mirror of
https://github.com/containers/podman.git
synced 2025-06-25 12:20:42 +08:00
610 lines
19 KiB
Go
610 lines
19 KiB
Go
package images
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
buildahDefine "github.com/containers/buildah/define"
|
|
buildahCLI "github.com/containers/buildah/pkg/cli"
|
|
"github.com/containers/buildah/pkg/parse"
|
|
buildahUtil "github.com/containers/buildah/pkg/util"
|
|
"github.com/containers/common/pkg/auth"
|
|
"github.com/containers/common/pkg/completion"
|
|
"github.com/containers/common/pkg/config"
|
|
encconfig "github.com/containers/ocicrypt/config"
|
|
enchelpers "github.com/containers/ocicrypt/helpers"
|
|
"github.com/containers/podman/v4/cmd/podman/common"
|
|
"github.com/containers/podman/v4/cmd/podman/registry"
|
|
"github.com/containers/podman/v4/cmd/podman/utils"
|
|
"github.com/containers/podman/v4/pkg/domain/entities"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
// buildFlagsWrapper are local to cmd/ as the build code is using Buildah-internal
|
|
// types. Hence, after parsing, we are converting buildFlagsWrapper to the entities'
|
|
// options which essentially embed the Buildah types.
|
|
type buildFlagsWrapper struct {
|
|
// Buildah stuff first
|
|
buildahCLI.BudResults
|
|
buildahCLI.LayerResults
|
|
buildahCLI.FromAndBudResults
|
|
buildahCLI.NameSpaceResults
|
|
buildahCLI.UserNSResults
|
|
|
|
// SquashAll squashes all layers into a single layer.
|
|
SquashAll bool
|
|
}
|
|
|
|
var (
|
|
// Command: podman _diff_ Object_ID
|
|
buildDescription = "Builds an OCI or Docker image using instructions from one or more Containerfiles and a specified build context directory."
|
|
buildCmd = &cobra.Command{
|
|
Use: "build [options] [CONTEXT]",
|
|
Short: "Build an image using instructions from Containerfiles",
|
|
Long: buildDescription,
|
|
Args: cobra.MaximumNArgs(1),
|
|
RunE: build,
|
|
ValidArgsFunction: common.AutocompleteDefaultOneArg,
|
|
Example: `podman build .
|
|
podman build --creds=username:password -t imageName -f Containerfile.simple .
|
|
podman build --layers --force-rm --tag imageName .`,
|
|
}
|
|
|
|
imageBuildCmd = &cobra.Command{
|
|
Args: buildCmd.Args,
|
|
Use: buildCmd.Use,
|
|
Short: buildCmd.Short,
|
|
Long: buildCmd.Long,
|
|
RunE: buildCmd.RunE,
|
|
ValidArgsFunction: buildCmd.ValidArgsFunction,
|
|
Example: `podman image build .
|
|
podman image build --creds=username:password -t imageName -f Containerfile.simple .
|
|
podman image build --layers --force-rm --tag imageName .`,
|
|
}
|
|
|
|
buildxBuildCmd = &cobra.Command{
|
|
Args: buildCmd.Args,
|
|
Use: buildCmd.Use,
|
|
Short: buildCmd.Short,
|
|
Long: buildCmd.Long,
|
|
RunE: buildCmd.RunE,
|
|
ValidArgsFunction: buildCmd.ValidArgsFunction,
|
|
Example: `podman buildx build .
|
|
podman buildx build --creds=username:password -t imageName -f Containerfile.simple .
|
|
podman buildx build --layers --force-rm --tag imageName .`,
|
|
}
|
|
|
|
buildOpts = buildFlagsWrapper{}
|
|
)
|
|
|
|
// useLayers returns false if BUILDAH_LAYERS is set to "0" or "false"
|
|
// otherwise it returns true
|
|
func useLayers() string {
|
|
layers := os.Getenv("BUILDAH_LAYERS")
|
|
if strings.ToLower(layers) == "false" || layers == "0" {
|
|
return "false"
|
|
}
|
|
return "true"
|
|
}
|
|
|
|
func init() {
|
|
registry.Commands = append(registry.Commands, registry.CliCommand{
|
|
Command: buildCmd,
|
|
})
|
|
buildFlags(buildCmd)
|
|
|
|
registry.Commands = append(registry.Commands, registry.CliCommand{
|
|
Command: imageBuildCmd,
|
|
Parent: imageCmd,
|
|
})
|
|
buildFlags(imageBuildCmd)
|
|
registry.Commands = append(registry.Commands, registry.CliCommand{
|
|
Command: buildxBuildCmd,
|
|
Parent: buildxCmd,
|
|
})
|
|
buildFlags(buildxBuildCmd)
|
|
}
|
|
|
|
func buildFlags(cmd *cobra.Command) {
|
|
flags := cmd.Flags()
|
|
|
|
// buildx build --load ignored, but added for compliance
|
|
flags.Bool("load", false, "buildx --load")
|
|
_ = flags.MarkHidden("load")
|
|
|
|
// buildx build --progress ignored, but added for compliance
|
|
flags.String("progress", "auto", "buildx --progress")
|
|
_ = flags.MarkHidden("progress")
|
|
|
|
// Podman flags
|
|
flags.BoolVarP(&buildOpts.SquashAll, "squash-all", "", false, "Squash all layers into a single layer")
|
|
|
|
// Bud flags
|
|
budFlags := buildahCLI.GetBudFlags(&buildOpts.BudResults)
|
|
|
|
// --pull flag
|
|
flag := budFlags.Lookup("pull")
|
|
if err := flag.Value.Set("true"); err != nil {
|
|
logrus.Errorf("Unable to set --pull to true: %v", err)
|
|
}
|
|
flag.DefValue = "true"
|
|
flag.Usage = "Always attempt to pull the image (errors are fatal)"
|
|
flags.AddFlagSet(&budFlags)
|
|
|
|
// Add the completion functions
|
|
budCompletions := buildahCLI.GetBudFlagsCompletions()
|
|
completion.CompleteCommandFlags(cmd, budCompletions)
|
|
|
|
// Layer flags
|
|
layerFlags := buildahCLI.GetLayerFlags(&buildOpts.LayerResults)
|
|
// --layers flag
|
|
flag = layerFlags.Lookup("layers")
|
|
useLayersVal := useLayers()
|
|
buildOpts.Layers = useLayersVal == "true"
|
|
if err := flag.Value.Set(useLayersVal); err != nil {
|
|
logrus.Errorf("Unable to set --layers to %v: %v", useLayersVal, err)
|
|
}
|
|
flag.DefValue = useLayersVal
|
|
// --force-rm flag
|
|
flag = layerFlags.Lookup("force-rm")
|
|
if err := flag.Value.Set("true"); err != nil {
|
|
logrus.Errorf("Unable to set --force-rm to true: %v", err)
|
|
}
|
|
flag.DefValue = "true"
|
|
flags.AddFlagSet(&layerFlags)
|
|
|
|
// FromAndBud flags
|
|
fromAndBudFlags, err := buildahCLI.GetFromAndBudFlags(&buildOpts.FromAndBudResults, &buildOpts.UserNSResults, &buildOpts.NameSpaceResults)
|
|
if err != nil {
|
|
logrus.Errorf("Setting up build flags: %v", err)
|
|
os.Exit(1)
|
|
}
|
|
// --http-proxy flag
|
|
// containers.conf defaults to true but we want to force false by default for remote, since settings do not apply
|
|
if registry.IsRemote() {
|
|
flag = fromAndBudFlags.Lookup("http-proxy")
|
|
buildOpts.HTTPProxy = false
|
|
if err := flag.Value.Set("false"); err != nil {
|
|
logrus.Errorf("Unable to set --https-proxy to %v: %v", false, err)
|
|
}
|
|
flag.DefValue = "false"
|
|
}
|
|
flags.AddFlagSet(&fromAndBudFlags)
|
|
// Add the completion functions
|
|
fromAndBudFlagsCompletions := buildahCLI.GetFromAndBudFlagsCompletions()
|
|
completion.CompleteCommandFlags(cmd, fromAndBudFlagsCompletions)
|
|
flags.SetNormalizeFunc(buildahCLI.AliasFlags)
|
|
if registry.IsRemote() {
|
|
_ = flags.MarkHidden("disable-content-trust")
|
|
_ = flags.MarkHidden("cache-from")
|
|
_ = flags.MarkHidden("sign-by")
|
|
_ = flags.MarkHidden("signature-policy")
|
|
_ = flags.MarkHidden("tls-verify")
|
|
_ = flags.MarkHidden("compress")
|
|
_ = flags.MarkHidden("volume")
|
|
}
|
|
}
|
|
|
|
// build executes the build command.
|
|
func build(cmd *cobra.Command, args []string) error {
|
|
if (cmd.Flags().Changed("squash") && cmd.Flags().Changed("layers")) ||
|
|
(cmd.Flags().Changed("squash-all") && cmd.Flags().Changed("layers")) ||
|
|
(cmd.Flags().Changed("squash-all") && cmd.Flags().Changed("squash")) {
|
|
return errors.New("cannot specify --squash, --squash-all and --layers options together")
|
|
}
|
|
|
|
// Extract container files from the CLI (i.e., --file/-f) first.
|
|
var containerFiles []string
|
|
for _, f := range buildOpts.File {
|
|
if f == "-" {
|
|
containerFiles = append(containerFiles, "/dev/stdin")
|
|
} else {
|
|
containerFiles = append(containerFiles, f)
|
|
}
|
|
}
|
|
|
|
// Determine context directory.
|
|
var contextDir string
|
|
if len(args) > 0 {
|
|
// The context directory could be a URL. Try to handle that.
|
|
tempDir, subDir, err := buildahDefine.TempDirForURL("", "buildah", args[0])
|
|
if err != nil {
|
|
return errors.Wrapf(err, "error prepping temporary context directory")
|
|
}
|
|
if tempDir != "" {
|
|
// We had to download it to a temporary directory.
|
|
// Delete it later.
|
|
defer func() {
|
|
if err = os.RemoveAll(tempDir); err != nil {
|
|
logrus.Errorf("Removing temporary directory %q: %v", contextDir, err)
|
|
}
|
|
}()
|
|
contextDir = filepath.Join(tempDir, subDir)
|
|
} else {
|
|
// Nope, it was local. Use it as is.
|
|
absDir, err := filepath.Abs(args[0])
|
|
if err != nil {
|
|
return errors.Wrapf(err, "error determining path to directory %q", args[0])
|
|
}
|
|
contextDir = absDir
|
|
}
|
|
} else {
|
|
// No context directory or URL was specified. Try to use the home of
|
|
// the first locally-available Containerfile.
|
|
for i := range containerFiles {
|
|
if strings.HasPrefix(containerFiles[i], "http://") ||
|
|
strings.HasPrefix(containerFiles[i], "https://") ||
|
|
strings.HasPrefix(containerFiles[i], "git://") ||
|
|
strings.HasPrefix(containerFiles[i], "github.com/") {
|
|
continue
|
|
}
|
|
absFile, err := filepath.Abs(containerFiles[i])
|
|
if err != nil {
|
|
return errors.Wrapf(err, "error determining path to file %q", containerFiles[i])
|
|
}
|
|
contextDir = filepath.Dir(absFile)
|
|
containerFiles[i] = absFile
|
|
break
|
|
}
|
|
}
|
|
|
|
if contextDir == "" {
|
|
return errors.Errorf("no context directory and no Containerfile specified")
|
|
}
|
|
if !utils.IsDir(contextDir) {
|
|
return errors.Errorf("context must be a directory: %q", contextDir)
|
|
}
|
|
if len(containerFiles) == 0 {
|
|
if utils.FileExists(filepath.Join(contextDir, "Containerfile")) {
|
|
containerFiles = append(containerFiles, filepath.Join(contextDir, "Containerfile"))
|
|
} else {
|
|
containerFiles = append(containerFiles, filepath.Join(contextDir, "Dockerfile"))
|
|
}
|
|
}
|
|
|
|
var logfile *os.File
|
|
if cmd.Flag("logfile").Changed {
|
|
var err error
|
|
logfile, err = os.OpenFile(buildOpts.Logfile, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0600)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer logfile.Close()
|
|
}
|
|
|
|
apiBuildOpts, err := buildFlagsWrapperToOptions(cmd, contextDir, &buildOpts, logfile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
report, err := registry.ImageEngine().Build(registry.GetContext(), containerFiles, *apiBuildOpts)
|
|
|
|
if err != nil {
|
|
exitCode := buildahCLI.ExecErrorCodeGeneric
|
|
if registry.IsRemote() {
|
|
// errors from server does not contain ExitCode
|
|
// so parse exit code from error message
|
|
remoteExitCode, parseErr := utils.ExitCodeFromBuildError(fmt.Sprint(errors.Cause(err)))
|
|
if parseErr == nil {
|
|
exitCode = remoteExitCode
|
|
}
|
|
}
|
|
|
|
if ee, ok := (errors.Cause(err)).(*exec.ExitError); ok {
|
|
exitCode = ee.ExitCode()
|
|
}
|
|
|
|
registry.SetExitCode(exitCode)
|
|
return err
|
|
}
|
|
|
|
if cmd.Flag("iidfile").Changed {
|
|
f, err := os.Create(buildOpts.Iidfile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if _, err := f.WriteString("sha256:" + report.ID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildFlagsWrapperToOptions converts the local build flags to the build options used
|
|
// in the API which embed Buildah types used across the build code. Doing the
|
|
// conversion here prevents the API from doing that (redundantly).
|
|
//
|
|
// TODO: this code should really be in Buildah.
|
|
func buildFlagsWrapperToOptions(c *cobra.Command, contextDir string, flags *buildFlagsWrapper, logfile *os.File) (*entities.BuildOptions, error) {
|
|
output := ""
|
|
tags := []string{}
|
|
if c.Flag("tag").Changed {
|
|
tags = flags.Tag
|
|
if len(tags) > 0 {
|
|
output = tags[0]
|
|
tags = tags[1:]
|
|
}
|
|
}
|
|
|
|
commonOpts, err := parse.CommonBuildOptions(c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
pullFlagsCount := 0
|
|
if c.Flag("pull").Changed {
|
|
pullFlagsCount++
|
|
}
|
|
if c.Flag("pull-always").Changed {
|
|
pullFlagsCount++
|
|
}
|
|
if c.Flag("pull-never").Changed {
|
|
pullFlagsCount++
|
|
}
|
|
|
|
if pullFlagsCount > 1 {
|
|
return nil, errors.Errorf("can only set one of 'pull' or 'pull-always' or 'pull-never'")
|
|
}
|
|
|
|
// Allow for --pull, --pull=true, --pull=false, --pull=never, --pull=always
|
|
// --pull-always and --pull-never. The --pull-never and --pull-always options
|
|
// will not be documented.
|
|
pullPolicy := buildahDefine.PullIfMissing
|
|
if c.Flags().Changed("pull") && strings.EqualFold(strings.TrimSpace(flags.Pull), "true") {
|
|
pullPolicy = buildahDefine.PullAlways
|
|
}
|
|
if flags.PullAlways || strings.EqualFold(strings.TrimSpace(flags.Pull), "always") {
|
|
pullPolicy = buildahDefine.PullAlways
|
|
}
|
|
|
|
if flags.PullNever || strings.EqualFold(strings.TrimSpace(flags.Pull), "never") {
|
|
pullPolicy = buildahDefine.PullNever
|
|
}
|
|
|
|
if c.Flag("authfile").Changed {
|
|
if err := auth.CheckAuthFile(flags.Authfile); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
var cleanTmpFile bool
|
|
flags.Authfile, cleanTmpFile = buildahUtil.MirrorToTempFileIfPathIsDescriptor(flags.Authfile)
|
|
if cleanTmpFile {
|
|
defer os.Remove(flags.Authfile)
|
|
}
|
|
|
|
args := make(map[string]string)
|
|
if c.Flag("build-arg").Changed {
|
|
for _, arg := range flags.BuildArg {
|
|
av := strings.SplitN(arg, "=", 2)
|
|
if len(av) > 1 {
|
|
args[av[0]] = av[1]
|
|
} else {
|
|
// check if the env is set in the local environment and use that value if it is
|
|
if val, present := os.LookupEnv(av[0]); present {
|
|
args[av[0]] = val
|
|
} else {
|
|
delete(args, av[0])
|
|
}
|
|
}
|
|
}
|
|
}
|
|
flags.Layers = buildOpts.Layers
|
|
|
|
// `buildah bud --layers=false` acts like `docker build --squash` does.
|
|
// That is all of the new layers created during the build process are
|
|
// condensed into one, any layers present prior to this build are
|
|
// retained without condensing. `buildah bud --squash` squashes both
|
|
// new and old layers down into one. Translate Podman commands into
|
|
// Buildah. Squash invoked, retain old layers, squash new layers into
|
|
// one.
|
|
if c.Flags().Changed("squash") && buildOpts.Squash {
|
|
flags.Squash = false
|
|
flags.Layers = false
|
|
}
|
|
// Squash-all invoked, squash both new and old layers into one.
|
|
if c.Flags().Changed("squash-all") {
|
|
flags.Squash = true
|
|
flags.Layers = false
|
|
}
|
|
|
|
var stdin io.Reader
|
|
if flags.Stdin {
|
|
stdin = os.Stdin
|
|
}
|
|
var stdout, stderr, reporter *os.File
|
|
stdout = os.Stdout
|
|
stderr = os.Stderr
|
|
reporter = os.Stderr
|
|
|
|
if logfile != nil {
|
|
logrus.SetOutput(logfile)
|
|
stdout = logfile
|
|
stderr = logfile
|
|
reporter = logfile
|
|
}
|
|
|
|
nsValues, networkPolicy, err := parse.NamespaceOptions(c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// `buildah bud --layers=false` acts like `docker build --squash` does.
|
|
// That is all of the new layers created during the build process are
|
|
// condensed into one, any layers present prior to this build are retained
|
|
// without condensing. `buildah bud --squash` squashes both new and old
|
|
// layers down into one. Translate Podman commands into Buildah.
|
|
// Squash invoked, retain old layers, squash new layers into one.
|
|
if c.Flags().Changed("squash") && flags.Squash {
|
|
flags.Squash = false
|
|
flags.Layers = false
|
|
}
|
|
// Squash-all invoked, squash both new and old layers into one.
|
|
if c.Flags().Changed("squash-all") {
|
|
flags.Squash = true
|
|
flags.Layers = false
|
|
}
|
|
|
|
compression := buildahDefine.Gzip
|
|
if flags.DisableCompression {
|
|
compression = buildahDefine.Uncompressed
|
|
}
|
|
|
|
isolation, err := parse.IsolationOption(flags.Isolation)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
usernsOption, idmappingOptions, err := parse.IDMappingOptions(c, isolation)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
nsValues = append(nsValues, usernsOption...)
|
|
|
|
systemContext, err := parse.SystemContextFromOptions(c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var format string
|
|
flags.Format = strings.ToLower(flags.Format)
|
|
switch {
|
|
case strings.HasPrefix(flags.Format, buildahDefine.OCI):
|
|
format = buildahDefine.OCIv1ImageManifest
|
|
case strings.HasPrefix(flags.Format, buildahDefine.DOCKER):
|
|
format = buildahDefine.Dockerv2ImageManifest
|
|
default:
|
|
return nil, errors.Errorf("unrecognized image type %q", flags.Format)
|
|
}
|
|
|
|
runtimeFlags := []string{}
|
|
for _, arg := range flags.RuntimeFlags {
|
|
runtimeFlags = append(runtimeFlags, "--"+arg)
|
|
}
|
|
|
|
containerConfig := registry.PodmanConfig()
|
|
for _, arg := range containerConfig.RuntimeFlags {
|
|
runtimeFlags = append(runtimeFlags, "--"+arg)
|
|
}
|
|
if containerConfig.Engine.CgroupManager == config.SystemdCgroupsManager {
|
|
runtimeFlags = append(runtimeFlags, "--systemd-cgroup")
|
|
}
|
|
|
|
platforms, err := parse.PlatformsFromOptions(c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
decConfig, err := getDecryptConfig(flags.DecryptionKeys)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "unable to obtain decrypt config")
|
|
}
|
|
|
|
opts := buildahDefine.BuildOptions{
|
|
AddCapabilities: flags.CapAdd,
|
|
AdditionalTags: tags,
|
|
AllPlatforms: flags.AllPlatforms,
|
|
Annotations: flags.Annotation,
|
|
Args: args,
|
|
BlobDirectory: flags.BlobCache,
|
|
BuildOutput: flags.BuildOutput,
|
|
CommonBuildOpts: commonOpts,
|
|
Compression: compression,
|
|
ConfigureNetwork: networkPolicy,
|
|
ContextDirectory: contextDir,
|
|
DefaultMountsFilePath: containerConfig.Containers.DefaultMountsFile,
|
|
Devices: flags.Devices,
|
|
DropCapabilities: flags.CapDrop,
|
|
Envs: flags.Envs,
|
|
Err: stderr,
|
|
ForceRmIntermediateCtrs: flags.ForceRm,
|
|
From: flags.From,
|
|
IDMappingOptions: idmappingOptions,
|
|
In: stdin,
|
|
Isolation: isolation,
|
|
Jobs: &flags.Jobs,
|
|
Labels: flags.Label,
|
|
Layers: flags.Layers,
|
|
LogRusage: flags.LogRusage,
|
|
Manifest: flags.Manifest,
|
|
MaxPullPushRetries: 3,
|
|
NamespaceOptions: nsValues,
|
|
NoCache: flags.NoCache,
|
|
OSFeatures: flags.OSFeatures,
|
|
OSVersion: flags.OSVersion,
|
|
OciDecryptConfig: decConfig,
|
|
Out: stdout,
|
|
Output: output,
|
|
OutputFormat: format,
|
|
Platforms: platforms,
|
|
PullPolicy: pullPolicy,
|
|
PullPushRetryDelay: 2 * time.Second,
|
|
Quiet: flags.Quiet,
|
|
RemoveIntermediateCtrs: flags.Rm,
|
|
ReportWriter: reporter,
|
|
Runtime: containerConfig.RuntimePath,
|
|
RuntimeArgs: runtimeFlags,
|
|
RusageLogFile: flags.RusageLogFile,
|
|
SignBy: flags.SignBy,
|
|
SignaturePolicyPath: flags.SignaturePolicy,
|
|
Squash: flags.Squash,
|
|
SystemContext: systemContext,
|
|
Target: flags.Target,
|
|
TransientMounts: flags.Volumes,
|
|
UnsetEnvs: flags.UnsetEnvs,
|
|
}
|
|
|
|
if flags.IgnoreFile != "" {
|
|
excludes, err := parseDockerignore(flags.IgnoreFile)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "unable to obtain decrypt config")
|
|
}
|
|
opts.Excludes = excludes
|
|
}
|
|
|
|
if c.Flag("timestamp").Changed {
|
|
timestamp := time.Unix(flags.Timestamp, 0).UTC()
|
|
opts.Timestamp = ×tamp
|
|
}
|
|
|
|
return &entities.BuildOptions{BuildOptions: opts}, nil
|
|
}
|
|
|
|
func getDecryptConfig(decryptionKeys []string) (*encconfig.DecryptConfig, error) {
|
|
decConfig := &encconfig.DecryptConfig{}
|
|
if len(decryptionKeys) > 0 {
|
|
// decryption
|
|
dcc, err := enchelpers.CreateCryptoConfig([]string{}, decryptionKeys)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "invalid decryption keys")
|
|
}
|
|
cc := encconfig.CombineCryptoConfigs([]encconfig.CryptoConfig{dcc})
|
|
decConfig = cc.DecryptConfig
|
|
}
|
|
|
|
return decConfig, nil
|
|
}
|
|
|
|
func parseDockerignore(ignoreFile string) ([]string, error) {
|
|
excludes := []string{}
|
|
ignore, err := ioutil.ReadFile(ignoreFile)
|
|
if err != nil {
|
|
return excludes, err
|
|
}
|
|
for _, e := range strings.Split(string(ignore), "\n") {
|
|
if len(e) == 0 || e[0] == '#' {
|
|
continue
|
|
}
|
|
excludes = append(excludes, e)
|
|
}
|
|
return excludes, nil
|
|
}
|