
PR opencontainers/runc#1754 works around an issue in manager.Apply(-1) that makes Kubelet startup hang when using systemd cgroup driver (by adding a timeout) and further PR opencontainers/runc#1772 fixes that bug by checking the proper error status before waiting on the channel. PR opencontainers/runc#1776 checks whether Delegate works in slices, which keeps libcontainer systemd cgroup driver working on systemd v237+. PR opencontainers/runc#1781 makes the channel buffered, so if we time out waiting on the channel, the updater will not block trying to it since there are no longer any consumers.
117 lines
2.5 KiB
Go
117 lines
2.5 KiB
Go
// +build darwin dragonfly freebsd linux netbsd openbsd solaris
|
|
|
|
package user
|
|
|
|
import (
|
|
"io"
|
|
"os"
|
|
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
// Unix-specific path to the passwd and group formatted files.
|
|
const (
|
|
unixPasswdPath = "/etc/passwd"
|
|
unixGroupPath = "/etc/group"
|
|
)
|
|
|
|
func lookupUser(username string) (User, error) {
|
|
return lookupUserFunc(func(u User) bool {
|
|
return u.Name == username
|
|
})
|
|
}
|
|
|
|
func lookupUid(uid int) (User, error) {
|
|
return lookupUserFunc(func(u User) bool {
|
|
return u.Uid == uid
|
|
})
|
|
}
|
|
|
|
func lookupUserFunc(filter func(u User) bool) (User, error) {
|
|
// Get operating system-specific passwd reader-closer.
|
|
passwd, err := GetPasswd()
|
|
if err != nil {
|
|
return User{}, err
|
|
}
|
|
defer passwd.Close()
|
|
|
|
// Get the users.
|
|
users, err := ParsePasswdFilter(passwd, filter)
|
|
if err != nil {
|
|
return User{}, err
|
|
}
|
|
|
|
// No user entries found.
|
|
if len(users) == 0 {
|
|
return User{}, ErrNoPasswdEntries
|
|
}
|
|
|
|
// Assume the first entry is the "correct" one.
|
|
return users[0], nil
|
|
}
|
|
|
|
func lookupGroup(groupname string) (Group, error) {
|
|
return lookupGroupFunc(func(g Group) bool {
|
|
return g.Name == groupname
|
|
})
|
|
}
|
|
|
|
func lookupGid(gid int) (Group, error) {
|
|
return lookupGroupFunc(func(g Group) bool {
|
|
return g.Gid == gid
|
|
})
|
|
}
|
|
|
|
func lookupGroupFunc(filter func(g Group) bool) (Group, error) {
|
|
// Get operating system-specific group reader-closer.
|
|
group, err := GetGroup()
|
|
if err != nil {
|
|
return Group{}, err
|
|
}
|
|
defer group.Close()
|
|
|
|
// Get the users.
|
|
groups, err := ParseGroupFilter(group, filter)
|
|
if err != nil {
|
|
return Group{}, err
|
|
}
|
|
|
|
// No user entries found.
|
|
if len(groups) == 0 {
|
|
return Group{}, ErrNoGroupEntries
|
|
}
|
|
|
|
// Assume the first entry is the "correct" one.
|
|
return groups[0], nil
|
|
}
|
|
|
|
func GetPasswdPath() (string, error) {
|
|
return unixPasswdPath, nil
|
|
}
|
|
|
|
func GetPasswd() (io.ReadCloser, error) {
|
|
return os.Open(unixPasswdPath)
|
|
}
|
|
|
|
func GetGroupPath() (string, error) {
|
|
return unixGroupPath, nil
|
|
}
|
|
|
|
func GetGroup() (io.ReadCloser, error) {
|
|
return os.Open(unixGroupPath)
|
|
}
|
|
|
|
// CurrentUser looks up the current user by their user id in /etc/passwd. If the
|
|
// user cannot be found (or there is no /etc/passwd file on the filesystem),
|
|
// then CurrentUser returns an error.
|
|
func CurrentUser() (User, error) {
|
|
return LookupUid(unix.Getuid())
|
|
}
|
|
|
|
// CurrentGroup looks up the current user's group by their primary group id's
|
|
// entry in /etc/passwd. If the group cannot be found (or there is no
|
|
// /etc/group file on the filesystem), then CurrentGroup returns an error.
|
|
func CurrentGroup() (Group, error) {
|
|
return LookupGid(unix.Getgid())
|
|
}
|