All checks were successful
Test / Create distribution (push) Successful in 33s
Test / Sandbox (push) Successful in 1m57s
Test / Hakurei (push) Successful in 2m54s
Test / Hpkg (push) Successful in 3m53s
Test / Sandbox (race detector) (push) Successful in 3m57s
Test / Hakurei (race detector) (push) Successful in 4m37s
Test / Flake checks (push) Successful in 1m25s
Signed-off-by: Ophestra <cat@gensokyo.uk>
135 lines
3.7 KiB
Go
135 lines
3.7 KiB
Go
package container
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"io/fs"
|
|
"os"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
"syscall"
|
|
|
|
"hakurei.app/container/vfs"
|
|
)
|
|
|
|
const (
|
|
// FHSRoot points to the file system root.
|
|
FHSRoot = "/"
|
|
// FHSEtc points to the directory for system-specific configuration.
|
|
FHSEtc = "/etc/"
|
|
// FHSTmp points to the place for small temporary files.
|
|
FHSTmp = "/tmp/"
|
|
|
|
// FHSRun points to a "tmpfs" file system for system packages to place runtime data, socket files, and similar.
|
|
FHSRun = "/run/"
|
|
// FHSRunUser points to a directory containing per-user runtime directories,
|
|
// each usually individually mounted "tmpfs" instances.
|
|
FHSRunUser = FHSRun + "user/"
|
|
|
|
// FHSUsr points to vendor-supplied operating system resources.
|
|
FHSUsr = "/usr/"
|
|
// FHSUsrBin points to binaries and executables for user commands that shall appear in the $PATH search path.
|
|
FHSUsrBin = FHSUsr + "bin/"
|
|
|
|
// FHSVar points to persistent, variable system data. Writable during normal system operation.
|
|
FHSVar = "/var/"
|
|
// FHSVarLib points to persistent system data.
|
|
FHSVarLib = FHSVar + "lib/"
|
|
// FHSVarEmpty points to a nonstandard directory that is usually empty.
|
|
FHSVarEmpty = FHSVar + "empty/"
|
|
|
|
// FHSDev points to the root directory for device nodes.
|
|
FHSDev = "/dev/"
|
|
// FHSProc points to a virtual kernel file system exposing the process list and other functionality.
|
|
FHSProc = "/proc/"
|
|
// FHSProcSys points to a hierarchy below /proc/ that exposes a number of kernel tunables.
|
|
FHSProcSys = FHSProc + "sys/"
|
|
// FHSSys points to a virtual kernel file system exposing discovered devices and other functionality.
|
|
FHSSys = "/sys/"
|
|
)
|
|
|
|
const (
|
|
// Nonexistent is a path that cannot exist.
|
|
// /proc is chosen because a system with covered /proc is unsupported by this package.
|
|
Nonexistent = FHSProc + "nonexistent"
|
|
|
|
hostPath = FHSRoot + hostDir
|
|
hostDir = "host"
|
|
sysrootPath = FHSRoot + sysrootDir
|
|
sysrootDir = "sysroot"
|
|
)
|
|
|
|
func toSysroot(name string) string {
|
|
name = strings.TrimLeftFunc(name, func(r rune) bool { return r == '/' })
|
|
return path.Join(sysrootPath, name)
|
|
}
|
|
|
|
func toHost(name string) string {
|
|
name = strings.TrimLeftFunc(name, func(r rune) bool { return r == '/' })
|
|
return path.Join(hostPath, name)
|
|
}
|
|
|
|
func createFile(name string, perm, pperm os.FileMode, content []byte) error {
|
|
if err := os.MkdirAll(path.Dir(name), pperm); err != nil {
|
|
return wrapErrSelf(err)
|
|
}
|
|
f, err := os.OpenFile(name, syscall.O_CREAT|syscall.O_EXCL|syscall.O_WRONLY, perm)
|
|
if err != nil {
|
|
return wrapErrSelf(err)
|
|
}
|
|
if content != nil {
|
|
_, err = f.Write(content)
|
|
if err != nil {
|
|
err = wrapErrSelf(err)
|
|
}
|
|
}
|
|
return errors.Join(f.Close(), err)
|
|
}
|
|
|
|
func ensureFile(name string, perm, pperm os.FileMode) error {
|
|
fi, err := os.Stat(name)
|
|
if err != nil {
|
|
if !os.IsNotExist(err) {
|
|
return err
|
|
}
|
|
return createFile(name, perm, pperm, nil)
|
|
}
|
|
|
|
if mode := fi.Mode(); mode&fs.ModeDir != 0 || mode&fs.ModeSymlink != 0 {
|
|
err = msg.WrapErr(syscall.EISDIR,
|
|
fmt.Sprintf("path %q is a directory", name))
|
|
}
|
|
return err
|
|
}
|
|
|
|
var hostProc = newProcPaths(hostPath)
|
|
|
|
func newProcPaths(prefix string) *procPaths {
|
|
return &procPaths{prefix + "/proc", prefix + "/proc/self"}
|
|
}
|
|
|
|
type procPaths struct {
|
|
prefix string
|
|
self string
|
|
}
|
|
|
|
func (p *procPaths) stdout() string { return p.self + "/fd/1" }
|
|
func (p *procPaths) fd(fd int) string { return p.self + "/fd/" + strconv.Itoa(fd) }
|
|
func (p *procPaths) mountinfo(f func(d *vfs.MountInfoDecoder) error) error {
|
|
if r, err := os.Open(p.self + "/mountinfo"); err != nil {
|
|
return wrapErrSelf(err)
|
|
} else {
|
|
d := vfs.NewMountInfoDecoder(r)
|
|
err0 := f(d)
|
|
if err = r.Close(); err != nil {
|
|
return wrapErrSuffix(err,
|
|
"cannot close mountinfo:")
|
|
} else if err = d.Err(); err != nil {
|
|
return wrapErrSuffix(err,
|
|
"cannot parse mountinfo:")
|
|
}
|
|
return err0
|
|
}
|
|
}
|