All checks were successful
Test / Create distribution (push) Successful in 1m17s
Test / Sandbox (push) Successful in 3m5s
Test / Hakurei (push) Successful in 4m12s
Test / ShareFS (push) Successful in 4m25s
Test / Sandbox (race detector) (push) Successful in 5m39s
Test / Hakurei (race detector) (push) Successful in 6m44s
Test / Flake checks (push) Successful in 1m24s
This makes package check portable, and removes nonportable behaviour from package pkg, pipewire, and system. All other packages remain nonportable due to their nature. No latency increase was observed due to this change on amd64 and arm64 linux. Signed-off-by: Ophestra <cat@gensokyo.uk>
97 lines
2.3 KiB
Go
97 lines
2.3 KiB
Go
package container
|
|
|
|
import (
|
|
"errors"
|
|
"io/fs"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
"syscall"
|
|
|
|
"hakurei.app/fhs"
|
|
"hakurei.app/vfs"
|
|
)
|
|
|
|
const (
|
|
// Nonexistent is a path that cannot exist.
|
|
//
|
|
// This path can never be presented by the kernel if proc is mounted on
|
|
// /proc/. This can only exist if parts of /proc/ is covered, or proc is not
|
|
// mounted at all. Neither configuration is supported by this package.
|
|
Nonexistent = fhs.Proc + "nonexistent"
|
|
|
|
hostPath = fhs.Root + hostDir
|
|
hostDir = "host"
|
|
sysrootPath = fhs.Root + sysrootDir
|
|
sysrootDir = "sysroot"
|
|
)
|
|
|
|
func toSysroot(name string) string {
|
|
name = strings.TrimLeftFunc(name, func(r rune) bool { return r == '/' })
|
|
return filepath.Join(sysrootPath, name)
|
|
}
|
|
|
|
func toHost(name string) string {
|
|
name = strings.TrimLeftFunc(name, func(r rune) bool { return r == '/' })
|
|
return filepath.Join(hostPath, name)
|
|
}
|
|
|
|
func createFile(name string, perm, pperm os.FileMode, content []byte) error {
|
|
if err := os.MkdirAll(filepath.Dir(name), pperm); err != nil {
|
|
return err
|
|
}
|
|
f, err := os.OpenFile(name, syscall.O_CREAT|syscall.O_EXCL|syscall.O_WRONLY, perm)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if content != nil {
|
|
_, err = f.Write(content)
|
|
}
|
|
return errors.Join(f.Close(), err)
|
|
}
|
|
|
|
func ensureFile(name string, perm, pperm os.FileMode) error {
|
|
fi, err := os.Stat(name)
|
|
if err != nil {
|
|
if !os.IsNotExist(err) {
|
|
return err
|
|
}
|
|
return createFile(name, perm, pperm, nil)
|
|
}
|
|
|
|
if mode := fi.Mode(); mode&fs.ModeDir != 0 || mode&fs.ModeSymlink != 0 {
|
|
err = &os.PathError{Op: "ensure", Path: name, Err: syscall.EISDIR}
|
|
}
|
|
return err
|
|
}
|
|
|
|
var hostProc = newProcPaths(direct{}, hostPath)
|
|
|
|
func newProcPaths(k syscallDispatcher, prefix string) *procPaths {
|
|
return &procPaths{k, prefix + "/proc", prefix + "/proc/self"}
|
|
}
|
|
|
|
type procPaths struct {
|
|
k syscallDispatcher
|
|
prefix string
|
|
self string
|
|
}
|
|
|
|
func (p *procPaths) stdout() string { return p.self + "/fd/1" }
|
|
func (p *procPaths) fd(fd int) string { return p.self + "/fd/" + strconv.Itoa(fd) }
|
|
func (p *procPaths) mountinfo(f func(d *vfs.MountInfoDecoder) error) error {
|
|
if r, err := p.k.openNew(p.self + "/mountinfo"); err != nil {
|
|
return err
|
|
} else {
|
|
d := vfs.NewMountInfoDecoder(r)
|
|
err0 := f(d)
|
|
if err = r.Close(); err != nil {
|
|
return err
|
|
} else if err = d.Err(); err != nil {
|
|
return err
|
|
}
|
|
return err0
|
|
}
|
|
}
|