123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306 |
- package utils
- import (
- "bufio"
- "crypto/sha1"
- "encoding/hex"
- "fmt"
- "io"
- "io/ioutil"
- "os"
- "os/exec"
- "path/filepath"
- "runtime"
- "strings"
- "github.com/docker/distribution/registry/api/errcode"
- "github.com/docker/docker/pkg/archive"
- "github.com/docker/docker/pkg/fileutils"
- "github.com/docker/docker/pkg/stringid"
- "github.com/docker/docker/version"
- )
- // SelfPath figures out the absolute path of our own binary (if it's still around).
- func SelfPath() string {
- path, err := exec.LookPath(os.Args[0])
- if err != nil {
- if os.IsNotExist(err) {
- return ""
- }
- if execErr, ok := err.(*exec.Error); ok && os.IsNotExist(execErr.Err) {
- return ""
- }
- panic(err)
- }
- path, err = filepath.Abs(path)
- if err != nil {
- if os.IsNotExist(err) {
- return ""
- }
- panic(err)
- }
- return path
- }
- func dockerInitSha1(target string) string {
- f, err := os.Open(target)
- if err != nil {
- return ""
- }
- defer f.Close()
- h := sha1.New()
- _, err = io.Copy(h, f)
- if err != nil {
- return ""
- }
- return hex.EncodeToString(h.Sum(nil))
- }
- func isValidDockerInitPath(target string, selfPath string) bool { // target and selfPath should be absolute (InitPath and SelfPath already do this)
- if target == "" {
- return false
- }
- if version.IAMSTATIC == "true" {
- if selfPath == "" {
- return false
- }
- if target == selfPath {
- return true
- }
- targetFileInfo, err := os.Lstat(target)
- if err != nil {
- return false
- }
- selfPathFileInfo, err := os.Lstat(selfPath)
- if err != nil {
- return false
- }
- return os.SameFile(targetFileInfo, selfPathFileInfo)
- }
- return version.INITSHA1 != "" && dockerInitSha1(target) == version.INITSHA1
- }
- // DockerInitPath figures out the path of our dockerinit (which may be SelfPath())
- func DockerInitPath(localCopy string) string {
- selfPath := SelfPath()
- if isValidDockerInitPath(selfPath, selfPath) {
- // if we're valid, don't bother checking anything else
- return selfPath
- }
- var possibleInits = []string{
- localCopy,
- version.INITPATH,
- filepath.Join(filepath.Dir(selfPath), "dockerinit"),
- // FHS 3.0 Draft: "/usr/libexec includes internal binaries that are not intended to be executed directly by users or shell scripts. Applications may use a single subdirectory under /usr/libexec."
- // https://www.linuxbase.org/betaspecs/fhs/fhs.html#usrlibexec
- "/usr/libexec/docker/dockerinit",
- "/usr/local/libexec/docker/dockerinit",
- // FHS 2.3: "/usr/lib includes object files, libraries, and internal binaries that are not intended to be executed directly by users or shell scripts."
- // https://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html#USRLIBLIBRARIESFORPROGRAMMINGANDPA
- "/usr/lib/docker/dockerinit",
- "/usr/local/lib/docker/dockerinit",
- }
- for _, dockerInit := range possibleInits {
- if dockerInit == "" {
- continue
- }
- path, err := exec.LookPath(dockerInit)
- if err == nil {
- path, err = filepath.Abs(path)
- if err != nil {
- // LookPath already validated that this file exists and is executable (following symlinks), so how could Abs fail?
- panic(err)
- }
- if isValidDockerInitPath(path, selfPath) {
- return path
- }
- }
- }
- return ""
- }
- var globalTestID string
- // TestDirectory creates a new temporary directory and returns its path.
- // The contents of directory at path `templateDir` is copied into the
- // new directory.
- func TestDirectory(templateDir string) (dir string, err error) {
- if globalTestID == "" {
- globalTestID = stringid.GenerateNonCryptoID()[:4]
- }
- prefix := fmt.Sprintf("docker-test%s-%s-", globalTestID, GetCallerName(2))
- if prefix == "" {
- prefix = "docker-test-"
- }
- dir, err = ioutil.TempDir("", prefix)
- if err = os.Remove(dir); err != nil {
- return
- }
- if templateDir != "" {
- if err = archive.CopyWithTar(templateDir, dir); err != nil {
- return
- }
- }
- return
- }
- // GetCallerName introspects the call stack and returns the name of the
- // function `depth` levels down in the stack.
- func GetCallerName(depth int) string {
- // Use the caller function name as a prefix.
- // This helps trace temp directories back to their test.
- pc, _, _, _ := runtime.Caller(depth + 1)
- callerLongName := runtime.FuncForPC(pc).Name()
- parts := strings.Split(callerLongName, ".")
- callerShortName := parts[len(parts)-1]
- return callerShortName
- }
- // ReplaceOrAppendEnvValues returns the defaults with the overrides either
- // replaced by env key or appended to the list
- func ReplaceOrAppendEnvValues(defaults, overrides []string) []string {
- cache := make(map[string]int, len(defaults))
- for i, e := range defaults {
- parts := strings.SplitN(e, "=", 2)
- cache[parts[0]] = i
- }
- for _, value := range overrides {
- // Values w/o = means they want this env to be removed/unset.
- if !strings.Contains(value, "=") {
- if i, exists := cache[value]; exists {
- defaults[i] = "" // Used to indicate it should be removed
- }
- continue
- }
- // Just do a normal set/update
- parts := strings.SplitN(value, "=", 2)
- if i, exists := cache[parts[0]]; exists {
- defaults[i] = value
- } else {
- defaults = append(defaults, value)
- }
- }
- // Now remove all entries that we want to "unset"
- for i := 0; i < len(defaults); i++ {
- if defaults[i] == "" {
- defaults = append(defaults[:i], defaults[i+1:]...)
- i--
- }
- }
- return defaults
- }
- // ValidateContextDirectory checks if all the contents of the directory
- // can be read and returns an error if some files can't be read
- // symlinks which point to non-existing files don't trigger an error
- func ValidateContextDirectory(srcPath string, excludes []string) error {
- contextRoot, err := getContextRoot(srcPath)
- if err != nil {
- return err
- }
- return filepath.Walk(contextRoot, func(filePath string, f os.FileInfo, err error) error {
- // skip this directory/file if it's not in the path, it won't get added to the context
- if relFilePath, err := filepath.Rel(contextRoot, filePath); err != nil {
- return err
- } else if skip, err := fileutils.Matches(relFilePath, excludes); err != nil {
- return err
- } else if skip {
- if f.IsDir() {
- return filepath.SkipDir
- }
- return nil
- }
- if err != nil {
- if os.IsPermission(err) {
- return fmt.Errorf("can't stat '%s'", filePath)
- }
- if os.IsNotExist(err) {
- return nil
- }
- return err
- }
- // skip checking if symlinks point to non-existing files, such symlinks can be useful
- // also skip named pipes, because they hanging on open
- if f.Mode()&(os.ModeSymlink|os.ModeNamedPipe) != 0 {
- return nil
- }
- if !f.IsDir() {
- currentFile, err := os.Open(filePath)
- if err != nil && os.IsPermission(err) {
- return fmt.Errorf("no permission to read from '%s'", filePath)
- }
- currentFile.Close()
- }
- return nil
- })
- }
- // ReadDockerIgnore reads a .dockerignore file and returns the list of file patterns
- // to ignore. Note this will trim whitespace from each line as well
- // as use GO's "clean" func to get the shortest/cleanest path for each.
- func ReadDockerIgnore(reader io.ReadCloser) ([]string, error) {
- if reader == nil {
- return nil, nil
- }
- defer reader.Close()
- scanner := bufio.NewScanner(reader)
- var excludes []string
- for scanner.Scan() {
- pattern := strings.TrimSpace(scanner.Text())
- if pattern == "" {
- continue
- }
- pattern = filepath.Clean(pattern)
- excludes = append(excludes, pattern)
- }
- if err := scanner.Err(); err != nil {
- return nil, fmt.Errorf("Error reading .dockerignore: %v", err)
- }
- return excludes, nil
- }
- // ImageReference combines `repo` and `ref` and returns a string representing
- // the combination. If `ref` is a digest (meaning it's of the form
- // <algorithm>:<digest>, the returned string is <repo>@<ref>. Otherwise,
- // ref is assumed to be a tag, and the returned string is <repo>:<tag>.
- func ImageReference(repo, ref string) string {
- if DigestReference(ref) {
- return repo + "@" + ref
- }
- return repo + ":" + ref
- }
- // DigestReference returns true if ref is a digest reference; i.e. if it
- // is of the form <algorithm>:<digest>.
- func DigestReference(ref string) bool {
- return strings.Contains(ref, ":")
- }
- // GetErrorMessage returns the human readable message associated with
- // the passed-in error. In some cases the default Error() func returns
- // something that is less than useful so based on its types this func
- // will go and get a better piece of text.
- func GetErrorMessage(err error) string {
- switch err.(type) {
- case errcode.Error:
- e, _ := err.(errcode.Error)
- return e.Message
- case errcode.ErrorCode:
- ec, _ := err.(errcode.ErrorCode)
- return ec.Message()
- default:
- return err.Error()
- }
- }
|