Documentation ¶
Index ¶
- Constants
- func CleanPath(path string) string
- func GenerateInsertLayer(root string, target string, opaque bool, opt *MapOptions) io.ReadCloser
- func GenerateLayer(path string, deltas []mtree.InodeDelta, opt *MapOptions) (io.ReadCloser, error)
- func InnerErrno(err error) error
- func ToRootless(spec *rspec.Spec)
- func UnpackLayer(root string, layer io.Reader, opt *MapOptions) error
- func UnpackManifest(ctx context.Context, engine cas.Engine, bundle string, manifest ispec.Manifest, ...) (err error)
- func UnpackRootfs(ctx context.Context, engine cas.Engine, rootfsPath string, ...) (err error)
- func UnpackRuntimeJSON(ctx context.Context, engine cas.Engine, configFile io.Writer, rootfs string, ...) error
- type MapOptions
- type TarExtractor
Constants ¶
const RootfsName = "rootfs"
RootfsName is the name of the rootfs directory inside the bundle path when generated.
Variables ¶
This section is empty.
Functions ¶
func CleanPath ¶
CleanPath makes a path safe for use with filepath.Join. This is done by not only cleaning the path, but also (if the path is relative) adding a leading '/' and cleaning it (then removing the leading '/'). This ensures that a path resulting from prepending another path will always resolve to lexically be a subdirectory of the prefixed path. This is all done lexically, so paths that include symlinks won't be safe as a result of using CleanPath.
This function comes from runC (libcontainer/utils/utils.go).
func GenerateInsertLayer ¶ added in v0.4.1
func GenerateInsertLayer(root string, target string, opaque bool, opt *MapOptions) io.ReadCloser
GenerateInsertLayer generates a completely new layer from "root"to be inserted into the image at "target". If "root" is an empty string then the "target" will be removed via a whiteout.
func GenerateLayer ¶
func GenerateLayer(path string, deltas []mtree.InodeDelta, opt *MapOptions) (io.ReadCloser, error)
GenerateLayer creates a new OCI diff layer based on the mtree diff provided. All of the mtree.Modified and mtree.Extra blobs are read relative to the provided path (which should be the rootfs of the layer that was diffed). The returned reader is for the *raw* tar data, it is the caller's responsibility to gzip it.
func InnerErrno ¶ added in v0.4.2
InnerErrno returns the "real" system error from an error that originally came from the "os" package. The returned error can be compared directly with unix.* (or syscall.*) errno values. If the type could not be detected we just return
func ToRootless ¶
ToRootless converts a specification to a version that works with rootless containers. This is done by removing options and other settings that clash with unprivileged user namespaces.
func UnpackLayer ¶
func UnpackLayer(root string, layer io.Reader, opt *MapOptions) error
UnpackLayer unpacks the tar stream representing an OCI layer at the given root. It ensures that the state of the root is as close as possible to the state used to create the layer. If an error is returned, the state of root is undefined (unpacking is not guaranteed to be atomic).
func UnpackManifest ¶
func UnpackManifest(ctx context.Context, engine cas.Engine, bundle string, manifest ispec.Manifest, opt *MapOptions) (err error)
UnpackManifest extracts all of the layers in the given manifest, as well as generating a runtime bundle and configuration. The rootfs is extracted to <bundle>/<layer.RootfsName>.
FIXME: This interface is ugly.
func UnpackRootfs ¶ added in v0.4.1
func UnpackRootfs(ctx context.Context, engine cas.Engine, rootfsPath string, manifest ispec.Manifest, opt *MapOptions) (err error)
UnpackRootfs extracts all of the layers in the given manifest. Some verification is done during image extraction.
func UnpackRuntimeJSON ¶ added in v0.2.0
func UnpackRuntimeJSON(ctx context.Context, engine cas.Engine, configFile io.Writer, rootfs string, manifest ispec.Manifest, opt *MapOptions) error
UnpackRuntimeJSON converts a given manifest's configuration to a runtime configuration and writes it to the given writer. If rootfs is specified, it is sourced during the configuration generation (for conversion of Config.User and other similar jobs -- which will error out if the user could not be parsed). If rootfs is not specified (is an empty string) then all conversions that require sourcing the rootfs will be set to their default values.
XXX: I don't like this API. It has way too many arguments.
Types ¶
type MapOptions ¶
type MapOptions struct { // UIDMappings and GIDMappings are the UID and GID mappings to apply when // packing and unpacking image rootfs layers. UIDMappings []rspec.LinuxIDMapping `json:"uid_mappings"` GIDMappings []rspec.LinuxIDMapping `json:"gid_mappings"` // Rootless specifies whether any to error out if chown fails. Rootless bool `json:"rootless"` // KeepDirlinks is essentially the same as rsync's optio // --keep-dirlinks: if, on extraction, a directory would be created // where a symlink to a directory previously existed, KeepDirlinks // doesn't create that directory, but instead just uses the existing // symlink. KeepDirlinks bool `json:"-"` }
MapOptions specifies the UID and GID mappings used when unpacking and repacking images.
type TarExtractor ¶ added in v0.4.2
type TarExtractor struct {
// contains filtered or unexported fields
}
TarExtractor represents a tar file to be extracted.
func NewTarExtractor ¶ added in v0.4.2
func NewTarExtractor(opt MapOptions) *TarExtractor
NewTarExtractor creates a new TarExtractor.
func (*TarExtractor) UnpackEntry ¶ added in v0.4.2
UnpackEntry extracts the given tar.Header to the provided root, ensuring that the layer state is consistent with the layer state that produced the tar archive being iterated over. This does handle whiteouts, so a tar.Header that represents a whiteout will result in the path being removed.