mirror of
https://github.com/rancher/os.git
synced 2025-08-11 03:22:49 +00:00
100 lines
2.7 KiB
Go
100 lines
2.7 KiB
Go
// Copyright 2015 go-dockerclient authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package docker
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/docker/docker/pkg/archive"
|
|
"github.com/docker/docker/pkg/fileutils"
|
|
)
|
|
|
|
func createTarStream(srcPath string) (io.ReadCloser, error) {
|
|
excludes, err := parseDockerignore(srcPath)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err := validateContextDirectory(srcPath, excludes); err != nil {
|
|
return nil, err
|
|
}
|
|
tarOpts := &archive.TarOptions{
|
|
ExcludePatterns: excludes,
|
|
Compression: archive.Uncompressed,
|
|
NoLchown: true,
|
|
}
|
|
return archive.TarWithOptions(srcPath, tarOpts)
|
|
}
|
|
|
|
// validateContextDirectory checks if all the contents of the directory
|
|
// can be read and returns an error if some files can't be read.
|
|
// Symlinks which point to non-existing files don't trigger an error
|
|
func validateContextDirectory(srcPath string, excludes []string) error {
|
|
return filepath.Walk(filepath.Join(srcPath, "."), func(filePath string, f os.FileInfo, err error) error {
|
|
// skip this directory/file if it's not in the path, it won't get added to the context
|
|
if relFilePath, err := filepath.Rel(srcPath, filePath); err != nil {
|
|
return err
|
|
} else if skip, err := fileutils.Matches(relFilePath, excludes); err != nil {
|
|
return err
|
|
} else if skip {
|
|
if f.IsDir() {
|
|
return filepath.SkipDir
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if err != nil {
|
|
if os.IsPermission(err) {
|
|
return fmt.Errorf("can't stat '%s'", filePath)
|
|
}
|
|
if os.IsNotExist(err) {
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
// skip checking if symlinks point to non-existing files, such symlinks can be useful
|
|
// also skip named pipes, because they hanging on open
|
|
if f.Mode()&(os.ModeSymlink|os.ModeNamedPipe) != 0 {
|
|
return nil
|
|
}
|
|
|
|
if !f.IsDir() {
|
|
currentFile, err := os.Open(filePath)
|
|
if err != nil && os.IsPermission(err) {
|
|
return fmt.Errorf("no permission to read from '%s'", filePath)
|
|
}
|
|
currentFile.Close()
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func parseDockerignore(root string) ([]string, error) {
|
|
var excludes []string
|
|
ignore, err := ioutil.ReadFile(path.Join(root, ".dockerignore"))
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return excludes, fmt.Errorf("error reading .dockerignore: '%s'", err)
|
|
}
|
|
for _, pattern := range strings.Split(string(ignore), "\n") {
|
|
matches, err := filepath.Match(pattern, "Dockerfile")
|
|
if err != nil {
|
|
return excludes, fmt.Errorf("bad .dockerignore pattern: '%s', error: %s", pattern, err)
|
|
}
|
|
if matches {
|
|
return excludes, fmt.Errorf("dockerfile was excluded by .dockerignore pattern '%s'", pattern)
|
|
}
|
|
excludes = append(excludes, pattern)
|
|
}
|
|
|
|
return excludes, nil
|
|
}
|