Documentation ¶
Overview ¶
Package osutil offers utilities related to the operating system or i/o, mainly for files, filesystems and mounts, and also users and processes.
Index ¶
- Constants
- Variables
- func AddUser(name string, opts *AddUserOptions) error
- func AtomicRename(oldName, newName string) (err error)
- func AtomicSymlink(target, linkPath string) error
- func AtomicWrite(filename string, reader io.Reader, perm os.FileMode, flags AtomicWriteFlags) (err error)
- func AtomicWriteChown(filename string, reader io.Reader, perm os.FileMode, flags AtomicWriteFlags, ...) (err error)
- func AtomicWriteFile(filename string, data []byte, perm os.FileMode, flags AtomicWriteFlags) (err error)
- func AtomicWriteFileChown(filename string, data []byte, perm os.FileMode, flags AtomicWriteFlags, ...) (err error)
- func AtomicWriteFileCopy(dst, src string, flags AtomicWriteFlags) (err error)
- func BootID() (string, error)
- func ChDir(newDir string, f func() error) (err error)
- func CheckFreeSpace(path string, minSize uint64) error
- func CombineStdOutErr(stdout, stderr []byte) []byte
- func ComparePathsByDeviceInode(a, b string) (match bool, err error)
- func ContextWriter(ctx context.Context) io.Writer
- func CopyFile(src, dst string, flags CopyFlag) (err error)
- func CopySpecialFile(path, dest string) error
- func DelUser(name string, opts *DelUserOptions) error
- func DirExists(fn string) (exists bool, isDir bool, err error)
- func EnsureDirState(dir string, glob string, content map[string]FileState) (changed, removed []string, err error)
- func EnsureDirStateGlobs(dir string, globs []string, content map[string]FileState) (changed, removed []string, err error)
- func EnsureFileState(filePath string, state FileState) error
- func EnsureSnapUserGroup(name string, id uint32, extraUsers bool) error
- func EnsureTreeState(baseDir string, globs []string, content map[string]map[string]FileState) (changed, removed []string, err error)
- func Escape(path string) string
- func ExecutableExists(name string) bool
- func ExitCode(runErr error) (e int, err error)
- func FileDigest(filename string, hash crypto.Hash) ([]byte, uint64, error)
- func FileExists(path string) bool
- func FilesAreEqual(a, b string) bool
- func FindGidOwning(path string) (uint64, error)
- func GetAttr(f *os.File) (int32, error)
- func GetenvBool(key string, dflt ...bool) bool
- func GetenvInt64(key string, dflt ...int64) int64
- func IsDevice(mode os.FileMode) bool
- func IsDirNotExist(err error) bool
- func IsDirectory(path string) bool
- func IsExecutable(path string) bool
- func IsHomeUsingRemoteFS() (bool, error)
- func IsMounted(baseDir string) (bool, error)
- func IsRootWritableOverlay() (string, error)
- func IsSymlink(path string) bool
- func IsTestBinary() bool
- func IsUnknownGroup(err error) bool
- func IsUnknownUser(err error) bool
- func IsWritable(path string) bool
- func KillProcessGroup(cmd *exec.Cmd) error
- func LookPathDefault(name string, defaultPath string) string
- func MachineName() string
- func MaybeInjectFault(tag string)
- func MkdirAllChown(path string, perm os.FileMode, uid sys.UserID, gid sys.GroupID) error
- func MockFindGid(f func(string) (uint64, error)) (restore func())
- func MockFindUid(f func(string) (uint64, error)) (restore func())
- func MockIsHomeUsingRemoteFS(new func() (bool, error)) (restore func())
- func MockIsRootWritableOverlay(new func() (string, error)) (restore func())
- func MockKernelVersion(version string) (restore func())
- func MockMountInfo(content string) (restore func())
- func MockProcMeminfo(newPath string) (restore func())
- func MockProcSelfMountInfoLocation(filename string) (restore func())
- func MockUserLookup(mock func(name string) (*user.User, error)) func()
- func MountOptsToCommonFlags(opts []string) (flags int, unparsed []string)
- func MountOptsToFlags(opts []string) (flags int, err error)
- func MustBeTestBinary(panicMsg string)
- func MyBuildID() (string, error)
- func OutputErr(output []byte, err error) error
- func OutputErrCombine(stdout, stderr []byte, err error) error
- func ReadBuildID(fname string) (string, error)
- func Readlinkat(dirfd int, path string, buf []byte) (n int, err error)
- func RegularFileExists(fn string) (exists, isReg bool, err error)
- func ReplaceMountEntryOption(entry *MountEntry, option string)
- func ResolvePathInSysroot(sysroot, path string) (string, error)
- func ResolvePathNoEscape(sysroot, path string) (string, error)
- func RunAndWait(argv []string, env []string, timeout time.Duration, tomb *tomb.Tomb) ([]byte, error)
- func RunCmd(c *exec.Cmd) ([]byte, []byte, error)
- func RunSplitOutput(name string, arg ...string) ([]byte, []byte, error)
- func RunWithContext(ctx context.Context, cmd *exec.Cmd) error
- func SaveMountProfileText(p *MountProfile) (string, error)
- func SetAttr(f *os.File, attr int32) error
- func SetTime(t time.Time) error
- func StreamCommand(name string, args ...string) (io.ReadCloser, error)
- func StreamsEqual(a, b io.Reader) bool
- func SwapDirs(oldpath string, newpath string) (err error)
- func Symlinkat(target string, dirfd int, linkpath string) error
- func TotalUsableMemory() (totalMem uint64, err error)
- func UidGid(u *user.User) (sys.UserID, sys.GroupID, error)
- func Unescape(path string) string
- func UnlinkMany(dirname string, filenames []string) error
- func UnlinkManyAt(dir *os.File, filenames []string) error
- func UserMaybeSudoUser() (*user.User, error)
- func UsernamesToUids(users []string) (map[int]string, error)
- func XSnapdDetach() string
- func XSnapdGroup(gid uint32) string
- func XSnapdIgnoreMissing() string
- func XSnapdKindEnsureDir() string
- func XSnapdKindFile() string
- func XSnapdKindSymlink() string
- func XSnapdMode(mode uint32) string
- func XSnapdMustExistDir(path string) string
- func XSnapdNeededBy(path string) string
- func XSnapdOriginLayout() string
- func XSnapdOriginOvername() string
- func XSnapdSymlink(oldname string) string
- func XSnapdSynthetic() string
- func XSnapdUser(uid uint32) string
- type AddUserOptions
- type AtomicFile
- type AtomicWriteFlags
- type CopyFlag
- type CopySpecialFileError
- type DelUserOptions
- type Environment
- type ExpandableEnv
- type FileLock
- type FileReference
- type FileReferencePlusMode
- type FileState
- type MemoryFileState
- type MountEntry
- func (e *MountEntry) Equal(o *MountEntry) bool
- func (e *MountEntry) OptBool(name string) bool
- func (e *MountEntry) OptStr(name string) (string, bool)
- func (e MountEntry) String() string
- func (e *MountEntry) XSnapdDetach() bool
- func (e *MountEntry) XSnapdEntryID() string
- func (e *MountEntry) XSnapdGID() (gid uint64, err error)
- func (e *MountEntry) XSnapdIgnoreMissing() bool
- func (e *MountEntry) XSnapdKind() string
- func (e *MountEntry) XSnapdMode() (os.FileMode, error)
- func (e *MountEntry) XSnapdMustExistDir() string
- func (e *MountEntry) XSnapdNeededBy() string
- func (e *MountEntry) XSnapdOrigin() string
- func (e *MountEntry) XSnapdSymlink() string
- func (e *MountEntry) XSnapdSynthetic() bool
- func (e *MountEntry) XSnapdUID() (uid uint64, err error)
- type MountInfoEntry
- type MountProfile
- type NotEnoughDiskSpaceError
- type Sizer
- type SymlinkFileState
- type Winsize
Constants ¶
const ( // from /usr/include/linux/fs.h FS_SECRM_FL = 0x00000001 /* Secure deletion */ FS_UNRM_FL = 0x00000002 /* Undelete */ FS_COMPR_FL = 0x00000004 /* Compress file */ FS_SYNC_FL = 0x00000008 /* Synchronous updates */ FS_IMMUTABLE_FL = 0x00000010 /* Immutable file */ FS_APPEND_FL = 0x00000020 /* writes to file may only append */ FS_NODUMP_FL = 0x00000040 /* do not dump file */ FS_NOATIME_FL = 0x00000080 /* do not update atime */ FS_DIRTY_FL = 0x00000100 FS_COMPRBLK_FL = 0x00000200 /* One or more compressed clusters */ FS_NOCOMP_FL = 0x00000400 /* Don't compress */ FS_ECOMPR_FL = 0x00000800 /* Compression error */ FS_BTREE_FL = 0x00001000 /* btree format dir */ FS_INDEX_FL = 0x00001000 /* hash-indexed directory */ FS_IMAGIC_FL = 0x00002000 /* AFS directory */ FS_JOURNAL_DATA_FL = 0x00004000 /* Reserved for ext3 */ FS_NOTAIL_FL = 0x00008000 /* file tail should not be merged */ FS_DIRSYNC_FL = 0x00010000 /* dirsync behaviour (directories only) */ FS_TOPDIR_FL = 0x00020000 /* Top of directory hierarchies*/ FS_EXTENT_FL = 0x00080000 /* Extents */ FS_DIRECTIO_FL = 0x00100000 /* Use direct i/o */ FS_NOCOW_FL = 0x00800000 /* Do not cow file */ FS_PROJINHERIT_FL = 0x20000000 /* Create with parents projid */ FS_RESERVED_FL = 0x80000000 /* reserved for ext2 lib */ )
const NoChown = sys.FlagID
Variables ¶
var ErrAlreadyLocked = errors.New("cannot acquire lock, already locked")
var ErrCannotCancel = errors.New("cannot cancel: file has already been renamed")
ErrCannotCancel means the Commit operation failed at the last step, and your luck has run out.
var ErrNoBuildID = errors.New("executable does not contain a build ID")
ErrNoBuildID is returned when an executable does not contain a Build-ID
var ErrSameState = fmt.Errorf("file state has not changed")
ErrSameState is returned when the state of a file has not changed.
var FindGid = findGid
FindGid returns the identifier of the given UNIX group name. It will automatically fallback to use "getent" if needed.
var FindUid = findUid
FindUid returns the identifier of the given UNIX user name. It will automatically fallback to use "getent" if needed.
var IsValidSnapSystemUsername = regexp.MustCompile(`^([_][-a-z0-9._]+[_]|[a-z0-9][-a-z0-9._]*)$`).MatchString
IsValidSnapSystemUsername defines what is valid for the "system-usernames" stanza in the snap.yaml.
Unlike a normal username a system usernames can be encloused in "_" (e.g. _username_ is valid)
var IsValidUsername = regexp.MustCompile(`^[a-z0-9][-a-z0-9._]*$`).MatchString
We check the (user)name ourselves, adduser is a bit too strict (i.e. no `.`) - this regexp is in sync with that SSO allows as valid usernames. On systems where there are no adduser, this is the regex that verifies users being created, and serves as a replacement for the regex that adduser was providing.
IsValidUsername define what is valid for a "system-user" assertion.
var KernelVersion = kernelVersion
Functions ¶
func AddUser ¶
func AddUser(name string, opts *AddUserOptions) error
AddUser uses the Debian/Ubuntu/derivative 'adduser' command for creating regular login users on Ubuntu Core. 'adduser' is not portable cross-distro but is convenient for creating regular login users. if 'adduser' is not available, 'useradd' is used instead.
The username created by this function will be checked against IsValidUsername().
func AtomicRename ¶
AtomicRename attempts to rename a path from oldName to newName atomically.
func AtomicSymlink ¶
AtomicSymlink attempts to atomically create a symlink at linkPath, pointing to a given target. The process creates a temporary symlink object pointing to the target, and then proceeds to rename it atomically, replacing the linkPath.
func AtomicWrite ¶
func AtomicWrite(filename string, reader io.Reader, perm os.FileMode, flags AtomicWriteFlags) (err error)
The AtomicWrite* family of functions work like os.WriteFile(), but the file created is an AtomicWriter, which is Committed before returning.
AtomicWriteChown and AtomicWriteFileChown take an uid and a gid that can be used to specify the ownership of the created file. A special value of 0xffffffff (math.MaxUint32, or NoChown for convenience) can be used to request no change to that attribute.
AtomicWriteFile and AtomicWriteFileChown take the content to be written as a []byte, and so work exactly like io.WriteFile(); AtomicWrite and AtomicWriteChown take an io.Reader which is copied into the file instead, and so are more amenable to streaming.
func AtomicWriteChown ¶
func AtomicWriteFile ¶
func AtomicWriteFileChown ¶
func AtomicWriteFileCopy ¶
func AtomicWriteFileCopy(dst, src string, flags AtomicWriteFlags) (err error)
AtomicWriteFileCopy writes to dst a copy of src using AtomicFile internally to create the destination. The destination path is always overwritten. The destination and the owning directory are synced after copy completes. Pass additional flags for AtomicFile wrapping the destination.
func ChDir ¶
ChDir runs runs "f" inside the given directory Note that this will only work reliable in a single-threaded context.
func CheckFreeSpace ¶
CheckFreeSpace checks if there is enough disk space for the given path
func CombineStdOutErr ¶
CombineStdOutErr combines stdout and stderr byte arrays into a single one.
func ComparePathsByDeviceInode ¶
ComparePathsByDeviceInode compares the devices and inodes of the given paths, following symlinks.
func ContextWriter ¶
ContextWriter returns a discarding io.Writer which Write method returns an error once the context is done.
func CopySpecialFile ¶
CopySpecialFile is used to copy all the things that are not files (like device nodes, named pipes etc)
func DelUser ¶
func DelUser(name string, opts *DelUserOptions) error
DelUser removes a "regular login user" from the system, including their home. Unlike AddUser, it does this by calling userdel(8) directly (deluser doesn't support extrausers). Additionally this will remove the user from sudoers if found.
func EnsureDirState ¶
func EnsureDirState(dir string, glob string, content map[string]FileState) (changed, removed []string, err error)
EnsureDirState ensures that directory content matches expectations.
This is like EnsureDirStateGlobs but it only supports one glob at a time.
func EnsureDirStateGlobs ¶
func EnsureDirStateGlobs(dir string, globs []string, content map[string]FileState) (changed, removed []string, err error)
EnsureDirStateGlobs ensures that directory content matches expectations.
EnsureDirStateGlobs enumerates all the files in the specified directory that match the provided set of pattern (globs). Each enumerated file is checked to ensure that the contents, permissions are what is desired. Unexpected files are removed. Missing files are created and differing files are corrected. Files not matching any pattern are ignored.
Note that EnsureDirStateGlobs only checks for permissions and content. Other security mechanisms, including file ownership and extended attributes are *not* supported.
The content map describes each of the files that are intended to exist in the directory. Map keys must be file names relative to the directory. Sub-directories in the name are not allowed.
If writing any of the files fails, EnsureDirStateGlobs switches to erase mode where *all* of the files managed by the glob pattern are removed (including those that may have been already written). The return value is an empty list of changed files, the real list of removed files and the first error.
If an error happens while removing files then such a file is not removed but the removal continues until the set of managed files matching the glob is exhausted.
In all cases, the function returns the first error it has encountered.
func EnsureFileState ¶
EnsureFileState ensures that the file is in the expected state. It will not attempt to remove the file if no content is provided.
func EnsureSnapUserGroup ¶
EnsureSnapUserGroup uses the standard shadow utilities' 'useradd' and 'groupadd' commands for creating non-login system users and groups that is portable cross-distro. It will create the group with groupname 'name' and gid 'id' as well as the user with username 'name' and uid 'id'. Importantly, 'useradd' and 'groupadd' will use NSS to determine if a uid/gid is already assigned (so LDAP, etc are consulted), but will themselves only add to local files, which is exactly what we want since we don't want snaps to be blocked on LDAP, etc when performing lookups.
The username created by this function will be checked against IsValidSnapSystemUsername().
func EnsureTreeState ¶
func EnsureTreeState(baseDir string, globs []string, content map[string]map[string]FileState) (changed, removed []string, err error)
EnsureTreeState ensures that a directory tree content matches expectations.
EnsureTreeState walks subdirectories of the base directory, and uses EnsureDirStateGlobs to synchronise content with the corresponding entry in the content map. Any non-existent subdirectories in the content map will be created.
After synchronising all subdirectories, any subdirectories where files were removed that are now empty will itself be removed, plus its parent directories up to but not including the base directory.
While there is a quick check to prevent creation of directories that match the file glob pattern, it is the caller's responsibility to not create directories that may match globs passed to other invocations.
For example, if the glob "snap.$SNAP_NAME.*" is used then the caller should avoid trying to populate any directories matching "snap.*".
If an error occurs, all matching files are removed from the tree.
A list of changed and removed files is returned, as relative paths to the base directory.
func ExecutableExists ¶
ExecutableExists returns whether there an exists an executable with the given name somewhere on $PATH.
func ExitCode ¶
ExitCode extract the exit code from the error of a failed cmd.Run() or the original error if its not a exec.ExitError
func FileDigest ¶
FileDigest computes a hash digest of the file using the given hash. It also returns the file size.
func FileExists ¶
FileExists return true if given path can be stat()ed by us. Note that it may return false on e.g. permission issues.
func FilesAreEqual ¶
FilesAreEqual compares the two files' contents and returns whether they are the same.
func FindGidOwning ¶
FindGidOwning obtains UNIX group ID and name owning file `path`.
func GetenvBool ¶
GetenvBool returns whether the given key may be considered "set" in the environment (i.e. it is set to one of "1", "true", etc).
An optional second argument can be provided, which determines how to treat missing or unparsable values; default is to treat them as false.
func GetenvInt64 ¶
GetenvInt64 interprets the value of the given environment variable as an int64 and returns the corresponding value. The base can be implied via the prefix (0x for 16, 0 for 8; otherwise 10).
An optional second argument can be provided, which determines how to treat missing or unparsable values; default is to treat them as 0.
func IsDirNotExist ¶
IsDirNotExist tells you whether the given error is due to a directory not existing.
func IsDirectory ¶
IsDirectory return true if the given path can be stat()ed by us and is a directory. Note that it may return false on e.g. permission issues.
func IsExecutable ¶
IsExecutable returns true when given path points to an executable file
func IsHomeUsingRemoteFS ¶
func IsRootWritableOverlay ¶
func IsTestBinary ¶
func IsTestBinary() bool
IsTestBinary checks whether the current process is a go test binary.
func IsUnknownGroup ¶
func IsUnknownUser ¶
func IsWritable ¶
IsWritable checks if the given file/directory can be written by the current user
func KillProcessGroup ¶
KillProcessGroup kills the process group associated with the given command.
If the command hasn't had Setpgid set in its SysProcAttr, you'll probably end up killing yourself.
func LookPathDefault ¶
LookPathDefault searches for a given command name in all directories listed in the environment variable PATH and returns the found path or the provided default path.
func MachineName ¶
func MachineName() string
func MaybeInjectFault ¶
func MaybeInjectFault(tag string)
MaybeInjectFault is an empty implementation for builds with fault injection disabled.
func MkdirAllChown ¶
MkdirAllChown is like os.MkdirAll but it calls os.Chown on any directories it creates.
func MockFindGid ¶
func MockFindUid ¶
func MockIsHomeUsingRemoteFS ¶
MockIsHomeUsingRemoteFS mocks the real implementation of osutil.IsHomeUsingRemoteFS. This is exported so that other packages that indirectly interact with this functionality can mock IsHomeUsingRemoteFS.
func MockIsRootWritableOverlay ¶
MockIsRootWritableOverlay mocks the real implementation of osutil.IsRootWritableOverlay
func MockKernelVersion ¶
func MockKernelVersion(version string) (restore func())
MockKernelVersion replaces the function that returns the kernel version string.
func MockMountInfo ¶
func MockMountInfo(content string) (restore func())
func MockProcMeminfo ¶
func MockProcMeminfo(newPath string) (restore func())
func MockProcSelfMountInfoLocation ¶
func MockProcSelfMountInfoLocation(filename string) (restore func())
this should not be used except to test the actual implementation logic of LoadMountInfo, if you are trying to mock /proc/self/mountinfo in a test, use MockMountInfo(), which is exported and the right way to do that.
func MockUserLookup ¶
Allow other test suites to mock this functionality
func MountOptsToCommonFlags ¶
MountOptsToCommonFlags converts mount options strings to a mount flag, returning unparsed flags. The unparsed flags will not contain any snapd- specific mount option, those starting with the string "x-snapd."
func MountOptsToFlags ¶
MountOptsToFlags converts mount options strings to a mount flag.
func MustBeTestBinary ¶
func MustBeTestBinary(panicMsg string)
MustBeTestBinary checks whether the executing process is a go test binary, panics otherwise.
func OutputErr ¶
OutputErr formats an error based on output if its length is not zero, or returns err otherwise.
func OutputErrCombine ¶
OutputErr formats an error based on output if its length is not zero, or returns err otherwise.
func ReadBuildID ¶
ReadBuildID returns the build ID of a given binary. GNU BuildID is is preferred over Go BuildID. Returns an error when neither is found.
func Readlinkat ¶
Readlinkat is a direct pass-through to the readlinkat(2) system call.
func RegularFileExists ¶
RegularFileExists checks whether a given path exists, and if so whether it is a regular file.
func ReplaceMountEntryOption ¶
func ReplaceMountEntryOption(entry *MountEntry, option string)
ReplaceMountEntryOption replaces the first mount entry option that has the same prefix as the given option with the given option
func ResolvePathInSysroot ¶
ResolvePathInSysroot resolves a path within a sysroot
In a sysroot, abolute symlinks should be relative to the sysroot rather than `/`. Also paths with multiple `..` that would escape the sysroot should not do so.
The path must point to a file that exists.
Example 1:
- /sysroot/path1/a is a symlink pointing to /path2/b
- /sysroot/path2/b is a symlink pointing to /path3/c
- /sysroot/path3/c is a file ResolvePathInSysroot("/sysroot", "/path1/a") will return "/path3/c"
Example 2:
- /sysroot/path1/a is a symlink pointing to ../../../path2/b
- /sysroot/path2/b is a symlink pointing to ../../../path3/c
- /sysroot/path3/c is a file ResolvePathInSysroot("/sysroot", "../../../path1/a") will return "/path3/c"
Example 3:
- /sysroot/path1/a is a symlink pointing to /path2/b
- /sysroot/path2/b does not exist ResolvePathInSysroot("/sysroot", "/path1/a") will fail (IsNotExist)
Example 4:
- /sysroot/foo is a file or a directory
- ResolvePathInSysroot("/sysroot", "/../../../../foo") will return "/foo"
The return path is the path within the sysroot. filepath.Join() has to be used to get the path in the sysroot.
func ResolvePathNoEscape ¶
ResolvePathNoEscape resolves a path within a pseudo sysroot
Like ResolvePathInSysroot(), it resolves path as if it was a sysroot. However, any escaping relative path, or absolute symlink generates an error.
The input path can however be absolute, and will be treated as relative.
This is useful when a path is expected to be relative only and sees any "attempt" to escape the sysroot as a malformed path.
func RunAndWait ¶
func RunAndWait(argv []string, env []string, timeout time.Duration, tomb *tomb.Tomb) ([]byte, error)
RunAndWait runs a command for the given argv with the given environ added to os.Environ, killing it if it reaches timeout, or if the tomb is dying.
func RunSplitOutput ¶
RunSplitOutput runs name command with arg arguments and returns stdout, stderr, and an error.
func RunWithContext ¶
RunWithContext runs the given command, but kills it if the context becomes done before the command finishes.
func SaveMountProfileText ¶
func SaveMountProfileText(p *MountProfile) (string, error)
func SetTime ¶
SetTime sets the time of the system using settimeofday(). This syscall needs to be performed as root or with CAP_SYS_TIME.
func StreamCommand ¶
func StreamCommand(name string, args ...string) (io.ReadCloser, error)
StreamCommand runs a the named program with the given arguments, streaming its standard output over the returned io.ReadCloser.
The program will run until EOF is reached (at which point the ReadCloser is closed), or until the ReadCloser is explicitly closed.
func StreamsEqual ¶
StreamsEqual compares two streams and returns true if both have the same content.
func SwapDirs ¶
SwapDirs swaps oldpath with newpath in an atomic way from the point of view of the running system. If it is needed to make the change persistent, users should call sync when appropriate.
func TotalUsableMemory ¶
TotalUsableMemory returns the total usable memory in the system in bytes.
Usable means (MemTotal - CmaTotal), i.e. the total amount of memory minus the space reserved for the CMA (Contiguous Memory Allocator).
CMA memory is taken up by e.g. the framebuffer on the Raspberry Pi or by DSPs on specific boards.
func UidGid ¶
UidGid returns the uid and gid of the given user, as uint32s
XXX this should go away soon
func Unescape ¶
Unescape returns the given path with space, tab, newline and forward slash unescaped.
func UnlinkMany ¶
UnlinkMany removes multiple files from a single directory.
If dirname is not a directory, this will fail.
This will abort at the first removal error (but ENOENT is ignored).
Filenames must refer to files. They don't necessarily have to be relative paths to the given dirname, but if they aren't why are you using this function?
Errors are *os.PathError, for convenience
func UnlinkManyAt ¶
UnlinkManyAt is like UnlinkMany but takes an open directory *os.File instead of a dirname.
func UserMaybeSudoUser ¶
UserMaybeSudoUser finds the user behind a sudo invocation when root, if applicable and possible. Otherwise the current user is returned.
Don't check SUDO_USER when not root and simply return the current uid to properly support sudo'ing from root to a non-root user
func UsernamesToUids ¶
UsernamesToUids converts a list of usernames to map indexed by their UID, i.e the call UsernamesToUids([]string{"root"}) may return { 0, "root" }
func XSnapdGroup ¶
XSnapdGroup returns the string "x-snapd.group=%d".
func XSnapdIgnoreMissing ¶
func XSnapdIgnoreMissing() string
XSnapdIgnoreMissing returns the string "x-snapd.ignore-missing".
func XSnapdKindEnsureDir ¶
func XSnapdKindEnsureDir() string
XSnapdKindEnsureDir returns the string "x-snapd.kind=ensure-dir".
func XSnapdKindFile ¶
func XSnapdKindFile() string
XSnapdKindFile returns the string "x-snapd.kind=file".
func XSnapdKindSymlink ¶
func XSnapdKindSymlink() string
XSnapdKindSymlink returns the string "x-snapd.kind=symlink".
func XSnapdMode ¶
XSnapdMode returns the string "x-snapd.mode=%#o".
func XSnapdMustExistDir ¶
XSnapdMustExistDir returns the string "x-snapd.must-exist-dir=%s".
func XSnapdNeededBy ¶
XSnapdNeededBy returns the string "x-snapd.needed-by=..." with the given path appended.
func XSnapdOriginLayout ¶
func XSnapdOriginLayout() string
XSnapdOriginLayout returns the string "x-snapd.origin=layout"
func XSnapdOriginOvername ¶
func XSnapdOriginOvername() string
XSnapdOriginOvername returns the string "x-snapd.origin=overname"
func XSnapdSymlink ¶
XSnapdSymlink returns the string "x-snapd.symlink=%s".
func XSnapdSynthetic ¶
func XSnapdSynthetic() string
XSnapdSynthetic returns the string "x-snapd.synthetic".
func XSnapdUser ¶
XSnapdUser returns the string "x-snapd.user=%d".
Types ¶
type AddUserOptions ¶
type AtomicFile ¶
An AtomicFile is similar to an os.File but it has an additional Commit() method that does whatever needs to be done so the modification is "atomic": an AtomicFile will do its best to leave either the previous content or the new content in permanent storage. It also has a Cancel() method to abort and clean up.
func NewAtomicFile ¶
func NewAtomicFile(filename string, perm os.FileMode, flags AtomicWriteFlags, uid sys.UserID, gid sys.GroupID) (aw *AtomicFile, err error)
NewAtomicFile builds an AtomicFile backed by an *os.File that will have the given filename, permissions and uid/gid when Committed.
It _might_ be implemented using O_TMPFILE (see open(2)).
Note that it won't follow symlinks and will replace existing symlinks with the real file, unless the AtomicWriteFollow flag is specified.
It is the caller's responsibility to clean up on error, by calling Cancel().
It is also the caller's responsibility to coordinate access to this, if it is used from different goroutines.
Also note that there are a number of scenarios where Commit fails and then Cancel also fails. In all these scenarios your filesystem was probably in a rather poor state. Good luck.
func (*AtomicFile) Cancel ¶
func (aw *AtomicFile) Cancel() error
Cancel closes the AtomicWriter, and cleans up any artifacts. Cancel can fail if Commit() was (even partially) successful, but calling Cancel after a successful Commit does nothing beyond returning error--so it's always safe to defer a Cancel().
func (*AtomicFile) Close ¶
func (aw *AtomicFile) Close() error
func (*AtomicFile) Commit ¶
func (aw *AtomicFile) Commit() error
Commit the modification; make it permanent.
If Commit succeeds, the writer is closed and further attempts to write will fail. If Commit fails, the writer _might_ be closed; Cancel() needs to be called to clean up.
func (*AtomicFile) CommitAs ¶
func (aw *AtomicFile) CommitAs(filename string) error
CommitAs commits the file under a new target name, following the same rules as Commit. The new target name must be located in the same directory as the original filename provided when creating AtomicFile.
The call is useful when the target name is not known until the end (eg. it may depend on data being written to the file), in which case one can create AtomicFile using a temporary name and later override the actual name by calling CommitAs.
func (*AtomicFile) SetModTime ¶
func (aw *AtomicFile) SetModTime(t time.Time)
SetModTime sets the given modification time on the created file.
type AtomicWriteFlags ¶
type AtomicWriteFlags uint
AtomicWriteFlags are a bitfield of flags for AtomicWriteFile
const ( // AtomicWriteFollow makes AtomicWriteFile follow symlinks AtomicWriteFollow AtomicWriteFlags = 1 << iota )
type CopyFlag ¶
type CopyFlag uint8
CopyFlag is used to tweak the behaviour of CopyFile
const ( // CopyFlagDefault is the default behaviour CopyFlagDefault CopyFlag = 0 // CopyFlagSync does a sync after copying the files CopyFlagSync CopyFlag = 1 << iota // CopyFlagOverwrite overwrites the target if it exists CopyFlagOverwrite // CopyFlagPreserveAll preserves mode,owner,time attributes CopyFlagPreserveAll )
type CopySpecialFileError ¶
type CopySpecialFileError struct {
// contains filtered or unexported fields
}
CopySpecialFileError is returned if a special file copy fails
func (CopySpecialFileError) Error ¶
func (e CopySpecialFileError) Error() string
type DelUserOptions ¶
type Environment ¶
Environment is an unordered map of key=value strings.
Environment can be manipulated with available methods and eventually converted to low-level representation necessary when executing programs. This approach discourages operations that could result in duplicate environment variable definitions from being constructed.
func OSEnvironment ¶
func OSEnvironment() (Environment, error)
OSEnvironment returns the environment of the calling process.
func OSEnvironmentUnescapeUnsafe ¶
func OSEnvironmentUnescapeUnsafe(unsafeEscapePrefix string) (Environment, error)
OSEnvironmentUnescapeUnsafe returns the environment of the calling process. It will also strip unsafeEscapePrefix from any variable starting with it. Use-case/assumption is that ForExecEscapeUnsafe was used previously along the exec chain.
func (*Environment) ExtendWithExpanded ¶
func (env *Environment) ExtendWithExpanded(eenv ExpandableEnv)
ExtendWithExpanded extends the environment with eenv.
Environment is modified in place. Each variable defined by eenv is expanded according to os.Expand, using the environment itself as it gets extended. Undefined variables expand to an empty string.
func (Environment) ForExec ¶
func (env Environment) ForExec() []string
ForExec returns the environment in a form suitable for using with the exec family of functions.
The returned environment is sorted lexicographically by variable name.
func (Environment) ForExecEscapeUnsafe ¶
func (env Environment) ForExecEscapeUnsafe(unsafeEscapePrefix string) []string
ForExecEscapeUnsafe returns the environment in a form suitable for using with the exec family of functions.
Further variables that are usually stripped out by ld.so when starting a setuid process are renamed by prepending unsafeEscapePrefix to them.
Unlikely variables already starting with the prefix will be dropped, they would be mishandled down chain.
The returned environment is sorted lexicographically by final variable name.
type ExpandableEnv ¶
type ExpandableEnv struct {
*strutil.OrderedMap
}
ExpandableEnv represents alterations to an environment as ordered key, value entries.
Values can refer to predefined entries by using shell-like syntax $KEY or ${KEY}.
func NewExpandableEnv ¶
func NewExpandableEnv(pairs ...string) ExpandableEnv
NewExpandableEnv returns a new expandable environment comprised of given pairs.
type FileLock ¶
type FileLock struct {
// contains filtered or unexported fields
}
FileLock describes a file system lock
func NewFileLock ¶
NewFileLock creates and opens the lock file given by "path" with mode 0600.
func NewFileLockWithMode ¶
NewFileLockWithMode creates and opens the lock file given by "path" with the given mode.
func OpenExistingLockForReading ¶
OpenExistingLockForReading opens an existing lock file given by "path". The lock is opened in read-only mode.
func (*FileLock) Lock ¶
Lock acquires an exclusive lock and blocks until the lock is free.
Only one process can acquire an exclusive lock at a given time, preventing shared or exclusive locks from being acquired.
func (*FileLock) ReadLock ¶
Lock acquires an shared lock and blocks until the lock is free.
Multiple processes can acquire a shared lock at the same time, unless an exclusive lock is held.
type FileReference ¶
type FileReference struct {
Path string
}
FileReference describes the desired content by referencing an existing file.
func (FileReference) State ¶
func (fref FileReference) State() (io.ReadCloser, int64, os.FileMode, error)
State returns a reader of the referenced file, along with other meta-data.
type FileReferencePlusMode ¶
type FileReferencePlusMode struct { FileReference Mode os.FileMode }
FileReferencePlusMode describes the desired content by referencing an existing file and providing custom mode.
func (FileReferencePlusMode) State ¶
func (fcref FileReferencePlusMode) State() (io.ReadCloser, int64, os.FileMode, error)
State returns a reader of the referenced file, substituting the mode.
type FileState ¶
type FileState interface {
State() (reader io.ReadCloser, size int64, mode os.FileMode, err error)
}
FileState is an interface for conveying the desired state of a some file.
type MemoryFileState ¶
MemoryFileState describes the desired content by providing an in-memory copy.
func (*MemoryFileState) State ¶
func (blob *MemoryFileState) State() (io.ReadCloser, int64, os.FileMode, error)
State returns a reader of the in-memory contents of a file, along with other meta-data.
type MountEntry ¶
type MountEntry struct { Name string // Device name, bind source, pseudo name Dir string // Directory name, bind target (including file) Type string // File system type Options []string DumpFrequency int CheckPassNumber int }
MountEntry describes an /etc/fstab-like mount entry.
Fields are named after names in struct returned by getmntent(3).
struct mntent { char *mnt_fsname; /* name of mounted filesystem */ char *mnt_dir; /* filesystem path prefix */ char *mnt_type; /* mount type (see Mntent.h) */ char *mnt_opts; /* mount options (see Mntent.h) */ int mnt_freq; /* dump frequency in days */ int mnt_passno; /* pass number on parallel fsck */ };
func ParseMountEntry ¶
func ParseMountEntry(s string) (MountEntry, error)
ParseMountEntry parses a fstab-like entry.
func (*MountEntry) Equal ¶
func (e *MountEntry) Equal(o *MountEntry) bool
Equal checks if one entry is equal to another
func (*MountEntry) OptBool ¶
func (e *MountEntry) OptBool(name string) bool
OptBool returns true if a given mount option is present.
func (*MountEntry) OptStr ¶
func (e *MountEntry) OptStr(name string) (string, bool)
OptStr returns the value part of a key=value mount option. The name of the option must not contain the trailing "=" character.
func (MountEntry) String ¶
func (e MountEntry) String() string
func (*MountEntry) XSnapdDetach ¶
func (e *MountEntry) XSnapdDetach() bool
XSnapdDetach returns true if a mount entry should be detached rather than unmounted.
Whenever we create a recursive bind mount we don't want to just unmount it as it may have replicated additional mount entries. For simplicity and race-free behavior we just detach such mount entries and let the kernel do the rest.
func (*MountEntry) XSnapdEntryID ¶
func (e *MountEntry) XSnapdEntryID() string
XSnapdEntryID returns the identifier of a given mount entry.
Identifiers are kept in the x-snapd.id mount option. The value is a string that identifies a mount entry and is stable across invocations of snapd. In absence of that identifier the entry mount point is returned.
func (*MountEntry) XSnapdGID ¶
func (e *MountEntry) XSnapdGID() (gid uint64, err error)
XSnapdGID returns the user associated with x-snapd-user mount option. If the mode is not specified explicitly then a default "root" use is returned.
func (*MountEntry) XSnapdIgnoreMissing ¶
func (e *MountEntry) XSnapdIgnoreMissing() bool
XSnapdIgnoreMissing returns true if a mount entry should be ignored if the source or target are missing.
By default, snap-update-ns will try to create missing source and target paths when processing a mount entry. In some cases, this behaviour is not desired and it would be better to ignore the mount entry when the source or target are missing.
func (*MountEntry) XSnapdKind ¶
func (e *MountEntry) XSnapdKind() string
XSnapdKind returns the kind of a given mount entry.
There are four kinds of mount entries today: one for directories, one for files, one for symlinks and one for ensuring directories exist. The values are "", "file", "symlink" and "ensure-dir respectively.
Directories use the empty string (in fact they don't need the option at all) as this was the default and is retained for backwards compatibility.
An "ensure-dir" mount does not result in actual mounting. It is an instruction to create missing directories within a target directory path.
func (*MountEntry) XSnapdMode ¶
func (e *MountEntry) XSnapdMode() (os.FileMode, error)
XSnapdMode returns the file mode associated with x-snapd.mode mount option. If the mode is not specified explicitly then a default mode of 0755 is assumed.
func (*MountEntry) XSnapdMustExistDir ¶
func (e *MountEntry) XSnapdMustExistDir() string
XSnapdMustExistDir returns the path that must exist as prequisite to a mount operation.
func (*MountEntry) XSnapdNeededBy ¶
func (e *MountEntry) XSnapdNeededBy() string
XSnapdNeededBy the identifier of an entry which needs this entry to function.
The "needed by" identifiers are kept in the x-snapd.needed-by mount option. The value is a string that identifies another mount entry which, in order to be feasible, has spawned one or more additional support entries. Each such entry contains the needed-by attribute.
func (*MountEntry) XSnapdOrigin ¶
func (e *MountEntry) XSnapdOrigin() string
XSnapdOrigin returns the origin of a given mount entry.
Currently only "layout" entries are identified with a unique origin string.
func (*MountEntry) XSnapdSymlink ¶
func (e *MountEntry) XSnapdSymlink() string
XSnapdSymlink returns the target for a symlink mount entry.
For non-symlinks an empty string is returned.
func (*MountEntry) XSnapdSynthetic ¶
func (e *MountEntry) XSnapdSynthetic() bool
XSnapdSynthetic returns true of a given mount entry is synthetic.
Synthetic mount entries are created by snap-update-ns itself, separately from what snapd instructed. Such entries are needed to make other things possible. They are identified by having the "x-snapd.synthetic" mount option.
func (*MountEntry) XSnapdUID ¶
func (e *MountEntry) XSnapdUID() (uid uint64, err error)
XSnapdUID returns the user associated with x-snapd-user mount option. If the mode is not specified explicitly then a default "root" use is returned.
type MountInfoEntry ¶
type MountInfoEntry struct { MountID int ParentID int DevMajor int DevMinor int Root string MountDir string MountOptions map[string]string OptionalFields []string FsType string MountSource string SuperOptions map[string]string }
MountInfoEntry contains data from /proc/$PID/mountinfo
For details please refer to mountinfo documentation at https://www.kernel.org/doc/Documentation/filesystems/proc.txt
func LoadMountInfo ¶
func LoadMountInfo() ([]*MountInfoEntry, error)
LoadMountInfo loads list of mounted entries from /proc/self/mountinfo. This can be mocked by using osutil.MockMountInfo to hard-code a specific mountinfo file content to be loaded by this function
func ParseMountInfoEntry ¶
func ParseMountInfoEntry(s string) (*MountInfoEntry, error)
ParseMountInfoEntry parses a single line of /proc/$PID/mountinfo file.
func ReadMountInfo ¶
func ReadMountInfo(reader io.Reader) ([]*MountInfoEntry, error)
ReadMountInfo reads and parses a mountinfo file.
func (*MountInfoEntry) String ¶
func (mi *MountInfoEntry) String() string
type MountProfile ¶
type MountProfile struct {
Entries []MountEntry
}
MountProfile represents an array of mount entries.
func LoadMountProfile ¶
func LoadMountProfile(fname string) (*MountProfile, error)
LoadMountProfile loads a mount profile from a given file.
The file may be absent, in such case an empty profile is returned without errors.
func LoadMountProfileText ¶
func LoadMountProfileText(fstab string) (*MountProfile, error)
LoadMountProfileText loads a mount profile from a given string.
func ReadMountProfile ¶
func ReadMountProfile(reader io.Reader) (*MountProfile, error)
ReadMountProfile reads and parses a mount profile.
The supported format is described by fstab(5).
func (*MountProfile) Save ¶
func (p *MountProfile) Save(fname string) error
Save saves a mount profile (fstab-like) to a given file. The profile is saved with an atomic write+rename+sync operation.
type NotEnoughDiskSpaceError ¶
func (*NotEnoughDiskSpaceError) Error ¶
func (e *NotEnoughDiskSpaceError) Error() string
type SymlinkFileState ¶
type SymlinkFileState struct {
Target string
}
SymlinkFileState describes the desired symlink by providing its target.
func (SymlinkFileState) State ¶
func (sym SymlinkFileState) State() (io.ReadCloser, int64, os.FileMode, error)
Source Files ¶
- bootid.go
- buildid.go
- chattr.go
- chattr_64.go
- chdir.go
- cmp.go
- context.go
- cp.go
- cp_linux.go
- digest.go
- disk.go
- doc.go
- env.go
- exec.go
- exitcode.go
- faultinject_fake.go
- flock.go
- fshelpers.go
- group.go
- group_cgo.go
- io.go
- meminfo.go
- mkdirallchown.go
- mount_linux.go
- mountentry.go
- mountentry_linux.go
- mountinfo.go
- mountinfo_linux.go
- mountprofile_linux.go
- nfs.go
- nfs_linux.go
- outputerr.go
- overlay.go
- overlay_linux.go
- rename.go
- rename_linux.go
- resolve_path.go
- settime.go
- settime_64bit.go
- sizer.go
- stat.go
- syncdir.go
- synctree.go
- sys_linux.go
- testhelper.go
- uname.go
- uname_linux.go
- unlink.go
- unlink_linux.go
- user.go
- winsize.go
Directories ¶
Path | Synopsis |
---|---|
Package epoll contains a thin wrapper around the epoll(7) facility.
|
Package epoll contains a thin wrapper around the epoll(7) facility. |
Package inotify implements a wrapper for the Linux inotify system.
|
Package inotify implements a wrapper for the Linux inotify system. |
libmount
Package libmount contains validation logic for user-level mount options typically handled by libmount.
|
Package libmount contains validation logic for user-level mount options typically handled by libmount. |
udev
|
|