c8404e
From be1eb6f70fb40e45096b69aeb048d54c526a4a8f Mon Sep 17 00:00:00 2001
c8404e
From: Valentin Rothberg <rothberg@redhat.com>
c8404e
Date: Thu, 6 Feb 2020 09:49:15 +0100
c8404e
Subject: [PATCH] [1.11-rhel] update github.com/containers/image
c8404e
c8404e
Note that this includes fixes for
c8404e
https://access.redhat.com/security/cve/CVE-2020-1702.
c8404e
c8404e
Signed-off-by: Valentin Rothberg <rothberg@redhat.com>
c8404e
---
c8404e
 go.mod                                        |  2 +-
c8404e
 go.sum                                        |  2 +
c8404e
 .../image/v5/docker/docker_client.go          |  6 +-
c8404e
 .../image/v5/docker/docker_image_dest.go      |  3 +-
c8404e
 .../image/v5/docker/docker_image_src.go       | 10 ++--
c8404e
 .../image/v5/docker/tarfile/dest.go           |  3 +-
c8404e
 .../containers/image/v5/docker/tarfile/src.go |  9 +--
c8404e
 .../image/v5/image/docker_schema2.go          |  4 +-
c8404e
 .../containers/image/v5/image/oci.go          |  4 +-
c8404e
 .../image/v5/internal/iolimits/iolimits.go    | 60 +++++++++++++++++++
c8404e
 .../image/v5/openshift/openshift.go           |  4 +-
c8404e
 vendor/modules.txt                            |  3 +-
c8404e
 12 files changed, 89 insertions(+), 21 deletions(-)
c8404e
 create mode 100644 vendor/github.com/containers/image/v5/internal/iolimits/iolimits.go
c8404e
c8404e
diff --git a/go.mod b/go.mod
c8404e
index 684b00ff5..b94792238 100644
c8404e
--- a/go.mod
c8404e
+++ b/go.mod
c8404e
@@ -5,7 +5,7 @@ go 1.12
c8404e
 require (
c8404e
 	github.com/blang/semver v3.5.0+incompatible // indirect
c8404e
 	github.com/containernetworking/cni v0.7.1
c8404e
-	github.com/containers/image/v5 v5.0.0
c8404e
+	github.com/containers/image/v5 v5.0.1-0.20200205124631-82291c45f2b0
c8404e
 	github.com/containers/storage v1.14.0
c8404e
 	github.com/cyphar/filepath-securejoin v0.2.2
c8404e
 	github.com/docker/distribution v2.7.1+incompatible
c8404e
diff --git a/go.sum b/go.sum
c8404e
index 1cce3ff7e..ef8729952 100644
c8404e
--- a/go.sum
c8404e
+++ b/go.sum
c8404e
@@ -54,6 +54,8 @@ github.com/containers/image/v4 v4.0.1 h1:idNGHChj0Pyv3vLrxul2oSVMZLeFqpoq3CjLeVg
c8404e
 github.com/containers/image/v4 v4.0.1/go.mod h1:0ASJH1YgJiX/eqFZObqepgsvIA4XjCgpyfwn9pDGafA=
c8404e
 github.com/containers/image/v5 v5.0.0 h1:arnXgbt1ucsC/ndtSpiQY87rA0UjhF+/xQnPzqdBDn4=
c8404e
 github.com/containers/image/v5 v5.0.0/go.mod h1:MgiLzCfIeo8lrHi+4Lb8HP+rh513sm0Mlk6RrhjFOLY=
c8404e
+github.com/containers/image/v5 v5.0.1-0.20200205124631-82291c45f2b0 h1:iV4aHKRoPcHp5BISsuiPMyaCjGJfLKp/FUMAG1NeqvE=
c8404e
+github.com/containers/image/v5 v5.0.1-0.20200205124631-82291c45f2b0/go.mod h1:MgiLzCfIeo8lrHi+4Lb8HP+rh513sm0Mlk6RrhjFOLY=
c8404e
 github.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b h1:Q8ePgVfHDplZ7U33NwHZkrVELsZP5fYj9pM5WBZB2GE=
c8404e
 github.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b/go.mod h1:9rfv8iPl1ZP7aqh9YA68wnZv2NUDbXdcdPHVz0pFbPY=
c8404e
 github.com/containers/storage v1.13.4 h1:j0bBaJDKbUHtAW1MXPFnwXJtqcH+foWeuXK1YaBV5GA=
c8404e
diff --git a/vendor/github.com/containers/image/v5/docker/docker_client.go b/vendor/github.com/containers/image/v5/docker/docker_client.go
c8404e
index 0b012c703..bff077a40 100644
c8404e
--- a/vendor/github.com/containers/image/v5/docker/docker_client.go
c8404e
+++ b/vendor/github.com/containers/image/v5/docker/docker_client.go
c8404e
@@ -6,7 +6,6 @@ import (
c8404e
 	"encoding/json"
c8404e
 	"fmt"
c8404e
 	"io"
c8404e
-	"io/ioutil"
c8404e
 	"net/http"
c8404e
 	"net/url"
c8404e
 	"os"
c8404e
@@ -17,6 +16,7 @@ import (
c8404e
 	"time"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/pkg/docker/config"
c8404e
 	"github.com/containers/image/v5/pkg/sysregistriesv2"
c8404e
 	"github.com/containers/image/v5/pkg/tlsclientconfig"
c8404e
@@ -597,7 +597,7 @@ func (c *dockerClient) getBearerToken(ctx context.Context, challenge challenge,
c8404e
 	default:
c8404e
 		return nil, errors.Errorf("unexpected http code: %d (%s), URL: %s", res.StatusCode, http.StatusText(res.StatusCode), authReq.URL)
c8404e
 	}
c8404e
-	tokenBlob, err := ioutil.ReadAll(res.Body)
c8404e
+	tokenBlob, err := iolimits.ReadAtMost(res.Body, iolimits.MaxAuthTokenBodySize)
c8404e
 	if err != nil {
c8404e
 		return nil, err
c8404e
 	}
c8404e
@@ -690,7 +690,7 @@ func (c *dockerClient) getExtensionsSignatures(ctx context.Context, ref dockerRe
c8404e
 		return nil, errors.Wrapf(clientLib.HandleErrorResponse(res), "Error downloading signatures for %s in %s", manifestDigest, ref.ref.Name())
c8404e
 	}
c8404e
 
c8404e
-	body, err := ioutil.ReadAll(res.Body)
c8404e
+	body, err := iolimits.ReadAtMost(res.Body, iolimits.MaxSignatureListBodySize)
c8404e
 	if err != nil {
c8404e
 		return nil, err
c8404e
 	}
c8404e
diff --git a/vendor/github.com/containers/image/v5/docker/docker_image_dest.go b/vendor/github.com/containers/image/v5/docker/docker_image_dest.go
c8404e
index 417d97aec..ce8a1f357 100644
c8404e
--- a/vendor/github.com/containers/image/v5/docker/docker_image_dest.go
c8404e
+++ b/vendor/github.com/containers/image/v5/docker/docker_image_dest.go
c8404e
@@ -15,6 +15,7 @@ import (
c8404e
 	"strings"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/pkg/blobinfocache/none"
c8404e
 	"github.com/containers/image/v5/types"
c8404e
@@ -620,7 +621,7 @@ sigExists:
c8404e
 		}
c8404e
 		defer res.Body.Close()
c8404e
 		if res.StatusCode != http.StatusCreated {
c8404e
-			body, err := ioutil.ReadAll(res.Body)
c8404e
+			body, err := iolimits.ReadAtMost(res.Body, iolimits.MaxErrorBodySize)
c8404e
 			if err == nil {
c8404e
 				logrus.Debugf("Error body %s", string(body))
c8404e
 			}
c8404e
diff --git a/vendor/github.com/containers/image/v5/docker/docker_image_src.go b/vendor/github.com/containers/image/v5/docker/docker_image_src.go
c8404e
index 35beb30e5..5436d9b7d 100644
c8404e
--- a/vendor/github.com/containers/image/v5/docker/docker_image_src.go
c8404e
+++ b/vendor/github.com/containers/image/v5/docker/docker_image_src.go
c8404e
@@ -12,6 +12,7 @@ import (
c8404e
 	"strconv"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/pkg/sysregistriesv2"
c8404e
 	"github.com/containers/image/v5/types"
c8404e
@@ -156,7 +157,8 @@ func (s *dockerImageSource) fetchManifest(ctx context.Context, tagOrDigest strin
c8404e
 	if res.StatusCode != http.StatusOK {
c8404e
 		return nil, "", errors.Wrapf(client.HandleErrorResponse(res), "Error reading manifest %s in %s", tagOrDigest, s.ref.ref.Name())
c8404e
 	}
c8404e
-	manblob, err := ioutil.ReadAll(res.Body)
c8404e
+
c8404e
+	manblob, err := iolimits.ReadAtMost(res.Body, iolimits.MaxManifestBodySize)
c8404e
 	if err != nil {
c8404e
 		return nil, "", err
c8404e
 	}
c8404e
@@ -342,7 +344,7 @@ func (s *dockerImageSource) getOneSignature(ctx context.Context, url *url.URL) (
c8404e
 		} else if res.StatusCode != http.StatusOK {
c8404e
 			return nil, false, errors.Errorf("Error reading signature from %s: status %d (%s)", url.String(), res.StatusCode, http.StatusText(res.StatusCode))
c8404e
 		}
c8404e
-		sig, err := ioutil.ReadAll(res.Body)
c8404e
+		sig, err := iolimits.ReadAtMost(res.Body, iolimits.MaxSignatureBodySize)
c8404e
 		if err != nil {
c8404e
 			return nil, false, err
c8404e
 		}
c8404e
@@ -401,7 +403,7 @@ func deleteImage(ctx context.Context, sys *types.SystemContext, ref dockerRefere
c8404e
 		return err
c8404e
 	}
c8404e
 	defer get.Body.Close()
c8404e
-	manifestBody, err := ioutil.ReadAll(get.Body)
c8404e
+	manifestBody, err := iolimits.ReadAtMost(get.Body, iolimits.MaxManifestBodySize)
c8404e
 	if err != nil {
c8404e
 		return err
c8404e
 	}
c8404e
@@ -424,7 +426,7 @@ func deleteImage(ctx context.Context, sys *types.SystemContext, ref dockerRefere
c8404e
 	}
c8404e
 	defer delete.Body.Close()
c8404e
 
c8404e
-	body, err := ioutil.ReadAll(delete.Body)
c8404e
+	body, err := iolimits.ReadAtMost(delete.Body, iolimits.MaxErrorBodySize)
c8404e
 	if err != nil {
c8404e
 		return err
c8404e
 	}
c8404e
diff --git a/vendor/github.com/containers/image/v5/docker/tarfile/dest.go b/vendor/github.com/containers/image/v5/docker/tarfile/dest.go
c8404e
index b02c60bb3..9748ca112 100644
c8404e
--- a/vendor/github.com/containers/image/v5/docker/tarfile/dest.go
c8404e
+++ b/vendor/github.com/containers/image/v5/docker/tarfile/dest.go
c8404e
@@ -13,6 +13,7 @@ import (
c8404e
 	"time"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/internal/tmpdir"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/types"
c8404e
@@ -135,7 +136,7 @@ func (d *Destination) PutBlob(ctx context.Context, stream io.Reader, inputInfo t
c8404e
 	}
c8404e
 
c8404e
 	if isConfig {
c8404e
-		buf, err := ioutil.ReadAll(stream)
c8404e
+		buf, err := iolimits.ReadAtMost(stream, iolimits.MaxConfigBodySize)
c8404e
 		if err != nil {
c8404e
 			return types.BlobInfo{}, errors.Wrap(err, "Error reading Config file stream")
c8404e
 		}
c8404e
diff --git a/vendor/github.com/containers/image/v5/docker/tarfile/src.go b/vendor/github.com/containers/image/v5/docker/tarfile/src.go
c8404e
index ad0a3d2cb..bbf604da6 100644
c8404e
--- a/vendor/github.com/containers/image/v5/docker/tarfile/src.go
c8404e
+++ b/vendor/github.com/containers/image/v5/docker/tarfile/src.go
c8404e
@@ -11,6 +11,7 @@ import (
c8404e
 	"path"
c8404e
 	"sync"
c8404e
 
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/internal/tmpdir"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/pkg/compression"
c8404e
@@ -187,13 +188,13 @@ func findTarComponent(inputFile io.Reader, path string) (*tar.Reader, *tar.Heade
c8404e
 }
c8404e
 
c8404e
 // readTarComponent returns full contents of componentPath.
c8404e
-func (s *Source) readTarComponent(path string) ([]byte, error) {
c8404e
+func (s *Source) readTarComponent(path string, limit int) ([]byte, error) {
c8404e
 	file, err := s.openTarComponent(path)
c8404e
 	if err != nil {
c8404e
 		return nil, errors.Wrapf(err, "Error loading tar component %s", path)
c8404e
 	}
c8404e
 	defer file.Close()
c8404e
-	bytes, err := ioutil.ReadAll(file)
c8404e
+	bytes, err := iolimits.ReadAtMost(file, limit)
c8404e
 	if err != nil {
c8404e
 		return nil, err
c8404e
 	}
c8404e
@@ -224,7 +225,7 @@ func (s *Source) ensureCachedDataIsPresentPrivate() error {
c8404e
 	}
c8404e
 
c8404e
 	// Read and parse config.
c8404e
-	configBytes, err := s.readTarComponent(tarManifest[0].Config)
c8404e
+	configBytes, err := s.readTarComponent(tarManifest[0].Config, iolimits.MaxConfigBodySize)
c8404e
 	if err != nil {
c8404e
 		return err
c8404e
 	}
c8404e
@@ -250,7 +251,7 @@ func (s *Source) ensureCachedDataIsPresentPrivate() error {
c8404e
 // loadTarManifest loads and decodes the manifest.json.
c8404e
 func (s *Source) loadTarManifest() ([]ManifestItem, error) {
c8404e
 	// FIXME? Do we need to deal with the legacy format?
c8404e
-	bytes, err := s.readTarComponent(manifestFileName)
c8404e
+	bytes, err := s.readTarComponent(manifestFileName, iolimits.MaxTarFileManifestSize)
c8404e
 	if err != nil {
c8404e
 		return nil, err
c8404e
 	}
c8404e
diff --git a/vendor/github.com/containers/image/v5/image/docker_schema2.go b/vendor/github.com/containers/image/v5/image/docker_schema2.go
c8404e
index 254c13f78..29c5047d7 100644
c8404e
--- a/vendor/github.com/containers/image/v5/image/docker_schema2.go
c8404e
+++ b/vendor/github.com/containers/image/v5/image/docker_schema2.go
c8404e
@@ -7,10 +7,10 @@ import (
c8404e
 	"encoding/hex"
c8404e
 	"encoding/json"
c8404e
 	"fmt"
c8404e
-	"io/ioutil"
c8404e
 	"strings"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/pkg/blobinfocache/none"
c8404e
 	"github.com/containers/image/v5/types"
c8404e
@@ -102,7 +102,7 @@ func (m *manifestSchema2) ConfigBlob(ctx context.Context) ([]byte, error) {
c8404e
 			return nil, err
c8404e
 		}
c8404e
 		defer stream.Close()
c8404e
-		blob, err := ioutil.ReadAll(stream)
c8404e
+		blob, err := iolimits.ReadAtMost(stream, iolimits.MaxConfigBodySize)
c8404e
 		if err != nil {
c8404e
 			return nil, err
c8404e
 		}
c8404e
diff --git a/vendor/github.com/containers/image/v5/image/oci.go b/vendor/github.com/containers/image/v5/image/oci.go
c8404e
index 18a38d463..406da262f 100644
c8404e
--- a/vendor/github.com/containers/image/v5/image/oci.go
c8404e
+++ b/vendor/github.com/containers/image/v5/image/oci.go
c8404e
@@ -4,9 +4,9 @@ import (
c8404e
 	"context"
c8404e
 	"encoding/json"
c8404e
 	"fmt"
c8404e
-	"io/ioutil"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/pkg/blobinfocache/none"
c8404e
 	"github.com/containers/image/v5/types"
c8404e
@@ -67,7 +67,7 @@ func (m *manifestOCI1) ConfigBlob(ctx context.Context) ([]byte, error) {
c8404e
 			return nil, err
c8404e
 		}
c8404e
 		defer stream.Close()
c8404e
-		blob, err := ioutil.ReadAll(stream)
c8404e
+		blob, err := iolimits.ReadAtMost(stream, iolimits.MaxConfigBodySize)
c8404e
 		if err != nil {
c8404e
 			return nil, err
c8404e
 		}
c8404e
diff --git a/vendor/github.com/containers/image/v5/internal/iolimits/iolimits.go b/vendor/github.com/containers/image/v5/internal/iolimits/iolimits.go
c8404e
new file mode 100644
c8404e
index 000000000..3fed1995c
c8404e
--- /dev/null
c8404e
+++ b/vendor/github.com/containers/image/v5/internal/iolimits/iolimits.go
c8404e
@@ -0,0 +1,60 @@
c8404e
+package iolimits
c8404e
+
c8404e
+import (
c8404e
+	"io"
c8404e
+	"io/ioutil"
c8404e
+
c8404e
+	"github.com/pkg/errors"
c8404e
+)
c8404e
+
c8404e
+// All constants below are intended to be used as limits for `ReadAtMost`. The
c8404e
+// immediate use-case for limiting the size of in-memory copied data is to
c8404e
+// protect against OOM DOS attacks as described inCVE-2020-1702. Instead of
c8404e
+// copying data until running out of memory, we error out after hitting the
c8404e
+// specified limit.
c8404e
+const (
c8404e
+	// megaByte denotes one megabyte and is intended to be used as a limit in
c8404e
+	// `ReadAtMost`.
c8404e
+	megaByte = 1 << 20
c8404e
+	// MaxManifestBodySize is the maximum allowed size of a manifest. The limit
c8404e
+	// of 4 MB aligns with the one of a Docker registry:
c8404e
+	// https://github.com/docker/distribution/blob/a8371794149d1d95f1e846744b05c87f2f825e5a/registry/handlers/manifests.go#L30
c8404e
+	MaxManifestBodySize = 4 * megaByte
c8404e
+	// MaxAuthTokenBodySize is the maximum allowed size of an auth token.
c8404e
+	// The limit of 1 MB is considered to be greatly sufficient.
c8404e
+	MaxAuthTokenBodySize = megaByte
c8404e
+	// MaxSignatureListBodySize is the maximum allowed size of a signature list.
c8404e
+	// The limit of 4 MB is considered to be greatly sufficient.
c8404e
+	MaxSignatureListBodySize = 4 * megaByte
c8404e
+	// MaxSignatureBodySize is the maximum allowed size of a signature.
c8404e
+	// The limit of 4 MB is considered to be greatly sufficient.
c8404e
+	MaxSignatureBodySize = 4 * megaByte
c8404e
+	// MaxErrorBodySize is the maximum allowed size of an error-response body.
c8404e
+	// The limit of 1 MB is considered to be greatly sufficient.
c8404e
+	MaxErrorBodySize = megaByte
c8404e
+	// MaxConfigBodySize is the maximum allowed size of a config blob.
c8404e
+	// The limit of 4 MB is considered to be greatly sufficient.
c8404e
+	MaxConfigBodySize = 4 * megaByte
c8404e
+	// MaxOpenShiftStatusBody is the maximum allowed size of an OpenShift status body.
c8404e
+	// The limit of 4 MB is considered to be greatly sufficient.
c8404e
+	MaxOpenShiftStatusBody = 4 * megaByte
c8404e
+	// MaxTarFileManifestSize is the maximum allowed size of a (docker save)-like manifest (which may contain multiple images)
c8404e
+	// The limit of 1 MB is considered to be greatly sufficient.
c8404e
+	MaxTarFileManifestSize = megaByte
c8404e
+)
c8404e
+
c8404e
+// ReadAtMost reads from reader and errors out if the specified limit (in bytes) is exceeded.
c8404e
+func ReadAtMost(reader io.Reader, limit int) ([]byte, error) {
c8404e
+	limitedReader := io.LimitReader(reader, int64(limit+1))
c8404e
+
c8404e
+	res, err := ioutil.ReadAll(limitedReader)
c8404e
+	if err != nil {
c8404e
+		return nil, err
c8404e
+	}
c8404e
+
c8404e
+	if len(res) > limit {
c8404e
+		return nil, errors.Errorf("exceeded maximum allowed size of %d bytes", limit)
c8404e
+	}
c8404e
+
c8404e
+	return res, nil
c8404e
+}
c8404e
diff --git a/vendor/github.com/containers/image/v5/openshift/openshift.go b/vendor/github.com/containers/image/v5/openshift/openshift.go
c8404e
index 016de4803..c37e1b751 100644
c8404e
--- a/vendor/github.com/containers/image/v5/openshift/openshift.go
c8404e
+++ b/vendor/github.com/containers/image/v5/openshift/openshift.go
c8404e
@@ -7,13 +7,13 @@ import (
c8404e
 	"encoding/json"
c8404e
 	"fmt"
c8404e
 	"io"
c8404e
-	"io/ioutil"
c8404e
 	"net/http"
c8404e
 	"net/url"
c8404e
 	"strings"
c8404e
 
c8404e
 	"github.com/containers/image/v5/docker"
c8404e
 	"github.com/containers/image/v5/docker/reference"
c8404e
+	"github.com/containers/image/v5/internal/iolimits"
c8404e
 	"github.com/containers/image/v5/manifest"
c8404e
 	"github.com/containers/image/v5/types"
c8404e
 	"github.com/containers/image/v5/version"
c8404e
@@ -102,7 +102,7 @@ func (c *openshiftClient) doRequest(ctx context.Context, method, path string, re
c8404e
 		return nil, err
c8404e
 	}
c8404e
 	defer res.Body.Close()
c8404e
-	body, err := ioutil.ReadAll(res.Body)
c8404e
+	body, err := iolimits.ReadAtMost(res.Body, iolimits.MaxOpenShiftStatusBody)
c8404e
 	if err != nil {
c8404e
 		return nil, err
c8404e
 	}
c8404e
diff --git a/vendor/modules.txt b/vendor/modules.txt
c8404e
index 840dae067..3f72f3f34 100644
c8404e
--- a/vendor/modules.txt
c8404e
+++ b/vendor/modules.txt
c8404e
@@ -48,7 +48,7 @@ github.com/containernetworking/cni/pkg/types
c8404e
 github.com/containernetworking/cni/pkg/types/020
c8404e
 github.com/containernetworking/cni/pkg/types/current
c8404e
 github.com/containernetworking/cni/pkg/version
c8404e
-# github.com/containers/image/v5 v5.0.0
c8404e
+# github.com/containers/image/v5 v5.0.1-0.20200205124631-82291c45f2b0
c8404e
 github.com/containers/image/v5/copy
c8404e
 github.com/containers/image/v5/directory
c8404e
 github.com/containers/image/v5/directory/explicitfilepath
c8404e
@@ -59,6 +59,7 @@ github.com/containers/image/v5/docker/policyconfiguration
c8404e
 github.com/containers/image/v5/docker/reference
c8404e
 github.com/containers/image/v5/docker/tarfile
c8404e
 github.com/containers/image/v5/image
c8404e
+github.com/containers/image/v5/internal/iolimits
c8404e
 github.com/containers/image/v5/internal/pkg/keyctl
c8404e
 github.com/containers/image/v5/internal/tmpdir
c8404e
 github.com/containers/image/v5/manifest