// +build linux package libpod import ( "fmt" "strings" "github.com/containerd/cgroups" "github.com/containers/libpod/pkg/util" spec "github.com/opencontainers/runtime-spec/specs-go" "github.com/opencontainers/selinux/go-selinux/label" "github.com/pkg/errors" "github.com/sirupsen/logrus" ) // systemdSliceFromPath makes a new systemd slice under the given parent with // the given name. // The parent must be a slice. The name must NOT include ".slice" func systemdSliceFromPath(parent, name string) (string, error) { cgroupPath, err := assembleSystemdCgroupName(parent, name) if err != nil { return "", err } logrus.Debugf("Created cgroup path %s for parent %s and name %s", cgroupPath, parent, name) if err := makeSystemdCgroup(cgroupPath); err != nil { return "", errors.Wrapf(err, "error creating cgroup %s", cgroupPath) } logrus.Debugf("Created cgroup %s", cgroupPath) return cgroupPath, nil } // makeSystemdCgroup creates a systemd CGroup at the given location. func makeSystemdCgroup(path string) error { controller, err := cgroups.NewSystemd(SystemdDefaultCgroupParent) if err != nil { return err } return controller.Create(path, &spec.LinuxResources{}) } // deleteSystemdCgroup deletes the systemd cgroup at the given location func deleteSystemdCgroup(path string) error { controller, err := cgroups.NewSystemd(SystemdDefaultCgroupParent) if err != nil { return err } return controller.Delete(path) } // assembleSystemdCgroupName creates a systemd cgroup path given a base and // a new component to add. // The base MUST be systemd slice (end in .slice) func assembleSystemdCgroupName(baseSlice, newSlice string) (string, error) { const sliceSuffix = ".slice" if !strings.HasSuffix(baseSlice, sliceSuffix) { return "", errors.Wrapf(ErrInvalidArg, "cannot assemble cgroup path with base %q - must end in .slice", baseSlice) } noSlice := strings.TrimSuffix(baseSlice, sliceSuffix) final := fmt.Sprintf("%s/%s-%s%s", baseSlice, noSlice, newSlice, sliceSuffix) return final, nil } // GetV1CGroups gets the V1 cgroup subsystems and then "filters" // out any subsystems that are provided by the caller. Passing nil // for excludes will return the subsystems unfiltered. //func GetV1CGroups(excludes []string) ([]cgroups.Subsystem, error) { func GetV1CGroups(excludes []string) cgroups.Hierarchy { return func() ([]cgroups.Subsystem, error) { var filtered []cgroups.Subsystem subSystem, err := cgroups.V1() if err != nil { return nil, err } for _, s := range subSystem { // If the name of the subsystem is not in the list of excludes, then // add it as a keeper. if !util.StringInSlice(string(s.Name()), excludes) { filtered = append(filtered, s) } } return filtered, nil } } // LabelVolumePath takes a mount path for a volume and gives it an // selinux label of either shared or not func LabelVolumePath(path string, shared bool) error { _, mountLabel, err := label.InitLabels([]string{}) if err != nil { return errors.Wrapf(err, "error getting default mountlabels") } if err := label.ReleaseLabel(mountLabel); err != nil { return errors.Wrapf(err, "error releasing label %q", mountLabel) } if err := label.Relabel(path, mountLabel, shared); err != nil { permString := "private" if shared { permString = "shared" } return errors.Wrapf(err, "error setting selinux label for %s to %q as %s", path, mountLabel, permString) } return nil }