuseppe/partial-support-200-ret-code
  • ea19c43 docker: convert fully body to partial requests
  • 9548c6c types: document GetBlobAt chunks assumption
  • d6f64a2 Fix build issues
  • 7ebb64a Merge pull request #1360 from rhatdan/vendor
  • 3edecab Vendor in containers/storage v1.35.0
  • 91c7fe7 Merge pull request #1356 from vrothberg/global-semaphore
  • c920363 copy.Options: semaphore to limit parallel pulls globaly
  • a50fcf2 Merge pull request #1357 from mtrmac/mpb
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/containers/image/v5](https://github.com/containers/image) from 5.12.0 to 5.16.0.
- [Release notes](https://github.com/containers/image/releases)
- [Commits](containers/image@v5.12.0...v5.16.0)

---
updated-dependencies:
- dependency-name: github.com/containers/image/v5
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Aug 25, 2021
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Oct 5, 2021

Superseded by #28.

@dependabot dependabot bot closed this Oct 5, 2021
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/containers/image/v5-5.16.0 branch October 5, 2021 21:45
ikaneshiro pushed a commit that referenced this pull request Oct 7, 2021
The real URI to which we are pushing is computed at a lower level, in
remote endpoint handling, than we have access to in the CLI newpair
code. At present it is only correct for the default keystore.

Remove the URI from the message, until we can address the issue by
having the CLI code able to know the true correct URI in all cases.

Fixes #4

See also #23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants