hst/fs: access ops through interface
All checks were successful
Test / Create distribution (push) Successful in 35s
Test / Hakurei (push) Successful in 3m14s
Test / Hpkg (push) Successful in 4m1s
Test / Sandbox (race detector) (push) Successful in 4m28s
Test / Hakurei (race detector) (push) Successful in 5m22s
Test / Sandbox (push) Successful in 1m28s
Test / Flake checks (push) Successful in 1m29s
All checks were successful
Test / Create distribution (push) Successful in 35s
Test / Hakurei (push) Successful in 3m14s
Test / Hpkg (push) Successful in 4m1s
Test / Sandbox (race detector) (push) Successful in 4m28s
Test / Hakurei (race detector) (push) Successful in 5m22s
Test / Sandbox (push) Successful in 1m28s
Test / Flake checks (push) Successful in 1m29s
This removes the final hakurei.app/container import from hst. Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
parent
1f0226f7e0
commit
12ab7ea3b4
27
hst/fs.go
27
hst/fs.go
@ -4,9 +4,9 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"os"
|
||||||
"reflect"
|
"reflect"
|
||||||
|
|
||||||
"hakurei.app/container"
|
|
||||||
"hakurei.app/container/check"
|
"hakurei.app/container/check"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -24,12 +24,35 @@ type FilesystemConfig interface {
|
|||||||
fmt.Stringer
|
fmt.Stringer
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// The Ops interface enables [FilesystemConfig] to queue container ops without depending on the container package.
|
||||||
|
type Ops interface {
|
||||||
|
// Tmpfs appends an op that mounts tmpfs on a container path.
|
||||||
|
Tmpfs(target *check.Absolute, size int, perm os.FileMode) Ops
|
||||||
|
// Readonly appends an op that mounts read-only tmpfs on a container path.
|
||||||
|
Readonly(target *check.Absolute, perm os.FileMode) Ops
|
||||||
|
|
||||||
|
// Bind appends an op that bind mounts a host path on a container path.
|
||||||
|
Bind(source, target *check.Absolute, flags int) Ops
|
||||||
|
// Overlay appends an op that mounts the overlay pseudo filesystem.
|
||||||
|
Overlay(target, state, work *check.Absolute, layers ...*check.Absolute) Ops
|
||||||
|
// OverlayReadonly appends an op that mounts the overlay pseudo filesystem readonly.
|
||||||
|
OverlayReadonly(target *check.Absolute, layers ...*check.Absolute) Ops
|
||||||
|
|
||||||
|
// Link appends an op that creates a symlink in the container filesystem.
|
||||||
|
Link(target *check.Absolute, linkName string, dereference bool) Ops
|
||||||
|
|
||||||
|
// Root appends an op that expands a directory into a toplevel bind mount mirror on container root.
|
||||||
|
Root(host *check.Absolute, flags int) Ops
|
||||||
|
// Etc appends an op that expands host /etc into a toplevel symlink mirror with /etc semantics.
|
||||||
|
Etc(host *check.Absolute, prefix string) Ops
|
||||||
|
}
|
||||||
|
|
||||||
// ApplyState holds the address of [container.Ops] and any relevant application state.
|
// ApplyState holds the address of [container.Ops] and any relevant application state.
|
||||||
type ApplyState struct {
|
type ApplyState struct {
|
||||||
// AutoEtcPrefix is the prefix for [container.AutoEtcOp].
|
// AutoEtcPrefix is the prefix for [container.AutoEtcOp].
|
||||||
AutoEtcPrefix string
|
AutoEtcPrefix string
|
||||||
|
|
||||||
*container.Ops
|
Ops
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -3,6 +3,7 @@ package hst_test
|
|||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
|
"os"
|
||||||
"reflect"
|
"reflect"
|
||||||
"strings"
|
"strings"
|
||||||
"syscall"
|
"syscall"
|
||||||
@ -249,7 +250,7 @@ func checkFs(t *testing.T, testCases []fsTestCase) {
|
|||||||
|
|
||||||
t.Run("ops", func(t *testing.T) {
|
t.Run("ops", func(t *testing.T) {
|
||||||
ops := new(container.Ops)
|
ops := new(container.Ops)
|
||||||
tc.fs.Apply(&hst.ApplyState{AutoEtcPrefix: ":3", Ops: ops})
|
tc.fs.Apply(&hst.ApplyState{AutoEtcPrefix: ":3", Ops: opsAdapter{ops}})
|
||||||
if !reflect.DeepEqual(ops, &tc.ops) {
|
if !reflect.DeepEqual(ops, &tc.ops) {
|
||||||
gotString := new(strings.Builder)
|
gotString := new(strings.Builder)
|
||||||
for _, op := range *ops {
|
for _, op := range *ops {
|
||||||
@ -288,6 +289,40 @@ func checkFs(t *testing.T, testCases []fsTestCase) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type opsAdapter struct{ *container.Ops }
|
||||||
|
|
||||||
|
func (p opsAdapter) Tmpfs(target *check.Absolute, size int, perm os.FileMode) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Tmpfs(target, size, perm)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Readonly(target *check.Absolute, perm os.FileMode) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Readonly(target, perm)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Bind(source, target *check.Absolute, flags int) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Bind(source, target, flags)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Overlay(target, state, work *check.Absolute, layers ...*check.Absolute) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Overlay(target, state, work, layers...)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) OverlayReadonly(target *check.Absolute, layers ...*check.Absolute) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.OverlayReadonly(target, layers...)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Link(target *check.Absolute, linkName string, dereference bool) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Link(target, linkName, dereference)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Root(host *check.Absolute, flags int) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Root(host, flags)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Etc(host *check.Absolute, prefix string) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Etc(host, prefix)}
|
||||||
|
}
|
||||||
|
|
||||||
func m(pathname string) *check.Absolute { return check.MustAbs(pathname) }
|
func m(pathname string) *check.Absolute { return check.MustAbs(pathname) }
|
||||||
func ms(pathnames ...string) []*check.Absolute {
|
func ms(pathnames ...string) []*check.Absolute {
|
||||||
as := make([]*check.Absolute, len(pathnames))
|
as := make([]*check.Absolute, len(pathnames))
|
||||||
|
@ -3,6 +3,7 @@ package app
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"io/fs"
|
"io/fs"
|
||||||
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"strconv"
|
"strconv"
|
||||||
"syscall"
|
"syscall"
|
||||||
@ -88,7 +89,7 @@ func (s *spParamsOp) toContainer(state *outcomeStateParams) error {
|
|||||||
state.as.AutoEtcPrefix = state.id.String()
|
state.as.AutoEtcPrefix = state.id.String()
|
||||||
ops := make(container.Ops, 0, preallocateOpsCount+len(state.Container.Filesystem))
|
ops := make(container.Ops, 0, preallocateOpsCount+len(state.Container.Filesystem))
|
||||||
state.params.Ops = &ops
|
state.params.Ops = &ops
|
||||||
state.as.Ops = &ops
|
state.as.Ops = opsAdapter{&ops}
|
||||||
}
|
}
|
||||||
|
|
||||||
rootfs, filesystem, _ := resolveRoot(state.Container)
|
rootfs, filesystem, _ := resolveRoot(state.Container)
|
||||||
@ -304,3 +305,38 @@ func evalSymlinks(msg container.Msg, k syscallDispatcher, v *string) error {
|
|||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// opsAdapter implements [hst.Ops] on [container.Ops].
|
||||||
|
type opsAdapter struct{ *container.Ops }
|
||||||
|
|
||||||
|
func (p opsAdapter) Tmpfs(target *check.Absolute, size int, perm os.FileMode) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Tmpfs(target, size, perm)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Readonly(target *check.Absolute, perm os.FileMode) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Readonly(target, perm)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Bind(source, target *check.Absolute, flags int) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Bind(source, target, flags)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Overlay(target, state, work *check.Absolute, layers ...*check.Absolute) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Overlay(target, state, work, layers...)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) OverlayReadonly(target *check.Absolute, layers ...*check.Absolute) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.OverlayReadonly(target, layers...)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Link(target *check.Absolute, linkName string, dereference bool) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Link(target, linkName, dereference)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Root(host *check.Absolute, flags int) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Root(host, flags)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p opsAdapter) Etc(host *check.Absolute, prefix string) hst.Ops {
|
||||||
|
return opsAdapter{p.Ops.Etc(host, prefix)}
|
||||||
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user