108 lines
3.3 KiB
Go
108 lines
3.3 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package archive
|
|
|
|
import (
|
|
"archive/tar"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/moby/sys/sequential"
|
|
)
|
|
|
|
// chmodTarEntry is used to adjust the file permissions used in tar header based
|
|
// on the platform the archival is done.
|
|
func chmodTarEntry(perm os.FileMode) os.FileMode {
|
|
perm &= 0755
|
|
// Add the x bit: make everything +x from windows
|
|
perm |= 0111
|
|
|
|
return perm
|
|
}
|
|
|
|
func setHeaderForSpecialDevice(*tar.Header, string, os.FileInfo) error {
|
|
// do nothing. no notion of Rdev, Inode, Nlink in stat on Windows
|
|
return nil
|
|
}
|
|
|
|
func open(p string) (*os.File, error) {
|
|
// We use sequential file access to avoid depleting the standby list on
|
|
// Windows.
|
|
return sequential.Open(p)
|
|
}
|
|
|
|
func openFile(name string, flag int, perm os.FileMode) (*os.File, error) {
|
|
// Source is regular file. We use sequential file access to avoid depleting
|
|
// the standby list on Windows.
|
|
return sequential.OpenFile(name, flag, perm)
|
|
}
|
|
|
|
func mkdir(path string, perm os.FileMode) error {
|
|
return os.Mkdir(path, perm)
|
|
}
|
|
|
|
func skipFile(hdr *tar.Header) bool {
|
|
// Windows does not support filenames with colons in them. Ignore
|
|
// these files. This is not a problem though (although it might
|
|
// appear that it is). Let's suppose a client is running docker pull.
|
|
// The daemon it points to is Windows. Would it make sense for the
|
|
// client to be doing a docker pull Ubuntu for example (which has files
|
|
// with colons in the name under /usr/share/man/man3)? No, absolutely
|
|
// not as it would really only make sense that they were pulling a
|
|
// Windows image. However, for development, it is necessary to be able
|
|
// to pull Linux images which are in the repository.
|
|
//
|
|
// TODO Windows. Once the registry is aware of what images are Windows-
|
|
// specific or Linux-specific, this warning should be changed to an error
|
|
// to cater for the situation where someone does manage to upload a Linux
|
|
// image but have it tagged as Windows inadvertently.
|
|
return strings.Contains(hdr.Name, ":")
|
|
}
|
|
|
|
// handleTarTypeBlockCharFifo is an OS-specific helper function used by
|
|
// createTarFile to handle the following types of header: Block; Char; Fifo
|
|
func handleTarTypeBlockCharFifo(hdr *tar.Header, path string) error {
|
|
return nil
|
|
}
|
|
|
|
func lchmod(path string, mode os.FileMode) error {
|
|
return nil
|
|
}
|
|
|
|
func getxattr(path, attr string) ([]byte, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
func setxattr(path, key, value string) error {
|
|
// Return not support error, do not wrap underlying not supported
|
|
// since xattrs should not exist in windows diff archives
|
|
return errors.New("xattrs not supported on Windows")
|
|
}
|
|
|
|
func copyDirInfo(fi os.FileInfo, path string) error {
|
|
if err := os.Chmod(path, fi.Mode()); err != nil {
|
|
return fmt.Errorf("failed to chmod %s: %w", path, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func copyUpXAttrs(dst, src string) error {
|
|
return nil
|
|
}
|