backend_linux.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727
  1. // +build linux
  2. package plugin
  3. import (
  4. "archive/tar"
  5. "compress/gzip"
  6. "encoding/json"
  7. "fmt"
  8. "io"
  9. "io/ioutil"
  10. "net/http"
  11. "os"
  12. "path"
  13. "path/filepath"
  14. "strings"
  15. "github.com/Sirupsen/logrus"
  16. "github.com/docker/distribution/manifest/schema2"
  17. "github.com/docker/docker/api/types"
  18. "github.com/docker/docker/api/types/filters"
  19. "github.com/docker/docker/distribution"
  20. progressutils "github.com/docker/docker/distribution/utils"
  21. "github.com/docker/docker/distribution/xfer"
  22. "github.com/docker/docker/image"
  23. "github.com/docker/docker/layer"
  24. "github.com/docker/docker/pkg/chrootarchive"
  25. "github.com/docker/docker/pkg/pools"
  26. "github.com/docker/docker/pkg/progress"
  27. "github.com/docker/docker/plugin/v2"
  28. "github.com/docker/docker/reference"
  29. "github.com/opencontainers/go-digest"
  30. "github.com/pkg/errors"
  31. "golang.org/x/net/context"
  32. )
  33. var acceptedPluginFilterTags = map[string]bool{
  34. "enabled": true,
  35. "capability": true,
  36. }
  37. // Disable deactivates a plugin. This means resources (volumes, networks) cant use them.
  38. func (pm *Manager) Disable(refOrID string, config *types.PluginDisableConfig) error {
  39. p, err := pm.config.Store.GetV2Plugin(refOrID)
  40. if err != nil {
  41. return err
  42. }
  43. pm.mu.RLock()
  44. c := pm.cMap[p]
  45. pm.mu.RUnlock()
  46. if !config.ForceDisable && p.GetRefCount() > 0 {
  47. return fmt.Errorf("plugin %s is in use", p.Name())
  48. }
  49. if err := pm.disable(p, c); err != nil {
  50. return err
  51. }
  52. pm.config.LogPluginEvent(p.GetID(), refOrID, "disable")
  53. return nil
  54. }
  55. // Enable activates a plugin, which implies that they are ready to be used by containers.
  56. func (pm *Manager) Enable(refOrID string, config *types.PluginEnableConfig) error {
  57. p, err := pm.config.Store.GetV2Plugin(refOrID)
  58. if err != nil {
  59. return err
  60. }
  61. c := &controller{timeoutInSecs: config.Timeout}
  62. if err := pm.enable(p, c, false); err != nil {
  63. return err
  64. }
  65. pm.config.LogPluginEvent(p.GetID(), refOrID, "enable")
  66. return nil
  67. }
  68. // Inspect examines a plugin config
  69. func (pm *Manager) Inspect(refOrID string) (tp *types.Plugin, err error) {
  70. p, err := pm.config.Store.GetV2Plugin(refOrID)
  71. if err != nil {
  72. return nil, err
  73. }
  74. return &p.PluginObj, nil
  75. }
  76. func (pm *Manager) pull(ctx context.Context, ref reference.Named, config *distribution.ImagePullConfig, outStream io.Writer) error {
  77. if outStream != nil {
  78. // Include a buffer so that slow client connections don't affect
  79. // transfer performance.
  80. progressChan := make(chan progress.Progress, 100)
  81. writesDone := make(chan struct{})
  82. defer func() {
  83. close(progressChan)
  84. <-writesDone
  85. }()
  86. var cancelFunc context.CancelFunc
  87. ctx, cancelFunc = context.WithCancel(ctx)
  88. go func() {
  89. progressutils.WriteDistributionProgress(cancelFunc, outStream, progressChan)
  90. close(writesDone)
  91. }()
  92. config.ProgressOutput = progress.ChanOutput(progressChan)
  93. } else {
  94. config.ProgressOutput = progress.DiscardOutput()
  95. }
  96. return distribution.Pull(ctx, ref, config)
  97. }
  98. type tempConfigStore struct {
  99. config []byte
  100. configDigest digest.Digest
  101. }
  102. func (s *tempConfigStore) Put(c []byte) (digest.Digest, error) {
  103. dgst := digest.FromBytes(c)
  104. s.config = c
  105. s.configDigest = dgst
  106. return dgst, nil
  107. }
  108. func (s *tempConfigStore) Get(d digest.Digest) ([]byte, error) {
  109. if d != s.configDigest {
  110. return nil, fmt.Errorf("digest not found")
  111. }
  112. return s.config, nil
  113. }
  114. func (s *tempConfigStore) RootFSFromConfig(c []byte) (*image.RootFS, error) {
  115. return configToRootFS(c)
  116. }
  117. func computePrivileges(c types.PluginConfig) (types.PluginPrivileges, error) {
  118. var privileges types.PluginPrivileges
  119. if c.Network.Type != "null" && c.Network.Type != "bridge" && c.Network.Type != "" {
  120. privileges = append(privileges, types.PluginPrivilege{
  121. Name: "network",
  122. Description: "permissions to access a network",
  123. Value: []string{c.Network.Type},
  124. })
  125. }
  126. for _, mount := range c.Mounts {
  127. if mount.Source != nil {
  128. privileges = append(privileges, types.PluginPrivilege{
  129. Name: "mount",
  130. Description: "host path to mount",
  131. Value: []string{*mount.Source},
  132. })
  133. }
  134. }
  135. for _, device := range c.Linux.Devices {
  136. if device.Path != nil {
  137. privileges = append(privileges, types.PluginPrivilege{
  138. Name: "device",
  139. Description: "host device to access",
  140. Value: []string{*device.Path},
  141. })
  142. }
  143. }
  144. if c.Linux.AllowAllDevices {
  145. privileges = append(privileges, types.PluginPrivilege{
  146. Name: "allow-all-devices",
  147. Description: "allow 'rwm' access to all devices",
  148. Value: []string{"true"},
  149. })
  150. }
  151. if len(c.Linux.Capabilities) > 0 {
  152. privileges = append(privileges, types.PluginPrivilege{
  153. Name: "capabilities",
  154. Description: "list of additional capabilities required",
  155. Value: c.Linux.Capabilities,
  156. })
  157. }
  158. return privileges, nil
  159. }
  160. // Privileges pulls a plugin config and computes the privileges required to install it.
  161. func (pm *Manager) Privileges(ctx context.Context, ref reference.Named, metaHeader http.Header, authConfig *types.AuthConfig) (types.PluginPrivileges, error) {
  162. // create image store instance
  163. cs := &tempConfigStore{}
  164. // DownloadManager not defined because only pulling configuration.
  165. pluginPullConfig := &distribution.ImagePullConfig{
  166. Config: distribution.Config{
  167. MetaHeaders: metaHeader,
  168. AuthConfig: authConfig,
  169. RegistryService: pm.config.RegistryService,
  170. ImageEventLogger: func(string, string, string) {},
  171. ImageStore: cs,
  172. },
  173. Schema2Types: distribution.PluginTypes,
  174. }
  175. if err := pm.pull(ctx, ref, pluginPullConfig, nil); err != nil {
  176. return nil, err
  177. }
  178. if cs.config == nil {
  179. return nil, errors.New("no configuration pulled")
  180. }
  181. var config types.PluginConfig
  182. if err := json.Unmarshal(cs.config, &config); err != nil {
  183. return nil, err
  184. }
  185. return computePrivileges(config)
  186. }
  187. // Pull pulls a plugin, check if the correct privileges are provided and install the plugin.
  188. func (pm *Manager) Pull(ctx context.Context, ref reference.Named, name string, metaHeader http.Header, authConfig *types.AuthConfig, privileges types.PluginPrivileges, outStream io.Writer) (err error) {
  189. pm.muGC.RLock()
  190. defer pm.muGC.RUnlock()
  191. // revalidate because Pull is public
  192. nameref, err := reference.ParseNamed(name)
  193. if err != nil {
  194. return errors.Wrapf(err, "failed to parse %q", name)
  195. }
  196. name = reference.WithDefaultTag(nameref).String()
  197. if err := pm.config.Store.validateName(name); err != nil {
  198. return err
  199. }
  200. tmpRootFSDir, err := ioutil.TempDir(pm.tmpDir(), ".rootfs")
  201. defer os.RemoveAll(tmpRootFSDir)
  202. dm := &downloadManager{
  203. tmpDir: tmpRootFSDir,
  204. blobStore: pm.blobStore,
  205. }
  206. pluginPullConfig := &distribution.ImagePullConfig{
  207. Config: distribution.Config{
  208. MetaHeaders: metaHeader,
  209. AuthConfig: authConfig,
  210. RegistryService: pm.config.RegistryService,
  211. ImageEventLogger: pm.config.LogPluginEvent,
  212. ImageStore: dm,
  213. },
  214. DownloadManager: dm, // todo: reevaluate if possible to substitute distribution/xfer dependencies instead
  215. Schema2Types: distribution.PluginTypes,
  216. }
  217. err = pm.pull(ctx, ref, pluginPullConfig, outStream)
  218. if err != nil {
  219. go pm.GC()
  220. return err
  221. }
  222. if _, err := pm.createPlugin(name, dm.configDigest, dm.blobs, tmpRootFSDir, &privileges); err != nil {
  223. return err
  224. }
  225. return nil
  226. }
  227. // List displays the list of plugins and associated metadata.
  228. func (pm *Manager) List(pluginFilters filters.Args) ([]types.Plugin, error) {
  229. if err := pluginFilters.Validate(acceptedPluginFilterTags); err != nil {
  230. return nil, err
  231. }
  232. enabledOnly := false
  233. disabledOnly := false
  234. if pluginFilters.Include("enabled") {
  235. if pluginFilters.ExactMatch("enabled", "true") {
  236. enabledOnly = true
  237. } else if pluginFilters.ExactMatch("enabled", "false") {
  238. disabledOnly = true
  239. } else {
  240. return nil, fmt.Errorf("Invalid filter 'enabled=%s'", pluginFilters.Get("enabled"))
  241. }
  242. }
  243. plugins := pm.config.Store.GetAll()
  244. out := make([]types.Plugin, 0, len(plugins))
  245. next:
  246. for _, p := range plugins {
  247. if enabledOnly && !p.PluginObj.Enabled {
  248. continue
  249. }
  250. if disabledOnly && p.PluginObj.Enabled {
  251. continue
  252. }
  253. if pluginFilters.Include("capability") {
  254. for _, f := range p.GetTypes() {
  255. if !pluginFilters.Match("capability", f.Capability) {
  256. continue next
  257. }
  258. }
  259. }
  260. out = append(out, p.PluginObj)
  261. }
  262. return out, nil
  263. }
  264. // Push pushes a plugin to the store.
  265. func (pm *Manager) Push(ctx context.Context, name string, metaHeader http.Header, authConfig *types.AuthConfig, outStream io.Writer) error {
  266. p, err := pm.config.Store.GetV2Plugin(name)
  267. if err != nil {
  268. return err
  269. }
  270. ref, err := reference.ParseNamed(p.Name())
  271. if err != nil {
  272. return errors.Wrapf(err, "plugin has invalid name %v for push", p.Name())
  273. }
  274. var po progress.Output
  275. if outStream != nil {
  276. // Include a buffer so that slow client connections don't affect
  277. // transfer performance.
  278. progressChan := make(chan progress.Progress, 100)
  279. writesDone := make(chan struct{})
  280. defer func() {
  281. close(progressChan)
  282. <-writesDone
  283. }()
  284. var cancelFunc context.CancelFunc
  285. ctx, cancelFunc = context.WithCancel(ctx)
  286. go func() {
  287. progressutils.WriteDistributionProgress(cancelFunc, outStream, progressChan)
  288. close(writesDone)
  289. }()
  290. po = progress.ChanOutput(progressChan)
  291. } else {
  292. po = progress.DiscardOutput()
  293. }
  294. // TODO: replace these with manager
  295. is := &pluginConfigStore{
  296. pm: pm,
  297. plugin: p,
  298. }
  299. ls := &pluginLayerProvider{
  300. pm: pm,
  301. plugin: p,
  302. }
  303. rs := &pluginReference{
  304. name: ref,
  305. pluginID: p.Config,
  306. }
  307. uploadManager := xfer.NewLayerUploadManager(3)
  308. imagePushConfig := &distribution.ImagePushConfig{
  309. Config: distribution.Config{
  310. MetaHeaders: metaHeader,
  311. AuthConfig: authConfig,
  312. ProgressOutput: po,
  313. RegistryService: pm.config.RegistryService,
  314. ReferenceStore: rs,
  315. ImageEventLogger: pm.config.LogPluginEvent,
  316. ImageStore: is,
  317. RequireSchema2: true,
  318. },
  319. ConfigMediaType: schema2.MediaTypePluginConfig,
  320. LayerStore: ls,
  321. UploadManager: uploadManager,
  322. }
  323. return distribution.Push(ctx, ref, imagePushConfig)
  324. }
  325. type pluginReference struct {
  326. name reference.Named
  327. pluginID digest.Digest
  328. }
  329. func (r *pluginReference) References(id digest.Digest) []reference.Named {
  330. if r.pluginID != id {
  331. return nil
  332. }
  333. return []reference.Named{r.name}
  334. }
  335. func (r *pluginReference) ReferencesByName(ref reference.Named) []reference.Association {
  336. return []reference.Association{
  337. {
  338. Ref: r.name,
  339. ID: r.pluginID,
  340. },
  341. }
  342. }
  343. func (r *pluginReference) Get(ref reference.Named) (digest.Digest, error) {
  344. if r.name.String() != ref.String() {
  345. return digest.Digest(""), reference.ErrDoesNotExist
  346. }
  347. return r.pluginID, nil
  348. }
  349. func (r *pluginReference) AddTag(ref reference.Named, id digest.Digest, force bool) error {
  350. // Read only, ignore
  351. return nil
  352. }
  353. func (r *pluginReference) AddDigest(ref reference.Canonical, id digest.Digest, force bool) error {
  354. // Read only, ignore
  355. return nil
  356. }
  357. func (r *pluginReference) Delete(ref reference.Named) (bool, error) {
  358. // Read only, ignore
  359. return false, nil
  360. }
  361. type pluginConfigStore struct {
  362. pm *Manager
  363. plugin *v2.Plugin
  364. }
  365. func (s *pluginConfigStore) Put([]byte) (digest.Digest, error) {
  366. return digest.Digest(""), errors.New("cannot store config on push")
  367. }
  368. func (s *pluginConfigStore) Get(d digest.Digest) ([]byte, error) {
  369. if s.plugin.Config != d {
  370. return nil, errors.New("plugin not found")
  371. }
  372. rwc, err := s.pm.blobStore.Get(d)
  373. if err != nil {
  374. return nil, err
  375. }
  376. defer rwc.Close()
  377. return ioutil.ReadAll(rwc)
  378. }
  379. func (s *pluginConfigStore) RootFSFromConfig(c []byte) (*image.RootFS, error) {
  380. return configToRootFS(c)
  381. }
  382. type pluginLayerProvider struct {
  383. pm *Manager
  384. plugin *v2.Plugin
  385. }
  386. func (p *pluginLayerProvider) Get(id layer.ChainID) (distribution.PushLayer, error) {
  387. rootFS := rootFSFromPlugin(p.plugin.PluginObj.Config.Rootfs)
  388. var i int
  389. for i = 1; i <= len(rootFS.DiffIDs); i++ {
  390. if layer.CreateChainID(rootFS.DiffIDs[:i]) == id {
  391. break
  392. }
  393. }
  394. if i > len(rootFS.DiffIDs) {
  395. return nil, errors.New("layer not found")
  396. }
  397. return &pluginLayer{
  398. pm: p.pm,
  399. diffIDs: rootFS.DiffIDs[:i],
  400. blobs: p.plugin.Blobsums[:i],
  401. }, nil
  402. }
  403. type pluginLayer struct {
  404. pm *Manager
  405. diffIDs []layer.DiffID
  406. blobs []digest.Digest
  407. }
  408. func (l *pluginLayer) ChainID() layer.ChainID {
  409. return layer.CreateChainID(l.diffIDs)
  410. }
  411. func (l *pluginLayer) DiffID() layer.DiffID {
  412. return l.diffIDs[len(l.diffIDs)-1]
  413. }
  414. func (l *pluginLayer) Parent() distribution.PushLayer {
  415. if len(l.diffIDs) == 1 {
  416. return nil
  417. }
  418. return &pluginLayer{
  419. pm: l.pm,
  420. diffIDs: l.diffIDs[:len(l.diffIDs)-1],
  421. blobs: l.blobs[:len(l.diffIDs)-1],
  422. }
  423. }
  424. func (l *pluginLayer) Open() (io.ReadCloser, error) {
  425. return l.pm.blobStore.Get(l.blobs[len(l.diffIDs)-1])
  426. }
  427. func (l *pluginLayer) Size() (int64, error) {
  428. return l.pm.blobStore.Size(l.blobs[len(l.diffIDs)-1])
  429. }
  430. func (l *pluginLayer) MediaType() string {
  431. return schema2.MediaTypeLayer
  432. }
  433. func (l *pluginLayer) Release() {
  434. // Nothing needs to be release, no references held
  435. }
  436. // Remove deletes plugin's root directory.
  437. func (pm *Manager) Remove(name string, config *types.PluginRmConfig) error {
  438. p, err := pm.config.Store.GetV2Plugin(name)
  439. pm.mu.RLock()
  440. c := pm.cMap[p]
  441. pm.mu.RUnlock()
  442. if err != nil {
  443. return err
  444. }
  445. if !config.ForceRemove {
  446. if p.GetRefCount() > 0 {
  447. return fmt.Errorf("plugin %s is in use", p.Name())
  448. }
  449. if p.IsEnabled() {
  450. return fmt.Errorf("plugin %s is enabled", p.Name())
  451. }
  452. }
  453. if p.IsEnabled() {
  454. if err := pm.disable(p, c); err != nil {
  455. logrus.Errorf("failed to disable plugin '%s': %s", p.Name(), err)
  456. }
  457. }
  458. defer func() {
  459. go pm.GC()
  460. }()
  461. id := p.GetID()
  462. pm.config.Store.Remove(p)
  463. pluginDir := filepath.Join(pm.config.Root, id)
  464. if err := os.RemoveAll(pluginDir); err != nil {
  465. logrus.Warnf("unable to remove %q from plugin remove: %v", pluginDir, err)
  466. }
  467. pm.config.LogPluginEvent(id, name, "remove")
  468. return nil
  469. }
  470. // Set sets plugin args
  471. func (pm *Manager) Set(name string, args []string) error {
  472. p, err := pm.config.Store.GetV2Plugin(name)
  473. if err != nil {
  474. return err
  475. }
  476. if err := p.Set(args); err != nil {
  477. return err
  478. }
  479. return pm.save(p)
  480. }
  481. // CreateFromContext creates a plugin from the given pluginDir which contains
  482. // both the rootfs and the config.json and a repoName with optional tag.
  483. func (pm *Manager) CreateFromContext(ctx context.Context, tarCtx io.ReadCloser, options *types.PluginCreateOptions) (err error) {
  484. pm.muGC.RLock()
  485. defer pm.muGC.RUnlock()
  486. ref, err := reference.ParseNamed(options.RepoName)
  487. if err != nil {
  488. return errors.Wrapf(err, "failed to parse reference %v", options.RepoName)
  489. }
  490. if _, ok := ref.(reference.Canonical); ok {
  491. return errors.Errorf("canonical references are not permitted")
  492. }
  493. name := reference.WithDefaultTag(ref).String()
  494. if err := pm.config.Store.validateName(name); err != nil { // fast check, real check is in createPlugin()
  495. return err
  496. }
  497. tmpRootFSDir, err := ioutil.TempDir(pm.tmpDir(), ".rootfs")
  498. defer os.RemoveAll(tmpRootFSDir)
  499. if err != nil {
  500. return errors.Wrap(err, "failed to create temp directory")
  501. }
  502. var configJSON []byte
  503. rootFS := splitConfigRootFSFromTar(tarCtx, &configJSON)
  504. rootFSBlob, err := pm.blobStore.New()
  505. if err != nil {
  506. return err
  507. }
  508. defer rootFSBlob.Close()
  509. gzw := gzip.NewWriter(rootFSBlob)
  510. layerDigester := digest.Canonical.Digester()
  511. rootFSReader := io.TeeReader(rootFS, io.MultiWriter(gzw, layerDigester.Hash()))
  512. if err := chrootarchive.Untar(rootFSReader, tmpRootFSDir, nil); err != nil {
  513. return err
  514. }
  515. if err := rootFS.Close(); err != nil {
  516. return err
  517. }
  518. if configJSON == nil {
  519. return errors.New("config not found")
  520. }
  521. if err := gzw.Close(); err != nil {
  522. return errors.Wrap(err, "error closing gzip writer")
  523. }
  524. var config types.PluginConfig
  525. if err := json.Unmarshal(configJSON, &config); err != nil {
  526. return errors.Wrap(err, "failed to parse config")
  527. }
  528. if err := pm.validateConfig(config); err != nil {
  529. return err
  530. }
  531. pm.mu.Lock()
  532. defer pm.mu.Unlock()
  533. rootFSBlobsum, err := rootFSBlob.Commit()
  534. if err != nil {
  535. return err
  536. }
  537. defer func() {
  538. if err != nil {
  539. go pm.GC()
  540. }
  541. }()
  542. config.Rootfs = &types.PluginConfigRootfs{
  543. Type: "layers",
  544. DiffIds: []string{layerDigester.Digest().String()},
  545. }
  546. configBlob, err := pm.blobStore.New()
  547. if err != nil {
  548. return err
  549. }
  550. defer configBlob.Close()
  551. if err := json.NewEncoder(configBlob).Encode(config); err != nil {
  552. return errors.Wrap(err, "error encoding json config")
  553. }
  554. configBlobsum, err := configBlob.Commit()
  555. if err != nil {
  556. return err
  557. }
  558. p, err := pm.createPlugin(name, configBlobsum, []digest.Digest{rootFSBlobsum}, tmpRootFSDir, nil)
  559. if err != nil {
  560. return err
  561. }
  562. pm.config.LogPluginEvent(p.PluginObj.ID, name, "create")
  563. return nil
  564. }
  565. func (pm *Manager) validateConfig(config types.PluginConfig) error {
  566. return nil // TODO:
  567. }
  568. func splitConfigRootFSFromTar(in io.ReadCloser, config *[]byte) io.ReadCloser {
  569. pr, pw := io.Pipe()
  570. go func() {
  571. tarReader := tar.NewReader(in)
  572. tarWriter := tar.NewWriter(pw)
  573. defer in.Close()
  574. hasRootFS := false
  575. for {
  576. hdr, err := tarReader.Next()
  577. if err == io.EOF {
  578. if !hasRootFS {
  579. pw.CloseWithError(errors.Wrap(err, "no rootfs found"))
  580. return
  581. }
  582. // Signals end of archive.
  583. tarWriter.Close()
  584. pw.Close()
  585. return
  586. }
  587. if err != nil {
  588. pw.CloseWithError(errors.Wrap(err, "failed to read from tar"))
  589. return
  590. }
  591. content := io.Reader(tarReader)
  592. name := path.Clean(hdr.Name)
  593. if path.IsAbs(name) {
  594. name = name[1:]
  595. }
  596. if name == configFileName {
  597. dt, err := ioutil.ReadAll(content)
  598. if err != nil {
  599. pw.CloseWithError(errors.Wrapf(err, "failed to read %s", configFileName))
  600. return
  601. }
  602. *config = dt
  603. }
  604. if parts := strings.Split(name, "/"); len(parts) != 0 && parts[0] == rootFSFileName {
  605. hdr.Name = path.Clean(path.Join(parts[1:]...))
  606. if hdr.Typeflag == tar.TypeLink && strings.HasPrefix(strings.ToLower(hdr.Linkname), rootFSFileName+"/") {
  607. hdr.Linkname = hdr.Linkname[len(rootFSFileName)+1:]
  608. }
  609. if err := tarWriter.WriteHeader(hdr); err != nil {
  610. pw.CloseWithError(errors.Wrap(err, "error writing tar header"))
  611. return
  612. }
  613. if _, err := pools.Copy(tarWriter, content); err != nil {
  614. pw.CloseWithError(errors.Wrap(err, "error copying tar data"))
  615. return
  616. }
  617. hasRootFS = true
  618. } else {
  619. io.Copy(ioutil.Discard, content)
  620. }
  621. }
  622. }()
  623. return pr
  624. }