Merge pull request #556 from vmarmol/kube
Updating Docker dependency to match Kubernetes'
This commit is contained in:
commit
bd06eda9c2
12
Godeps/Godeps.json
generated
12
Godeps/Godeps.json
generated
@ -48,18 +48,18 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/docker/docker/pkg/mount",
|
"ImportPath": "github.com/docker/docker/pkg/mount",
|
||||||
"Comment": "v1.1.1-402-g487a417",
|
"Comment": "v1.4.1-1379-g8e107a9",
|
||||||
"Rev": "487a417d9fd074d0e78876072c7d1ebfd398ea7a"
|
"Rev": "8e107a93210c54f22ec1354d969c771b1abfbe05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/docker/docker/pkg/symlink",
|
"ImportPath": "github.com/docker/docker/pkg/symlink",
|
||||||
"Comment": "v1.1.1-402-g487a417",
|
"Comment": "v1.4.1-1379-g8e107a9",
|
||||||
"Rev": "487a417d9fd074d0e78876072c7d1ebfd398ea7a"
|
"Rev": "8e107a93210c54f22ec1354d969c771b1abfbe05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/docker/docker/pkg/units",
|
"ImportPath": "github.com/docker/docker/pkg/units",
|
||||||
"Comment": "v1.1.1-402-g487a417",
|
"Comment": "v1.4.1-1379-g8e107a9",
|
||||||
"Rev": "487a417d9fd074d0e78876072c7d1ebfd398ea7a"
|
"Rev": "8e107a93210c54f22ec1354d969c771b1abfbe05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/docker/libcontainer",
|
"ImportPath": "github.com/docker/libcontainer",
|
||||||
|
7
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags.go
generated
vendored
7
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags.go
generated
vendored
@ -37,7 +37,14 @@ func parseOptions(options string) (int, string) {
|
|||||||
"nodiratime": {false, NODIRATIME},
|
"nodiratime": {false, NODIRATIME},
|
||||||
"bind": {false, BIND},
|
"bind": {false, BIND},
|
||||||
"rbind": {false, RBIND},
|
"rbind": {false, RBIND},
|
||||||
|
"unbindable": {false, UNBINDABLE},
|
||||||
|
"runbindable": {false, RUNBINDABLE},
|
||||||
"private": {false, PRIVATE},
|
"private": {false, PRIVATE},
|
||||||
|
"rprivate": {false, RPRIVATE},
|
||||||
|
"shared": {false, SHARED},
|
||||||
|
"rshared": {false, RSHARED},
|
||||||
|
"slave": {false, SLAVE},
|
||||||
|
"rslave": {false, RSLAVE},
|
||||||
"relatime": {false, RELATIME},
|
"relatime": {false, RELATIME},
|
||||||
"norelatime": {true, RELATIME},
|
"norelatime": {true, RELATIME},
|
||||||
"strictatime": {false, STRICTATIME},
|
"strictatime": {false, STRICTATIME},
|
||||||
|
7
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags_freebsd.go
generated
vendored
7
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags_freebsd.go
generated
vendored
@ -19,7 +19,14 @@ const (
|
|||||||
MANDLOCK = 0
|
MANDLOCK = 0
|
||||||
NODEV = 0
|
NODEV = 0
|
||||||
NODIRATIME = 0
|
NODIRATIME = 0
|
||||||
|
UNBINDABLE = 0
|
||||||
|
RUNBINDABLE = 0
|
||||||
PRIVATE = 0
|
PRIVATE = 0
|
||||||
|
RPRIVATE = 0
|
||||||
|
SHARED = 0
|
||||||
|
RSHARED = 0
|
||||||
|
SLAVE = 0
|
||||||
|
RSLAVE = 0
|
||||||
RBIND = 0
|
RBIND = 0
|
||||||
RELATIVE = 0
|
RELATIVE = 0
|
||||||
RELATIME = 0
|
RELATIME = 0
|
||||||
|
9
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags_linux.go
generated
vendored
9
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags_linux.go
generated
vendored
@ -1,5 +1,3 @@
|
|||||||
// +build amd64
|
|
||||||
|
|
||||||
package mount
|
package mount
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@ -19,7 +17,14 @@ const (
|
|||||||
NODIRATIME = syscall.MS_NODIRATIME
|
NODIRATIME = syscall.MS_NODIRATIME
|
||||||
BIND = syscall.MS_BIND
|
BIND = syscall.MS_BIND
|
||||||
RBIND = syscall.MS_BIND | syscall.MS_REC
|
RBIND = syscall.MS_BIND | syscall.MS_REC
|
||||||
|
UNBINDABLE = syscall.MS_UNBINDABLE
|
||||||
|
RUNBINDABLE = syscall.MS_UNBINDABLE | syscall.MS_REC
|
||||||
PRIVATE = syscall.MS_PRIVATE
|
PRIVATE = syscall.MS_PRIVATE
|
||||||
|
RPRIVATE = syscall.MS_PRIVATE | syscall.MS_REC
|
||||||
|
SLAVE = syscall.MS_SLAVE
|
||||||
|
RSLAVE = syscall.MS_SLAVE | syscall.MS_REC
|
||||||
|
SHARED = syscall.MS_SHARED
|
||||||
|
RSHARED = syscall.MS_SHARED | syscall.MS_REC
|
||||||
RELATIME = syscall.MS_RELATIME
|
RELATIME = syscall.MS_RELATIME
|
||||||
STRICTATIME = syscall.MS_STRICTATIME
|
STRICTATIME = syscall.MS_STRICTATIME
|
||||||
)
|
)
|
||||||
|
9
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags_unsupported.go
generated
vendored
9
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/flags_unsupported.go
generated
vendored
@ -1,4 +1,4 @@
|
|||||||
// +build !linux,!freebsd linux,!amd64 freebsd,!cgo
|
// +build !linux,!freebsd freebsd,!cgo
|
||||||
|
|
||||||
package mount
|
package mount
|
||||||
|
|
||||||
@ -11,7 +11,14 @@ const (
|
|||||||
NODIRATIME = 0
|
NODIRATIME = 0
|
||||||
NOEXEC = 0
|
NOEXEC = 0
|
||||||
NOSUID = 0
|
NOSUID = 0
|
||||||
|
UNBINDABLE = 0
|
||||||
|
RUNBINDABLE = 0
|
||||||
PRIVATE = 0
|
PRIVATE = 0
|
||||||
|
RPRIVATE = 0
|
||||||
|
SHARED = 0
|
||||||
|
RSHARED = 0
|
||||||
|
SLAVE = 0
|
||||||
|
RSLAVE = 0
|
||||||
RBIND = 0
|
RBIND = 0
|
||||||
RELATIME = 0
|
RELATIME = 0
|
||||||
RELATIVE = 0
|
RELATIVE = 0
|
||||||
|
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mounter_linux.go
generated
vendored
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mounter_linux.go
generated
vendored
@ -1,5 +1,3 @@
|
|||||||
// +build amd64
|
|
||||||
|
|
||||||
package mount
|
package mount
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mounter_unsupported.go
generated
vendored
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mounter_unsupported.go
generated
vendored
@ -1,4 +1,4 @@
|
|||||||
// +build !linux,!freebsd linux,!amd64 freebsd,!cgo
|
// +build !linux,!freebsd freebsd,!cgo
|
||||||
|
|
||||||
package mount
|
package mount
|
||||||
|
|
||||||
|
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mountinfo.go
generated
vendored
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mountinfo.go
generated
vendored
@ -2,6 +2,6 @@ package mount
|
|||||||
|
|
||||||
type MountInfo struct {
|
type MountInfo struct {
|
||||||
Id, Parent, Major, Minor int
|
Id, Parent, Major, Minor int
|
||||||
Root, Mountpoint, Opts string
|
Root, Mountpoint, Opts, Optional string
|
||||||
Fstype, Source, VfsOpts string
|
Fstype, Source, VfsOpts string
|
||||||
}
|
}
|
||||||
|
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mountinfo_freebsd.go
generated
vendored
2
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mountinfo_freebsd.go
generated
vendored
@ -32,6 +32,8 @@ func parseMountTable() ([]*MountInfo, error) {
|
|||||||
for _, entry := range entries {
|
for _, entry := range entries {
|
||||||
var mountinfo MountInfo
|
var mountinfo MountInfo
|
||||||
mountinfo.Mountpoint = C.GoString(&entry.f_mntonname[0])
|
mountinfo.Mountpoint = C.GoString(&entry.f_mntonname[0])
|
||||||
|
mountinfo.Source = C.GoString(&entry.f_mntfromname[0])
|
||||||
|
mountinfo.Fstype = C.GoString(&entry.f_fstypename[0])
|
||||||
out = append(out, &mountinfo)
|
out = append(out, &mountinfo)
|
||||||
}
|
}
|
||||||
return out, nil
|
return out, nil
|
||||||
|
29
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mountinfo_linux.go
generated
vendored
29
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/mountinfo_linux.go
generated
vendored
@ -1,3 +1,5 @@
|
|||||||
|
// +build linux
|
||||||
|
|
||||||
package mount
|
package mount
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@ -23,7 +25,7 @@ const (
|
|||||||
(9) filesystem type: name of filesystem of the form "type[.subtype]"
|
(9) filesystem type: name of filesystem of the form "type[.subtype]"
|
||||||
(10) mount source: filesystem specific information or "none"
|
(10) mount source: filesystem specific information or "none"
|
||||||
(11) super options: per super block options*/
|
(11) super options: per super block options*/
|
||||||
mountinfoFormat = "%d %d %d:%d %s %s %s "
|
mountinfoFormat = "%d %d %d:%d %s %s %s %s"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Parse /proc/self/mountinfo because comparing Dev and ino does not work from bind mounts
|
// Parse /proc/self/mountinfo because comparing Dev and ino does not work from bind mounts
|
||||||
@ -51,23 +53,40 @@ func parseInfoFile(r io.Reader) ([]*MountInfo, error) {
|
|||||||
var (
|
var (
|
||||||
p = &MountInfo{}
|
p = &MountInfo{}
|
||||||
text = s.Text()
|
text = s.Text()
|
||||||
|
optionalFields string
|
||||||
)
|
)
|
||||||
|
|
||||||
if _, err := fmt.Sscanf(text, mountinfoFormat,
|
if _, err := fmt.Sscanf(text, mountinfoFormat,
|
||||||
&p.Id, &p.Parent, &p.Major, &p.Minor,
|
&p.Id, &p.Parent, &p.Major, &p.Minor,
|
||||||
&p.Root, &p.Mountpoint, &p.Opts); err != nil {
|
&p.Root, &p.Mountpoint, &p.Opts, &optionalFields); err != nil {
|
||||||
return nil, fmt.Errorf("Scanning '%s' failed: %s", text, err)
|
return nil, fmt.Errorf("Scanning '%s' failed: %s", text, err)
|
||||||
}
|
}
|
||||||
// Safe as mountinfo encodes mountpoints with spaces as \040.
|
// Safe as mountinfo encodes mountpoints with spaces as \040.
|
||||||
index := strings.Index(text, " - ")
|
index := strings.Index(text, " - ")
|
||||||
postSeparatorFields := strings.Fields(text[index+3:])
|
postSeparatorFields := strings.Fields(text[index+3:])
|
||||||
if len(postSeparatorFields) != 3 {
|
if len(postSeparatorFields) < 3 {
|
||||||
return nil, fmt.Errorf("Error did not find 3 fields post '-' in '%s'", text)
|
return nil, fmt.Errorf("Error found less than 3 fields post '-' in %q", text)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if optionalFields != "-" {
|
||||||
|
p.Optional = optionalFields
|
||||||
|
}
|
||||||
|
|
||||||
p.Fstype = postSeparatorFields[0]
|
p.Fstype = postSeparatorFields[0]
|
||||||
p.Source = postSeparatorFields[1]
|
p.Source = postSeparatorFields[1]
|
||||||
p.VfsOpts = postSeparatorFields[2]
|
p.VfsOpts = strings.Join(postSeparatorFields[2:], " ")
|
||||||
out = append(out, p)
|
out = append(out, p)
|
||||||
}
|
}
|
||||||
return out, nil
|
return out, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PidMountInfo collects the mounts for a specific Pid
|
||||||
|
func PidMountInfo(pid int) ([]*MountInfo, error) {
|
||||||
|
f, err := os.Open(fmt.Sprintf("/proc/%d/mountinfo", pid))
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
|
||||||
|
return parseInfoFile(f)
|
||||||
|
}
|
||||||
|
@ -1,3 +1,5 @@
|
|||||||
|
// +build linux
|
||||||
|
|
||||||
package mount
|
package mount
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@ -62,7 +64,8 @@ const (
|
|||||||
235 35 253:32 / /var/lib/docker/devicemapper/mnt/1a28059f29eda821578b1bb27a60cc71f76f846a551abefabce6efd0146dce9f rw,relatime shared:217 - ext4 /dev/mapper/docker-253:2-425882-1a28059f29eda821578b1bb27a60cc71f76f846a551abefabce6efd0146dce9f rw,seclabel,discard,stripe=16,data=ordered
|
235 35 253:32 / /var/lib/docker/devicemapper/mnt/1a28059f29eda821578b1bb27a60cc71f76f846a551abefabce6efd0146dce9f rw,relatime shared:217 - ext4 /dev/mapper/docker-253:2-425882-1a28059f29eda821578b1bb27a60cc71f76f846a551abefabce6efd0146dce9f rw,seclabel,discard,stripe=16,data=ordered
|
||||||
239 35 253:33 / /var/lib/docker/devicemapper/mnt/e9aa60c60128cad1 rw,relatime shared:221 - ext4 /dev/mapper/docker-253:2-425882-e9aa60c60128cad1 rw,seclabel,discard,stripe=16,data=ordered
|
239 35 253:33 / /var/lib/docker/devicemapper/mnt/e9aa60c60128cad1 rw,relatime shared:221 - ext4 /dev/mapper/docker-253:2-425882-e9aa60c60128cad1 rw,seclabel,discard,stripe=16,data=ordered
|
||||||
243 35 253:34 / /var/lib/docker/devicemapper/mnt/5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d-init rw,relatime shared:225 - ext4 /dev/mapper/docker-253:2-425882-5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d-init rw,seclabel,discard,stripe=16,data=ordered
|
243 35 253:34 / /var/lib/docker/devicemapper/mnt/5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d-init rw,relatime shared:225 - ext4 /dev/mapper/docker-253:2-425882-5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d-init rw,seclabel,discard,stripe=16,data=ordered
|
||||||
247 35 253:35 / /var/lib/docker/devicemapper/mnt/5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d rw,relatime shared:229 - ext4 /dev/mapper/docker-253:2-425882-5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d rw,seclabel,discard,stripe=16,data=ordered`
|
247 35 253:35 / /var/lib/docker/devicemapper/mnt/5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d rw,relatime shared:229 - ext4 /dev/mapper/docker-253:2-425882-5fec11304b6f4713fea7b6ccdcc1adc0a1966187f590fe25a8227428a8df275d rw,seclabel,discard,stripe=16,data=ordered
|
||||||
|
31 21 0:23 / /DATA/foo_bla_bla rw,relatime - cifs //foo/BLA\040BLA\040BLA/ rw,sec=ntlm,cache=loose,unc=\\foo\BLA BLA BLA,username=my_login,domain=mydomain.com,uid=12345678,forceuid,gid=12345678,forcegid,addr=10.1.30.10,file_mode=0755,dir_mode=0755,nounix,rsize=61440,wsize=65536,actimeo=1`
|
||||||
|
|
||||||
ubuntuMountInfo = `15 20 0:14 / /sys rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw
|
ubuntuMountInfo = `15 20 0:14 / /sys rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw
|
||||||
16 20 0:3 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw
|
16 20 0:3 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw
|
||||||
@ -443,3 +446,32 @@ func TestParseGentooMountinfo(t *testing.T) {
|
|||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestParseFedoraMountinfoFields(t *testing.T) {
|
||||||
|
r := bytes.NewBuffer([]byte(fedoraMountinfo))
|
||||||
|
infos, err := parseInfoFile(r)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
expectedLength := 58
|
||||||
|
if len(infos) != expectedLength {
|
||||||
|
t.Fatalf("Expected %d entries, got %d", expectedLength, len(infos))
|
||||||
|
}
|
||||||
|
mi := MountInfo{
|
||||||
|
Id: 15,
|
||||||
|
Parent: 35,
|
||||||
|
Major: 0,
|
||||||
|
Minor: 3,
|
||||||
|
Root: "/",
|
||||||
|
Mountpoint: "/proc",
|
||||||
|
Opts: "rw,nosuid,nodev,noexec,relatime",
|
||||||
|
Optional: "shared:5",
|
||||||
|
Fstype: "proc",
|
||||||
|
Source: "proc",
|
||||||
|
VfsOpts: "rw",
|
||||||
|
}
|
||||||
|
|
||||||
|
if *infos[0] != mi {
|
||||||
|
t.Fatalf("expected %#v, got %#v", mi, infos[0])
|
||||||
|
}
|
||||||
|
}
|
54
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/sharedsubtree_linux.go
generated
vendored
Normal file
54
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/sharedsubtree_linux.go
generated
vendored
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
// +build linux
|
||||||
|
|
||||||
|
package mount
|
||||||
|
|
||||||
|
func MakeShared(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "shared")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakeRShared(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "rshared")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakePrivate(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "private")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakeRPrivate(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "rprivate")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakeSlave(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "slave")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakeRSlave(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "rslave")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakeUnbindable(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "unbindable")
|
||||||
|
}
|
||||||
|
|
||||||
|
func MakeRUnbindable(mountPoint string) error {
|
||||||
|
return ensureMountedAs(mountPoint, "runbindable")
|
||||||
|
}
|
||||||
|
|
||||||
|
func ensureMountedAs(mountPoint, options string) error {
|
||||||
|
mounted, err := Mounted(mountPoint)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !mounted {
|
||||||
|
if err := Mount(mountPoint, mountPoint, "none", "bind,rw"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
mounted, err = Mounted(mountPoint)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return ForceMount("", mountPoint, "none", options)
|
||||||
|
}
|
331
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/sharedsubtree_linux_test.go
generated
vendored
Normal file
331
Godeps/_workspace/src/github.com/docker/docker/pkg/mount/sharedsubtree_linux_test.go
generated
vendored
Normal file
@ -0,0 +1,331 @@
|
|||||||
|
// +build linux
|
||||||
|
|
||||||
|
package mount
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"syscall"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// nothing is propagated in or out
|
||||||
|
func TestSubtreePrivate(t *testing.T) {
|
||||||
|
tmp := path.Join(os.TempDir(), "mount-tests")
|
||||||
|
if err := os.MkdirAll(tmp, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmp)
|
||||||
|
|
||||||
|
var (
|
||||||
|
sourceDir = path.Join(tmp, "source")
|
||||||
|
targetDir = path.Join(tmp, "target")
|
||||||
|
outside1Dir = path.Join(tmp, "outside1")
|
||||||
|
outside2Dir = path.Join(tmp, "outside2")
|
||||||
|
|
||||||
|
outside1Path = path.Join(outside1Dir, "file.txt")
|
||||||
|
outside2Path = path.Join(outside2Dir, "file.txt")
|
||||||
|
outside1CheckPath = path.Join(targetDir, "a", "file.txt")
|
||||||
|
outside2CheckPath = path.Join(sourceDir, "b", "file.txt")
|
||||||
|
)
|
||||||
|
if err := os.MkdirAll(path.Join(sourceDir, "a"), 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(path.Join(sourceDir, "b"), 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(targetDir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(outside1Dir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(outside2Dir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := createFile(outside1Path); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := createFile(outside2Path); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// mount the shared directory to a target
|
||||||
|
if err := Mount(sourceDir, targetDir, "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// next, make the target private
|
||||||
|
if err := MakePrivate(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// mount in an outside path to a mounted path inside the _source_
|
||||||
|
if err := Mount(outside1Dir, path.Join(sourceDir, "a"), "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(path.Join(sourceDir, "a")); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// check that this file _does_not_ show in the _target_
|
||||||
|
if _, err := os.Stat(outside1CheckPath); err != nil && !os.IsNotExist(err) {
|
||||||
|
t.Fatal(err)
|
||||||
|
} else if err == nil {
|
||||||
|
t.Fatalf("%q should not be visible, but is", outside1CheckPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
// next mount outside2Dir into the _target_
|
||||||
|
if err := Mount(outside2Dir, path.Join(targetDir, "b"), "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(path.Join(targetDir, "b")); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// check that this file _does_not_ show in the _source_
|
||||||
|
if _, err := os.Stat(outside2CheckPath); err != nil && !os.IsNotExist(err) {
|
||||||
|
t.Fatal(err)
|
||||||
|
} else if err == nil {
|
||||||
|
t.Fatalf("%q should not be visible, but is", outside2CheckPath)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Testing that when a target is a shared mount,
|
||||||
|
// then child mounts propogate to the source
|
||||||
|
func TestSubtreeShared(t *testing.T) {
|
||||||
|
tmp := path.Join(os.TempDir(), "mount-tests")
|
||||||
|
if err := os.MkdirAll(tmp, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmp)
|
||||||
|
|
||||||
|
var (
|
||||||
|
sourceDir = path.Join(tmp, "source")
|
||||||
|
targetDir = path.Join(tmp, "target")
|
||||||
|
outsideDir = path.Join(tmp, "outside")
|
||||||
|
|
||||||
|
outsidePath = path.Join(outsideDir, "file.txt")
|
||||||
|
sourceCheckPath = path.Join(sourceDir, "a", "file.txt")
|
||||||
|
)
|
||||||
|
|
||||||
|
if err := os.MkdirAll(path.Join(sourceDir, "a"), 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(targetDir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(outsideDir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := createFile(outsidePath); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// mount the source as shared
|
||||||
|
if err := MakeShared(sourceDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(sourceDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// mount the shared directory to a target
|
||||||
|
if err := Mount(sourceDir, targetDir, "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// mount in an outside path to a mounted path inside the target
|
||||||
|
if err := Mount(outsideDir, path.Join(targetDir, "a"), "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(path.Join(targetDir, "a")); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// NOW, check that the file from the outside directory is avaible in the source directory
|
||||||
|
if _, err := os.Stat(sourceCheckPath); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testing that mounts to a shared source show up in the slave target,
|
||||||
|
// and that mounts into a slave target do _not_ show up in the shared source
|
||||||
|
func TestSubtreeSharedSlave(t *testing.T) {
|
||||||
|
tmp := path.Join(os.TempDir(), "mount-tests")
|
||||||
|
if err := os.MkdirAll(tmp, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmp)
|
||||||
|
|
||||||
|
var (
|
||||||
|
sourceDir = path.Join(tmp, "source")
|
||||||
|
targetDir = path.Join(tmp, "target")
|
||||||
|
outside1Dir = path.Join(tmp, "outside1")
|
||||||
|
outside2Dir = path.Join(tmp, "outside2")
|
||||||
|
|
||||||
|
outside1Path = path.Join(outside1Dir, "file.txt")
|
||||||
|
outside2Path = path.Join(outside2Dir, "file.txt")
|
||||||
|
outside1CheckPath = path.Join(targetDir, "a", "file.txt")
|
||||||
|
outside2CheckPath = path.Join(sourceDir, "b", "file.txt")
|
||||||
|
)
|
||||||
|
if err := os.MkdirAll(path.Join(sourceDir, "a"), 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(path.Join(sourceDir, "b"), 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(targetDir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(outside1Dir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.Mkdir(outside2Dir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := createFile(outside1Path); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := createFile(outside2Path); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// mount the source as shared
|
||||||
|
if err := MakeShared(sourceDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(sourceDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// mount the shared directory to a target
|
||||||
|
if err := Mount(sourceDir, targetDir, "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// next, make the target slave
|
||||||
|
if err := MakeSlave(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// mount in an outside path to a mounted path inside the _source_
|
||||||
|
if err := Mount(outside1Dir, path.Join(sourceDir, "a"), "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(path.Join(sourceDir, "a")); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// check that this file _does_ show in the _target_
|
||||||
|
if _, err := os.Stat(outside1CheckPath); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// next mount outside2Dir into the _target_
|
||||||
|
if err := Mount(outside2Dir, path.Join(targetDir, "b"), "none", "bind,rw"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(path.Join(targetDir, "b")); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// check that this file _does_not_ show in the _source_
|
||||||
|
if _, err := os.Stat(outside2CheckPath); err != nil && !os.IsNotExist(err) {
|
||||||
|
t.Fatal(err)
|
||||||
|
} else if err == nil {
|
||||||
|
t.Fatalf("%q should not be visible, but is", outside2CheckPath)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSubtreeUnbindable(t *testing.T) {
|
||||||
|
tmp := path.Join(os.TempDir(), "mount-tests")
|
||||||
|
if err := os.MkdirAll(tmp, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmp)
|
||||||
|
|
||||||
|
var (
|
||||||
|
sourceDir = path.Join(tmp, "source")
|
||||||
|
targetDir = path.Join(tmp, "target")
|
||||||
|
)
|
||||||
|
if err := os.MkdirAll(sourceDir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(targetDir, 0777); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// next, make the source unbindable
|
||||||
|
if err := MakeUnbindable(sourceDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(sourceDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// then attempt to mount it to target. It should fail
|
||||||
|
if err := Mount(sourceDir, targetDir, "none", "bind,rw"); err != nil && err != syscall.EINVAL {
|
||||||
|
t.Fatal(err)
|
||||||
|
} else if err == nil {
|
||||||
|
t.Fatalf("%q should not have been bindable", sourceDir)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := Unmount(targetDir); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
func createFile(path string) error {
|
||||||
|
f, err := os.Create(path)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.WriteString("hello world!")
|
||||||
|
return f.Close()
|
||||||
|
}
|
191
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/LICENSE.APACHE
generated
vendored
Normal file
191
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/LICENSE.APACHE
generated
vendored
Normal file
@ -0,0 +1,191 @@
|
|||||||
|
|
||||||
|
Apache License
|
||||||
|
Version 2.0, January 2004
|
||||||
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
|
1. Definitions.
|
||||||
|
|
||||||
|
"License" shall mean the terms and conditions for use, reproduction,
|
||||||
|
and distribution as defined by Sections 1 through 9 of this document.
|
||||||
|
|
||||||
|
"Licensor" shall mean the copyright owner or entity authorized by
|
||||||
|
the copyright owner that is granting the License.
|
||||||
|
|
||||||
|
"Legal Entity" shall mean the union of the acting entity and all
|
||||||
|
other entities that control, are controlled by, or are under common
|
||||||
|
control with that entity. For the purposes of this definition,
|
||||||
|
"control" means (i) the power, direct or indirect, to cause the
|
||||||
|
direction or management of such entity, whether by contract or
|
||||||
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||||
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||||
|
|
||||||
|
"You" (or "Your") shall mean an individual or Legal Entity
|
||||||
|
exercising permissions granted by this License.
|
||||||
|
|
||||||
|
"Source" form shall mean the preferred form for making modifications,
|
||||||
|
including but not limited to software source code, documentation
|
||||||
|
source, and configuration files.
|
||||||
|
|
||||||
|
"Object" form shall mean any form resulting from mechanical
|
||||||
|
transformation or translation of a Source form, including but
|
||||||
|
not limited to compiled object code, generated documentation,
|
||||||
|
and conversions to other media types.
|
||||||
|
|
||||||
|
"Work" shall mean the work of authorship, whether in Source or
|
||||||
|
Object form, made available under the License, as indicated by a
|
||||||
|
copyright notice that is included in or attached to the work
|
||||||
|
(an example is provided in the Appendix below).
|
||||||
|
|
||||||
|
"Derivative Works" shall mean any work, whether in Source or Object
|
||||||
|
form, that is based on (or derived from) the Work and for which the
|
||||||
|
editorial revisions, annotations, elaborations, or other modifications
|
||||||
|
represent, as a whole, an original work of authorship. For the purposes
|
||||||
|
of this License, Derivative Works shall not include works that remain
|
||||||
|
separable from, or merely link (or bind by name) to the interfaces of,
|
||||||
|
the Work and Derivative Works thereof.
|
||||||
|
|
||||||
|
"Contribution" shall mean any work of authorship, including
|
||||||
|
the original version of the Work and any modifications or additions
|
||||||
|
to that Work or Derivative Works thereof, that is intentionally
|
||||||
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||||
|
or by an individual or Legal Entity authorized to submit on behalf of
|
||||||
|
the copyright owner. For the purposes of this definition, "submitted"
|
||||||
|
means any form of electronic, verbal, or written communication sent
|
||||||
|
to the Licensor or its representatives, including but not limited to
|
||||||
|
communication on electronic mailing lists, source code control systems,
|
||||||
|
and issue tracking systems that are managed by, or on behalf of, the
|
||||||
|
Licensor for the purpose of discussing and improving the Work, but
|
||||||
|
excluding communication that is conspicuously marked or otherwise
|
||||||
|
designated in writing by the copyright owner as "Not a Contribution."
|
||||||
|
|
||||||
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||||
|
on behalf of whom a Contribution has been received by Licensor and
|
||||||
|
subsequently incorporated within the Work.
|
||||||
|
|
||||||
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
copyright license to reproduce, prepare Derivative Works of,
|
||||||
|
publicly display, publicly perform, sublicense, and distribute the
|
||||||
|
Work and such Derivative Works in Source or Object form.
|
||||||
|
|
||||||
|
3. Grant of Patent License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
(except as stated in this section) patent license to make, have made,
|
||||||
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||||
|
where such license applies only to those patent claims licensable
|
||||||
|
by such Contributor that are necessarily infringed by their
|
||||||
|
Contribution(s) alone or by combination of their Contribution(s)
|
||||||
|
with the Work to which such Contribution(s) was submitted. If You
|
||||||
|
institute patent litigation against any entity (including a
|
||||||
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||||
|
or a Contribution incorporated within the Work constitutes direct
|
||||||
|
or contributory patent infringement, then any patent licenses
|
||||||
|
granted to You under this License for that Work shall terminate
|
||||||
|
as of the date such litigation is filed.
|
||||||
|
|
||||||
|
4. Redistribution. You may reproduce and distribute copies of the
|
||||||
|
Work or Derivative Works thereof in any medium, with or without
|
||||||
|
modifications, and in Source or Object form, provided that You
|
||||||
|
meet the following conditions:
|
||||||
|
|
||||||
|
(a) You must give any other recipients of the Work or
|
||||||
|
Derivative Works a copy of this License; and
|
||||||
|
|
||||||
|
(b) You must cause any modified files to carry prominent notices
|
||||||
|
stating that You changed the files; and
|
||||||
|
|
||||||
|
(c) You must retain, in the Source form of any Derivative Works
|
||||||
|
that You distribute, all copyright, patent, trademark, and
|
||||||
|
attribution notices from the Source form of the Work,
|
||||||
|
excluding those notices that do not pertain to any part of
|
||||||
|
the Derivative Works; and
|
||||||
|
|
||||||
|
(d) If the Work includes a "NOTICE" text file as part of its
|
||||||
|
distribution, then any Derivative Works that You distribute must
|
||||||
|
include a readable copy of the attribution notices contained
|
||||||
|
within such NOTICE file, excluding those notices that do not
|
||||||
|
pertain to any part of the Derivative Works, in at least one
|
||||||
|
of the following places: within a NOTICE text file distributed
|
||||||
|
as part of the Derivative Works; within the Source form or
|
||||||
|
documentation, if provided along with the Derivative Works; or,
|
||||||
|
within a display generated by the Derivative Works, if and
|
||||||
|
wherever such third-party notices normally appear. The contents
|
||||||
|
of the NOTICE file are for informational purposes only and
|
||||||
|
do not modify the License. You may add Your own attribution
|
||||||
|
notices within Derivative Works that You distribute, alongside
|
||||||
|
or as an addendum to the NOTICE text from the Work, provided
|
||||||
|
that such additional attribution notices cannot be construed
|
||||||
|
as modifying the License.
|
||||||
|
|
||||||
|
You may add Your own copyright statement to Your modifications and
|
||||||
|
may provide additional or different license terms and conditions
|
||||||
|
for use, reproduction, or distribution of Your modifications, or
|
||||||
|
for any such Derivative Works as a whole, provided Your use,
|
||||||
|
reproduction, and distribution of the Work otherwise complies with
|
||||||
|
the conditions stated in this License.
|
||||||
|
|
||||||
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||||
|
any Contribution intentionally submitted for inclusion in the Work
|
||||||
|
by You to the Licensor shall be under the terms and conditions of
|
||||||
|
this License, without any additional terms or conditions.
|
||||||
|
Notwithstanding the above, nothing herein shall supersede or modify
|
||||||
|
the terms of any separate license agreement you may have executed
|
||||||
|
with Licensor regarding such Contributions.
|
||||||
|
|
||||||
|
6. Trademarks. This License does not grant permission to use the trade
|
||||||
|
names, trademarks, service marks, or product names of the Licensor,
|
||||||
|
except as required for reasonable and customary use in describing the
|
||||||
|
origin of the Work and reproducing the content of the NOTICE file.
|
||||||
|
|
||||||
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||||
|
agreed to in writing, Licensor provides the Work (and each
|
||||||
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||||
|
implied, including, without limitation, any warranties or conditions
|
||||||
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||||
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||||
|
appropriateness of using or redistributing the Work and assume any
|
||||||
|
risks associated with Your exercise of permissions under this License.
|
||||||
|
|
||||||
|
8. Limitation of Liability. In no event and under no legal theory,
|
||||||
|
whether in tort (including negligence), contract, or otherwise,
|
||||||
|
unless required by applicable law (such as deliberate and grossly
|
||||||
|
negligent acts) or agreed to in writing, shall any Contributor be
|
||||||
|
liable to You for damages, including any direct, indirect, special,
|
||||||
|
incidental, or consequential damages of any character arising as a
|
||||||
|
result of this License or out of the use or inability to use the
|
||||||
|
Work (including but not limited to damages for loss of goodwill,
|
||||||
|
work stoppage, computer failure or malfunction, or any and all
|
||||||
|
other commercial damages or losses), even if such Contributor
|
||||||
|
has been advised of the possibility of such damages.
|
||||||
|
|
||||||
|
9. Accepting Warranty or Additional Liability. While redistributing
|
||||||
|
the Work or Derivative Works thereof, You may choose to offer,
|
||||||
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||||
|
or other liability obligations and/or rights consistent with this
|
||||||
|
License. However, in accepting such obligations, You may act only
|
||||||
|
on Your own behalf and on Your sole responsibility, not on behalf
|
||||||
|
of any other Contributor, and only if You agree to indemnify,
|
||||||
|
defend, and hold each Contributor harmless for any liability
|
||||||
|
incurred by, or claims asserted against, such Contributor by reason
|
||||||
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
Copyright 2014-2015 Docker, Inc.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
27
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/LICENSE.BSD
generated
vendored
Normal file
27
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/LICENSE.BSD
generated
vendored
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
Copyright (c) 2014-2015 The Docker & Go Authors. All rights reserved.
|
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without
|
||||||
|
modification, are permitted provided that the following conditions are
|
||||||
|
met:
|
||||||
|
|
||||||
|
* Redistributions of source code must retain the above copyright
|
||||||
|
notice, this list of conditions and the following disclaimer.
|
||||||
|
* Redistributions in binary form must reproduce the above
|
||||||
|
copyright notice, this list of conditions and the following disclaimer
|
||||||
|
in the documentation and/or other materials provided with the
|
||||||
|
distribution.
|
||||||
|
* Neither the name of Google Inc. nor the names of its
|
||||||
|
contributors may be used to endorse or promote products derived from
|
||||||
|
this software without specific prior written permission.
|
||||||
|
|
||||||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||||
|
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||||
|
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||||||
|
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||||
|
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||||
|
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||||
|
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||||
|
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||||
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
|
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
5
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/MAINTAINERS
generated
vendored
5
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/MAINTAINERS
generated
vendored
@ -1,2 +1,3 @@
|
|||||||
Michael Crosby <michael@crosbymichael.com> (@crosbymichael)
|
Tibor Vass <teabee89@gmail.com> (@tiborvass)
|
||||||
Victor Vieux <vieux@docker.com> (@vieux)
|
Cristian Staretu <cristian.staretu@gmail.com> (@unclejack)
|
||||||
|
Tianon Gravi <admwiggin@gmail.com> (@tianon)
|
||||||
|
5
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/README.md
generated
vendored
Normal file
5
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/README.md
generated
vendored
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
Package symlink implements EvalSymlinksInScope which is an extension of filepath.EvalSymlinks
|
||||||
|
from the [Go standard library](https://golang.org/pkg/path/filepath).
|
||||||
|
|
||||||
|
The code from filepath.EvalSymlinks has been adapted in fs.go.
|
||||||
|
Please read the LICENSE.BSD file that governs fs.go and LICENSE.APACHE for fs_test.go.
|
186
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/fs.go
generated
vendored
186
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/fs.go
generated
vendored
@ -1,85 +1,131 @@
|
|||||||
|
// Copyright 2012 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE.BSD file.
|
||||||
|
|
||||||
|
// This code is a modified version of path/filepath/symlink.go from the Go standard library.
|
||||||
|
|
||||||
package symlink
|
package symlink
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"bytes"
|
||||||
|
"errors"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
)
|
)
|
||||||
|
|
||||||
const maxLoopCounter = 100
|
// FollowSymlinkInScope is a wrapper around evalSymlinksInScope that returns an absolute path
|
||||||
|
func FollowSymlinkInScope(path, root string) (string, error) {
|
||||||
// FollowSymlink will follow an existing link and scope it to the root
|
path, err := filepath.Abs(path)
|
||||||
// path provided.
|
|
||||||
func FollowSymlinkInScope(link, root string) (string, error) {
|
|
||||||
root, err := filepath.Abs(root)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
root, err = filepath.Abs(root)
|
||||||
link, err = filepath.Abs(link)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
return evalSymlinksInScope(path, root)
|
||||||
if link == root {
|
}
|
||||||
return root, nil
|
|
||||||
}
|
// evalSymlinksInScope will evaluate symlinks in `path` within a scope `root` and return
|
||||||
|
// a result guaranteed to be contained within the scope `root`, at the time of the call.
|
||||||
if !strings.HasPrefix(filepath.Dir(link), root) {
|
// Symlinks in `root` are not evaluated and left as-is.
|
||||||
return "", fmt.Errorf("%s is not within %s", link, root)
|
// Errors encountered while attempting to evaluate symlinks in path will be returned.
|
||||||
}
|
// Non-existing paths are valid and do not constitute an error.
|
||||||
|
// `path` has to contain `root` as a prefix, or else an error will be returned.
|
||||||
prev := "/"
|
// Trying to break out from `root` does not constitute an error.
|
||||||
|
//
|
||||||
for _, p := range strings.Split(link, "/") {
|
// Example:
|
||||||
prev = filepath.Join(prev, p)
|
// If /foo/bar -> /outside,
|
||||||
prev = filepath.Clean(prev)
|
// FollowSymlinkInScope("/foo/bar", "/foo") == "/foo/outside" instead of "/oustide"
|
||||||
|
//
|
||||||
loopCounter := 0
|
// IMPORTANT: it is the caller's responsibility to call evalSymlinksInScope *after* relevant symlinks
|
||||||
for {
|
// are created and not to create subsequently, additional symlinks that could potentially make a
|
||||||
loopCounter++
|
// previously-safe path, unsafe. Example: if /foo/bar does not exist, evalSymlinksInScope("/foo/bar", "/foo")
|
||||||
|
// would return "/foo/bar". If one makes /foo/bar a symlink to /baz subsequently, then "/foo/bar" should
|
||||||
if loopCounter >= maxLoopCounter {
|
// no longer be considered safely contained in "/foo".
|
||||||
return "", fmt.Errorf("loopCounter reached MAX: %v", loopCounter)
|
func evalSymlinksInScope(path, root string) (string, error) {
|
||||||
}
|
root = filepath.Clean(root)
|
||||||
|
if path == root {
|
||||||
if !strings.HasPrefix(prev, root) {
|
return path, nil
|
||||||
// Don't resolve symlinks outside of root. For example,
|
}
|
||||||
// we don't have to check /home in the below.
|
if !strings.HasPrefix(path, root) {
|
||||||
//
|
return "", errors.New("evalSymlinksInScope: " + path + " is not in " + root)
|
||||||
// /home -> usr/home
|
}
|
||||||
// FollowSymlinkInScope("/home/bob/foo/bar", "/home/bob/foo")
|
const maxIter = 255
|
||||||
break
|
originalPath := path
|
||||||
}
|
// given root of "/a" and path of "/a/b/../../c" we want path to be "/b/../../c"
|
||||||
|
path = path[len(root):]
|
||||||
stat, err := os.Lstat(prev)
|
if root == string(filepath.Separator) {
|
||||||
if err != nil {
|
path = string(filepath.Separator) + path
|
||||||
if os.IsNotExist(err) {
|
}
|
||||||
break
|
if !strings.HasPrefix(path, string(filepath.Separator)) {
|
||||||
}
|
return "", errors.New("evalSymlinksInScope: " + path + " is not in " + root)
|
||||||
return "", err
|
}
|
||||||
}
|
path = filepath.Clean(path)
|
||||||
if stat.Mode()&os.ModeSymlink == os.ModeSymlink {
|
// consume path by taking each frontmost path element,
|
||||||
dest, err := os.Readlink(prev)
|
// expanding it if it's a symlink, and appending it to b
|
||||||
if err != nil {
|
var b bytes.Buffer
|
||||||
return "", err
|
// b here will always be considered to be the "current absolute path inside
|
||||||
}
|
// root" when we append paths to it, we also append a slash and use
|
||||||
|
// filepath.Clean after the loop to trim the trailing slash
|
||||||
if path.IsAbs(dest) {
|
for n := 0; path != ""; n++ {
|
||||||
prev = filepath.Join(root, dest)
|
if n > maxIter {
|
||||||
} else {
|
return "", errors.New("evalSymlinksInScope: too many links in " + originalPath)
|
||||||
prev, _ = filepath.Abs(prev)
|
}
|
||||||
|
|
||||||
if prev = filepath.Clean(filepath.Join(filepath.Dir(prev), dest)); len(prev) < len(root) {
|
// find next path component, p
|
||||||
prev = filepath.Join(root, filepath.Base(dest))
|
i := strings.IndexRune(path, filepath.Separator)
|
||||||
}
|
var p string
|
||||||
}
|
if i == -1 {
|
||||||
} else {
|
p, path = path, ""
|
||||||
break
|
} else {
|
||||||
}
|
p, path = path[:i], path[i+1:]
|
||||||
}
|
}
|
||||||
}
|
|
||||||
return prev, nil
|
if p == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// this takes a b.String() like "b/../" and a p like "c" and turns it
|
||||||
|
// into "/b/../c" which then gets filepath.Cleaned into "/c" and then
|
||||||
|
// root gets prepended and we Clean again (to remove any trailing slash
|
||||||
|
// if the first Clean gave us just "/")
|
||||||
|
cleanP := filepath.Clean(string(filepath.Separator) + b.String() + p)
|
||||||
|
if cleanP == string(filepath.Separator) {
|
||||||
|
// never Lstat "/" itself
|
||||||
|
b.Reset()
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
fullP := filepath.Clean(root + cleanP)
|
||||||
|
|
||||||
|
fi, err := os.Lstat(fullP)
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
// if p does not exist, accept it
|
||||||
|
b.WriteString(p)
|
||||||
|
b.WriteRune(filepath.Separator)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
if fi.Mode()&os.ModeSymlink == 0 {
|
||||||
|
b.WriteString(p + string(filepath.Separator))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// it's a symlink, put it at the front of path
|
||||||
|
dest, err := os.Readlink(fullP)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
if filepath.IsAbs(dest) {
|
||||||
|
b.Reset()
|
||||||
|
}
|
||||||
|
path = dest + string(filepath.Separator) + path
|
||||||
|
}
|
||||||
|
|
||||||
|
// see note above on "fullP := ..." for why this is double-cleaned and
|
||||||
|
// what's happening here
|
||||||
|
return filepath.Clean(root + filepath.Clean(string(filepath.Separator)+b.String())), nil
|
||||||
}
|
}
|
||||||
|
411
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/fs_test.go
generated
vendored
411
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/fs_test.go
generated
vendored
@ -1,121 +1,402 @@
|
|||||||
|
// Licensed under the Apache License, Version 2.0; See LICENSE.APACHE
|
||||||
|
|
||||||
package symlink
|
package symlink
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"testing"
|
"testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
func abs(t *testing.T, p string) string {
|
type dirOrLink struct {
|
||||||
o, err := filepath.Abs(p)
|
path string
|
||||||
if err != nil {
|
target string
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
return o
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkNormal(t *testing.T) {
|
func makeFs(tmpdir string, fs []dirOrLink) error {
|
||||||
link := "testdata/fs/a/d/c/data"
|
for _, s := range fs {
|
||||||
|
s.path = filepath.Join(tmpdir, s.path)
|
||||||
|
if s.target == "" {
|
||||||
|
os.MkdirAll(s.path, 0755)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(filepath.Dir(s.path), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.Symlink(s.target, s.path); err != nil && !os.IsExist(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
rewrite, err := FollowSymlinkInScope(link, "testdata")
|
func testSymlink(tmpdir, path, expected, scope string) error {
|
||||||
|
rewrite, err := FollowSymlinkInScope(filepath.Join(tmpdir, path), filepath.Join(tmpdir, scope))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
expected, err = filepath.Abs(filepath.Join(tmpdir, expected))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if expected != rewrite {
|
||||||
|
return fmt.Errorf("Expected %q got %q", expected, rewrite)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkAbsolute(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkAbsolute")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
if expected := abs(t, "testdata/b/c/data"); expected != rewrite {
|
if err := makeFs(tmpdir, []dirOrLink{{path: "testdata/fs/a/d", target: "/b"}}); err != nil {
|
||||||
t.Fatalf("Expected %s got %s", expected, rewrite)
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/a/d/c/data", "testdata/b/c/data", "testdata"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkRelativePath(t *testing.T) {
|
func TestFollowSymlinkRelativePath(t *testing.T) {
|
||||||
link := "testdata/fs/i"
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkRelativePath")
|
||||||
|
|
||||||
rewrite, err := FollowSymlinkInScope(link, "testdata")
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
if expected := abs(t, "testdata/fs/a"); expected != rewrite {
|
if err := makeFs(tmpdir, []dirOrLink{{path: "testdata/fs/i", target: "a"}}); err != nil {
|
||||||
t.Fatalf("Expected %s got %s", expected, rewrite)
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/i", "testdata/fs/a", "testdata"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkUnderLinkedDir(t *testing.T) {
|
func TestFollowSymlinkSkipSymlinksOutsideScope(t *testing.T) {
|
||||||
dir, err := ioutil.TempDir("", "docker-fs-test")
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkSkipSymlinksOutsideScope")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
os.Mkdir(filepath.Join(dir, "realdir"), 0700)
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
os.Symlink("realdir", filepath.Join(dir, "linkdir"))
|
{path: "linkdir", target: "realdir"},
|
||||||
|
{path: "linkdir/foo/bar"},
|
||||||
linkDir := filepath.Join(dir, "linkdir", "foo")
|
}); err != nil {
|
||||||
dirUnderLinkDir := filepath.Join(dir, "linkdir", "foo", "bar")
|
|
||||||
os.MkdirAll(dirUnderLinkDir, 0700)
|
|
||||||
|
|
||||||
rewrite, err := FollowSymlinkInScope(dirUnderLinkDir, linkDir)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
if err := testSymlink(tmpdir, "linkdir/foo/bar", "linkdir/foo/bar", "linkdir/foo"); err != nil {
|
||||||
if rewrite != dirUnderLinkDir {
|
t.Fatal(err)
|
||||||
t.Fatalf("Expected %s got %s", dirUnderLinkDir, rewrite)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkRandomString(t *testing.T) {
|
func TestFollowSymlinkInvalidScopePathPair(t *testing.T) {
|
||||||
if _, err := FollowSymlinkInScope("toto", "testdata"); err == nil {
|
if _, err := FollowSymlinkInScope("toto", "testdata"); err == nil {
|
||||||
t.Fatal("Random string should fail but didn't")
|
t.Fatal("expected an error")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkLastLink(t *testing.T) {
|
func TestFollowSymlinkLastLink(t *testing.T) {
|
||||||
link := "testdata/fs/a/d"
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkLastLink")
|
||||||
|
|
||||||
rewrite, err := FollowSymlinkInScope(link, "testdata")
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
if expected := abs(t, "testdata/b"); expected != rewrite {
|
if err := makeFs(tmpdir, []dirOrLink{{path: "testdata/fs/a/d", target: "/b"}}); err != nil {
|
||||||
t.Fatalf("Expected %s got %s", expected, rewrite)
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/a/d", "testdata/b", "testdata"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkRelativeLink(t *testing.T) {
|
func TestFollowSymlinkRelativeLinkChangeScope(t *testing.T) {
|
||||||
link := "testdata/fs/a/e/c/data"
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkRelativeLinkChangeScope")
|
||||||
|
|
||||||
rewrite, err := FollowSymlinkInScope(link, "testdata")
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
if expected := abs(t, "testdata/fs/b/c/data"); expected != rewrite {
|
if err := makeFs(tmpdir, []dirOrLink{{path: "testdata/fs/a/e", target: "../b"}}); err != nil {
|
||||||
t.Fatalf("Expected %s got %s", expected, rewrite)
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/a/e/c/data", "testdata/fs/b/c/data", "testdata"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
// avoid letting allowing symlink e lead us to ../b
|
||||||
|
// normalize to the "testdata/fs/a"
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/a/e", "testdata/fs/a/b", "testdata/fs/a"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFollowSymLinkRelativeLinkScope(t *testing.T) {
|
func TestFollowSymlinkDeepRelativeLinkChangeScope(t *testing.T) {
|
||||||
link := "testdata/fs/a/f"
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkDeepRelativeLinkChangeScope")
|
||||||
|
|
||||||
rewrite, err := FollowSymlinkInScope(link, "testdata")
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
if expected := abs(t, "testdata/test"); expected != rewrite {
|
if err := makeFs(tmpdir, []dirOrLink{{path: "testdata/fs/a/f", target: "../../../../test"}}); err != nil {
|
||||||
t.Fatalf("Expected %s got %s", expected, rewrite)
|
|
||||||
}
|
|
||||||
|
|
||||||
link = "testdata/fs/b/h"
|
|
||||||
|
|
||||||
rewrite, err = FollowSymlinkInScope(link, "testdata")
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
// avoid letting symlink f lead us out of the "testdata" scope
|
||||||
if expected := abs(t, "testdata/root"); expected != rewrite {
|
// we don't normalize because symlink f is in scope and there is no
|
||||||
t.Fatalf("Expected %s got %s", expected, rewrite)
|
// information leak
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/a/f", "testdata/test", "testdata"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
// avoid letting symlink f lead us out of the "testdata/fs" scope
|
||||||
|
// we don't normalize because symlink f is in scope and there is no
|
||||||
|
// information leak
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/a/f", "testdata/fs/test", "testdata/fs"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkRelativeLinkChain(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkRelativeLinkChain")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
// avoid letting symlink g (pointed at by symlink h) take out of scope
|
||||||
|
// TODO: we should probably normalize to scope here because ../[....]/root
|
||||||
|
// is out of scope and we leak information
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
|
{path: "testdata/fs/b/h", target: "../g"},
|
||||||
|
{path: "testdata/fs/g", target: "../../../../../../../../../../../../root"},
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/b/h", "testdata/root", "testdata"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkBreakoutPath(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkBreakoutPath")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
// avoid letting symlink -> ../directory/file escape from scope
|
||||||
|
// normalize to "testdata/fs/j"
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{{path: "testdata/fs/j/k", target: "../i/a"}}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "testdata/fs/j/k", "testdata/fs/j/i/a", "testdata/fs/j"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkToRoot(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkToRoot")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
// make sure we don't allow escaping to /
|
||||||
|
// normalize to dir
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{{path: "foo", target: "/"}}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "foo", "", ""); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkSlashDotdot(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkSlashDotdot")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
tmpdir = filepath.Join(tmpdir, "dir", "subdir")
|
||||||
|
|
||||||
|
// make sure we don't allow escaping to /
|
||||||
|
// normalize to dir
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{{path: "foo", target: "/../../"}}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "foo", "", ""); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkDotdot(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkDotdot")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
tmpdir = filepath.Join(tmpdir, "dir", "subdir")
|
||||||
|
|
||||||
|
// make sure we stay in scope without leaking information
|
||||||
|
// this also checks for escaping to /
|
||||||
|
// normalize to dir
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{{path: "foo", target: "../../"}}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "foo", "", ""); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkRelativePath2(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkRelativePath2")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{{path: "bar/foo", target: "baz/target"}}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "bar/foo", "bar/baz/target", ""); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkScopeLink(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkScopeLink")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
|
{path: "root2"},
|
||||||
|
{path: "root", target: "root2"},
|
||||||
|
{path: "root2/foo", target: "../bar"},
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "root/foo", "root/bar", "root"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkRootScope(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkRootScope")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
expected, err := filepath.EvalSymlinks(tmpdir)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
rewrite, err := FollowSymlinkInScope(tmpdir, "/")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if rewrite != expected {
|
||||||
|
t.Fatalf("expected %q got %q", expected, rewrite)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkEmpty(t *testing.T) {
|
||||||
|
res, err := FollowSymlinkInScope("", "")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
wd, err := os.Getwd()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if res != wd {
|
||||||
|
t.Fatalf("expected %q got %q", wd, res)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkCircular(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkCircular")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{{path: "root/foo", target: "foo"}}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "root/foo", "", "root"); err == nil {
|
||||||
|
t.Fatal("expected an error for foo -> foo")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
|
{path: "root/bar", target: "baz"},
|
||||||
|
{path: "root/baz", target: "../bak"},
|
||||||
|
{path: "root/bak", target: "/bar"},
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "root/foo", "", "root"); err == nil {
|
||||||
|
t.Fatal("expected an error for bar -> baz -> bak -> bar")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkComplexChainWithTargetPathsContainingLinks(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkComplexChainWithTargetPathsContainingLinks")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
|
{path: "root2"},
|
||||||
|
{path: "root", target: "root2"},
|
||||||
|
{path: "root/a", target: "r/s"},
|
||||||
|
{path: "root/r", target: "../root/t"},
|
||||||
|
{path: "root/root/t/s/b", target: "/../u"},
|
||||||
|
{path: "root/u/c", target: "."},
|
||||||
|
{path: "root/u/x/y", target: "../v"},
|
||||||
|
{path: "root/u/v", target: "/../w"},
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "root/a/b/c/x/y/z", "root/w/z", "root"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkBreakoutNonExistent(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkBreakoutNonExistent")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
|
{path: "root/slash", target: "/"},
|
||||||
|
{path: "root/sym", target: "/idontexist/../slash"},
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "root/sym/file", "root/file", "root"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFollowSymlinkNoLexicalCleaning(t *testing.T) {
|
||||||
|
tmpdir, err := ioutil.TempDir("", "TestFollowSymlinkNoLexicalCleaning")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpdir)
|
||||||
|
|
||||||
|
if err := makeFs(tmpdir, []dirOrLink{
|
||||||
|
{path: "root/sym", target: "/foo/bar"},
|
||||||
|
{path: "root/hello", target: "/sym/../baz"},
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if err := testSymlink(tmpdir, "root/hello", "root/foo/baz", "root"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/a/d
generated
vendored
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/a/d
generated
vendored
@ -1 +0,0 @@
|
|||||||
/b
|
|
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/a/e
generated
vendored
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/a/e
generated
vendored
@ -1 +0,0 @@
|
|||||||
../b
|
|
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/a/f
generated
vendored
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/a/f
generated
vendored
@ -1 +0,0 @@
|
|||||||
../../../../test
|
|
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/b/h
generated
vendored
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/b/h
generated
vendored
@ -1 +0,0 @@
|
|||||||
../g
|
|
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/g
generated
vendored
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/g
generated
vendored
@ -1 +0,0 @@
|
|||||||
../../../../../../../../../../../../root
|
|
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/i
generated
vendored
1
Godeps/_workspace/src/github.com/docker/docker/pkg/symlink/testdata/fs/i
generated
vendored
@ -1 +0,0 @@
|
|||||||
a
|
|
2
Godeps/_workspace/src/github.com/docker/docker/pkg/units/MAINTAINERS
generated
vendored
2
Godeps/_workspace/src/github.com/docker/docker/pkg/units/MAINTAINERS
generated
vendored
@ -1,2 +1,2 @@
|
|||||||
Michael Crosby <michael@crosbymichael.com> (@crosbymichael)
|
|
||||||
Victor Vieux <vieux@docker.com> (@vieux)
|
Victor Vieux <vieux@docker.com> (@vieux)
|
||||||
|
Jessie Frazelle <jess@docker.com> (@jfrazelle)
|
||||||
|
6
Godeps/_workspace/src/github.com/docker/docker/pkg/units/duration_test.go
generated
vendored
6
Godeps/_workspace/src/github.com/docker/docker/pkg/units/duration_test.go
generated
vendored
@ -44,9 +44,3 @@ func TestHumanDuration(t *testing.T) {
|
|||||||
assertEquals(t, "2.010959 years", HumanDuration(24*month+2*week))
|
assertEquals(t, "2.010959 years", HumanDuration(24*month+2*week))
|
||||||
assertEquals(t, "3.164384 years", HumanDuration(3*year+2*month))
|
assertEquals(t, "3.164384 years", HumanDuration(3*year+2*month))
|
||||||
}
|
}
|
||||||
|
|
||||||
func assertEquals(t *testing.T, expected, actual interface{}) {
|
|
||||||
if expected != actual {
|
|
||||||
t.Errorf("Expected '%s' but got '%s'", expected, actual)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
137
Godeps/_workspace/src/github.com/docker/docker/pkg/units/size.go
generated
vendored
137
Godeps/_workspace/src/github.com/docker/docker/pkg/units/size.go
generated
vendored
@ -7,88 +7,85 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// See: http://en.wikipedia.org/wiki/Binary_prefix
|
||||||
|
const (
|
||||||
|
// Decimal
|
||||||
|
|
||||||
|
KB = 1000
|
||||||
|
MB = 1000 * KB
|
||||||
|
GB = 1000 * MB
|
||||||
|
TB = 1000 * GB
|
||||||
|
PB = 1000 * TB
|
||||||
|
|
||||||
|
// Binary
|
||||||
|
|
||||||
|
KiB = 1024
|
||||||
|
MiB = 1024 * KiB
|
||||||
|
GiB = 1024 * MiB
|
||||||
|
TiB = 1024 * GiB
|
||||||
|
PiB = 1024 * TiB
|
||||||
|
)
|
||||||
|
|
||||||
|
type unitMap map[string]int64
|
||||||
|
|
||||||
|
var (
|
||||||
|
decimalMap = unitMap{"k": KB, "m": MB, "g": GB, "t": TB, "p": PB}
|
||||||
|
binaryMap = unitMap{"k": KiB, "m": MiB, "g": GiB, "t": TiB, "p": PiB}
|
||||||
|
sizeRegex = regexp.MustCompile(`^(\d+)([kKmMgGtTpP])?[bB]?$`)
|
||||||
|
)
|
||||||
|
|
||||||
|
var decimapAbbrs = []string{"B", "kB", "MB", "GB", "TB", "PB", "EB", "ZB", "YB"}
|
||||||
|
var binaryAbbrs = []string{"B", "KiB", "MiB", "GiB", "TiB", "PiB", "EiB", "ZiB", "YiB"}
|
||||||
|
|
||||||
// HumanSize returns a human-readable approximation of a size
|
// HumanSize returns a human-readable approximation of a size
|
||||||
// using SI standard (eg. "44kB", "17MB")
|
// using SI standard (eg. "44kB", "17MB")
|
||||||
func HumanSize(size int64) string {
|
func HumanSize(size float64) string {
|
||||||
|
return intToString(float64(size), 1000.0, decimapAbbrs)
|
||||||
|
}
|
||||||
|
|
||||||
|
func BytesSize(size float64) string {
|
||||||
|
return intToString(size, 1024.0, binaryAbbrs)
|
||||||
|
}
|
||||||
|
|
||||||
|
func intToString(size, unit float64, _map []string) string {
|
||||||
i := 0
|
i := 0
|
||||||
var sizef float64
|
for size >= unit {
|
||||||
sizef = float64(size)
|
size = size / unit
|
||||||
units := []string{"B", "kB", "MB", "GB", "TB", "PB", "EB", "ZB", "YB"}
|
|
||||||
for sizef >= 1000.0 {
|
|
||||||
sizef = sizef / 1000.0
|
|
||||||
i++
|
i++
|
||||||
}
|
}
|
||||||
return fmt.Sprintf("%.4g %s", sizef, units[i])
|
return fmt.Sprintf("%.4g %s", size, _map[i])
|
||||||
}
|
}
|
||||||
|
|
||||||
// FromHumanSize returns an integer from a human-readable specification of a size
|
// FromHumanSize returns an integer from a human-readable specification of a
|
||||||
// using SI standard (eg. "44kB", "17MB")
|
// size using SI standard (eg. "44kB", "17MB")
|
||||||
func FromHumanSize(size string) (int64, error) {
|
func FromHumanSize(size string) (int64, error) {
|
||||||
re, err := regexp.Compile("^(\\d+)([kKmMgGtTpP])?[bB]?$")
|
return parseSize(size, decimalMap)
|
||||||
if err != nil {
|
|
||||||
return -1, fmt.Errorf("%s does not specify not a size", size)
|
|
||||||
}
|
|
||||||
|
|
||||||
matches := re.FindStringSubmatch(size)
|
|
||||||
|
|
||||||
if len(matches) != 3 {
|
|
||||||
return -1, fmt.Errorf("Invalid size: '%s'", size)
|
|
||||||
}
|
|
||||||
|
|
||||||
theSize, err := strconv.ParseInt(matches[1], 10, 0)
|
|
||||||
if err != nil {
|
|
||||||
return -1, err
|
|
||||||
}
|
|
||||||
|
|
||||||
unit := strings.ToLower(matches[2])
|
|
||||||
|
|
||||||
if unit == "k" {
|
|
||||||
theSize *= 1000
|
|
||||||
} else if unit == "m" {
|
|
||||||
theSize *= 1000 * 1000
|
|
||||||
} else if unit == "g" {
|
|
||||||
theSize *= 1000 * 1000 * 1000
|
|
||||||
} else if unit == "t" {
|
|
||||||
theSize *= 1000 * 1000 * 1000 * 1000
|
|
||||||
} else if unit == "p" {
|
|
||||||
theSize *= 1000 * 1000 * 1000 * 1000 * 1000
|
|
||||||
}
|
|
||||||
|
|
||||||
return theSize, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Parses a human-readable string representing an amount of RAM
|
// RAMInBytes parses a human-readable string representing an amount of RAM
|
||||||
// in bytes, kibibytes, mebibytes, gibibytes, or tebibytes and
|
// in bytes, kibibytes, mebibytes, gibibytes, or tebibytes and
|
||||||
// returns the number of bytes, or -1 if the string is unparseable.
|
// returns the number of bytes, or -1 if the string is unparseable.
|
||||||
// Units are case-insensitive, and the 'b' suffix is optional.
|
// Units are case-insensitive, and the 'b' suffix is optional.
|
||||||
func RAMInBytes(size string) (int64, error) {
|
func RAMInBytes(size string) (int64, error) {
|
||||||
re, err := regexp.Compile("^(\\d+)([kKmMgGtT])?[bB]?$")
|
return parseSize(size, binaryMap)
|
||||||
if err != nil {
|
}
|
||||||
return -1, err
|
|
||||||
}
|
// Parses the human-readable size string into the amount it represents
|
||||||
|
func parseSize(sizeStr string, uMap unitMap) (int64, error) {
|
||||||
matches := re.FindStringSubmatch(size)
|
matches := sizeRegex.FindStringSubmatch(sizeStr)
|
||||||
|
if len(matches) != 3 {
|
||||||
if len(matches) != 3 {
|
return -1, fmt.Errorf("invalid size: '%s'", sizeStr)
|
||||||
return -1, fmt.Errorf("Invalid size: '%s'", size)
|
}
|
||||||
}
|
|
||||||
|
size, err := strconv.ParseInt(matches[1], 10, 0)
|
||||||
memLimit, err := strconv.ParseInt(matches[1], 10, 0)
|
if err != nil {
|
||||||
if err != nil {
|
return -1, err
|
||||||
return -1, err
|
}
|
||||||
}
|
|
||||||
|
unitPrefix := strings.ToLower(matches[2])
|
||||||
unit := strings.ToLower(matches[2])
|
if mul, ok := uMap[unitPrefix]; ok {
|
||||||
|
size *= mul
|
||||||
if unit == "k" {
|
}
|
||||||
memLimit *= 1024
|
|
||||||
} else if unit == "m" {
|
return size, nil
|
||||||
memLimit *= 1024 * 1024
|
|
||||||
} else if unit == "g" {
|
|
||||||
memLimit *= 1024 * 1024 * 1024
|
|
||||||
} else if unit == "t" {
|
|
||||||
memLimit *= 1024 * 1024 * 1024 * 1024
|
|
||||||
}
|
|
||||||
|
|
||||||
return memLimit, nil
|
|
||||||
}
|
}
|
||||||
|
151
Godeps/_workspace/src/github.com/docker/docker/pkg/units/size_test.go
generated
vendored
151
Godeps/_workspace/src/github.com/docker/docker/pkg/units/size_test.go
generated
vendored
@ -1,89 +1,108 @@
|
|||||||
package units
|
package units
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"reflect"
|
||||||
|
"runtime"
|
||||||
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func TestBytesSize(t *testing.T) {
|
||||||
|
assertEquals(t, "1 KiB", BytesSize(1024))
|
||||||
|
assertEquals(t, "1 MiB", BytesSize(1024*1024))
|
||||||
|
assertEquals(t, "1 MiB", BytesSize(1048576))
|
||||||
|
assertEquals(t, "2 MiB", BytesSize(2*MiB))
|
||||||
|
assertEquals(t, "3.42 GiB", BytesSize(3.42*GiB))
|
||||||
|
assertEquals(t, "5.372 TiB", BytesSize(5.372*TiB))
|
||||||
|
assertEquals(t, "2.22 PiB", BytesSize(2.22*PiB))
|
||||||
|
}
|
||||||
|
|
||||||
func TestHumanSize(t *testing.T) {
|
func TestHumanSize(t *testing.T) {
|
||||||
assertEquals(t, "1 kB", HumanSize(1000))
|
assertEquals(t, "1 kB", HumanSize(1000))
|
||||||
assertEquals(t, "1.024 kB", HumanSize(1024))
|
assertEquals(t, "1.024 kB", HumanSize(1024))
|
||||||
assertEquals(t, "1 MB", HumanSize(1000000))
|
assertEquals(t, "1 MB", HumanSize(1000000))
|
||||||
assertEquals(t, "1.049 MB", HumanSize(1048576))
|
assertEquals(t, "1.049 MB", HumanSize(1048576))
|
||||||
assertEquals(t, "2 MB", HumanSize(2*1000*1000))
|
assertEquals(t, "2 MB", HumanSize(2*MB))
|
||||||
assertEquals(t, "3.42 GB", HumanSize(3.42*1000*1000*1000))
|
assertEquals(t, "3.42 GB", HumanSize(float64(3.42*GB)))
|
||||||
assertEquals(t, "5.372 TB", HumanSize(5.372*1000*1000*1000*1000))
|
assertEquals(t, "5.372 TB", HumanSize(float64(5.372*TB)))
|
||||||
assertEquals(t, "2.22 PB", HumanSize(2.22*1000*1000*1000*1000*1000))
|
assertEquals(t, "2.22 PB", HumanSize(float64(2.22*PB)))
|
||||||
assertEquals(t, "2.22 EB", HumanSize(2.22*1000*1000*1000*1000*1000*1000))
|
|
||||||
assertEquals(t, "7.707 EB", HumanSize(7.707*1000*1000*1000*1000*1000*1000))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFromHumanSize(t *testing.T) {
|
func TestFromHumanSize(t *testing.T) {
|
||||||
assertFromHumanSize(t, "32", false, 32)
|
assertSuccessEquals(t, 32, FromHumanSize, "32")
|
||||||
assertFromHumanSize(t, "32b", false, 32)
|
assertSuccessEquals(t, 32, FromHumanSize, "32b")
|
||||||
assertFromHumanSize(t, "32B", false, 32)
|
assertSuccessEquals(t, 32, FromHumanSize, "32B")
|
||||||
assertFromHumanSize(t, "32k", false, 32*1000)
|
assertSuccessEquals(t, 32*KB, FromHumanSize, "32k")
|
||||||
assertFromHumanSize(t, "32K", false, 32*1000)
|
assertSuccessEquals(t, 32*KB, FromHumanSize, "32K")
|
||||||
assertFromHumanSize(t, "32kb", false, 32*1000)
|
assertSuccessEquals(t, 32*KB, FromHumanSize, "32kb")
|
||||||
assertFromHumanSize(t, "32Kb", false, 32*1000)
|
assertSuccessEquals(t, 32*KB, FromHumanSize, "32Kb")
|
||||||
assertFromHumanSize(t, "32Mb", false, 32*1000*1000)
|
assertSuccessEquals(t, 32*MB, FromHumanSize, "32Mb")
|
||||||
assertFromHumanSize(t, "32Gb", false, 32*1000*1000*1000)
|
assertSuccessEquals(t, 32*GB, FromHumanSize, "32Gb")
|
||||||
assertFromHumanSize(t, "32Tb", false, 32*1000*1000*1000*1000)
|
assertSuccessEquals(t, 32*TB, FromHumanSize, "32Tb")
|
||||||
assertFromHumanSize(t, "8Pb", false, 8*1000*1000*1000*1000*1000)
|
assertSuccessEquals(t, 32*PB, FromHumanSize, "32Pb")
|
||||||
|
|
||||||
assertFromHumanSize(t, "", true, -1)
|
assertError(t, FromHumanSize, "")
|
||||||
assertFromHumanSize(t, "hello", true, -1)
|
assertError(t, FromHumanSize, "hello")
|
||||||
assertFromHumanSize(t, "-32", true, -1)
|
assertError(t, FromHumanSize, "-32")
|
||||||
assertFromHumanSize(t, " 32 ", true, -1)
|
assertError(t, FromHumanSize, "32.3")
|
||||||
assertFromHumanSize(t, "32 mb", true, -1)
|
assertError(t, FromHumanSize, " 32 ")
|
||||||
assertFromHumanSize(t, "32m b", true, -1)
|
assertError(t, FromHumanSize, "32.3Kb")
|
||||||
assertFromHumanSize(t, "32bm", true, -1)
|
assertError(t, FromHumanSize, "32 mb")
|
||||||
}
|
assertError(t, FromHumanSize, "32m b")
|
||||||
|
assertError(t, FromHumanSize, "32bm")
|
||||||
func assertFromHumanSize(t *testing.T, size string, expectError bool, expectedBytes int64) {
|
|
||||||
actualBytes, err := FromHumanSize(size)
|
|
||||||
if (err != nil) && !expectError {
|
|
||||||
t.Errorf("Unexpected error parsing '%s': %s", size, err)
|
|
||||||
}
|
|
||||||
if (err == nil) && expectError {
|
|
||||||
t.Errorf("Expected to get an error parsing '%s', but got none (bytes=%d)", size, actualBytes)
|
|
||||||
}
|
|
||||||
if actualBytes != expectedBytes {
|
|
||||||
t.Errorf("Expected '%s' to parse as %d bytes, got %d", size, expectedBytes, actualBytes)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRAMInBytes(t *testing.T) {
|
func TestRAMInBytes(t *testing.T) {
|
||||||
assertRAMInBytes(t, "32", false, 32)
|
assertSuccessEquals(t, 32, RAMInBytes, "32")
|
||||||
assertRAMInBytes(t, "32b", false, 32)
|
assertSuccessEquals(t, 32, RAMInBytes, "32b")
|
||||||
assertRAMInBytes(t, "32B", false, 32)
|
assertSuccessEquals(t, 32, RAMInBytes, "32B")
|
||||||
assertRAMInBytes(t, "32k", false, 32*1024)
|
assertSuccessEquals(t, 32*KiB, RAMInBytes, "32k")
|
||||||
assertRAMInBytes(t, "32K", false, 32*1024)
|
assertSuccessEquals(t, 32*KiB, RAMInBytes, "32K")
|
||||||
assertRAMInBytes(t, "32kb", false, 32*1024)
|
assertSuccessEquals(t, 32*KiB, RAMInBytes, "32kb")
|
||||||
assertRAMInBytes(t, "32Kb", false, 32*1024)
|
assertSuccessEquals(t, 32*KiB, RAMInBytes, "32Kb")
|
||||||
assertRAMInBytes(t, "32Mb", false, 32*1024*1024)
|
assertSuccessEquals(t, 32*MiB, RAMInBytes, "32Mb")
|
||||||
assertRAMInBytes(t, "32MB", false, 32*1024*1024)
|
assertSuccessEquals(t, 32*GiB, RAMInBytes, "32Gb")
|
||||||
assertRAMInBytes(t, "32Gb", false, 32*1024*1024*1024)
|
assertSuccessEquals(t, 32*TiB, RAMInBytes, "32Tb")
|
||||||
assertRAMInBytes(t, "32G", false, 32*1024*1024*1024)
|
assertSuccessEquals(t, 32*PiB, RAMInBytes, "32Pb")
|
||||||
assertRAMInBytes(t, "32Tb", false, 32*1024*1024*1024*1024)
|
assertSuccessEquals(t, 32*PiB, RAMInBytes, "32PB")
|
||||||
|
assertSuccessEquals(t, 32*PiB, RAMInBytes, "32P")
|
||||||
|
|
||||||
assertRAMInBytes(t, "", true, -1)
|
assertError(t, RAMInBytes, "")
|
||||||
assertRAMInBytes(t, "hello", true, -1)
|
assertError(t, RAMInBytes, "hello")
|
||||||
assertRAMInBytes(t, "-32", true, -1)
|
assertError(t, RAMInBytes, "-32")
|
||||||
assertRAMInBytes(t, " 32 ", true, -1)
|
assertError(t, RAMInBytes, "32.3")
|
||||||
assertRAMInBytes(t, "32 mb", true, -1)
|
assertError(t, RAMInBytes, " 32 ")
|
||||||
assertRAMInBytes(t, "32m b", true, -1)
|
assertError(t, RAMInBytes, "32.3Kb")
|
||||||
assertRAMInBytes(t, "32bm", true, -1)
|
assertError(t, RAMInBytes, "32 mb")
|
||||||
|
assertError(t, RAMInBytes, "32m b")
|
||||||
|
assertError(t, RAMInBytes, "32bm")
|
||||||
}
|
}
|
||||||
|
|
||||||
func assertRAMInBytes(t *testing.T, size string, expectError bool, expectedBytes int64) {
|
func assertEquals(t *testing.T, expected, actual interface{}) {
|
||||||
actualBytes, err := RAMInBytes(size)
|
if expected != actual {
|
||||||
if (err != nil) && !expectError {
|
t.Errorf("Expected '%v' but got '%v'", expected, actual)
|
||||||
t.Errorf("Unexpected error parsing '%s': %s", size, err)
|
}
|
||||||
}
|
}
|
||||||
if (err == nil) && expectError {
|
|
||||||
t.Errorf("Expected to get an error parsing '%s', but got none (bytes=%d)", size, actualBytes)
|
// func that maps to the parse function signatures as testing abstraction
|
||||||
}
|
type parseFn func(string) (int64, error)
|
||||||
if actualBytes != expectedBytes {
|
|
||||||
t.Errorf("Expected '%s' to parse as %d bytes, got %d", size, expectedBytes, actualBytes)
|
// Define 'String()' for pretty-print
|
||||||
|
func (fn parseFn) String() string {
|
||||||
|
fnName := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()
|
||||||
|
return fnName[strings.LastIndex(fnName, ".")+1:]
|
||||||
|
}
|
||||||
|
|
||||||
|
func assertSuccessEquals(t *testing.T, expected int64, fn parseFn, arg string) {
|
||||||
|
res, err := fn(arg)
|
||||||
|
if err != nil || res != expected {
|
||||||
|
t.Errorf("%s(\"%s\") -> expected '%d' but got '%d' with error '%v'", fn, arg, expected, res, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func assertError(t *testing.T, fn parseFn, arg string) {
|
||||||
|
res, err := fn(arg)
|
||||||
|
if err == nil && res != -1 {
|
||||||
|
t.Errorf("%s(\"%s\") -> expected error but got '%d'", fn, arg, res)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -222,7 +222,7 @@ func (c *containerData) housekeeping() {
|
|||||||
|
|
||||||
instantUsageInCores := float64(stats[numSamples-1].Cpu.Usage.Total-stats[numSamples-2].Cpu.Usage.Total) / float64(stats[numSamples-1].Timestamp.Sub(stats[numSamples-2].Timestamp).Nanoseconds())
|
instantUsageInCores := float64(stats[numSamples-1].Cpu.Usage.Total-stats[numSamples-2].Cpu.Usage.Total) / float64(stats[numSamples-1].Timestamp.Sub(stats[numSamples-2].Timestamp).Nanoseconds())
|
||||||
usageInCores := float64(usageCpuNs) / float64(stats[numSamples-1].Timestamp.Sub(stats[0].Timestamp).Nanoseconds())
|
usageInCores := float64(usageCpuNs) / float64(stats[numSamples-1].Timestamp.Sub(stats[0].Timestamp).Nanoseconds())
|
||||||
usageInHuman := units.HumanSize(int64(usageMemory))
|
usageInHuman := units.HumanSize(float64(usageMemory))
|
||||||
glog.Infof("[%s] %.3f cores (average: %.3f cores), %s of memory", c.info.Name, instantUsageInCores, usageInCores, usageInHuman)
|
glog.Infof("[%s] %.3f cores (average: %.3f cores), %s of memory", c.info.Name, instantUsageInCores, usageInCores, usageInHuman)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user