open-vault/vendor/github.com/opencontainers/go-digest
Jeff Mitchell 9ebc57581d
Switch to go modules (#6585)
* Switch to go modules

* Make fmt
2019-04-13 03:44:06 -04:00
..
.mailmap Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
.pullapprove.yml Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
.travis.yml Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
algorithm.go Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
CONTRIBUTING.md Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
digest.go Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
digester.go Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
doc.go Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
LICENSE.code Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
LICENSE.docs Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
MAINTAINERS Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00
README.md Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
verifiers.go Re-add dockertest and fix up imports and update script (#4909) 2018-07-11 17:49:13 -04:00

go-digest

GoDoc Go Report Card Build Status

Common digest package used across the container ecosystem.

Please see the godoc for more information.

What is a digest?

A digest is just a hash.

The most common use case for a digest is to create a content identifier for use in Content Addressable Storage systems:

id := digest.FromBytes([]byte("my content"))

In the example above, the id can be used to uniquely identify the byte slice "my content". This allows two disparate applications to agree on a verifiable identifier without having to trust one another.

An identifying digest can be verified, as follows:

if id != digest.FromBytes([]byte("my content")) {
  return errors.New("the content has changed!")
}

A Verifier type can be used to handle cases where an io.Reader makes more sense:

rd := getContent()
verifier := id.Verifier()
io.Copy(verifier, rd)

if !verifier.Verified() {
  return errors.New("the content has changed!")
}

Using Merkle DAGs, this can power a rich, safe, content distribution system.

Usage

While the godoc is considered the best resource, a few important items need to be called out when using this package.

  1. Make sure to import the hash implementations into your application or the package will panic. You should have something like the following in the main (or other entrypoint) of your application:

    import (
        _ "crypto/sha256"
        _ "crypto/sha512"
    )
    

    This may seem inconvenient but it allows you replace the hash implementations with others, such as https://github.com/stevvooe/resumable.

  2. Even though digest.Digest may be assemable as a string, always verify your input with digest.Parse or use Digest.Validate when accepting untrusted input. While there are measures to avoid common problems, this will ensure you have valid digests in the rest of your application.

Stability

The Go API, at this stage, is considered stable, unless otherwise noted.

As always, before using a package export, read the godoc.

Contributing

This package is considered fairly complete. It has been in production in thousands (millions?) of deployments and is fairly battle-hardened. New additions will be met with skepticism. If you think there is a missing feature, please file a bug clearly describing the problem and the alternatives you tried before submitting a PR.

Reporting security issues

Please DO NOT file a public issue, instead send your report privately to security@opencontainers.org.

The maintainers take security seriously. If you discover a security issue, please bring it to their attention right away!

If you are reporting a security issue, do not create an issue or file a pull request on GitHub. Instead, disclose the issue responsibly by sending an email to security@opencontainers.org (which is inhabited only by the maintainers of the various OCI projects).

Copyright and license

Copyright © 2016 Docker, Inc. All rights reserved, except as follows. Code is released under the Apache 2.0 license. This README.md file and the CONTRIBUTING.md file are licensed under the Creative Commons Attribution 4.0 International License under the terms and conditions set forth in the file LICENSE.docs. You may obtain a duplicate copy of the same license, titled CC BY-SA 4.0, at http://creativecommons.org/licenses/by-sa/4.0/.