2016-12-23 17:49:24 +03:00
|
|
|
// Copyright 2016 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2017-01-27 23:39:07 +03:00
|
|
|
package dep
|
2016-12-23 17:49:24 +03:00
|
|
|
|
|
|
|
import (
|
2017-03-01 23:52:09 +03:00
|
|
|
"bytes"
|
2016-12-23 17:49:24 +03:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2017-03-01 23:52:09 +03:00
|
|
|
"sort"
|
|
|
|
"strings"
|
2016-12-23 17:49:24 +03:00
|
|
|
|
2017-04-25 20:13:14 +03:00
|
|
|
"github.com/golang/dep/gps"
|
2017-05-06 03:17:26 +03:00
|
|
|
"github.com/golang/dep/log"
|
2017-03-23 01:11:43 +03:00
|
|
|
"github.com/pelletier/go-toml"
|
2016-12-23 18:34:20 +03:00
|
|
|
"github.com/pkg/errors"
|
2016-12-23 17:49:24 +03:00
|
|
|
)
|
|
|
|
|
2017-04-13 15:30:07 +03:00
|
|
|
// Example string to be written to the manifest file
|
|
|
|
// if no dependencies are found in the project
|
|
|
|
// during `dep init`
|
2017-04-26 07:47:31 +03:00
|
|
|
const exampleTOML = `
|
2017-04-28 08:11:17 +03:00
|
|
|
## Gopkg.toml example (these lines may be deleted)
|
|
|
|
|
2017-04-28 06:51:57 +03:00
|
|
|
## "required" lists a set of packages (not projects) that must be included in
|
|
|
|
## Gopkg.lock. This list is merged with the set of packages imported by the current
|
|
|
|
## project. Use it when your project needs a package it doesn't explicitly import -
|
|
|
|
## including "main" packages.
|
|
|
|
# required = ["github.com/user/thing/cmd/thing"]
|
2017-04-28 08:11:17 +03:00
|
|
|
|
2017-04-28 06:51:57 +03:00
|
|
|
## "ignored" lists a set of packages (not projects) that are ignored when
|
|
|
|
## dep statically analyzes source code. Ignored packages can be in this project,
|
|
|
|
## or in a dependency.
|
|
|
|
# ignored = ["github.com/user/project/badpkg"]
|
2017-04-28 08:11:17 +03:00
|
|
|
|
2017-04-28 06:51:57 +03:00
|
|
|
## Dependencies define constraints on dependent projects. They are respected by
|
|
|
|
## dep whether coming from the Gopkg.toml of the current project or a dependency.
|
2017-04-13 15:30:07 +03:00
|
|
|
# [[dependencies]]
|
2017-04-28 06:51:57 +03:00
|
|
|
## Required: the root import path of the project being constrained.
|
2017-04-26 07:47:31 +03:00
|
|
|
# name = "github.com/user/project"
|
2017-04-28 06:51:57 +03:00
|
|
|
#
|
2017-04-28 08:11:17 +03:00
|
|
|
## Recommended: the version constraint to enforce for the project.
|
2017-04-26 07:47:31 +03:00
|
|
|
## Only one of "branch", "version" or "revision" can be specified.
|
|
|
|
# version = "1.0.0"
|
2017-04-13 15:30:07 +03:00
|
|
|
# branch = "master"
|
2017-04-14 00:45:32 +03:00
|
|
|
# revision = "abc123"
|
2017-04-28 05:04:39 +03:00
|
|
|
#
|
2017-04-28 06:51:57 +03:00
|
|
|
## Optional: an alternate location (URL or import path) for the project's source.
|
|
|
|
# source = "https://github.com/myfork/package.git"
|
2017-04-28 08:11:17 +03:00
|
|
|
|
2017-04-28 06:51:57 +03:00
|
|
|
## Overrides have the same structure as [[dependencies]], but supercede all
|
|
|
|
## [[dependencies]] declarations from all projects. Only the current project's
|
2017-04-28 04:31:58 +03:00
|
|
|
## [[overrides]] are applied.
|
2017-04-26 07:47:31 +03:00
|
|
|
##
|
2017-04-28 06:51:57 +03:00
|
|
|
## Overrides are a sledgehammer. Use them only as a last resort.
|
2017-04-28 08:11:17 +03:00
|
|
|
# [[overrides]]
|
2017-04-28 06:51:57 +03:00
|
|
|
## Required: the root import path of the project being constrained.
|
|
|
|
# name = "github.com/user/project"
|
2017-04-28 05:04:39 +03:00
|
|
|
#
|
2017-04-28 06:51:57 +03:00
|
|
|
## Optional: specifying a version constraint override will cause all other
|
|
|
|
## constraints on this project to be ignored; only the overriden constraint
|
|
|
|
## need be satisfied.
|
|
|
|
## Again, only one of "branch", "version" or "revision" can be specified.
|
2017-04-14 00:45:32 +03:00
|
|
|
# version = "1.0.0"
|
2017-04-28 06:51:57 +03:00
|
|
|
# branch = "master"
|
|
|
|
# revision = "abc123"
|
|
|
|
#
|
|
|
|
## Optional: specifying an alternate source location as an override will
|
|
|
|
## enforce that the alternate location is used for that project, regardless of
|
|
|
|
## what source location any dependent projects specify.
|
|
|
|
# source = "https://github.com/myfork/package.git"
|
2017-04-28 05:04:39 +03:00
|
|
|
|
|
|
|
|
2017-04-13 15:30:07 +03:00
|
|
|
`
|
|
|
|
|
2017-01-27 23:39:07 +03:00
|
|
|
// SafeWriter transactionalizes writes of manifest, lock, and vendor dir, both
|
2016-12-23 17:49:24 +03:00
|
|
|
// individually and in any combination, into a pseudo-atomic action with
|
|
|
|
// transactional rollback.
|
|
|
|
//
|
|
|
|
// It is not impervious to errors (writing to disk is hard), but it should
|
|
|
|
// guard against non-arcane failure conditions.
|
2017-01-27 23:39:07 +03:00
|
|
|
type SafeWriter struct {
|
2017-03-13 17:34:32 +03:00
|
|
|
Manifest *Manifest
|
|
|
|
Lock *Lock
|
2017-04-11 18:38:50 +03:00
|
|
|
LockDiff *gps.LockDiff
|
2017-03-13 17:34:32 +03:00
|
|
|
WriteVendor bool
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
|
2017-05-01 00:35:43 +03:00
|
|
|
// NewSafeWriter sets up a SafeWriter to write a set of config yaml, lock and vendor tree.
|
|
|
|
//
|
|
|
|
// - If manifest is provided, it will be written to the standard manifest file
|
|
|
|
// name beneath root.
|
|
|
|
// - If newLock is provided, it will be written to the standard lock file
|
|
|
|
// name beneath root.
|
|
|
|
// - If vendor is VendorAlways, or is VendorOnChanged and the locks are different,
|
|
|
|
// the vendor directory will be written beneath root based on newLock.
|
|
|
|
// - If oldLock is provided without newLock, error.
|
|
|
|
// - If vendor is VendorAlways without a newLock, error.
|
|
|
|
func NewSafeWriter(manifest *Manifest, oldLock, newLock *Lock, vendor VendorBehavior) (*SafeWriter, error) {
|
2017-05-01 14:34:38 +03:00
|
|
|
sw := &SafeWriter{
|
2017-05-01 00:35:43 +03:00
|
|
|
Manifest: manifest,
|
|
|
|
Lock: newLock,
|
|
|
|
}
|
|
|
|
if oldLock != nil {
|
|
|
|
if newLock == nil {
|
|
|
|
return nil, errors.New("must provide newLock when oldLock is specified")
|
|
|
|
}
|
2017-05-01 14:34:38 +03:00
|
|
|
sw.LockDiff = gps.DiffLocks(oldLock, newLock)
|
2017-05-01 00:35:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
switch vendor {
|
|
|
|
case VendorAlways:
|
2017-05-01 14:34:38 +03:00
|
|
|
sw.WriteVendor = true
|
2017-05-01 00:35:43 +03:00
|
|
|
case VendorOnChanged:
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.LockDiff != nil || (newLock != nil && oldLock == nil) {
|
|
|
|
sw.WriteVendor = true
|
2017-05-01 00:35:43 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.WriteVendor && newLock == nil {
|
2017-05-01 00:35:43 +03:00
|
|
|
return nil, errors.New("must provide newLock in order to write out vendor")
|
|
|
|
}
|
|
|
|
|
|
|
|
return sw, nil
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
// HasLock checks if a Lock is present in the SafeWriter
|
|
|
|
func (sw *SafeWriter) HasLock() bool {
|
|
|
|
return sw.Lock != nil
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
// HasManifest checks if a Manifest is present in the SafeWriter
|
|
|
|
func (sw *SafeWriter) HasManifest() bool {
|
|
|
|
return sw.Manifest != nil
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
// HasVendor returns the if SafeWriter should write to vendor
|
|
|
|
func (sw *SafeWriter) HasVendor() bool {
|
|
|
|
return sw.WriteVendor
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
|
2017-04-11 18:38:50 +03:00
|
|
|
type rawStringDiff struct {
|
|
|
|
*gps.StringDiff
|
|
|
|
}
|
|
|
|
|
|
|
|
func (diff rawStringDiff) MarshalTOML() ([]byte, error) {
|
|
|
|
return []byte(diff.String()), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type rawLockDiff struct {
|
|
|
|
*gps.LockDiff
|
|
|
|
}
|
|
|
|
|
|
|
|
type rawLockedProjectDiff struct {
|
|
|
|
Name gps.ProjectRoot `toml:"name"`
|
|
|
|
Source *rawStringDiff `toml:"source,omitempty"`
|
|
|
|
Version *rawStringDiff `toml:"version,omitempty"`
|
|
|
|
Branch *rawStringDiff `toml:"branch,omitempty"`
|
|
|
|
Revision *rawStringDiff `toml:"revision,omitempty"`
|
|
|
|
Packages []rawStringDiff `toml:"packages,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func toRawLockedProjectDiff(diff gps.LockedProjectDiff) rawLockedProjectDiff {
|
|
|
|
// this is a shallow copy since we aren't modifying the raw diff
|
|
|
|
raw := rawLockedProjectDiff{Name: diff.Name}
|
|
|
|
if diff.Source != nil {
|
|
|
|
raw.Source = &rawStringDiff{diff.Source}
|
|
|
|
}
|
|
|
|
if diff.Version != nil {
|
|
|
|
raw.Version = &rawStringDiff{diff.Version}
|
|
|
|
}
|
|
|
|
if diff.Branch != nil {
|
|
|
|
raw.Branch = &rawStringDiff{diff.Branch}
|
|
|
|
}
|
|
|
|
if diff.Revision != nil {
|
|
|
|
raw.Revision = &rawStringDiff{diff.Revision}
|
|
|
|
}
|
|
|
|
raw.Packages = make([]rawStringDiff, len(diff.Packages))
|
|
|
|
for i := 0; i < len(diff.Packages); i++ {
|
|
|
|
raw.Packages[i] = rawStringDiff{&diff.Packages[i]}
|
|
|
|
}
|
|
|
|
return raw
|
2017-03-01 23:52:09 +03:00
|
|
|
}
|
|
|
|
|
2017-04-05 04:47:09 +03:00
|
|
|
type rawLockedProjectDiffs struct {
|
2017-04-11 18:38:50 +03:00
|
|
|
Projects []rawLockedProjectDiff `toml:"projects"`
|
2017-04-05 04:47:09 +03:00
|
|
|
}
|
|
|
|
|
2017-04-11 18:38:50 +03:00
|
|
|
func toRawLockedProjectDiffs(diffs []gps.LockedProjectDiff) rawLockedProjectDiffs {
|
|
|
|
raw := rawLockedProjectDiffs{
|
|
|
|
Projects: make([]rawLockedProjectDiff, len(diffs)),
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < len(diffs); i++ {
|
|
|
|
raw.Projects[i] = toRawLockedProjectDiff(diffs[i])
|
2017-03-01 23:52:09 +03:00
|
|
|
}
|
|
|
|
|
2017-04-11 18:38:50 +03:00
|
|
|
return raw
|
|
|
|
}
|
|
|
|
|
|
|
|
func formatLockDiff(diff gps.LockDiff) (string, error) {
|
2017-03-01 23:52:09 +03:00
|
|
|
var buf bytes.Buffer
|
|
|
|
|
2017-03-18 00:48:57 +03:00
|
|
|
if diff.HashDiff != nil {
|
2017-03-23 01:11:43 +03:00
|
|
|
buf.WriteString(fmt.Sprintf("Memo: %s\n\n", diff.HashDiff))
|
2017-03-18 00:48:57 +03:00
|
|
|
}
|
|
|
|
|
2017-04-11 18:38:50 +03:00
|
|
|
writeDiffs := func(diffs []gps.LockedProjectDiff) error {
|
|
|
|
raw := toRawLockedProjectDiffs(diffs)
|
2017-04-05 04:47:09 +03:00
|
|
|
chunk, err := toml.Marshal(raw)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2017-03-23 01:11:43 +03:00
|
|
|
}
|
2017-04-05 04:47:09 +03:00
|
|
|
buf.Write(chunk)
|
2017-03-23 01:11:43 +03:00
|
|
|
buf.WriteString("\n")
|
|
|
|
return nil
|
|
|
|
}
|
2017-03-01 23:52:09 +03:00
|
|
|
|
2017-03-23 01:11:43 +03:00
|
|
|
if len(diff.Add) > 0 {
|
|
|
|
buf.WriteString("Add:")
|
|
|
|
err := writeDiffs(diff.Add)
|
2017-03-01 23:52:09 +03:00
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrap(err, "Unable to format LockDiff.Add")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(diff.Remove) > 0 {
|
2017-03-23 01:11:43 +03:00
|
|
|
buf.WriteString("Remove:")
|
|
|
|
err := writeDiffs(diff.Remove)
|
2017-03-01 23:52:09 +03:00
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrap(err, "Unable to format LockDiff.Remove")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(diff.Modify) > 0 {
|
2017-03-23 01:11:43 +03:00
|
|
|
buf.WriteString("Modify:")
|
|
|
|
err := writeDiffs(diff.Modify)
|
2017-03-01 23:52:09 +03:00
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrap(err, "Unable to format LockDiff.Modify")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return buf.String(), nil
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
|
2017-03-18 04:53:00 +03:00
|
|
|
// VendorBehavior defines when the vendor directory should be written.
|
|
|
|
type VendorBehavior int
|
|
|
|
|
|
|
|
const (
|
|
|
|
// VendorOnChanged indicates that the vendor directory should be written when the lock is new or changed.
|
|
|
|
VendorOnChanged VendorBehavior = iota
|
|
|
|
// VendorAlways forces the vendor directory to always be written.
|
|
|
|
VendorAlways
|
|
|
|
// VendorNever indicates the vendor directory should never be written.
|
|
|
|
VendorNever
|
|
|
|
)
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
func (sw SafeWriter) validate(root string, sm gps.SourceManager) error {
|
2017-03-09 22:28:42 +03:00
|
|
|
if root == "" {
|
2016-12-30 06:15:23 +03:00
|
|
|
return errors.New("root path must be non-empty")
|
|
|
|
}
|
2017-03-09 22:28:42 +03:00
|
|
|
if is, err := IsDir(root); !is {
|
2016-12-30 06:15:23 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-03-22 18:58:50 +03:00
|
|
|
return errors.Errorf("root path %q does not exist", root)
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasVendor() && sm == nil {
|
2017-01-25 00:48:14 +03:00
|
|
|
return errors.New("must provide a SourceManager if writing out a vendor dir")
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
|
2017-03-09 22:28:42 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write saves some combination of config yaml, lock, and a vendor tree.
|
|
|
|
// root is the absolute path of root dir in which to write.
|
|
|
|
// sm is only required if vendor is being written.
|
|
|
|
//
|
|
|
|
// It first writes to a temp dir, then moves them in place if and only if all the write
|
|
|
|
// operations succeeded. It also does its best to roll back if any moves fail.
|
|
|
|
// This mostly guarantees that dep cannot exit with a partial write that would
|
|
|
|
// leave an undefined state on disk.
|
2017-04-28 18:10:20 +03:00
|
|
|
func (sw *SafeWriter) Write(root string, sm gps.SourceManager, noExamples bool) error {
|
2017-05-01 14:34:38 +03:00
|
|
|
err := sw.validate(root, sm)
|
2017-03-09 22:28:42 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if !sw.HasManifest() && !sw.HasLock() && !sw.HasVendor() {
|
2017-03-09 22:28:42 +03:00
|
|
|
// nothing to do
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
mpath := filepath.Join(root, ManifestName)
|
|
|
|
lpath := filepath.Join(root, LockName)
|
|
|
|
vpath := filepath.Join(root, "vendor")
|
2016-12-30 06:56:11 +03:00
|
|
|
|
2017-01-19 03:11:38 +03:00
|
|
|
td, err := ioutil.TempDir(os.TempDir(), "dep")
|
2016-12-23 17:49:24 +03:00
|
|
|
if err != nil {
|
2016-12-23 18:34:20 +03:00
|
|
|
return errors.Wrap(err, "error while creating temp dir for writing manifest/lock/vendor")
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
defer os.RemoveAll(td)
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasManifest() {
|
2017-04-26 07:47:31 +03:00
|
|
|
// Always write the example text to the bottom of the TOML file.
|
2017-05-01 14:34:38 +03:00
|
|
|
tb, err := sw.Manifest.MarshalTOML()
|
2017-04-26 07:47:31 +03:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "failed to marshal manifest to TOML")
|
|
|
|
}
|
|
|
|
|
2017-04-29 14:02:18 +03:00
|
|
|
var initOutput string
|
2017-04-28 21:13:52 +03:00
|
|
|
|
|
|
|
// If examples are NOT disabled, use the example text
|
2017-04-28 18:10:20 +03:00
|
|
|
if !noExamples {
|
2017-04-28 21:13:52 +03:00
|
|
|
initOutput = exampleTOML
|
|
|
|
}
|
|
|
|
|
|
|
|
// 0666 is before umask; mirrors behavior of os.Create (used by
|
|
|
|
// writeFile())
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(td, ManifestName), append([]byte(initOutput), tb...), 0666); err != nil {
|
2016-12-23 18:34:20 +03:00
|
|
|
return errors.Wrap(err, "failed to write manifest file to temp dir")
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasLock() {
|
|
|
|
if err := writeFile(filepath.Join(td, LockName), sw.Lock); err != nil {
|
2017-03-09 22:28:42 +03:00
|
|
|
return errors.Wrap(err, "failed to write lock file to temp dir")
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasVendor() {
|
|
|
|
err = gps.WriteDepTree(filepath.Join(td, "vendor"), sw.Lock, sm, true)
|
2016-12-23 17:49:24 +03:00
|
|
|
if err != nil {
|
2016-12-30 06:15:23 +03:00
|
|
|
return errors.Wrap(err, "error while writing out vendor tree")
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-26 15:21:11 +03:00
|
|
|
// Ensure vendor/.git is preserved if present
|
|
|
|
if hasDotGit(vpath) {
|
2017-04-26 22:19:09 +03:00
|
|
|
err = renameWithFallback(filepath.Join(vpath, ".git"), filepath.Join(td, "vendor/.git"))
|
2017-04-26 15:21:11 +03:00
|
|
|
if _, ok := err.(*os.LinkError); ok {
|
|
|
|
return errors.Wrap(err, "failed to preserve vendor/.git")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-23 17:49:24 +03:00
|
|
|
// Move the existing files and dirs to the temp dir while we put the new
|
2017-01-25 10:29:04 +03:00
|
|
|
// ones in, to provide insurance against errors for as long as possible.
|
2016-12-23 17:49:24 +03:00
|
|
|
type pathpair struct {
|
|
|
|
from, to string
|
|
|
|
}
|
|
|
|
var restore []pathpair
|
2016-12-30 06:56:11 +03:00
|
|
|
var failerr error
|
|
|
|
var vendorbak string
|
2016-12-23 17:49:24 +03:00
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasManifest() {
|
2016-12-30 06:15:23 +03:00
|
|
|
if _, err := os.Stat(mpath); err == nil {
|
2017-01-25 10:29:04 +03:00
|
|
|
// Move out the old one.
|
2017-01-27 23:39:07 +03:00
|
|
|
tmploc := filepath.Join(td, ManifestName+".orig")
|
2017-01-01 04:11:05 +03:00
|
|
|
failerr = renameWithFallback(mpath, tmploc)
|
2016-12-23 17:49:24 +03:00
|
|
|
if failerr != nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
goto fail
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
2016-12-30 06:56:11 +03:00
|
|
|
restore = append(restore, pathpair{from: tmploc, to: mpath})
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
|
2017-01-25 10:29:04 +03:00
|
|
|
// Move in the new one.
|
2017-01-27 23:39:07 +03:00
|
|
|
failerr = renameWithFallback(filepath.Join(td, ManifestName), mpath)
|
2016-12-23 17:49:24 +03:00
|
|
|
if failerr != nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
goto fail
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasLock() {
|
2016-12-30 06:15:23 +03:00
|
|
|
if _, err := os.Stat(lpath); err == nil {
|
2017-01-25 10:29:04 +03:00
|
|
|
// Move out the old one.
|
2017-01-27 23:39:07 +03:00
|
|
|
tmploc := filepath.Join(td, LockName+".orig")
|
2016-12-23 17:49:24 +03:00
|
|
|
|
2017-01-01 04:11:05 +03:00
|
|
|
failerr = renameWithFallback(lpath, tmploc)
|
2016-12-23 17:49:24 +03:00
|
|
|
if failerr != nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
goto fail
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
2016-12-30 06:56:11 +03:00
|
|
|
restore = append(restore, pathpair{from: tmploc, to: lpath})
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
|
2017-01-25 10:29:04 +03:00
|
|
|
// Move in the new one.
|
2017-01-27 23:39:07 +03:00
|
|
|
failerr = renameWithFallback(filepath.Join(td, LockName), lpath)
|
2016-12-23 17:49:24 +03:00
|
|
|
if failerr != nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
goto fail
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasVendor() {
|
2016-12-30 06:15:23 +03:00
|
|
|
if _, err := os.Stat(vpath); err == nil {
|
2017-01-25 10:29:04 +03:00
|
|
|
// Move out the old vendor dir. just do it into an adjacent dir, to
|
2016-12-23 18:34:20 +03:00
|
|
|
// try to mitigate the possibility of a pointless cross-filesystem
|
2017-01-25 10:29:04 +03:00
|
|
|
// move with a temp directory.
|
2016-12-30 06:15:23 +03:00
|
|
|
vendorbak = vpath + ".orig"
|
2016-12-23 17:49:24 +03:00
|
|
|
if _, err := os.Stat(vendorbak); err == nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
// If the adjacent dir already exists, bite the bullet and move
|
2017-01-25 10:29:04 +03:00
|
|
|
// to a proper tempdir.
|
2016-12-23 18:34:20 +03:00
|
|
|
vendorbak = filepath.Join(td, "vendor.orig")
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
2016-12-23 18:34:20 +03:00
|
|
|
|
2017-01-01 04:11:05 +03:00
|
|
|
failerr = renameWithFallback(vpath, vendorbak)
|
2016-12-23 17:49:24 +03:00
|
|
|
if failerr != nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
goto fail
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
2016-12-30 06:56:11 +03:00
|
|
|
restore = append(restore, pathpair{from: vendorbak, to: vpath})
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
|
2017-01-25 10:29:04 +03:00
|
|
|
// Move in the new one.
|
2017-01-01 04:11:05 +03:00
|
|
|
failerr = renameWithFallback(filepath.Join(td, "vendor"), vpath)
|
2016-12-23 17:49:24 +03:00
|
|
|
if failerr != nil {
|
2016-12-30 06:56:11 +03:00
|
|
|
goto fail
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Renames all went smoothly. The deferred os.RemoveAll will get the temp
|
|
|
|
// dir, but if we wrote vendor, we have to clean that up directly
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasVendor() {
|
2016-12-30 06:56:11 +03:00
|
|
|
// Nothing we can really do about an error at this point, so ignore it
|
2016-12-23 17:49:24 +03:00
|
|
|
os.RemoveAll(vendorbak)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2016-12-30 06:56:11 +03:00
|
|
|
|
|
|
|
fail:
|
2017-01-25 10:29:04 +03:00
|
|
|
// If we failed at any point, move all the things back into place, then bail.
|
2016-12-30 06:56:11 +03:00
|
|
|
for _, pair := range restore {
|
2017-01-25 10:29:04 +03:00
|
|
|
// Nothing we can do on err here, as we're already in recovery mode.
|
2017-01-01 04:11:05 +03:00
|
|
|
renameWithFallback(pair.from, pair.to)
|
2016-12-30 06:56:11 +03:00
|
|
|
}
|
|
|
|
return failerr
|
2016-12-23 17:49:24 +03:00
|
|
|
}
|
2017-03-09 22:28:42 +03:00
|
|
|
|
2017-05-06 02:03:46 +03:00
|
|
|
func (sw *SafeWriter) PrintPreparedActions(stdout *log.Logger) error {
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasManifest() {
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logf("Would have written the following %s:\n", ManifestName)
|
2017-05-01 14:34:38 +03:00
|
|
|
m, err := sw.Manifest.MarshalTOML()
|
2017-03-09 22:28:42 +03:00
|
|
|
if err != nil {
|
2017-03-01 23:52:09 +03:00
|
|
|
return errors.Wrap(err, "ensure DryRun cannot serialize manifest")
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logln(string(m))
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasLock() {
|
|
|
|
if sw.LockDiff == nil {
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logf("Would have written the following %s:\n", LockName)
|
2017-05-01 14:34:38 +03:00
|
|
|
l, err := sw.Lock.MarshalTOML()
|
2017-03-15 18:06:07 +03:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "ensure DryRun cannot serialize lock")
|
|
|
|
}
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logln(string(l))
|
2017-03-15 18:06:07 +03:00
|
|
|
} else {
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logf("Would have written the following changes to %s:\n", LockName)
|
2017-05-01 14:34:38 +03:00
|
|
|
diff, err := formatLockDiff(*sw.LockDiff)
|
2017-03-15 18:06:07 +03:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "ensure DryRun cannot serialize the lock diff")
|
|
|
|
}
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logln(diff)
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 14:34:38 +03:00
|
|
|
if sw.HasVendor() {
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logln("Would have written the following projects to the vendor directory:")
|
2017-05-01 14:34:38 +03:00
|
|
|
for _, project := range sw.Lock.Projects() {
|
2017-03-09 22:28:42 +03:00
|
|
|
prj := project.Ident()
|
2017-04-11 18:38:50 +03:00
|
|
|
rev, _, _ := gps.VersionComponentStrings(project.Version())
|
2017-03-09 22:28:42 +03:00
|
|
|
if prj.Source == "" {
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logf("%s@%s\n", prj.ProjectRoot, rev)
|
2017-03-09 22:28:42 +03:00
|
|
|
} else {
|
2017-05-06 02:03:46 +03:00
|
|
|
stdout.Logf("%s -> %s@%s\n", prj.ProjectRoot, prj.Source, rev)
|
2017-03-09 22:28:42 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2017-03-01 23:52:09 +03:00
|
|
|
|
2017-03-13 13:43:21 +03:00
|
|
|
func PruneProject(p *Project, sm gps.SourceManager) error {
|
|
|
|
td, err := ioutil.TempDir(os.TempDir(), "dep")
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "error while creating temp dir for writing manifest/lock/vendor")
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(td)
|
|
|
|
|
|
|
|
if err := gps.WriteDepTree(td, p.Lock, sm, true); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var toKeep []string
|
|
|
|
for _, project := range p.Lock.Projects() {
|
|
|
|
projectRoot := string(project.Ident().ProjectRoot)
|
|
|
|
for _, pkg := range project.Packages() {
|
|
|
|
toKeep = append(toKeep, filepath.Join(projectRoot, pkg))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
toDelete, err := calculatePrune(td, toKeep)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := deleteDirs(toDelete); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
vpath := filepath.Join(p.AbsRoot, "vendor")
|
|
|
|
vendorbak := vpath + ".orig"
|
|
|
|
var failerr error
|
|
|
|
if _, err := os.Stat(vpath); err == nil {
|
|
|
|
// Move out the old vendor dir. just do it into an adjacent dir, to
|
|
|
|
// try to mitigate the possibility of a pointless cross-filesystem
|
|
|
|
// move with a temp directory.
|
|
|
|
if _, err := os.Stat(vendorbak); err == nil {
|
|
|
|
// If the adjacent dir already exists, bite the bullet and move
|
|
|
|
// to a proper tempdir.
|
|
|
|
vendorbak = filepath.Join(td, "vendor.orig")
|
|
|
|
}
|
|
|
|
failerr = renameWithFallback(vpath, vendorbak)
|
|
|
|
if failerr != nil {
|
|
|
|
goto fail
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Move in the new one.
|
|
|
|
failerr = renameWithFallback(td, vpath)
|
|
|
|
if failerr != nil {
|
|
|
|
goto fail
|
|
|
|
}
|
|
|
|
|
|
|
|
os.RemoveAll(vendorbak)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
|
|
|
fail:
|
|
|
|
renameWithFallback(vendorbak, vpath)
|
|
|
|
return failerr
|
|
|
|
}
|
|
|
|
|
|
|
|
func calculatePrune(vendorDir string, keep []string) ([]string, error) {
|
|
|
|
sort.Strings(keep)
|
|
|
|
toDelete := []string{}
|
|
|
|
err := filepath.Walk(vendorDir, func(path string, info os.FileInfo, err error) error {
|
|
|
|
if _, err := os.Lstat(path); err != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if !info.IsDir() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if path == vendorDir {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
name := strings.TrimPrefix(path, vendorDir+"/")
|
|
|
|
i := sort.Search(len(keep), func(i int) bool {
|
|
|
|
return name <= keep[i]
|
|
|
|
})
|
|
|
|
if i >= len(keep) || !strings.HasPrefix(keep[i], name) {
|
|
|
|
toDelete = append(toDelete, path)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return toDelete, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func deleteDirs(toDelete []string) error {
|
|
|
|
// sort by length so we delete sub dirs first
|
|
|
|
sort.Sort(byLen(toDelete))
|
|
|
|
for _, path := range toDelete {
|
|
|
|
if err := os.RemoveAll(path); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-04-26 15:21:11 +03:00
|
|
|
// hasDotGit checks if a given path has .git file or directory in it.
|
|
|
|
func hasDotGit(path string) bool {
|
|
|
|
gitfilepath := filepath.Join(path, ".git")
|
|
|
|
_, err := os.Stat(gitfilepath)
|
2017-04-26 22:19:09 +03:00
|
|
|
return err == nil
|
2017-04-26 15:21:11 +03:00
|
|
|
}
|
|
|
|
|
2017-03-13 13:43:21 +03:00
|
|
|
type byLen []string
|
|
|
|
|
|
|
|
func (a byLen) Len() int { return len(a) }
|
|
|
|
func (a byLen) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
|
|
|
|
func (a byLen) Less(i, j int) bool { return len(a[i]) > len(a[j]) }
|