626 lines
20 KiB
Go
626 lines
20 KiB
Go
package plugingetter
|
||
|
||
import (
|
||
"archive/zip"
|
||
"encoding/hex"
|
||
"encoding/json"
|
||
"fmt"
|
||
"io"
|
||
"io/ioutil"
|
||
"log"
|
||
"os"
|
||
"path/filepath"
|
||
"sort"
|
||
"strconv"
|
||
"strings"
|
||
|
||
"github.com/hashicorp/go-version"
|
||
"github.com/hashicorp/packer-plugin-sdk/tmp"
|
||
"github.com/hashicorp/packer/hcl2template/addrs"
|
||
)
|
||
|
||
type Requirements []*Requirement
|
||
|
||
// Requirement describes a required plugin and how it is installed. Usually a list
|
||
// of required plugins is generated from a config file. From it we check what
|
||
// is actually installed and what needs to happen to get in the desired state.
|
||
type Requirement struct {
|
||
// Plugin accessor as defined in the config file.
|
||
// For Packer, using :
|
||
// required_plugins { amazon = {...} }
|
||
// Will set Accessor to `amazon`.
|
||
Accessor string
|
||
|
||
// Something like github.com/hashicorp/packer-plugin-amazon, from the
|
||
// previous example.
|
||
Identifier *addrs.Plugin
|
||
|
||
// VersionConstraints as defined by user. Empty ( to be avoided ) means
|
||
// highest found version.
|
||
VersionConstraints version.Constraints
|
||
|
||
// was this require implicitly guessed ?
|
||
Implicit bool
|
||
}
|
||
|
||
type BinaryInstallationOptions struct {
|
||
//
|
||
APIVersionMajor, APIVersionMinor string
|
||
// OS and ARCH usually should be runtime.GOOS and runtime.ARCH, they allow
|
||
// to pick the correct binary.
|
||
OS, ARCH string
|
||
|
||
// Ext is ".exe" on windows
|
||
Ext string
|
||
|
||
Checksummers []Checksummer
|
||
}
|
||
|
||
type ListInstallationsOptions struct {
|
||
// FromFolders where plugins could be installed. Paths should be absolute for
|
||
// safety but can also be relative.
|
||
FromFolders []string
|
||
|
||
BinaryInstallationOptions
|
||
}
|
||
|
||
func (pr Requirement) FilenamePrefix() string {
|
||
return "packer-plugin-" + pr.Identifier.Type + "_"
|
||
}
|
||
|
||
func (opts BinaryInstallationOptions) filenameSuffix() string {
|
||
return "_" + opts.OS + "_" + opts.ARCH + opts.Ext
|
||
}
|
||
|
||
// ListInstallations lists unique installed versions of plugin Requirement pr
|
||
// with opts as a filter.
|
||
//
|
||
// Installations are sorted by version and one binary per version is returned.
|
||
// Last binary detected takes precedence: in the order 'FromFolders' option.
|
||
//
|
||
// At least one opts.Checksumers must be given for a binary to be even
|
||
// considered.
|
||
func (pr Requirement) ListInstallations(opts ListInstallationsOptions) (InstallList, error) {
|
||
res := InstallList{}
|
||
FilenamePrefix := pr.FilenamePrefix()
|
||
filenameSuffix := opts.filenameSuffix()
|
||
log.Printf("[TRACE] listing potential installations for %q that match %q. %#v", pr.Identifier, pr.VersionConstraints, opts)
|
||
for _, knownFolder := range opts.FromFolders {
|
||
glob := filepath.Join(knownFolder, pr.Identifier.Hostname, pr.Identifier.Namespace, pr.Identifier.Type, FilenamePrefix+"*"+filenameSuffix)
|
||
|
||
matches, err := filepath.Glob(glob)
|
||
if err != nil {
|
||
return nil, fmt.Errorf("ListInstallations: %q failed to list binaries in folder: %v", pr.Identifier.String(), err)
|
||
}
|
||
for _, path := range matches {
|
||
fname := filepath.Base(path)
|
||
if fname == "." {
|
||
continue
|
||
}
|
||
|
||
// base name could look like packer-plugin-amazon_v1.2.3_x5.1_darwin_amd64.exe
|
||
versionsStr := strings.TrimPrefix(fname, FilenamePrefix)
|
||
versionsStr = strings.TrimSuffix(versionsStr, filenameSuffix)
|
||
|
||
// versionsStr now looks like v1.2.3_x5.1
|
||
parts := strings.SplitN(versionsStr, "_", 2)
|
||
pluginVersionStr, protocolVerionStr := parts[0], parts[1]
|
||
pv, err := version.NewVersion(pluginVersionStr)
|
||
if err != nil {
|
||
// could not be parsed, ignoring the file
|
||
log.Printf("found %q with an incorrect %q version, ignoring it. %v", path, pluginVersionStr, err)
|
||
continue
|
||
}
|
||
|
||
// no constraint means always pass, this will happen for implicit
|
||
// plugin requirements
|
||
if !pr.VersionConstraints.Check(pv) {
|
||
log.Printf("[TRACE] version %q of file %q does not match constraint %q", pluginVersionStr, path, pr.VersionConstraints.String())
|
||
continue
|
||
}
|
||
|
||
if err := opts.CheckProtocolVersion(protocolVerionStr); err != nil {
|
||
log.Printf("[NOTICE] binary %s requires protocol version %s that is incompatible "+
|
||
"with this version of Packer. %s", path, protocolVerionStr, err)
|
||
continue
|
||
}
|
||
|
||
checksumOk := false
|
||
for _, checksummer := range opts.Checksummers {
|
||
|
||
cs, err := checksummer.GetCacheChecksumOfFile(path)
|
||
if err != nil {
|
||
log.Printf("[TRACE] GetChecksumOfFile(%q) failed: %v", path, err)
|
||
continue
|
||
}
|
||
|
||
if err := checksummer.ChecksumFile(cs, path); err != nil {
|
||
log.Printf("[TRACE] ChecksumFile(%q) failed: %v", path, err)
|
||
continue
|
||
}
|
||
checksumOk = true
|
||
break
|
||
}
|
||
if !checksumOk {
|
||
log.Printf("[TRACE] No checksum found for %q ignoring possibly unsafe binary", path)
|
||
continue
|
||
}
|
||
|
||
res.InsertSortedUniq(&Installation{
|
||
BinaryPath: path,
|
||
Version: pluginVersionStr,
|
||
})
|
||
}
|
||
}
|
||
return res, nil
|
||
}
|
||
|
||
// InstallList is a list of installed plugins (binaries) with their versions,
|
||
// ListInstallations should be used to get an InstallList.
|
||
//
|
||
// ListInstallations sorts binaries by version and one binary per version is
|
||
// returned.
|
||
type InstallList []*Installation
|
||
|
||
func (l InstallList) String() string {
|
||
v := &strings.Builder{}
|
||
v.Write([]byte("["))
|
||
for i, inst := range l {
|
||
if i > 0 {
|
||
v.Write([]byte(","))
|
||
}
|
||
fmt.Fprintf(v, "%v", *inst)
|
||
}
|
||
v.Write([]byte("]"))
|
||
return v.String()
|
||
}
|
||
|
||
// InsertSortedUniq inserts the installation in the right spot in the list by
|
||
// comparing the version lexicographically.
|
||
// A Duplicate version will replace any already present version.
|
||
func (l *InstallList) InsertSortedUniq(install *Installation) {
|
||
pos := sort.Search(len(*l), func(i int) bool { return (*l)[i].Version >= install.Version })
|
||
if len(*l) > pos && (*l)[pos].Version == install.Version {
|
||
// already detected, let's ignore any new foundings, this way any plugin
|
||
// close to cwd or the packer exec takes precedence; this will be better
|
||
// for plugin development/tests.
|
||
return
|
||
}
|
||
(*l) = append((*l), nil)
|
||
copy((*l)[pos+1:], (*l)[pos:])
|
||
(*l)[pos] = install
|
||
}
|
||
|
||
// Installation describes a plugin installation
|
||
type Installation struct {
|
||
// path to where binary is installed, if installed.
|
||
// Ex: /usr/azr/.packer.d/plugins/github.com/hashicorp/packer-plugin-amazon/packer-plugin-amazon_v1.2.3_darwin_amd64
|
||
BinaryPath string
|
||
|
||
// Version of this plugin, if installed and versionned. Ex:
|
||
// * v1.2.3 for packer-plugin-amazon_v1.2.3_darwin_x5
|
||
// * empty for packer-plugin-amazon
|
||
Version string
|
||
}
|
||
|
||
// InstallOptions describes the possible options for installing the plugin that
|
||
// fits the plugin Requirement.
|
||
type InstallOptions struct {
|
||
// Different means to get releases, sha256 and binary files.
|
||
Getters []Getter
|
||
|
||
// Any downloaded binary and checksum file will be put in the last possible
|
||
// folder of this list.
|
||
InFolders []string
|
||
|
||
BinaryInstallationOptions
|
||
}
|
||
|
||
type GetOptions struct {
|
||
PluginRequirement *Requirement
|
||
|
||
BinaryInstallationOptions
|
||
|
||
version *version.Version
|
||
|
||
expectedZipFilename string
|
||
}
|
||
|
||
// ExpectedZipFilename is the filename of the zip we expect to find, the
|
||
// value is known only after parsing the checksum file file.
|
||
func (gp *GetOptions) ExpectedZipFilename() string {
|
||
return gp.expectedZipFilename
|
||
}
|
||
|
||
func (binOpts *BinaryInstallationOptions) CheckProtocolVersion(remoteProt string) error {
|
||
remoteProt = strings.TrimPrefix(remoteProt, "x")
|
||
parts := strings.Split(remoteProt, ".")
|
||
if len(parts) < 2 {
|
||
return fmt.Errorf("Invalid remote protocol: %q, expected something like '%s.%s'", remoteProt, binOpts.APIVersionMajor, binOpts.APIVersionMinor)
|
||
}
|
||
vMajor, vMinor := parts[0], parts[1]
|
||
|
||
if vMajor != binOpts.APIVersionMajor {
|
||
return fmt.Errorf("Unsupported remote protocol MAJOR version %q. The current MAJOR protocol version is %q."+
|
||
" This version of Packer can only communicate with plugins using that version.", vMajor, binOpts.APIVersionMajor)
|
||
}
|
||
|
||
if vMinor == binOpts.APIVersionMinor {
|
||
return nil
|
||
}
|
||
|
||
vMinori, err := strconv.Atoi(vMinor)
|
||
if err != nil {
|
||
return err
|
||
}
|
||
|
||
APIVersoinMinori, err := strconv.Atoi(binOpts.APIVersionMinor)
|
||
if err != nil {
|
||
return err
|
||
}
|
||
|
||
if vMinori > APIVersoinMinori {
|
||
return fmt.Errorf("Unsupported remote protocol MINOR version %q. The supported MINOR protocol versions are version %q and bellow."+
|
||
"Please upgrade Packer or use an older version of the plugin if possible.", vMinor, binOpts.APIVersionMinor)
|
||
}
|
||
|
||
return nil
|
||
}
|
||
|
||
func (gp *GetOptions) Version() string {
|
||
return "v" + gp.version.String()
|
||
}
|
||
|
||
// A Getter helps get the appropriate files to download a binary.
|
||
type Getter interface {
|
||
// Get:
|
||
// * 'releases'
|
||
// * 'sha256'
|
||
// * 'binary'
|
||
Get(what string, opts GetOptions) (io.ReadCloser, error)
|
||
}
|
||
|
||
type Release struct {
|
||
Version string `json:"version"`
|
||
}
|
||
|
||
func ParseReleases(f io.ReadCloser) ([]Release, error) {
|
||
var releases []Release
|
||
defer f.Close()
|
||
return releases, json.NewDecoder(f).Decode(&releases)
|
||
}
|
||
|
||
type ChecksumFileEntry struct {
|
||
Filename string `json:"filename"`
|
||
Checksum string `json:"checksum"`
|
||
ext, binVersion, os, arch string
|
||
protVersion string
|
||
}
|
||
|
||
func (e ChecksumFileEntry) Ext() string { return e.ext }
|
||
func (e ChecksumFileEntry) BinVersion() string { return e.binVersion }
|
||
func (e ChecksumFileEntry) ProtVersion() string { return e.protVersion }
|
||
func (e ChecksumFileEntry) Os() string { return e.os }
|
||
func (e ChecksumFileEntry) Arch() string { return e.arch }
|
||
|
||
// a file inside will look like so:
|
||
// packer-plugin-comment_v0.2.12_x5.0_freebsd_amd64.zip
|
||
//
|
||
func (e *ChecksumFileEntry) init(req *Requirement) (err error) {
|
||
filename := e.Filename
|
||
res := strings.TrimPrefix(filename, req.FilenamePrefix())
|
||
// res now looks like v0.2.12_x5.0_freebsd_amd64.zip
|
||
|
||
e.ext = filepath.Ext(res)
|
||
|
||
res = strings.TrimSuffix(res, e.ext)
|
||
// res now looks like v0.2.12_x5.0_freebsd_amd64
|
||
|
||
parts := strings.Split(res, "_")
|
||
// ["v0.2.12", "x5.0", "freebsd", "amd64"]
|
||
if len(parts) < 4 {
|
||
return fmt.Errorf("malformed filename expected %s{version}_x{protocol-version}_{os}_{arch}", req.FilenamePrefix())
|
||
}
|
||
|
||
e.binVersion, e.protVersion, e.os, e.arch = parts[0], parts[1], parts[2], parts[3]
|
||
|
||
return err
|
||
}
|
||
|
||
func (e *ChecksumFileEntry) validate(expectedVersion string, installOpts BinaryInstallationOptions) error {
|
||
if e.binVersion != expectedVersion {
|
||
return fmt.Errorf("wrong version: '%s' does not match expected %s ", e.binVersion, expectedVersion)
|
||
}
|
||
if e.os != installOpts.OS || e.arch != installOpts.ARCH {
|
||
return fmt.Errorf("wrong system, expected %s_%s ", installOpts.OS, installOpts.ARCH)
|
||
}
|
||
|
||
return installOpts.CheckProtocolVersion(e.protVersion)
|
||
}
|
||
|
||
func ParseChecksumFileEntries(f io.Reader) ([]ChecksumFileEntry, error) {
|
||
var entries []ChecksumFileEntry
|
||
return entries, json.NewDecoder(f).Decode(&entries)
|
||
}
|
||
|
||
func (pr *Requirement) InstallLatest(opts InstallOptions) (*Installation, error) {
|
||
|
||
getters := opts.Getters
|
||
fail := fmt.Errorf("could not find a local nor a remote checksum for plugin %q %q", pr.Identifier, pr.VersionConstraints)
|
||
|
||
log.Printf("[TRACE] getting available versions for the %s plugin", pr.Identifier)
|
||
versions := version.Collection{}
|
||
for _, getter := range getters {
|
||
|
||
releasesFile, err := getter.Get("releases", GetOptions{
|
||
PluginRequirement: pr,
|
||
BinaryInstallationOptions: opts.BinaryInstallationOptions,
|
||
})
|
||
if err != nil {
|
||
err := fmt.Errorf("%q getter could not get release: %w", getter, err)
|
||
log.Printf("[TRACE] %s", err.Error())
|
||
continue
|
||
}
|
||
|
||
releases, err := ParseReleases(releasesFile)
|
||
if err != nil {
|
||
err := fmt.Errorf("could not parse release: %w", err)
|
||
log.Printf("[TRACE] %s", err.Error())
|
||
continue
|
||
}
|
||
if len(releases) == 0 {
|
||
err := fmt.Errorf("no release found")
|
||
log.Printf("[TRACE] %s", err.Error())
|
||
continue
|
||
}
|
||
for _, release := range releases {
|
||
v, err := version.NewVersion(release.Version)
|
||
if err != nil {
|
||
err := fmt.Errorf("Could not parse release version %s. %w", release.Version, err)
|
||
log.Printf("[TRACE] %s, ignoring it", err.Error())
|
||
continue
|
||
}
|
||
if pr.VersionConstraints.Check(v) {
|
||
versions = append(versions, v)
|
||
}
|
||
}
|
||
if len(versions) == 0 {
|
||
err := fmt.Errorf("no matching version found in releases. In %v", releases)
|
||
log.Printf("[TRACE] %s", err.Error())
|
||
continue
|
||
}
|
||
|
||
break
|
||
}
|
||
|
||
// Here we want to try every relese in order, starting from the highest one
|
||
// that matches the requirements.
|
||
// The system and protocol version need to match too.
|
||
sort.Sort(sort.Reverse(versions))
|
||
log.Printf("[DEBUG] will try to install: %s", versions)
|
||
|
||
if len(versions) == 0 {
|
||
err := fmt.Errorf("no release version found for the %s plugin matching the constraint(s): %q", pr.Identifier, pr.VersionConstraints.String())
|
||
return nil, err
|
||
}
|
||
|
||
for _, version := range versions {
|
||
//TODO(azr): split in its own InstallVersion(version, opts) function
|
||
|
||
outputFolder := filepath.Join(
|
||
// Pick last folder as it's the one with the highest priority
|
||
opts.InFolders[len(opts.InFolders)-1],
|
||
// add expected full path
|
||
filepath.Join(pr.Identifier.Parts()...),
|
||
)
|
||
|
||
log.Printf("[TRACE] fetching checksums file for the %q version of the %s plugin in %q...", version, pr.Identifier, outputFolder)
|
||
|
||
var checksum *FileChecksum
|
||
for _, getter := range getters {
|
||
if checksum != nil {
|
||
break
|
||
}
|
||
for _, checksummer := range opts.Checksummers {
|
||
if checksum != nil {
|
||
break
|
||
}
|
||
checksumFile, err := getter.Get(checksummer.Type, GetOptions{
|
||
PluginRequirement: pr,
|
||
BinaryInstallationOptions: opts.BinaryInstallationOptions,
|
||
version: version,
|
||
})
|
||
if err != nil {
|
||
err := fmt.Errorf("could not get %s checksum file for %s version %s. Is the file present on the release and correctly named ? %s", checksummer.Type, pr.Identifier, version, err)
|
||
log.Printf("[TRACE] %s", err.Error())
|
||
return nil, err
|
||
}
|
||
entries, err := ParseChecksumFileEntries(checksumFile)
|
||
_ = checksumFile.Close()
|
||
if err != nil {
|
||
log.Printf("[TRACE] could not parse %s checksumfile: %v. Make sure the checksum file contains a checksum and a binary filename per line.", checksummer.Type, err)
|
||
continue
|
||
}
|
||
|
||
for _, entry := range entries {
|
||
if err := entry.init(pr); err != nil {
|
||
log.Printf("[TRACE] could not parse checksum filename %s. Is it correctly formatted ? %s", entry.Filename, err)
|
||
continue
|
||
}
|
||
if err := entry.validate("v"+version.String(), opts.BinaryInstallationOptions); err != nil {
|
||
log.Printf("[TRACE] Ignoring remote binary %s, %s", entry.Filename, err)
|
||
continue
|
||
}
|
||
|
||
log.Printf("[TRACE] About to get: %s", entry.Filename)
|
||
|
||
cs, err := checksummer.ParseChecksum(strings.NewReader(entry.Checksum))
|
||
if err != nil {
|
||
log.Printf("[TRACE] could not parse %s checksum: %v. Make sure the checksum file contains the checksum and only the checksum.", checksummer.Type, err)
|
||
continue
|
||
}
|
||
|
||
checksum = &FileChecksum{
|
||
Filename: entry.Filename,
|
||
Expected: cs,
|
||
Checksummer: checksummer,
|
||
}
|
||
expectedZipFilename := checksum.Filename
|
||
expectedBinaryFilename := strings.TrimSuffix(expectedZipFilename, filepath.Ext(expectedZipFilename)) + opts.BinaryInstallationOptions.Ext
|
||
|
||
for _, outputFolder := range opts.InFolders {
|
||
potentialOutputFilename := filepath.Join(
|
||
outputFolder,
|
||
filepath.Join(pr.Identifier.Parts()...),
|
||
expectedBinaryFilename,
|
||
)
|
||
for _, potentialChecksumer := range opts.Checksummers {
|
||
// First check if a local checksum file is already here in the expected
|
||
// download folder. Here we want to download a binary so we only check
|
||
// for an existing checksum file from the folder we want to download
|
||
// into.
|
||
cs, err := potentialChecksumer.GetCacheChecksumOfFile(potentialOutputFilename)
|
||
if err == nil && len(cs) > 0 {
|
||
localChecksum := &FileChecksum{
|
||
Expected: cs,
|
||
Checksummer: potentialChecksumer,
|
||
}
|
||
|
||
log.Printf("[TRACE] found a pre-exising %q checksum file", potentialChecksumer.Type)
|
||
// if outputFile is there and matches the checksum: do nothing more.
|
||
if err := localChecksum.ChecksumFile(localChecksum.Expected, potentialOutputFilename); err == nil {
|
||
log.Printf("[INFO] %s v%s plugin is already correctly installed in %q", pr.Identifier, version, potentialOutputFilename)
|
||
return nil, nil
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
// The last folder from the installation list is where we will install.
|
||
outputFileName := filepath.Join(outputFolder, expectedBinaryFilename)
|
||
|
||
// create directories if need be
|
||
if err := os.MkdirAll(outputFolder, 0755); err != nil {
|
||
err := fmt.Errorf("could not create plugin folder %q: %w", outputFolder, err)
|
||
log.Printf("[TRACE] %s", err.Error())
|
||
return nil, err
|
||
}
|
||
|
||
for _, getter := range getters {
|
||
// create temporary file that will receive a temporary binary.zip
|
||
tmpFile, err := tmp.File("packer-plugin-*.zip")
|
||
if err != nil {
|
||
return nil, fmt.Errorf("could not create temporary file to dowload plugin: %w", err)
|
||
}
|
||
defer tmpFile.Close()
|
||
|
||
// start fetching binary
|
||
remoteZipFile, err := getter.Get("zip", GetOptions{
|
||
PluginRequirement: pr,
|
||
BinaryInstallationOptions: opts.BinaryInstallationOptions,
|
||
version: version,
|
||
expectedZipFilename: expectedZipFilename,
|
||
})
|
||
if err != nil {
|
||
err := fmt.Errorf("could not get binary for %s version %s. Is the file present on the release and correctly named ? %s", pr.Identifier, version, err)
|
||
log.Printf("[TRACE] %v", err)
|
||
continue
|
||
}
|
||
|
||
// write binary to tmp file
|
||
_, err = io.Copy(tmpFile, remoteZipFile)
|
||
_ = remoteZipFile.Close()
|
||
if err != nil {
|
||
err := fmt.Errorf("Error getting plugin: %w", err)
|
||
log.Printf("[TRACE] %v, trying another getter", err)
|
||
continue
|
||
}
|
||
|
||
if _, err := tmpFile.Seek(0, 0); err != nil {
|
||
err := fmt.Errorf("Error seeking begining of temporary file for checksumming: %w", err)
|
||
log.Printf("[TRACE] %v, continuing", err)
|
||
continue
|
||
}
|
||
|
||
// verify that the checksum for the zip is what we expect.
|
||
if err := checksum.Checksummer.Checksum(checksum.Expected, tmpFile); err != nil {
|
||
err := fmt.Errorf("%w. Is the checksum file correct ? Is the binary file correct ?", err)
|
||
log.Printf("%s, truncating the zipfile", err)
|
||
if err := tmpFile.Truncate(0); err != nil {
|
||
log.Printf("[TRACE] %v", err)
|
||
}
|
||
continue
|
||
}
|
||
|
||
tmpFileStat, err := tmpFile.Stat()
|
||
if err != nil {
|
||
err := fmt.Errorf("failed to stat: %v", err)
|
||
return nil, err
|
||
}
|
||
|
||
zr, err := zip.NewReader(tmpFile, tmpFileStat.Size())
|
||
if err != nil {
|
||
err := fmt.Errorf("zip : %v", err)
|
||
return nil, err
|
||
}
|
||
|
||
var copyFrom io.ReadCloser
|
||
for _, f := range zr.File {
|
||
if f.Name != expectedBinaryFilename {
|
||
continue
|
||
}
|
||
copyFrom, err = f.Open()
|
||
if err != nil {
|
||
return nil, err
|
||
}
|
||
break
|
||
}
|
||
if copyFrom == nil {
|
||
err := fmt.Errorf("could not find a %s file in zipfile", checksum.Filename)
|
||
return nil, err
|
||
}
|
||
|
||
outputFile, err := os.OpenFile(outputFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0755)
|
||
if err != nil {
|
||
err := fmt.Errorf("Failed to create %s: %v", outputFileName, err)
|
||
return nil, err
|
||
}
|
||
defer outputFile.Close()
|
||
|
||
if _, err := io.Copy(outputFile, copyFrom); err != nil {
|
||
err := fmt.Errorf("Extract file: %v", err)
|
||
return nil, err
|
||
}
|
||
|
||
if _, err := outputFile.Seek(0, 0); err != nil {
|
||
err := fmt.Errorf("Error seeking begining of binary file for checksumming: %w", err)
|
||
log.Printf("[WARNING] %v, ignoring", err)
|
||
}
|
||
|
||
cs, err := checksum.Checksummer.Sum(outputFile)
|
||
if err != nil {
|
||
err := fmt.Errorf("failed to checksum binary file: %s", err)
|
||
log.Printf("[WARNING] %v, ignoring", err)
|
||
}
|
||
|
||
if err := ioutil.WriteFile(outputFileName+checksum.Checksummer.FileExt(), []byte(hex.EncodeToString(cs)), 0555); err != nil {
|
||
err := fmt.Errorf("failed to write local binary checksum file: %s", err)
|
||
log.Printf("[WARNING] %v, ignoring", err)
|
||
}
|
||
|
||
// Success !!
|
||
return &Installation{
|
||
BinaryPath: strings.ReplaceAll(outputFileName, "\\", "/"),
|
||
Version: "v" + version.String(),
|
||
}, nil
|
||
}
|
||
|
||
}
|
||
}
|
||
|
||
}
|
||
}
|
||
|
||
return nil, fail
|
||
}
|