Skip to content

Commit d3c2351

Browse files
authored
Merge pull request #113 from darstahl/ResolveRoot
Resolve context root on context.Walk when root is symlink
2 parents a60600a + 5633c24 commit d3c2351

13 files changed

+293
-9
lines changed

context.go

+19-3
Original file line numberDiff line numberDiff line change
@@ -572,8 +572,16 @@ func (c *context) Apply(resource Resource) error {
572572
// the context. Otherwise identical to filepath.Walk, the path argument is
573573
// corrected to be contained within the context.
574574
func (c *context) Walk(fn filepath.WalkFunc) error {
575-
return c.pathDriver.Walk(c.root, func(p string, fi os.FileInfo, err error) error {
576-
contained, err := c.contain(p)
575+
root := c.root
576+
fi, err := c.driver.Lstat(c.root)
577+
if err == nil && fi.Mode()&os.ModeSymlink != 0 {
578+
root, err = c.driver.Readlink(c.root)
579+
if err != nil {
580+
return err
581+
}
582+
}
583+
return c.pathDriver.Walk(root, func(p string, fi os.FileInfo, err error) error {
584+
contained, err := c.containWithRoot(p, root)
577585
return fn(contained, fi, err)
578586
})
579587
}
@@ -592,7 +600,15 @@ func (c *context) fullpath(p string) (string, error) {
592600
// contain cleans and santizes the filesystem path p to be an absolute path,
593601
// effectively relative to the context root.
594602
func (c *context) contain(p string) (string, error) {
595-
sanitized, err := c.pathDriver.Rel(c.root, p)
603+
return c.containWithRoot(p, c.root)
604+
}
605+
606+
// containWithRoot cleans and santizes the filesystem path p to be an absolute path,
607+
// effectively relative to the passed root. Extra care should be used when calling this
608+
// instead of contain. This is needed for Walk, as if context root is a symlink,
609+
// it must be evaluated prior to the Walk
610+
func (c *context) containWithRoot(p string, root string) (string, error) {
611+
sanitized, err := c.pathDriver.Rel(root, p)
596612
if err != nil {
597613
return "", err
598614
}

driver/driver.go

-4
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,6 @@ func (d *driver) Lstat(p string) (os.FileInfo, error) {
122122
return os.Lstat(p)
123123
}
124124

125-
func (d *driver) Readlink(p string) (string, error) {
126-
return os.Readlink(p)
127-
}
128-
129125
func (d *driver) Mkdir(p string, mode os.FileMode) error {
130126
return os.Mkdir(p, mode)
131127
}

driver/driver_unix.go

+5
Original file line numberDiff line numberDiff line change
@@ -120,3 +120,8 @@ func (d *driver) LSetxattr(path string, attrMap map[string][]byte) error {
120120
func (d *driver) DeviceInfo(fi os.FileInfo) (maj uint64, min uint64, err error) {
121121
return devices.DeviceInfo(fi)
122122
}
123+
124+
// Readlink was forked on Windows to fix a Golang bug, use the "os" package here
125+
func (d *driver) Readlink(p string) (string, error) {
126+
return os.Readlink(p)
127+
}

driver/driver_windows.go

+7
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package driver
33
import (
44
"os"
55

6+
"github.com/containerd/continuity/sysx"
67
"github.com/pkg/errors"
78
)
89

@@ -19,3 +20,9 @@ func (d *driver) Lchmod(path string, mode os.FileMode) (err error) {
1920
// TODO: Use Window's equivalent
2021
return os.Chmod(path, mode)
2122
}
23+
24+
// Readlink is forked in order to support Volume paths which are used
25+
// in container layers.
26+
func (d *driver) Readlink(p string) (string, error) {
27+
return sysx.Readlink(p)
28+
}

fs/fstest/compare.go

+9-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,15 @@ func CheckDirectoryEqual(d1, d2 string) error {
3333

3434
diff := diffResourceList(m1.Resources, m2.Resources)
3535
if diff.HasDiff() {
36-
return errors.Errorf("directory diff between %s and %s\n%s", d1, d2, diff.String())
36+
if len(diff.Deletions) != 0 {
37+
return errors.Errorf("directory diff between %s and %s\n%s", d1, d2, diff.String())
38+
}
39+
// TODO: Also skip Recycle Bin contents in Windows layers which is used to store deleted files in some cases
40+
for _, add := range diff.Additions {
41+
if ok, _ := metadataFiles[add.Path()]; !ok {
42+
return errors.Errorf("directory diff between %s and %s\n%s", d1, d2, diff.String())
43+
}
44+
}
3745
}
3846

3947
return nil

fs/fstest/compare_unix.go

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
// +build !windows
2+
3+
package fstest
4+
5+
var metadataFiles map[string]bool

fs/fstest/compare_windows.go

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
package fstest
2+
3+
// TODO: Any more metadata files generated by Windows layers?
4+
var metadataFiles = map[string]bool{
5+
"\\System Volume Information": true,
6+
"\\WcSandboxState": true,
7+
}

fs/fstest/file_unix.go

+7
Original file line numberDiff line numberDiff line change
@@ -27,3 +27,10 @@ func Lchtimes(name string, atime, mtime time.Time) Applier {
2727
return unix.UtimesNanoAt(unix.AT_FDCWD, path, utimes[0:], unix.AT_SYMLINK_NOFOLLOW)
2828
})
2929
}
30+
31+
func Base() Applier {
32+
return applyFn(func(root string) error {
33+
// do nothing, as the base is not special
34+
return nil
35+
})
36+
}

fs/fstest/file_windows.go

+15
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,18 @@ func Lchtimes(name string, atime, mtime time.Time) Applier {
1212
return errors.New("Not implemented")
1313
})
1414
}
15+
16+
// Base applies the files required to make a valid Windows container layer
17+
// that the filter will mount. It is used for testing the snapshotter
18+
func Base() Applier {
19+
return Apply(
20+
CreateDir("Windows", 0755),
21+
CreateDir("Windows/System32", 0755),
22+
CreateDir("Windows/System32/Config", 0755),
23+
CreateFile("Windows/System32/Config/SYSTEM", []byte("foo\n"), 0777),
24+
CreateFile("Windows/System32/Config/SOFTWARE", []byte("foo\n"), 0777),
25+
CreateFile("Windows/System32/Config/SAM", []byte("foo\n"), 0777),
26+
CreateFile("Windows/System32/Config/SECURITY", []byte("foo\n"), 0777),
27+
CreateFile("Windows/System32/Config/DEFAULT", []byte("foo\n"), 0777),
28+
)
29+
}

manifest.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ func BuildManifest(ctx Context) (*Manifest, error) {
6666
return fmt.Errorf("error walking %s: %v", p, err)
6767
}
6868

69-
if p == "/" {
69+
if p == string(os.PathSeparator) {
7070
// skip root
7171
return nil
7272
}

syscallx/syscall_unix.go

+10
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
// +build !windows
2+
3+
package syscallx
4+
5+
import "syscall"
6+
7+
// Readlink returns the destination of the named symbolic link.
8+
func Readlink(path string, buf []byte) (n int, err error) {
9+
return syscall.Readlink(path, buf)
10+
}

syscallx/syscall_windows.go

+96
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
package syscallx
2+
3+
import (
4+
"syscall"
5+
"unsafe"
6+
)
7+
8+
type reparseDataBuffer struct {
9+
ReparseTag uint32
10+
ReparseDataLength uint16
11+
Reserved uint16
12+
13+
// GenericReparseBuffer
14+
reparseBuffer byte
15+
}
16+
17+
type mountPointReparseBuffer struct {
18+
SubstituteNameOffset uint16
19+
SubstituteNameLength uint16
20+
PrintNameOffset uint16
21+
PrintNameLength uint16
22+
PathBuffer [1]uint16
23+
}
24+
25+
type symbolicLinkReparseBuffer struct {
26+
SubstituteNameOffset uint16
27+
SubstituteNameLength uint16
28+
PrintNameOffset uint16
29+
PrintNameLength uint16
30+
Flags uint32
31+
PathBuffer [1]uint16
32+
}
33+
34+
const (
35+
_IO_REPARSE_TAG_MOUNT_POINT = 0xA0000003
36+
_SYMLINK_FLAG_RELATIVE = 1
37+
)
38+
39+
// Readlink returns the destination of the named symbolic link.
40+
func Readlink(path string, buf []byte) (n int, err error) {
41+
fd, err := syscall.CreateFile(syscall.StringToUTF16Ptr(path), syscall.GENERIC_READ, 0, nil, syscall.OPEN_EXISTING,
42+
syscall.FILE_FLAG_OPEN_REPARSE_POINT|syscall.FILE_FLAG_BACKUP_SEMANTICS, 0)
43+
if err != nil {
44+
return -1, err
45+
}
46+
defer syscall.CloseHandle(fd)
47+
48+
rdbbuf := make([]byte, syscall.MAXIMUM_REPARSE_DATA_BUFFER_SIZE)
49+
var bytesReturned uint32
50+
err = syscall.DeviceIoControl(fd, syscall.FSCTL_GET_REPARSE_POINT, nil, 0, &rdbbuf[0], uint32(len(rdbbuf)), &bytesReturned, nil)
51+
if err != nil {
52+
return -1, err
53+
}
54+
55+
rdb := (*reparseDataBuffer)(unsafe.Pointer(&rdbbuf[0]))
56+
var s string
57+
switch rdb.ReparseTag {
58+
case syscall.IO_REPARSE_TAG_SYMLINK:
59+
data := (*symbolicLinkReparseBuffer)(unsafe.Pointer(&rdb.reparseBuffer))
60+
p := (*[0xffff]uint16)(unsafe.Pointer(&data.PathBuffer[0]))
61+
s = syscall.UTF16ToString(p[data.SubstituteNameOffset/2 : (data.SubstituteNameOffset+data.SubstituteNameLength)/2])
62+
if data.Flags&_SYMLINK_FLAG_RELATIVE == 0 {
63+
if len(s) >= 4 && s[:4] == `\??\` {
64+
s = s[4:]
65+
switch {
66+
case len(s) >= 2 && s[1] == ':': // \??\C:\foo\bar
67+
// do nothing
68+
case len(s) >= 4 && s[:4] == `UNC\`: // \??\UNC\foo\bar
69+
s = `\\` + s[4:]
70+
default:
71+
// unexpected; do nothing
72+
}
73+
} else {
74+
// unexpected; do nothing
75+
}
76+
}
77+
case _IO_REPARSE_TAG_MOUNT_POINT:
78+
data := (*mountPointReparseBuffer)(unsafe.Pointer(&rdb.reparseBuffer))
79+
p := (*[0xffff]uint16)(unsafe.Pointer(&data.PathBuffer[0]))
80+
s = syscall.UTF16ToString(p[data.SubstituteNameOffset/2 : (data.SubstituteNameOffset+data.SubstituteNameLength)/2])
81+
if len(s) >= 4 && s[:4] == `\??\` { // \??\C:\foo\bar
82+
if len(s) < 48 || s[:11] != `\??\Volume{` {
83+
s = s[4:]
84+
}
85+
} else {
86+
// unexpected; do nothing
87+
}
88+
default:
89+
// the path is not a symlink or junction but another type of reparse
90+
// point
91+
return -1, syscall.ENOENT
92+
}
93+
n = copy(buf, []byte(s))
94+
95+
return n, nil
96+
}

sysx/file_posix.go

+112
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,112 @@
1+
package sysx
2+
3+
import (
4+
"os"
5+
"path/filepath"
6+
7+
"github.com/containerd/continuity/syscallx"
8+
)
9+
10+
// Readlink returns the destination of the named symbolic link.
11+
// If there is an error, it will be of type *PathError.
12+
func Readlink(name string) (string, error) {
13+
for len := 128; ; len *= 2 {
14+
b := make([]byte, len)
15+
n, e := fixCount(syscallx.Readlink(fixLongPath(name), b))
16+
if e != nil {
17+
return "", &os.PathError{Op: "readlink", Path: name, Err: e}
18+
}
19+
if n < len {
20+
return string(b[0:n]), nil
21+
}
22+
}
23+
}
24+
25+
// Many functions in package syscall return a count of -1 instead of 0.
26+
// Using fixCount(call()) instead of call() corrects the count.
27+
func fixCount(n int, err error) (int, error) {
28+
if n < 0 {
29+
n = 0
30+
}
31+
return n, err
32+
}
33+
34+
// fixLongPath returns the extended-length (\\?\-prefixed) form of
35+
// path when needed, in order to avoid the default 260 character file
36+
// path limit imposed by Windows. If path is not easily converted to
37+
// the extended-length form (for example, if path is a relative path
38+
// or contains .. elements), or is short enough, fixLongPath returns
39+
// path unmodified.
40+
//
41+
// See https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247(v=vs.85).aspx#maxpath
42+
func fixLongPath(path string) string {
43+
// Do nothing (and don't allocate) if the path is "short".
44+
// Empirically (at least on the Windows Server 2013 builder),
45+
// the kernel is arbitrarily okay with < 248 bytes. That
46+
// matches what the docs above say:
47+
// "When using an API to create a directory, the specified
48+
// path cannot be so long that you cannot append an 8.3 file
49+
// name (that is, the directory name cannot exceed MAX_PATH
50+
// minus 12)." Since MAX_PATH is 260, 260 - 12 = 248.
51+
//
52+
// The MSDN docs appear to say that a normal path that is 248 bytes long
53+
// will work; empirically the path must be less then 248 bytes long.
54+
if len(path) < 248 {
55+
// Don't fix. (This is how Go 1.7 and earlier worked,
56+
// not automatically generating the \\?\ form)
57+
return path
58+
}
59+
60+
// The extended form begins with \\?\, as in
61+
// \\?\c:\windows\foo.txt or \\?\UNC\server\share\foo.txt.
62+
// The extended form disables evaluation of . and .. path
63+
// elements and disables the interpretation of / as equivalent
64+
// to \. The conversion here rewrites / to \ and elides
65+
// . elements as well as trailing or duplicate separators. For
66+
// simplicity it avoids the conversion entirely for relative
67+
// paths or paths containing .. elements. For now,
68+
// \\server\share paths are not converted to
69+
// \\?\UNC\server\share paths because the rules for doing so
70+
// are less well-specified.
71+
if len(path) >= 2 && path[:2] == `\\` {
72+
// Don't canonicalize UNC paths.
73+
return path
74+
}
75+
if !filepath.IsAbs(path) {
76+
// Relative path
77+
return path
78+
}
79+
80+
const prefix = `\\?`
81+
82+
pathbuf := make([]byte, len(prefix)+len(path)+len(`\`))
83+
copy(pathbuf, prefix)
84+
n := len(path)
85+
r, w := 0, len(prefix)
86+
for r < n {
87+
switch {
88+
case os.IsPathSeparator(path[r]):
89+
// empty block
90+
r++
91+
case path[r] == '.' && (r+1 == n || os.IsPathSeparator(path[r+1])):
92+
// /./
93+
r++
94+
case r+1 < n && path[r] == '.' && path[r+1] == '.' && (r+2 == n || os.IsPathSeparator(path[r+2])):
95+
// /../ is currently unhandled
96+
return path
97+
default:
98+
pathbuf[w] = '\\'
99+
w++
100+
for ; r < n && !os.IsPathSeparator(path[r]); r++ {
101+
pathbuf[w] = path[r]
102+
w++
103+
}
104+
}
105+
}
106+
// A drive's root directory needs a trailing \
107+
if w == len(`\\?\c:`) {
108+
pathbuf[w] = '\\'
109+
w++
110+
}
111+
return string(pathbuf[:w])
112+
}

0 commit comments

Comments
 (0)