mirror of
https://github.com/aljazceru/kata-containers.git
synced 2026-01-17 05:14:31 +01:00
As we bumped the rust toolchain to 1.66.0, some new warnings have been raised due to needless_borrow. Let's fix them all here. For more info about the warnings, please, take a look at: https://rust-lang.github.io/rust-clippy/master/index.html#needless_borrow Signed-off-by: Fabiano Fidêncio <fabiano.fidencio@intel.com>
213 lines
7.0 KiB
Rust
213 lines
7.0 KiB
Rust
// Copyright (c) 2019-2021 Alibaba Cloud
|
|
// Copyright (c) 2019-2021 Ant Group
|
|
//
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
//
|
|
|
|
use std::ffi::OsString;
|
|
use std::fs::{self, File};
|
|
use std::io::{Error, Result};
|
|
use std::os::unix::io::AsRawFd;
|
|
use std::path::Path;
|
|
use std::process::Command;
|
|
|
|
use crate::{eother, sl};
|
|
|
|
// nix filesystem_type for different libc and architectures
|
|
#[cfg(all(target_os = "linux", target_env = "musl"))]
|
|
type FsType = libc::c_ulong;
|
|
#[cfg(all(
|
|
target_os = "linux",
|
|
not(any(target_env = "musl", target_arch = "s390x"))
|
|
))]
|
|
type FsType = libc::__fsword_t;
|
|
#[cfg(all(target_os = "linux", not(target_env = "musl"), target_arch = "s390x"))]
|
|
type FsType = libc::c_uint;
|
|
|
|
// from linux.git/fs/fuse/inode.c: #define FUSE_SUPER_MAGIC 0x65735546
|
|
const FUSE_SUPER_MAGIC: FsType = 0x65735546;
|
|
// from linux.git/include/uapi/linux/magic.h
|
|
const OVERLAYFS_SUPER_MAGIC: FsType = 0x794c7630;
|
|
|
|
/// Get the basename of the canonicalized path
|
|
pub fn get_base_name<P: AsRef<Path>>(src: P) -> Result<OsString> {
|
|
let s = src.as_ref().canonicalize()?;
|
|
s.file_name().map(|v| v.to_os_string()).ok_or_else(|| {
|
|
eother!(
|
|
"failed to get base name of path {}",
|
|
src.as_ref().to_string_lossy()
|
|
)
|
|
})
|
|
}
|
|
|
|
/// Check whether `path` is on a fuse filesystem.
|
|
pub fn is_fuse_fs<P: AsRef<Path>>(path: P) -> bool {
|
|
if let Ok(st) = nix::sys::statfs::statfs(path.as_ref()) {
|
|
if st.filesystem_type().0 == FUSE_SUPER_MAGIC {
|
|
return true;
|
|
}
|
|
}
|
|
false
|
|
}
|
|
|
|
/// Check whether `path` is on a overlay filesystem.
|
|
pub fn is_overlay_fs<P: AsRef<Path>>(path: P) -> bool {
|
|
if let Ok(st) = nix::sys::statfs::statfs(path.as_ref()) {
|
|
if st.filesystem_type().0 == OVERLAYFS_SUPER_MAGIC {
|
|
return true;
|
|
}
|
|
}
|
|
false
|
|
}
|
|
|
|
/// Check whether the given path is a symlink.
|
|
pub fn is_symlink<P: AsRef<Path>>(path: P) -> std::io::Result<bool> {
|
|
let path = path.as_ref();
|
|
let meta = fs::symlink_metadata(path)?;
|
|
|
|
Ok(meta.file_type().is_symlink())
|
|
}
|
|
|
|
/// Reflink copy src to dst, and falls back to regular copy if reflink copy fails.
|
|
///
|
|
/// # Safety
|
|
/// The `reflink_copy()` doesn't preserve permission/security context for the copied file,
|
|
/// so caller needs to take care of it.
|
|
pub fn reflink_copy<S: AsRef<Path>, D: AsRef<Path>>(src: S, dst: D) -> Result<()> {
|
|
let src_path = src.as_ref();
|
|
let dst_path = dst.as_ref();
|
|
let src = src_path.to_string_lossy();
|
|
let dst = dst_path.to_string_lossy();
|
|
|
|
if !src_path.is_file() {
|
|
return Err(eother!("reflink_copy src {} is not a regular file", src));
|
|
}
|
|
|
|
// Make sure dst's parent exist. If dst is a regular file, then unlink it for later copy.
|
|
if dst_path.exists() {
|
|
if !dst_path.is_file() {
|
|
return Err(eother!("reflink_copy dst {} is not a regular file", dst));
|
|
} else {
|
|
fs::remove_file(dst_path)?;
|
|
}
|
|
} else if let Some(dst_parent) = dst_path.parent() {
|
|
if !dst_parent.exists() {
|
|
if let Err(e) = fs::create_dir_all(dst_parent) {
|
|
return Err(eother!(
|
|
"reflink_copy: create_dir_all {} failed: {:?}",
|
|
dst_parent.to_str().unwrap(),
|
|
e
|
|
));
|
|
}
|
|
} else if !dst_parent.is_dir() {
|
|
return Err(eother!("reflink_copy parent of {} is not a directory", dst));
|
|
}
|
|
}
|
|
|
|
// Reflink copy, and fallback to regular copy if reflink fails.
|
|
let src_file = fs::File::open(src_path)?;
|
|
let dst_file = fs::File::create(dst_path)?;
|
|
if let Err(e) = do_reflink_copy(src_file, dst_file) {
|
|
match e.raw_os_error() {
|
|
// Cross dev copy or filesystem doesn't support reflink, do regular copy
|
|
Some(os_err)
|
|
if os_err == nix::Error::EXDEV as i32
|
|
|| os_err == nix::Error::EOPNOTSUPP as i32 =>
|
|
{
|
|
warn!(
|
|
sl!(),
|
|
"reflink_copy: reflink is not supported ({:?}), do regular copy instead", e,
|
|
);
|
|
if let Err(e) = do_regular_copy(src.as_ref(), dst.as_ref()) {
|
|
return Err(eother!(
|
|
"reflink_copy: regular copy {} to {} failed: {:?}",
|
|
src,
|
|
dst,
|
|
e
|
|
));
|
|
}
|
|
}
|
|
// Reflink copy failed
|
|
_ => {
|
|
return Err(eother!(
|
|
"reflink_copy: copy {} to {} failed: {:?}",
|
|
src,
|
|
dst,
|
|
e,
|
|
))
|
|
}
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
// Copy file using cp command, which handles sparse file copy.
|
|
fn do_regular_copy(src: &str, dst: &str) -> Result<()> {
|
|
let mut cmd = Command::new("/bin/cp");
|
|
cmd.args(["--sparse=auto", src, dst]);
|
|
|
|
match cmd.output() {
|
|
Ok(output) => match output.status.success() {
|
|
true => Ok(()),
|
|
false => Err(eother!("`{:?}` failed: {:?}", cmd, output)),
|
|
},
|
|
Err(e) => Err(eother!("`{:?}` failed: {:?}", cmd, e)),
|
|
}
|
|
}
|
|
|
|
/// Copy file by reflink
|
|
fn do_reflink_copy(src: File, dst: File) -> Result<()> {
|
|
use nix::ioctl_write_int;
|
|
// FICLONE ioctl number definition, from include/linux/fs.h
|
|
const FS_IOC_MAGIC: u8 = 0x94;
|
|
const FS_IOC_FICLONE: u8 = 9;
|
|
// Define FICLONE ioctl using nix::ioctl_write_int! macro.
|
|
// The generated function has the following signature:
|
|
// pub unsafe fn ficlone(fd: libc::c_int, data: libc::c_ulang) -> Result<libc::c_int>
|
|
ioctl_write_int!(ficlone, FS_IOC_MAGIC, FS_IOC_FICLONE);
|
|
|
|
// Safe because the `src` and `dst` are valid file objects and we have checked the result.
|
|
unsafe { ficlone(dst.as_raw_fd(), src.as_raw_fd() as u64) }
|
|
.map(|_| ())
|
|
.map_err(|e| Error::from_raw_os_error(e as i32))
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
|
|
#[test]
|
|
fn test_get_base_name() {
|
|
assert_eq!(&get_base_name("/etc/hostname").unwrap(), "hostname");
|
|
assert_eq!(&get_base_name("/bin").unwrap(), "bin");
|
|
assert!(&get_base_name("/").is_err());
|
|
assert!(&get_base_name("").is_err());
|
|
assert!(get_base_name("/no/such/path________yeah").is_err());
|
|
}
|
|
|
|
#[test]
|
|
fn test_is_symlink() {
|
|
let tmpdir = tempfile::tempdir().unwrap();
|
|
let path = tmpdir.path();
|
|
|
|
std::os::unix::fs::symlink(path, path.join("a")).unwrap();
|
|
assert!(is_symlink(path.join("a")).unwrap());
|
|
}
|
|
|
|
#[test]
|
|
fn test_reflink_copy() {
|
|
let tmpdir = tempfile::tempdir().unwrap();
|
|
let path = tmpdir.path().join("mounts");
|
|
reflink_copy("/proc/mounts", &path).unwrap();
|
|
let content = fs::read_to_string(&path).unwrap();
|
|
assert!(!content.is_empty());
|
|
reflink_copy("/proc/mounts", &path).unwrap();
|
|
let content = fs::read_to_string(&path).unwrap();
|
|
assert!(!content.is_empty());
|
|
|
|
reflink_copy("/proc/mounts", tmpdir.path()).unwrap_err();
|
|
reflink_copy("/proc/mounts_not_exist", &path).unwrap_err();
|
|
}
|
|
}
|