mirror of
https://github.com/containers/podman.git
synced 2025-05-20 00:27:03 +08:00
71 lines
1.9 KiB
Go
71 lines
1.9 KiB
Go
package util
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"syscall"
|
|
|
|
"github.com/containers/podman/v2/pkg/rootless"
|
|
"github.com/containers/psgo"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// GetContainerPidInformationDescriptors returns a string slice of all supported
|
|
// format descriptors of GetContainerPidInformation.
|
|
func GetContainerPidInformationDescriptors() ([]string, error) {
|
|
return psgo.ListDescriptors(), nil
|
|
}
|
|
|
|
// FindDeviceNodes parses /dev/ into a set of major:minor -> path, where
|
|
// [major:minor] is the device's major and minor numbers formatted as, for
|
|
// example, 2:0 and path is the path to the device node.
|
|
// Symlinks to nodes are ignored.
|
|
func FindDeviceNodes() (map[string]string, error) {
|
|
nodes := make(map[string]string)
|
|
err := filepath.Walk("/dev", func(path string, info os.FileInfo, err error) error {
|
|
if err != nil {
|
|
logrus.Warnf("Error descending into path %s: %v", path, err)
|
|
return filepath.SkipDir
|
|
}
|
|
|
|
// If we aren't a device node, do nothing.
|
|
if info.Mode()&(os.ModeDevice|os.ModeCharDevice) == 0 {
|
|
return nil
|
|
}
|
|
|
|
// We are a device node. Get major/minor.
|
|
sysstat, ok := info.Sys().(*syscall.Stat_t)
|
|
if !ok {
|
|
return errors.Errorf("Could not convert stat output for use")
|
|
}
|
|
major := sysstat.Rdev / 256
|
|
minor := sysstat.Rdev % 256
|
|
|
|
nodes[fmt.Sprintf("%d:%d", major, minor)] = path
|
|
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return nodes, nil
|
|
}
|
|
|
|
// CheckRootlessUIDRange checks the uid within the rootless container is in the range from /etc/subuid
|
|
func CheckRootlessUIDRange(uid int) error {
|
|
uids, _, err := rootless.GetConfiguredMappings()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, u := range uids {
|
|
// add 1 since we also map in the user's own UID
|
|
if uid > u.Size+1 {
|
|
return errors.Errorf("requested user's UID %d is too large for the rootless user namespace", uid)
|
|
}
|
|
}
|
|
return nil
|
|
}
|