diff.go 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. package archive // import "github.com/docker/docker/pkg/archive"
  2. import (
  3. "archive/tar"
  4. "fmt"
  5. "io"
  6. "os"
  7. "path/filepath"
  8. "runtime"
  9. "strings"
  10. "github.com/docker/docker/pkg/pools"
  11. "github.com/docker/docker/pkg/system"
  12. "github.com/sirupsen/logrus"
  13. )
  14. // UnpackLayer unpack `layer` to a `dest`. The stream `layer` can be
  15. // compressed or uncompressed.
  16. // Returns the size in bytes of the contents of the layer.
  17. func UnpackLayer(dest string, layer io.Reader, options *TarOptions) (size int64, err error) {
  18. tr := tar.NewReader(layer)
  19. trBuf := pools.BufioReader32KPool.Get(tr)
  20. defer pools.BufioReader32KPool.Put(trBuf)
  21. var dirs []*tar.Header
  22. unpackedPaths := make(map[string]struct{})
  23. if options == nil {
  24. options = &TarOptions{}
  25. }
  26. if options.ExcludePatterns == nil {
  27. options.ExcludePatterns = []string{}
  28. }
  29. aufsTempdir := ""
  30. aufsHardlinks := make(map[string]*tar.Header)
  31. // Iterate through the files in the archive.
  32. for {
  33. hdr, err := tr.Next()
  34. if err == io.EOF {
  35. // end of tar archive
  36. break
  37. }
  38. if err != nil {
  39. return 0, err
  40. }
  41. size += hdr.Size
  42. // Normalize name, for safety and for a simple is-root check
  43. hdr.Name = filepath.Clean(hdr.Name)
  44. // Windows does not support filenames with colons in them. Ignore
  45. // these files. This is not a problem though (although it might
  46. // appear that it is). Let's suppose a client is running docker pull.
  47. // The daemon it points to is Windows. Would it make sense for the
  48. // client to be doing a docker pull Ubuntu for example (which has files
  49. // with colons in the name under /usr/share/man/man3)? No, absolutely
  50. // not as it would really only make sense that they were pulling a
  51. // Windows image. However, for development, it is necessary to be able
  52. // to pull Linux images which are in the repository.
  53. //
  54. // TODO Windows. Once the registry is aware of what images are Windows-
  55. // specific or Linux-specific, this warning should be changed to an error
  56. // to cater for the situation where someone does manage to upload a Linux
  57. // image but have it tagged as Windows inadvertently.
  58. if runtime.GOOS == "windows" {
  59. if strings.Contains(hdr.Name, ":") {
  60. logrus.Warnf("Windows: Ignoring %s (is this a Linux image?)", hdr.Name)
  61. continue
  62. }
  63. }
  64. // Note as these operations are platform specific, so must the slash be.
  65. if !strings.HasSuffix(hdr.Name, string(os.PathSeparator)) {
  66. // Not the root directory, ensure that the parent directory exists.
  67. // This happened in some tests where an image had a tarfile without any
  68. // parent directories.
  69. parent := filepath.Dir(hdr.Name)
  70. parentPath := filepath.Join(dest, parent)
  71. if _, err := os.Lstat(parentPath); err != nil && os.IsNotExist(err) {
  72. err = system.MkdirAll(parentPath, 0600)
  73. if err != nil {
  74. return 0, err
  75. }
  76. }
  77. }
  78. // Skip AUFS metadata dirs
  79. if strings.HasPrefix(hdr.Name, WhiteoutMetaPrefix) {
  80. // Regular files inside /.wh..wh.plnk can be used as hardlink targets
  81. // We don't want this directory, but we need the files in them so that
  82. // such hardlinks can be resolved.
  83. if strings.HasPrefix(hdr.Name, WhiteoutLinkDir) && hdr.Typeflag == tar.TypeReg {
  84. basename := filepath.Base(hdr.Name)
  85. aufsHardlinks[basename] = hdr
  86. if aufsTempdir == "" {
  87. if aufsTempdir, err = os.MkdirTemp("", "dockerplnk"); err != nil {
  88. return 0, err
  89. }
  90. defer os.RemoveAll(aufsTempdir)
  91. }
  92. if err := createTarFile(filepath.Join(aufsTempdir, basename), dest, hdr, tr, true, nil, options.InUserNS); err != nil {
  93. return 0, err
  94. }
  95. }
  96. if hdr.Name != WhiteoutOpaqueDir {
  97. continue
  98. }
  99. }
  100. //#nosec G305 -- The joined path is guarded against path traversal.
  101. path := filepath.Join(dest, hdr.Name)
  102. rel, err := filepath.Rel(dest, path)
  103. if err != nil {
  104. return 0, err
  105. }
  106. // Note as these operations are platform specific, so must the slash be.
  107. if strings.HasPrefix(rel, ".."+string(os.PathSeparator)) {
  108. return 0, breakoutError(fmt.Errorf("%q is outside of %q", hdr.Name, dest))
  109. }
  110. base := filepath.Base(path)
  111. if strings.HasPrefix(base, WhiteoutPrefix) {
  112. dir := filepath.Dir(path)
  113. if base == WhiteoutOpaqueDir {
  114. _, err := os.Lstat(dir)
  115. if err != nil {
  116. return 0, err
  117. }
  118. err = filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {
  119. if err != nil {
  120. if os.IsNotExist(err) {
  121. err = nil // parent was deleted
  122. }
  123. return err
  124. }
  125. if path == dir {
  126. return nil
  127. }
  128. if _, exists := unpackedPaths[path]; !exists {
  129. err := os.RemoveAll(path)
  130. return err
  131. }
  132. return nil
  133. })
  134. if err != nil {
  135. return 0, err
  136. }
  137. } else {
  138. originalBase := base[len(WhiteoutPrefix):]
  139. originalPath := filepath.Join(dir, originalBase)
  140. if err := os.RemoveAll(originalPath); err != nil {
  141. return 0, err
  142. }
  143. }
  144. } else {
  145. // If path exits we almost always just want to remove and replace it.
  146. // The only exception is when it is a directory *and* the file from
  147. // the layer is also a directory. Then we want to merge them (i.e.
  148. // just apply the metadata from the layer).
  149. if fi, err := os.Lstat(path); err == nil {
  150. if !(fi.IsDir() && hdr.Typeflag == tar.TypeDir) {
  151. if err := os.RemoveAll(path); err != nil {
  152. return 0, err
  153. }
  154. }
  155. }
  156. trBuf.Reset(tr)
  157. srcData := io.Reader(trBuf)
  158. srcHdr := hdr
  159. // Hard links into /.wh..wh.plnk don't work, as we don't extract that directory, so
  160. // we manually retarget these into the temporary files we extracted them into
  161. if hdr.Typeflag == tar.TypeLink && strings.HasPrefix(filepath.Clean(hdr.Linkname), WhiteoutLinkDir) {
  162. linkBasename := filepath.Base(hdr.Linkname)
  163. srcHdr = aufsHardlinks[linkBasename]
  164. if srcHdr == nil {
  165. return 0, fmt.Errorf("Invalid aufs hardlink")
  166. }
  167. tmpFile, err := os.Open(filepath.Join(aufsTempdir, linkBasename))
  168. if err != nil {
  169. return 0, err
  170. }
  171. defer tmpFile.Close()
  172. srcData = tmpFile
  173. }
  174. if err := remapIDs(options.IDMap, srcHdr); err != nil {
  175. return 0, err
  176. }
  177. if err := createTarFile(path, dest, srcHdr, srcData, !options.NoLchown, nil, options.InUserNS); err != nil {
  178. return 0, err
  179. }
  180. // Directory mtimes must be handled at the end to avoid further
  181. // file creation in them to modify the directory mtime
  182. if hdr.Typeflag == tar.TypeDir {
  183. dirs = append(dirs, hdr)
  184. }
  185. unpackedPaths[path] = struct{}{}
  186. }
  187. }
  188. for _, hdr := range dirs {
  189. //#nosec G305 -- The header was checked for path traversal before it was appended to the dirs slice.
  190. path := filepath.Join(dest, hdr.Name)
  191. if err := system.Chtimes(path, hdr.AccessTime, hdr.ModTime); err != nil {
  192. return 0, err
  193. }
  194. }
  195. return size, nil
  196. }
  197. // ApplyLayer parses a diff in the standard layer format from `layer`,
  198. // and applies it to the directory `dest`. The stream `layer` can be
  199. // compressed or uncompressed.
  200. // Returns the size in bytes of the contents of the layer.
  201. func ApplyLayer(dest string, layer io.Reader) (int64, error) {
  202. return applyLayerHandler(dest, layer, &TarOptions{}, true)
  203. }
  204. // ApplyUncompressedLayer parses a diff in the standard layer format from
  205. // `layer`, and applies it to the directory `dest`. The stream `layer`
  206. // can only be uncompressed.
  207. // Returns the size in bytes of the contents of the layer.
  208. func ApplyUncompressedLayer(dest string, layer io.Reader, options *TarOptions) (int64, error) {
  209. return applyLayerHandler(dest, layer, options, false)
  210. }
  211. // do the bulk load of ApplyLayer, but allow for not calling DecompressStream
  212. func applyLayerHandler(dest string, layer io.Reader, options *TarOptions, decompress bool) (int64, error) {
  213. dest = filepath.Clean(dest)
  214. // We need to be able to set any perms
  215. if runtime.GOOS != "windows" {
  216. oldmask, err := system.Umask(0)
  217. if err != nil {
  218. return 0, err
  219. }
  220. defer system.Umask(oldmask)
  221. }
  222. if decompress {
  223. decompLayer, err := DecompressStream(layer)
  224. if err != nil {
  225. return 0, err
  226. }
  227. defer decompLayer.Close()
  228. layer = decompLayer
  229. }
  230. return UnpackLayer(dest, layer, options)
  231. }