All checks were successful
Test / Create distribution (push) Successful in 43s
Test / Sandbox (push) Successful in 2m34s
Test / Hakurei (push) Successful in 3m36s
Test / ShareFS (push) Successful in 3m41s
Test / Hpkg (push) Successful in 4m24s
Test / Sandbox (race detector) (push) Successful in 4m57s
Test / Hakurei (race detector) (push) Successful in 5m51s
Test / Flake checks (push) Successful in 1m35s
This enables much cleaner use of their output without giving up any meaningful data. Signed-off-by: Ophestra <cat@gensokyo.uk>
218 lines
4.3 KiB
Go
218 lines
4.3 KiB
Go
package pkg
|
|
|
|
import (
|
|
"archive/tar"
|
|
"bytes"
|
|
"compress/gzip"
|
|
"context"
|
|
"encoding/binary"
|
|
"errors"
|
|
"io"
|
|
"io/fs"
|
|
"net/http"
|
|
"os"
|
|
|
|
"hakurei.app/container/check"
|
|
)
|
|
|
|
const (
|
|
// TarUncompressed denotes an uncompressed tarball.
|
|
TarUncompressed = iota
|
|
// TarGzip denotes a tarball compressed via [gzip].
|
|
TarGzip
|
|
)
|
|
|
|
// A tarArtifact is an [Artifact] unpacking a tarball backed by a [File].
|
|
type tarArtifact struct {
|
|
// Caller-supplied backing tarball.
|
|
f File
|
|
// Compression on top of the tarball.
|
|
compression uint64
|
|
}
|
|
|
|
// NewTar returns a new [Artifact] backed by the supplied [File] and
|
|
// compression method.
|
|
func NewTar(f File, compression uint64) Artifact {
|
|
return &tarArtifact{f: f, compression: compression}
|
|
}
|
|
|
|
// NewHTTPGetTar is abbreviation for NewHTTPGet passed to NewTar.
|
|
func NewHTTPGetTar(
|
|
ctx context.Context,
|
|
hc *http.Client,
|
|
url string,
|
|
checksum Checksum,
|
|
compression uint64,
|
|
) Artifact {
|
|
return NewTar(NewHTTPGet(ctx, hc, url, checksum), compression)
|
|
}
|
|
|
|
// Kind returns the hardcoded [Kind] constant.
|
|
func (a *tarArtifact) Kind() Kind { return KindTar }
|
|
|
|
// Params returns compression encoded in little endian.
|
|
func (a *tarArtifact) Params() []byte {
|
|
return binary.LittleEndian.AppendUint64(nil, a.compression)
|
|
}
|
|
|
|
// Dependencies returns a slice containing the backing file.
|
|
func (a *tarArtifact) Dependencies() []Artifact {
|
|
return []Artifact{a.f}
|
|
}
|
|
|
|
// A DisallowedTypeflagError describes a disallowed typeflag encountered while
|
|
// unpacking a tarball.
|
|
type DisallowedTypeflagError byte
|
|
|
|
func (e DisallowedTypeflagError) Error() string {
|
|
return "disallowed typeflag '" + string(e) + "'"
|
|
}
|
|
|
|
// Cure cures the [Artifact], producing a directory located at work.
|
|
func (a *tarArtifact) Cure(work, temp *check.Absolute, loadData CacheDataFunc) (err error) {
|
|
var tr io.ReadCloser
|
|
|
|
{
|
|
var data []byte
|
|
data, err = loadData(a.f)
|
|
if err != nil {
|
|
return
|
|
}
|
|
tr = io.NopCloser(bytes.NewReader(data))
|
|
}
|
|
|
|
defer func() {
|
|
closeErr := tr.Close()
|
|
if err == nil {
|
|
err = closeErr
|
|
}
|
|
}()
|
|
|
|
switch a.compression {
|
|
case TarUncompressed:
|
|
break
|
|
|
|
case TarGzip:
|
|
if tr, err = gzip.NewReader(tr); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
default:
|
|
return os.ErrInvalid
|
|
}
|
|
|
|
type dirTargetPerm struct {
|
|
path *check.Absolute
|
|
mode fs.FileMode
|
|
}
|
|
var madeDirectories []dirTargetPerm
|
|
|
|
if err = os.MkdirAll(temp.String(), 0700); err != nil {
|
|
return
|
|
}
|
|
|
|
var header *tar.Header
|
|
r := tar.NewReader(tr)
|
|
for header, err = r.Next(); err == nil; header, err = r.Next() {
|
|
typeflag := header.Typeflag
|
|
for {
|
|
switch typeflag {
|
|
case 0:
|
|
if len(header.Name) > 0 && header.Name[len(header.Name)-1] == '/' {
|
|
typeflag = tar.TypeDir
|
|
} else {
|
|
typeflag = tar.TypeReg
|
|
}
|
|
continue
|
|
|
|
case tar.TypeReg:
|
|
var f *os.File
|
|
if f, err = os.OpenFile(
|
|
temp.Append(header.Name).String(),
|
|
os.O_CREATE|os.O_EXCL|os.O_WRONLY,
|
|
header.FileInfo().Mode()&0400,
|
|
); err != nil {
|
|
return
|
|
}
|
|
if _, err = io.Copy(f, r); err != nil {
|
|
_ = f.Close()
|
|
return
|
|
} else if err = f.Close(); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeLink:
|
|
if err = os.Link(
|
|
header.Linkname,
|
|
temp.Append(header.Name).String(),
|
|
); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeSymlink:
|
|
if err = os.Symlink(
|
|
header.Linkname,
|
|
temp.Append(header.Name).String(),
|
|
); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeDir:
|
|
pathname := temp.Append(header.Name)
|
|
madeDirectories = append(madeDirectories, dirTargetPerm{
|
|
path: pathname,
|
|
mode: header.FileInfo().Mode(),
|
|
})
|
|
if err = os.MkdirAll(
|
|
pathname.String(),
|
|
0700,
|
|
); err != nil {
|
|
return
|
|
}
|
|
break
|
|
|
|
case tar.TypeXGlobalHeader:
|
|
// ignore
|
|
break
|
|
|
|
default:
|
|
return DisallowedTypeflagError(typeflag)
|
|
}
|
|
|
|
break
|
|
}
|
|
}
|
|
if errors.Is(err, io.EOF) {
|
|
err = nil
|
|
}
|
|
if err == nil {
|
|
for _, e := range madeDirectories {
|
|
if err = os.Chmod(e.path.String(), e.mode&0500); err != nil {
|
|
return
|
|
}
|
|
}
|
|
} else {
|
|
return
|
|
}
|
|
|
|
var entries []os.DirEntry
|
|
if entries, err = os.ReadDir(temp.String()); err != nil {
|
|
return
|
|
}
|
|
|
|
if len(entries) == 1 && entries[0].IsDir() {
|
|
p := temp.Append(entries[0].Name())
|
|
if err = os.Chmod(p.String(), 0700); err != nil {
|
|
return
|
|
}
|
|
err = os.Rename(p.String(), work.String())
|
|
} else {
|
|
err = os.Rename(temp.String(), work.String())
|
|
}
|
|
return
|
|
}
|