Module: Docker::Util
- Includes:
- Error
- Defined in:
- lib/docker/util.rb
Overview
This module holds shared logic that doesn’t really belong anywhere else in the gem.
Constant Summary collapse
- GLOB_WILDCARDS =
/[\?\*\[\{\]\}]/
Class Method Summary collapse
- .add_file_to_tar(tar, name, mode, size, mtime) {|os| ... } ⇒ Object
-
.attach_for(block, msg_stack, tty = false) ⇒ Object
Attaches to a HTTP stream.
- .attach_for_multiplex(block, msg_stack) ⇒ Object
- .attach_for_tty(block, msg_stack) ⇒ Object
- .build_auth_header(credentials) ⇒ Object
- .build_config_header(credentials) ⇒ Object
- .close_write(socket) ⇒ Object
- .create_dir_tar(directory) ⇒ Object
- .create_relative_dir_tar(directory, output) ⇒ Object
- .create_tar(hash = {}) ⇒ Object
- .create_temp_file ⇒ Object
- .debug(msg) ⇒ Object
-
.docker_context(directory) ⇒ Object
return the set of files that form the docker context implement this logic docs.docker.com/engine/reference/builder/#dockerignore-file.
-
.dockerignore_compatible_glob(pattern) ⇒ Object
do a directory glob that matches .dockerignore behavior specifically: matched directories are considered a recursive match.
- .extract_id(body) ⇒ Object
-
.file_hash_from_paths(local_paths) ⇒ Object
Convenience method to get the file hash corresponding to an array of local paths.
- .filesystem_permissions(path) ⇒ Object
- .fix_json(body) ⇒ Object
- .glob_all_files(pattern) ⇒ Object
- .hijack_for(stdin, block, msg_stack, tty) ⇒ Object
- .parse_json(body) ⇒ Object
- .parse_repo_tag(str) ⇒ Object
Class Method Details
.add_file_to_tar(tar, name, mode, size, mtime) {|os| ... } ⇒ Object
191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 |
# File 'lib/docker/util.rb', line 191 def add_file_to_tar(tar, name, mode, size, mtime) tar.check_closed io = tar.instance_variable_get(:@io) name, prefix = tar.split_name(name) header = Gem::Package::TarHeader.new(:name => name, :mode => mode, :size => size, :prefix => prefix, :mtime => mtime).to_s io.write header os = Gem::Package::TarWriter::BoundedStream.new io, size yield os if block_given? min_padding = size - os.written io.write("\0" * min_padding) remainder = (512 - (size % 512)) % 512 io.write("\0" * remainder) tar end |
.attach_for(block, msg_stack, tty = false) ⇒ Object
Attaches to a HTTP stream
18 19 20 21 22 23 24 25 |
# File 'lib/docker/util.rb', line 18 def attach_for(block, msg_stack, tty = false) # If TTY is enabled expect raw data and append to stdout if tty attach_for_tty(block, msg_stack) else attach_for_multiplex(block, msg_stack) end end |
.attach_for_multiplex(block, msg_stack) ⇒ Object
38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 |
# File 'lib/docker/util.rb', line 38 def attach_for_multiplex(block, msg_stack) = Docker::Messages.new lambda do |c,r,t| = .(c) unless block.nil? ..each do |msg| block.call(:stdout, msg) end ..each do |msg| block.call(:stderr, msg) end end msg_stack.append() end end |
.attach_for_tty(block, msg_stack) ⇒ Object
27 28 29 30 31 32 33 34 35 36 |
# File 'lib/docker/util.rb', line 27 def attach_for_tty(block, msg_stack) = Docker::Messages.new lambda do |c,r,t| . << c . << c msg_stack.append() block.call c if block end end |
.build_auth_header(credentials) ⇒ Object
261 262 263 264 265 266 267 |
# File 'lib/docker/util.rb', line 261 def build_auth_header(credentials) credentials = MultiJson.dump(credentials) if credentials.is_a?(Hash) encoded_creds = Base64.urlsafe_encode64(credentials) { 'X-Registry-Auth' => encoded_creds } end |
.build_config_header(credentials) ⇒ Object
269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 |
# File 'lib/docker/util.rb', line 269 def build_config_header(credentials) if credentials.is_a?(String) credentials = MultiJson.load(credentials, symbolize_keys: true) end header = MultiJson.dump( credentials[:serveraddress].to_s => { 'username' => credentials[:username].to_s, 'password' => credentials[:password].to_s, 'email' => credentials[:email].to_s } ) encoded_header = Base64.urlsafe_encode64(header) { 'X-Registry-Config' => encoded_header } end |
.close_write(socket) ⇒ Object
96 97 98 99 100 101 102 103 104 |
# File 'lib/docker/util.rb', line 96 def close_write(socket) if socket.respond_to?(:close_write) socket.close_write elsif socket.respond_to?(:io) socket.io.close_write else raise IOError, 'Cannot close socket' end end |
.create_dir_tar(directory) ⇒ Object
138 139 140 141 142 143 144 145 |
# File 'lib/docker/util.rb', line 138 def create_dir_tar(directory) tempfile = create_temp_file directory += '/' unless directory.end_with?('/') create_relative_dir_tar(directory, tempfile) File.new(tempfile.path, 'r') end |
.create_relative_dir_tar(directory, output) ⇒ Object
173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 |
# File 'lib/docker/util.rb', line 173 def create_relative_dir_tar(directory, output) Gem::Package::TarWriter.new(output) do |tar| files = docker_context(directory) files.each do |prefixed_file_name| stat = File.stat(prefixed_file_name) next unless stat.file? unprefixed_file_name = prefixed_file_name[directory.length..-1] add_file_to_tar( tar, unprefixed_file_name, stat.mode, stat.size, stat.mtime ) do |tar_file| IO.copy_stream(File.open(prefixed_file_name, 'rb'), tar_file) end end end end |
.create_tar(hash = {}) ⇒ Object
124 125 126 127 128 129 130 131 132 133 134 135 136 |
# File 'lib/docker/util.rb', line 124 def create_tar(hash = {}) output = StringIO.new Gem::Package::TarWriter.new(output) do |tar| hash.each do |file_name, file_details| = file_details.is_a?(Hash) ? file_details[:permissions] : 0640 tar.add_file(file_name, ) do |tar_file| content = file_details.is_a?(Hash) ? file_details[:content] : file_details tar_file.write(content) end end end output.tap(&:rewind).string end |
.create_temp_file ⇒ Object
216 217 218 219 |
# File 'lib/docker/util.rb', line 216 def create_temp_file tempfile_name = Dir::Tmpname.create('out') {} File.open(tempfile_name, 'wb+') end |
.debug(msg) ⇒ Object
56 57 58 |
# File 'lib/docker/util.rb', line 56 def debug(msg) Docker.logger.debug(msg) if Docker.logger end |
.docker_context(directory) ⇒ Object
return the set of files that form the docker context implement this logic docs.docker.com/engine/reference/builder/#dockerignore-file
150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 |
# File 'lib/docker/util.rb', line 150 def docker_context(directory) all_files = glob_all_files(File.join(directory, "**/*")) dockerignore = File.join(directory, '.dockerignore') return all_files unless all_files.include?(dockerignore) # Iterate over valid lines, starting with the initial glob as working set File .read(dockerignore) # https://docs.docker.com/engine/reference/builder/#dockerignore-file .each_line # "a newline-separated list of patterns" .map(&:strip) # "A preprocessing step removes leading and trailing whitespace" .reject(&:empty?) # "Lines that are blank after preprocessing are ignored" .reject { |p| p.start_with?('#') } # "if [a line starts with `#`], then this line is considered as a comment" .each_with_object(Set.new(all_files)) do |p, working_set| # determine the pattern (p) and whether it is to be added or removed from context add = p.start_with?("!") # strip leading "!" from pattern p, then prepend the base directory matches = dockerignore_compatible_glob(File.join(directory, add ? p[1..-1] : p)) # add or remove the matched items as indicated in the ignore file add ? working_set.merge(matches) : working_set.replace(working_set.difference(matches)) end .to_a end |
.dockerignore_compatible_glob(pattern) ⇒ Object
do a directory glob that matches .dockerignore behavior specifically: matched directories are considered a recursive match
291 292 293 294 295 296 297 298 299 300 301 |
# File 'lib/docker/util.rb', line 291 def dockerignore_compatible_glob(pattern) begin some_dirs, some_files = glob_all_files(pattern).partition { |f| File.directory?(f) } # since all directories will be re-processed with a /**/* glob, we can preemptively # eliminate any whose parent directory is already in this set. This saves significant time. some_files + some_dirs.reject { |d| some_dirs.any? { |pd| d.start_with?(pd) && d != pd } } end.each_with_object(Set.new) do |f, acc| # expand any directories by globbing; flatten results acc.merge(File.directory?(f) ? glob_all_files("#{f}/**/*") : [f]) end end |
.extract_id(body) ⇒ Object
221 222 223 224 225 226 227 228 |
# File 'lib/docker/util.rb', line 221 def extract_id(body) body.lines.reverse_each do |line| if (id = line.match(/Successfully built ([a-f0-9]+)/)) && !id[1].empty? return id[1] end end raise UnexpectedResponseError, "Couldn't find id: #{body}" end |
.file_hash_from_paths(local_paths) ⇒ Object
Convenience method to get the file hash corresponding to an array of local paths.
232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 |
# File 'lib/docker/util.rb', line 232 def file_hash_from_paths(local_paths) local_paths.each_with_object({}) do |local_path, file_hash| unless File.exist?(local_path) raise ArgumentError, "#{local_path} does not exist." end basename = File.basename(local_path) if File.directory?(local_path) tar = create_dir_tar(local_path) file_hash[basename] = { content: tar.read, permissions: (local_path) } tar.close FileUtils.rm(tar.path) else file_hash[basename] = { content: File.read(local_path, mode: 'rb'), permissions: (local_path) } end end end |
.filesystem_permissions(path) ⇒ Object
256 257 258 259 |
# File 'lib/docker/util.rb', line 256 def (path) mode = sprintf("%o", File.stat(path).mode) mode[(mode.length - 3)...mode.length].to_i(8) end |
.fix_json(body) ⇒ Object
120 121 122 |
# File 'lib/docker/util.rb', line 120 def fix_json(body) parse_json("[#{body.gsub(/}\s*{/, '},{')}]") end |
.glob_all_files(pattern) ⇒ Object
303 304 305 306 |
# File 'lib/docker/util.rb', line 303 def glob_all_files(pattern) # globs of "a_dir/**/*" can return "a_dir/.", so explicitly reject those (Dir.glob(pattern, File::FNM_DOTMATCH) - ['..', '.']).reject { |p| p.end_with?("/.") } end |
.hijack_for(stdin, block, msg_stack, tty) ⇒ Object
60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 |
# File 'lib/docker/util.rb', line 60 def hijack_for(stdin, block, msg_stack, tty) attach_block = attach_for(block, msg_stack, tty) lambda do |socket| debug "hijack: hijacking the HTTP socket" threads = [] debug "hijack: starting stdin copy thread" threads << Thread.start do debug "hijack: copying stdin => socket" IO.copy_stream stdin, socket debug "hijack: closing write end of hijacked socket" close_write(socket) end debug "hijack: starting hijacked socket read thread" threads << Thread.start do debug "hijack: reading from hijacked socket" begin while chunk = socket.readpartial(512) debug "hijack: got #{chunk.bytesize} bytes from hijacked socket" attach_block.call chunk, nil, nil end rescue EOFError end debug "hijack: killing stdin copy thread" threads.first.kill end threads.each(&:join) end end |
.parse_json(body) ⇒ Object
106 107 108 109 110 |
# File 'lib/docker/util.rb', line 106 def parse_json(body) MultiJson.load(body) unless body.nil? || body.empty? || (body == 'null') rescue MultiJson::ParseError => ex raise UnexpectedResponseError, ex. end |
.parse_repo_tag(str) ⇒ Object
112 113 114 115 116 117 118 |
# File 'lib/docker/util.rb', line 112 def parse_repo_tag(str) if match = str.match(/\A(.*):([^:]*)\z/) match.captures else [str, ''] end end |