Files
hakurei/internal/pkg/tar.go
Ophestra aa0a949cef
All checks were successful
Test / Create distribution (push) Successful in 53s
Test / Sandbox (push) Successful in 2m57s
Test / ShareFS (push) Successful in 4m46s
Test / Sandbox (race detector) (push) Successful in 5m18s
Test / Hpkg (push) Successful in 5m47s
Test / Hakurei (push) Successful in 5m52s
Test / Hakurei (race detector) (push) Successful in 7m23s
Test / Flake checks (push) Successful in 1m47s
internal/pkg: do not clear execute bit
Only write should be cleared here, clearing execute causes execArtifact to be unable to start anything since no Artifact is able to produce an executable file.

Signed-off-by: Ophestra <cat@gensokyo.uk>
2026-01-06 22:31:44 +09:00

227 lines
4.6 KiB
Go

package pkg
import (
"archive/tar"
"bytes"
"compress/gzip"
"context"
"encoding/binary"
"errors"
"io"
"io/fs"
"net/http"
"os"
"path"
"hakurei.app/container/check"
)
const (
// TarUncompressed denotes an uncompressed tarball.
TarUncompressed = iota
// TarGzip denotes a tarball compressed via [gzip].
TarGzip
)
// A tarArtifact is an [Artifact] unpacking a tarball backed by a [File].
type tarArtifact struct {
// Caller-supplied backing tarball.
f File
// Compression on top of the tarball.
compression uint64
}
// NewTar returns a new [Artifact] backed by the supplied [File] and
// compression method.
func NewTar(f File, compression uint64) Artifact {
return &tarArtifact{f: f, compression: compression}
}
// NewHTTPGetTar is abbreviation for NewHTTPGet passed to NewTar.
func NewHTTPGetTar(
ctx context.Context,
hc *http.Client,
url string,
checksum Checksum,
compression uint64,
) Artifact {
return NewTar(NewHTTPGet(ctx, hc, url, checksum), compression)
}
// Kind returns the hardcoded [Kind] constant.
func (a *tarArtifact) Kind() Kind { return KindTar }
// Params returns compression encoded in little endian.
func (a *tarArtifact) Params() []byte {
return binary.LittleEndian.AppendUint64(nil, a.compression)
}
// Dependencies returns a slice containing the backing file.
func (a *tarArtifact) Dependencies() []Artifact {
return []Artifact{a.f}
}
// A DisallowedTypeflagError describes a disallowed typeflag encountered while
// unpacking a tarball.
type DisallowedTypeflagError byte
func (e DisallowedTypeflagError) Error() string {
return "disallowed typeflag '" + string(e) + "'"
}
// Cure cures the [Artifact], producing a directory located at work.
func (a *tarArtifact) Cure(c *CureContext) (err error) {
temp := c.GetTempDir()
var tr io.ReadCloser
{
var data []byte
data, err = c.LoadData(a.f)
if err != nil {
return
}
tr = io.NopCloser(bytes.NewReader(data))
}
defer func() {
closeErr := tr.Close()
if err == nil {
err = closeErr
}
}()
switch a.compression {
case TarUncompressed:
break
case TarGzip:
if tr, err = gzip.NewReader(tr); err != nil {
return
}
break
default:
return os.ErrInvalid
}
type dirTargetPerm struct {
path *check.Absolute
mode fs.FileMode
}
var madeDirectories []dirTargetPerm
if err = os.MkdirAll(temp.String(), 0700); err != nil {
return
}
var header *tar.Header
r := tar.NewReader(tr)
for header, err = r.Next(); err == nil; header, err = r.Next() {
typeflag := header.Typeflag
for {
switch typeflag {
case 0:
if len(header.Name) > 0 && header.Name[len(header.Name)-1] == '/' {
typeflag = tar.TypeDir
} else {
typeflag = tar.TypeReg
}
continue
case tar.TypeReg:
p := temp.Append(header.Name).String()
if err = os.MkdirAll(path.Dir(p), 0700); err != nil {
return
}
var f *os.File
if f, err = os.OpenFile(
p,
os.O_CREATE|os.O_EXCL|os.O_WRONLY,
header.FileInfo().Mode()&0500,
); err != nil {
return
}
if _, err = io.Copy(f, r); err != nil {
_ = f.Close()
return
} else if err = f.Close(); err != nil {
return
}
break
case tar.TypeLink:
p := temp.Append(header.Name).String()
if err = os.MkdirAll(path.Dir(p), 0700); err != nil {
return
}
if err = os.Link(header.Linkname, p); err != nil {
return
}
break
case tar.TypeSymlink:
p := temp.Append(header.Name).String()
if err = os.MkdirAll(path.Dir(p), 0700); err != nil {
return
}
if err = os.Symlink(header.Linkname, p); err != nil {
return
}
break
case tar.TypeDir:
pathname := temp.Append(header.Name)
madeDirectories = append(madeDirectories, dirTargetPerm{
path: pathname,
mode: header.FileInfo().Mode(),
})
if err = os.MkdirAll(
pathname.String(),
0700,
); err != nil {
return
}
break
case tar.TypeXGlobalHeader:
// ignore
break
default:
return DisallowedTypeflagError(typeflag)
}
break
}
}
if errors.Is(err, io.EOF) {
err = nil
}
if err == nil {
for _, e := range madeDirectories {
if err = os.Chmod(e.path.String(), e.mode&0500); err != nil {
return
}
}
} else {
return
}
var entries []os.DirEntry
if entries, err = os.ReadDir(temp.String()); err != nil {
return
}
if len(entries) == 1 && entries[0].IsDir() {
p := temp.Append(entries[0].Name())
if err = os.Chmod(p.String(), 0700); err != nil {
return
}
err = os.Rename(p.String(), c.GetWorkDir().String())
} else {
err = os.Rename(temp.String(), c.GetWorkDir().String())
}
return
}