summaryrefslogtreecommitdiff
path: root/pkg/util/utils_linux.go
blob: d4c2644b3b94c5263a65af5102dffc2c783302fc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
package util

import (
	"fmt"
	"os"
	"path/filepath"
	"syscall"

	"github.com/containers/libpod/v2/pkg/rootless"
	"github.com/containers/psgo"
	"github.com/pkg/errors"
	"github.com/sirupsen/logrus"
)

// GetContainerPidInformationDescriptors returns a string slice of all supported
// format descriptors of GetContainerPidInformation.
func GetContainerPidInformationDescriptors() ([]string, error) {
	return psgo.ListDescriptors(), nil
}

// FindDeviceNodes parses /dev/ into a set of major:minor -> path, where
// [major:minor] is the device's major and minor numbers formatted as, for
// example, 2:0 and path is the path to the device node.
// Symlinks to nodes are ignored.
func FindDeviceNodes() (map[string]string, error) {
	nodes := make(map[string]string)
	err := filepath.Walk("/dev", func(path string, info os.FileInfo, err error) error {
		if err != nil {
			logrus.Warnf("Error descending into path %s: %v", path, err)
			return filepath.SkipDir
		}

		// If we aren't a device node, do nothing.
		if info.Mode()&(os.ModeDevice|os.ModeCharDevice) == 0 {
			return nil
		}

		// We are a device node. Get major/minor.
		sysstat, ok := info.Sys().(*syscall.Stat_t)
		if !ok {
			return errors.Errorf("Could not convert stat output for use")
		}
		major := sysstat.Rdev / 256
		minor := sysstat.Rdev % 256

		nodes[fmt.Sprintf("%d:%d", major, minor)] = path

		return nil
	})
	if err != nil {
		return nil, err
	}

	return nodes, nil
}

// CheckRootlessUIDRange checks the uid within the rootless container is in the range from /etc/subuid
func CheckRootlessUIDRange(uid int) error {
	uids, _, err := rootless.GetConfiguredMappings()
	if err != nil {
		return err
	}
	for _, u := range uids {
		// add 1 since we also map in the user's own UID
		if uid > u.Size+1 {
			return errors.Errorf("requested user's UID %d is too large for the rootless user namespace", uid)
		}
	}
	return nil
}