mirror of https://github.com/kubernetes/kops.git
277 lines
6.1 KiB
Go
277 lines
6.1 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package vfs
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"path"
|
|
"strings"
|
|
"sync"
|
|
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter"
|
|
)
|
|
|
|
type MemFSPath struct {
|
|
context *MemFSContext
|
|
location string
|
|
acl ACL
|
|
|
|
mutex sync.Mutex
|
|
contents []byte
|
|
children map[string]*MemFSPath
|
|
}
|
|
|
|
var (
|
|
_ Path = &MemFSPath{}
|
|
_ TerraformPath = &MemFSPath{}
|
|
)
|
|
|
|
type MemFSContext struct {
|
|
clusterReadable bool
|
|
root *MemFSPath
|
|
}
|
|
|
|
func NewMemFSContext() *MemFSContext {
|
|
c := &MemFSContext{}
|
|
c.root = &MemFSPath{
|
|
context: c,
|
|
location: "",
|
|
}
|
|
return c
|
|
}
|
|
|
|
// MarkClusterReadable pretends the current memfscontext is cluster readable; this is useful for tests
|
|
func (c *MemFSContext) MarkClusterReadable() {
|
|
c.clusterReadable = true
|
|
}
|
|
|
|
func (c *MemFSPath) HasChildren() bool {
|
|
c.mutex.Lock()
|
|
defer c.mutex.Unlock()
|
|
|
|
return len(c.children) != 0
|
|
}
|
|
|
|
func (c *MemFSPath) IsClusterReadable() bool {
|
|
return c.context.clusterReadable
|
|
}
|
|
|
|
var _ HasClusterReadable = &MemFSPath{}
|
|
|
|
func NewMemFSPath(context *MemFSContext, location string) *MemFSPath {
|
|
return context.root.Join(location).(*MemFSPath)
|
|
}
|
|
|
|
func (p *MemFSPath) Join(relativePath ...string) Path {
|
|
p.mutex.Lock()
|
|
defer p.mutex.Unlock()
|
|
|
|
joined := path.Join(relativePath...)
|
|
tokens := strings.Split(joined, "/")
|
|
current := p
|
|
for _, token := range tokens {
|
|
if current.children == nil {
|
|
current.children = make(map[string]*MemFSPath)
|
|
}
|
|
child := current.children[token]
|
|
if child == nil {
|
|
child = &MemFSPath{
|
|
context: p.context,
|
|
location: path.Join(current.location, token),
|
|
}
|
|
current.children[token] = child
|
|
}
|
|
current = child
|
|
current.mutex.Lock()
|
|
defer current.mutex.Unlock()
|
|
}
|
|
return current
|
|
}
|
|
|
|
func (p *MemFSPath) WriteFile(ctx context.Context, r io.ReadSeeker, acl ACL) error {
|
|
data, err := io.ReadAll(r)
|
|
if err != nil {
|
|
return fmt.Errorf("error reading data: %v", err)
|
|
}
|
|
p.contents = data
|
|
p.acl = acl
|
|
return nil
|
|
}
|
|
|
|
func (p *MemFSPath) CreateFile(ctx context.Context, data io.ReadSeeker, acl ACL) error {
|
|
// Check if exists
|
|
if p.contents != nil {
|
|
return os.ErrExist
|
|
}
|
|
|
|
return p.WriteFile(ctx, data, acl)
|
|
}
|
|
|
|
// ReadFile implements Path::ReadFile
|
|
func (p *MemFSPath) ReadFile(ctx context.Context) ([]byte, error) {
|
|
if p.contents == nil {
|
|
return nil, os.ErrNotExist
|
|
}
|
|
// TODO: Copy?
|
|
return p.contents, nil
|
|
}
|
|
|
|
// WriteTo implements io.WriterTo
|
|
func (p *MemFSPath) WriteTo(out io.Writer) (int64, error) {
|
|
if p.contents == nil {
|
|
return 0, os.ErrNotExist
|
|
}
|
|
n, err := out.Write(p.contents)
|
|
return int64(n), err
|
|
}
|
|
|
|
func (p *MemFSPath) ReadDir() ([]Path, error) {
|
|
p.mutex.Lock()
|
|
defer p.mutex.Unlock()
|
|
|
|
var paths []Path
|
|
for _, f := range p.children {
|
|
paths = append(paths, f)
|
|
}
|
|
return paths, nil
|
|
}
|
|
|
|
func (p *MemFSPath) ReadTree(ctx context.Context) ([]Path, error) {
|
|
var paths []Path
|
|
p.readTree(&paths)
|
|
return paths, nil
|
|
}
|
|
|
|
func (p *MemFSPath) readTree(dest *[]Path) {
|
|
p.mutex.Lock()
|
|
defer p.mutex.Unlock()
|
|
|
|
for _, f := range p.children {
|
|
if !f.HasChildren() {
|
|
*dest = append(*dest, f)
|
|
}
|
|
f.readTree(dest)
|
|
}
|
|
}
|
|
|
|
func (p *MemFSPath) Base() string {
|
|
return path.Base(p.location)
|
|
}
|
|
|
|
func (p *MemFSPath) Path() string {
|
|
return "memfs://" + p.location
|
|
}
|
|
|
|
func (p *MemFSPath) String() string {
|
|
return p.Path()
|
|
}
|
|
|
|
func (p *MemFSPath) Remove(ctx context.Context) error {
|
|
p.contents = nil
|
|
return nil
|
|
}
|
|
|
|
func (p *MemFSPath) RemoveAll(ctx context.Context) error {
|
|
tree, err := p.ReadTree(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, filePath := range tree {
|
|
err := filePath.Remove(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("error removing file %s: %w", filePath, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *MemFSPath) RemoveAllVersions(ctx context.Context) error {
|
|
return p.Remove(ctx)
|
|
}
|
|
|
|
func (p *MemFSPath) Location() string {
|
|
return p.location
|
|
}
|
|
|
|
func (p *MemFSPath) IsPublic() (bool, error) {
|
|
if p.acl == nil {
|
|
return false, nil
|
|
}
|
|
s3Acl, ok := p.acl.(*S3Acl)
|
|
if !ok {
|
|
return false, fmt.Errorf("expected acl to be S3Acl, was %T", p.acl)
|
|
}
|
|
isPublic := false
|
|
if s3Acl.RequestACL != nil {
|
|
isPublic = *s3Acl.RequestACL == "public-read"
|
|
}
|
|
return isPublic, nil
|
|
}
|
|
|
|
type terraformMemFSFile struct {
|
|
Bucket string `json:"bucket" cty:"bucket"`
|
|
Key string `json:"key" cty:"key"`
|
|
Content *terraformWriter.Literal `json:"content,omitempty" cty:"content"`
|
|
Acl *string `json:"acl,omitempty" cty:"acl"`
|
|
SSE string `json:"server_side_encryption,omitempty" cty:"server_side_encryption"`
|
|
Provider *terraformWriter.Literal `json:"provider,omitempty" cty:"provider"`
|
|
}
|
|
|
|
func (p *MemFSPath) RenderTerraform(w *terraformWriter.TerraformWriter, name string, data io.Reader, acl ACL) error {
|
|
bytes, err := io.ReadAll(data)
|
|
if err != nil {
|
|
return fmt.Errorf("reading data: %v", err)
|
|
}
|
|
|
|
tfProviderArguments := map[string]string{
|
|
"region": "us-test-1",
|
|
}
|
|
w.EnsureTerraformProvider("aws", tfProviderArguments)
|
|
|
|
content, err := w.AddFileBytes("aws_s3_object", name, "content", bytes, false)
|
|
if err != nil {
|
|
return fmt.Errorf("rendering S3 file: %v", err)
|
|
}
|
|
|
|
var requestAcl *string
|
|
if acl != nil {
|
|
s3Acl, ok := acl.(*S3Acl)
|
|
if !ok {
|
|
return fmt.Errorf("write to %s with ACL of unexpected type %T", p, acl)
|
|
}
|
|
if s3Acl != nil && s3Acl.RequestACL != nil {
|
|
aclVal := string(*s3Acl.RequestACL)
|
|
requestAcl = &aclVal
|
|
}
|
|
}
|
|
|
|
tf := &terraformMemFSFile{
|
|
Bucket: "testingBucket",
|
|
Key: p.location,
|
|
Content: content,
|
|
SSE: "AES256",
|
|
Acl: requestAcl,
|
|
Provider: terraformWriter.LiteralTokens("aws", "files"),
|
|
}
|
|
return w.RenderResource("aws_s3_object", name, tf)
|
|
}
|