 bbe46b8c43
			
		
	
	bbe46b8c43
	
	
	
		
			
			Signed-off-by: haoyun <yun.hao@daocloud.io> Co-authored-by: zounengren <zouyee1989@gmail.com>
		
			
				
	
	
		
			123 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			123 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package archive
 | |
| 
 | |
| import (
 | |
| 	"archive/tar"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/containerd/containerd/sys"
 | |
| )
 | |
| 
 | |
| // tarName returns platform-specific filepath
 | |
| // to canonical posix-style path for tar archival. p is relative
 | |
| // path.
 | |
| func tarName(p string) (string, error) {
 | |
| 	// windows: convert windows style relative path with backslashes
 | |
| 	// into forward slashes. Since windows does not allow '/' or '\'
 | |
| 	// in file names, it is mostly safe to replace however we must
 | |
| 	// check just in case
 | |
| 	if strings.Contains(p, "/") {
 | |
| 		return "", fmt.Errorf("windows path contains forward slash: %s", p)
 | |
| 	}
 | |
| 
 | |
| 	return strings.Replace(p, string(os.PathSeparator), "/", -1), nil
 | |
| }
 | |
| 
 | |
| // chmodTarEntry is used to adjust the file permissions used in tar header based
 | |
| // on the platform the archival is done.
 | |
| func chmodTarEntry(perm os.FileMode) os.FileMode {
 | |
| 	perm &= 0755
 | |
| 	// Add the x bit: make everything +x from windows
 | |
| 	perm |= 0111
 | |
| 
 | |
| 	return perm
 | |
| }
 | |
| 
 | |
| func setHeaderForSpecialDevice(*tar.Header, string, os.FileInfo) error {
 | |
| 	// do nothing. no notion of Rdev, Inode, Nlink in stat on Windows
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func open(p string) (*os.File, error) {
 | |
| 	// We use sys.OpenSequential to ensure we use sequential file
 | |
| 	// access on Windows to avoid depleting the standby list.
 | |
| 	return sys.OpenSequential(p)
 | |
| }
 | |
| 
 | |
| func openFile(name string, flag int, perm os.FileMode) (*os.File, error) {
 | |
| 	// Source is regular file. We use sys.OpenFileSequential to use sequential
 | |
| 	// file access to avoid depleting the standby list on Windows.
 | |
| 	return sys.OpenFileSequential(name, flag, perm)
 | |
| }
 | |
| 
 | |
| func mkdir(path string, perm os.FileMode) error {
 | |
| 	return os.Mkdir(path, perm)
 | |
| }
 | |
| 
 | |
| func skipFile(hdr *tar.Header) bool {
 | |
| 	// Windows does not support filenames with colons in them. Ignore
 | |
| 	// these files. This is not a problem though (although it might
 | |
| 	// appear that it is). Let's suppose a client is running docker pull.
 | |
| 	// The daemon it points to is Windows. Would it make sense for the
 | |
| 	// client to be doing a docker pull Ubuntu for example (which has files
 | |
| 	// with colons in the name under /usr/share/man/man3)? No, absolutely
 | |
| 	// not as it would really only make sense that they were pulling a
 | |
| 	// Windows image. However, for development, it is necessary to be able
 | |
| 	// to pull Linux images which are in the repository.
 | |
| 	//
 | |
| 	// TODO Windows. Once the registry is aware of what images are Windows-
 | |
| 	// specific or Linux-specific, this warning should be changed to an error
 | |
| 	// to cater for the situation where someone does manage to upload a Linux
 | |
| 	// image but have it tagged as Windows inadvertently.
 | |
| 	return strings.Contains(hdr.Name, ":")
 | |
| }
 | |
| 
 | |
| // handleTarTypeBlockCharFifo is an OS-specific helper function used by
 | |
| // createTarFile to handle the following types of header: Block; Char; Fifo
 | |
| func handleTarTypeBlockCharFifo(hdr *tar.Header, path string) error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func lchmod(path string, mode os.FileMode) error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func getxattr(path, attr string) ([]byte, error) {
 | |
| 	return nil, nil
 | |
| }
 | |
| 
 | |
| func setxattr(path, key, value string) error {
 | |
| 	// Return not support error, do not wrap underlying not supported
 | |
| 	// since xattrs should not exist in windows diff archives
 | |
| 	return errors.New("xattrs not supported on Windows")
 | |
| }
 | |
| 
 | |
| func copyDirInfo(fi os.FileInfo, path string) error {
 | |
| 	if err := os.Chmod(path, fi.Mode()); err != nil {
 | |
| 		return fmt.Errorf("failed to chmod %s: %w", path, err)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func copyUpXAttrs(dst, src string) error {
 | |
| 	return nil
 | |
| }
 |