|
@@ -28,7 +28,7 @@ import (
|
|
|
"github.com/docker/docker/pkg/system"
|
|
|
refstore "github.com/docker/docker/reference"
|
|
|
"github.com/docker/docker/registry"
|
|
|
- "github.com/opencontainers/go-digest"
|
|
|
+ digest "github.com/opencontainers/go-digest"
|
|
|
"github.com/pkg/errors"
|
|
|
"github.com/sirupsen/logrus"
|
|
|
"golang.org/x/net/context"
|
|
@@ -435,7 +435,7 @@ func (p *v2Puller) pullV2Tag(ctx context.Context, ref reference.Named) (tagUpdat
|
|
|
return true, nil
|
|
|
}
|
|
|
|
|
|
-func (p *v2Puller) pullSchema1(ctx context.Context, ref reference.Named, unverifiedManifest *schema1.SignedManifest) (id digest.Digest, manifestDigest digest.Digest, err error) {
|
|
|
+func (p *v2Puller) pullSchema1(ctx context.Context, ref reference.Reference, unverifiedManifest *schema1.SignedManifest) (id digest.Digest, manifestDigest digest.Digest, err error) {
|
|
|
var verifiedManifest *schema1.Manifest
|
|
|
verifiedManifest, err = verifySchema1Manifest(unverifiedManifest, ref)
|
|
|
if err != nil {
|
|
@@ -838,7 +838,7 @@ func allowV1Fallback(err error) error {
|
|
|
return err
|
|
|
}
|
|
|
|
|
|
-func verifySchema1Manifest(signedManifest *schema1.SignedManifest, ref reference.Named) (m *schema1.Manifest, err error) {
|
|
|
+func verifySchema1Manifest(signedManifest *schema1.SignedManifest, ref reference.Reference) (m *schema1.Manifest, err error) {
|
|
|
// If pull by digest, then verify the manifest digest. NOTE: It is
|
|
|
// important to do this first, before any other content validation. If the
|
|
|
// digest cannot be verified, don't even bother with those other things.
|