All checks were successful
Test / Create distribution (push) Successful in 53s
Test / Sandbox (push) Successful in 2m57s
Test / ShareFS (push) Successful in 4m46s
Test / Sandbox (race detector) (push) Successful in 5m18s
Test / Hpkg (push) Successful in 5m47s
Test / Hakurei (push) Successful in 5m52s
Test / Hakurei (race detector) (push) Successful in 7m23s
Test / Flake checks (push) Successful in 1m47s
Only write should be cleared here, clearing execute causes execArtifact to be unable to start anything since no Artifact is able to produce an executable file. Signed-off-by: Ophestra <cat@gensokyo.uk>
227 lines
4.6 KiB
Go
227 lines
4.6 KiB
Go
package pkg
|
|
|
|
import (
|
|
"archive/tar"
|
|
"bytes"
|
|
"compress/gzip"
|
|
"context"
|
|
"encoding/binary"
|
|
"errors"
|
|
"io"
|
|
"io/fs"
|
|
"net/http"
|
|
"os"
|
|
"path"
|
|
|
|
"hakurei.app/container/check"
|
|
)
|
|
|
|
const (
|
|
// TarUncompressed denotes an uncompressed tarball.
|
|
TarUncompressed = iota
|
|
// TarGzip denotes a tarball compressed via [gzip].
|
|
TarGzip
|
|
)
|
|
|
|
// A tarArtifact is an [Artifact] unpacking a tarball backed by a [File].
|
|
type tarArtifact struct {
|
|
// Caller-supplied backing tarball.
|
|
f File
|
|
// Compression on top of the tarball.
|
|
compression uint64
|
|
}
|
|
|
|
// NewTar returns a new [Artifact] backed by the supplied [File] and
|
|
// compression method.
|
|
func NewTar(f File, compression uint64) Artifact {
|
|
return &tarArtifact{f: f, compression: compression}
|
|
}
|
|
|
|
// NewHTTPGetTar is abbreviation for NewHTTPGet passed to NewTar.
|
|
func NewHTTPGetTar(
|
|
ctx context.Context,
|
|
hc *http.Client,
|
|
url string,
|
|
checksum Checksum,
|
|
compression uint64,
|
|
) Artifact {
|
|
return NewTar(NewHTTPGet(ctx, hc, url, checksum), compression)
|
|
}
|
|
|
|
// Kind returns the hardcoded [Kind] constant.
|
|
func (a *tarArtifact) Kind() Kind { return KindTar }
|
|
|
|
// Params returns compression encoded in little endian.
|
|
func (a *tarArtifact) Params() []byte {
|
|
return binary.LittleEndian.AppendUint64(nil, a.compression)
|
|
}
|
|
|
|
// Dependencies returns a slice containing the backing file.
|
|
func (a *tarArtifact) Dependencies() []Artifact {
|
|
return []Artifact{a.f}
|
|
}
|
|
|
|
// A DisallowedTypeflagError describes a disallowed typeflag encountered while
|
|
// unpacking a tarball.
|
|
type DisallowedTypeflagError byte
|
|
|
|
func (e DisallowedTypeflagError) Error() string {
|
|
return "disallowed typeflag '" + string(e) + "'"
|
|
}
|
|
|
|
// Cure cures the [Artifact], producing a directory located at work.
|
|
func (a *tarArtifact) Cure(c *CureContext) (err error) {
|
|
temp := c.GetTempDir()
|
|
var tr io.ReadCloser
|
|
|
|
{
|
|
var data []byte
|
|
data, err = c.LoadData(a.f)
|
|
if err != nil {
|
|
return
|
|
}
|
|
tr = io.NopCloser(bytes.NewReader(data))
|
|
}
|
|
|
|
defer func() {
|
|
closeErr := tr.Close()
|
|
if err == nil {
|
|
err = closeErr
|
|
}
|
|
}()
|
|
|
|
switch a.compression {
|
|
case TarUncompressed:
|
|
break
|
|
|
|
case TarGzip:
|
|
if tr, err = gzip.NewReader(tr); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
default:
|
|
return os.ErrInvalid
|
|
}
|
|
|
|
type dirTargetPerm struct {
|
|
path *check.Absolute
|
|
mode fs.FileMode
|
|
}
|
|
var madeDirectories []dirTargetPerm
|
|
|
|
if err = os.MkdirAll(temp.String(), 0700); err != nil {
|
|
return
|
|
}
|
|
|
|
var header *tar.Header
|
|
r := tar.NewReader(tr)
|
|
for header, err = r.Next(); err == nil; header, err = r.Next() {
|
|
typeflag := header.Typeflag
|
|
for {
|
|
switch typeflag {
|
|
case 0:
|
|
if len(header.Name) > 0 && header.Name[len(header.Name)-1] == '/' {
|
|
typeflag = tar.TypeDir
|
|
} else {
|
|
typeflag = tar.TypeReg
|
|
}
|
|
continue
|
|
|
|
case tar.TypeReg:
|
|
p := temp.Append(header.Name).String()
|
|
if err = os.MkdirAll(path.Dir(p), 0700); err != nil {
|
|
return
|
|
}
|
|
|
|
var f *os.File
|
|
if f, err = os.OpenFile(
|
|
p,
|
|
os.O_CREATE|os.O_EXCL|os.O_WRONLY,
|
|
header.FileInfo().Mode()&0500,
|
|
); err != nil {
|
|
return
|
|
}
|
|
if _, err = io.Copy(f, r); err != nil {
|
|
_ = f.Close()
|
|
return
|
|
} else if err = f.Close(); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeLink:
|
|
p := temp.Append(header.Name).String()
|
|
if err = os.MkdirAll(path.Dir(p), 0700); err != nil {
|
|
return
|
|
}
|
|
if err = os.Link(header.Linkname, p); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeSymlink:
|
|
p := temp.Append(header.Name).String()
|
|
if err = os.MkdirAll(path.Dir(p), 0700); err != nil {
|
|
return
|
|
}
|
|
if err = os.Symlink(header.Linkname, p); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeDir:
|
|
pathname := temp.Append(header.Name)
|
|
madeDirectories = append(madeDirectories, dirTargetPerm{
|
|
path: pathname,
|
|
mode: header.FileInfo().Mode(),
|
|
})
|
|
if err = os.MkdirAll(
|
|
pathname.String(),
|
|
0700,
|
|
); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeXGlobalHeader:
|
|
// ignore
|
|
break
|
|
|
|
default:
|
|
return DisallowedTypeflagError(typeflag)
|
|
}
|
|
|
|
break
|
|
}
|
|
}
|
|
if errors.Is(err, io.EOF) {
|
|
err = nil
|
|
}
|
|
if err == nil {
|
|
for _, e := range madeDirectories {
|
|
if err = os.Chmod(e.path.String(), e.mode&0500); err != nil {
|
|
return
|
|
}
|
|
}
|
|
} else {
|
|
return
|
|
}
|
|
|
|
var entries []os.DirEntry
|
|
if entries, err = os.ReadDir(temp.String()); err != nil {
|
|
return
|
|
}
|
|
|
|
if len(entries) == 1 && entries[0].IsDir() {
|
|
p := temp.Append(entries[0].Name())
|
|
if err = os.Chmod(p.String(), 0700); err != nil {
|
|
return
|
|
}
|
|
err = os.Rename(p.String(), c.GetWorkDir().String())
|
|
} else {
|
|
err = os.Rename(temp.String(), c.GetWorkDir().String())
|
|
}
|
|
return
|
|
}
|