Skip to content

Commit 5db42c2

Browse files
committed
pack: support .packignore
In some cases, there are files that may be useful, but should not be part of artifact. The ability to add files and directories to the .packignore file has been added, which allows you to ignore these files and directories when packing. Closes #812 @TarantoolBot document Title: `tt pack` support `.packignore` Use `.packignore` in the same way as `.gitignore` allows to exclude unnecessary files while preparing application package with `tt pack command.
1 parent da304aa commit 5db42c2

File tree

7 files changed

+889
-12
lines changed

7 files changed

+889
-12
lines changed

CHANGELOG.md

+2
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
1111

1212
- `tt pack `: added TCM file packaging.
1313
- `tt aeon connect`: add connection from the cluster config.
14+
- `tt pack `: support `.packignore` file to specify files that should not be included
15+
in package (works the same as `.gitignore`).
1416

1517
### Changed
1618

cli/pack/common.go

+22-12
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
package pack
22

33
import (
4+
"errors"
45
"fmt"
56
"io/fs"
67
"os"
@@ -33,6 +34,8 @@ const (
3334
versionLuaFileName = "VERSION.lua"
3435

3536
rocksManifestPath = ".rocks/share/tarantool/rocks/manifest"
37+
38+
ignoreFile = ".packignore"
3639
)
3740

3841
var (
@@ -51,6 +54,8 @@ var (
5154
}
5255
)
5356

57+
type skipFilter func(srcInfo os.FileInfo, src string) bool
58+
5459
type RocksVersions map[string][]string
5560

5661
// packFileInfo contains information to set for files/dirs in rpm/deb packages.
@@ -76,9 +81,8 @@ func skipDefaults(srcInfo os.FileInfo, src string) bool {
7681
}
7782

7883
// appArtifactsFilters returns a slice of skip functions to avoid copying application artifacts.
79-
func appArtifactsFilters(cliOpts *config.CliOpts, srcAppPath string) []func(
80-
srcInfo os.FileInfo, src string) bool {
81-
filters := make([]func(srcInfo os.FileInfo, src string) bool, 0)
84+
func appArtifactsFilters(cliOpts *config.CliOpts, srcAppPath string) []skipFilter {
85+
filters := make([]skipFilter, 0)
8286
if cliOpts.App == nil {
8387
return filters
8488
}
@@ -102,9 +106,8 @@ func appArtifactsFilters(cliOpts *config.CliOpts, srcAppPath string) []func(
102106
}
103107

104108
// ttEnvironmentFilters prepares a slice of filters for tt environment directories/files.
105-
func ttEnvironmentFilters(packCtx *PackCtx, cliOpts *config.CliOpts) []func(
106-
srcInfo os.FileInfo, src string) bool {
107-
filters := make([]func(srcInfo os.FileInfo, src string) bool, 0)
109+
func ttEnvironmentFilters(packCtx *PackCtx, cliOpts *config.CliOpts) []skipFilter {
110+
filters := make([]skipFilter, 0)
108111
if cliOpts == nil {
109112
return filters
110113
}
@@ -139,10 +142,9 @@ func ttEnvironmentFilters(packCtx *PackCtx, cliOpts *config.CliOpts) []func(
139142
}
140143

141144
// previousPackageFilters returns filters for the previously built packages.
142-
func previousPackageFilters(packCtx *PackCtx) []func(
143-
srcInfo os.FileInfo, src string) bool {
145+
func previousPackageFilters(packCtx *PackCtx) []skipFilter {
144146
pkgName := packCtx.Name
145-
return []func(srcInfo os.FileInfo, src string) bool{
147+
return []skipFilter{
146148
func(srcInfo os.FileInfo, src string) bool {
147149
name := srcInfo.Name()
148150
if strings.HasPrefix(name, pkgName) {
@@ -159,13 +161,18 @@ func previousPackageFilters(packCtx *PackCtx) []func(
159161

160162
// appSrcCopySkip returns a filter func to filter out artifacts paths.
161163
func appSrcCopySkip(packCtx *PackCtx, cliOpts *config.CliOpts,
162-
srcAppPath string) func(srcinfo os.FileInfo, src, dest string) (bool, error) {
164+
srcAppPath string) (func(srcinfo os.FileInfo, src, dest string) (bool, error), error) {
163165
appCopyFilters := appArtifactsFilters(cliOpts, srcAppPath)
164166
appCopyFilters = append(appCopyFilters, ttEnvironmentFilters(packCtx, cliOpts)...)
165167
appCopyFilters = append(appCopyFilters, previousPackageFilters(packCtx)...)
166168
appCopyFilters = append(appCopyFilters, func(srcInfo os.FileInfo, src string) bool {
167169
return skipDefaults(srcInfo, src)
168170
})
171+
if f, err := ignoreFilter(util.GetOsFS(), filepath.Join(srcAppPath, ignoreFile)); err == nil {
172+
appCopyFilters = append(appCopyFilters, f)
173+
} else if !errors.Is(err, fs.ErrNotExist) {
174+
return nil, fmt.Errorf("failed to load %q: %w", ignoreFile, err)
175+
}
169176

170177
return func(srcinfo os.FileInfo, src, dest string) (bool, error) {
171178
for _, shouldSkip := range appCopyFilters {
@@ -174,7 +181,7 @@ func appSrcCopySkip(packCtx *PackCtx, cliOpts *config.CliOpts,
174181
}
175182
}
176183
return false, nil
177-
}
184+
}, nil
178185
}
179186

180187
// getAppNamesToPack generates application names list to pack.
@@ -430,7 +437,10 @@ func copyAppSrc(packCtx *PackCtx, cliOpts *config.CliOpts, srcAppPath, dstAppPat
430437
return err
431438
}
432439

433-
skipFunc := appSrcCopySkip(packCtx, cliOpts, resolvedAppPath)
440+
skipFunc, err := appSrcCopySkip(packCtx, cliOpts, resolvedAppPath)
441+
if err != nil {
442+
return err
443+
}
434444

435445
// Copying application.
436446
log.Debugf("Copying application source %q -> %q", resolvedAppPath, dstAppPath)

cli/pack/ignore.go

+132
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
package pack
2+
3+
import (
4+
"bufio"
5+
"bytes"
6+
"fmt"
7+
"io/fs"
8+
"os"
9+
"path/filepath"
10+
"regexp"
11+
"slices"
12+
"strings"
13+
)
14+
15+
type ignorePattern struct {
16+
re *regexp.Regexp
17+
dirOnly bool
18+
isNegate bool
19+
}
20+
21+
func turnEscapedToHexCode(s string, c rune) string {
22+
return strings.ReplaceAll(s, `\`+string(c), fmt.Sprintf(`\x%x`, c))
23+
}
24+
25+
func splitIgnorePattern(pattern string) (cleanPattern string, dirOnly bool, isNegate bool) {
26+
// First, get rid of `\\` to simplify further handling of escaped sequences.
27+
// From now on any `\c` always means escaped 'c' (previously it might also
28+
// occur as a part of `\\c` sequence which denotes '\' followed by <c>).
29+
cleanPattern = turnEscapedToHexCode(pattern, '\\')
30+
31+
// Remove trailing spaces (unless escaped one).
32+
cleanPattern = turnEscapedToHexCode(cleanPattern, ' ')
33+
cleanPattern = strings.TrimRight(cleanPattern, " ")
34+
35+
cleanPattern, dirOnly = strings.CutSuffix(cleanPattern, "/")
36+
cleanPattern, isNegate = strings.CutPrefix(cleanPattern, "!")
37+
return
38+
}
39+
40+
func createIgnorePattern(pattern string, basepath string) (ignorePattern, error) {
41+
cleanPattern, dirOnly, isNegate := splitIgnorePattern(pattern)
42+
43+
// Translate pattern to regex expression.
44+
expr := cleanPattern
45+
// Turn escaped '*' and '?' to their hex representation to simplify the translation.
46+
expr = turnEscapedToHexCode(expr, '*')
47+
expr = turnEscapedToHexCode(expr, '?')
48+
// Escape symbols that designate themselves in pattern, but have special meaning in regex.
49+
for _, s := range []string{"(", ")", "{", "}", "+"} {
50+
// Do unescape first to avoid double escaping of the ones that are already escaped
51+
expr = strings.ReplaceAll(expr, "\\"+s, s)
52+
expr = strings.ReplaceAll(expr, s, "\\"+s)
53+
}
54+
// Replace wildcards with the corresponding regex representation.
55+
// Note that '{0,}' (not '*') is used while replacing '**' to avoid confusing
56+
// in the subsequent replacement of a single '*'.
57+
expr = strings.ReplaceAll(expr, "/**/", "/([^/]+/){0,}")
58+
expr, found := strings.CutPrefix(expr, "**/")
59+
if found || !strings.Contains(cleanPattern, "/") {
60+
expr = "([^/]+/){0,}" + expr
61+
}
62+
expr, found = strings.CutSuffix(expr, "/**")
63+
if found {
64+
expr = expr + "/([^/]+/){0,}[^/]+"
65+
}
66+
expr = strings.ReplaceAll(expr, "*", "[^/]*")
67+
expr = strings.ReplaceAll(expr, "?", "[^/]")
68+
69+
re, err := regexp.Compile("^" + basepath + expr + "$")
70+
if err != nil {
71+
return ignorePattern{}, fmt.Errorf("failed to compile expression: %w", err)
72+
}
73+
74+
return ignorePattern{
75+
re: re,
76+
dirOnly: dirOnly,
77+
isNegate: isNegate,
78+
}, nil
79+
}
80+
81+
// loadIgnorePatterns reads ignore patterns from the patternsFile.
82+
func loadIgnorePatterns(fsys fs.FS, patternsFile string) ([]ignorePattern, error) {
83+
contents, err := fs.ReadFile(fsys, patternsFile)
84+
if err != nil {
85+
return nil, err
86+
}
87+
88+
basepath, _ := filepath.Split(ignoreFile)
89+
90+
var patterns []ignorePattern
91+
s := bufio.NewScanner(bytes.NewReader(contents))
92+
for s.Scan() {
93+
pattern := s.Text()
94+
if pattern == "" || strings.HasPrefix(pattern, "#") {
95+
continue
96+
}
97+
98+
p, err := createIgnorePattern(pattern, basepath)
99+
if err != nil {
100+
return nil, err
101+
}
102+
103+
patterns = append(patterns, p)
104+
}
105+
return patterns, nil
106+
}
107+
108+
// ignoreFilter returns filter function that implements .gitignore approach of filtering files.
109+
func ignoreFilter(fsys fs.FS, patternsFile string) (skipFilter, error) {
110+
patterns, err := loadIgnorePatterns(fsys, patternsFile)
111+
if err != nil {
112+
return nil, err
113+
}
114+
115+
// According to .gitignore documentation "the last matching pattern decides the outcome"
116+
// so we need to iterate in reverse order until the first match.
117+
slices.Reverse(patterns)
118+
119+
return func(srcInfo os.FileInfo, src string) bool {
120+
// Skip ignore file itself.
121+
if src == patternsFile {
122+
return true
123+
}
124+
for _, p := range patterns {
125+
isApplicable := srcInfo.IsDir() || !p.dirOnly
126+
if isApplicable && p.re.MatchString(src) {
127+
return !p.isNegate
128+
}
129+
}
130+
return false
131+
}, nil
132+
}

0 commit comments

Comments
 (0)