Documentation ¶
Index ¶
- func AddNamespaceRangesUser(name string) (int, int, error)
- func CanAccess(path string, pair Identity) bool
- func GetRootUIDGID(uidMap, gidMap []IDMap) (int, int, error)
- func LookupGID(gid int) (user.Group, error)
- func LookupGroup(name string) (user.Group, error)
- func LookupUID(uid int) (user.User, error)
- func LookupUser(name string) (user.User, error)
- func MkdirAllAndChown(path string, mode os.FileMode, owner Identity) error
- func MkdirAllAndChownNew(path string, mode os.FileMode, owner Identity) error
- func MkdirAndChown(path string, mode os.FileMode, owner Identity) error
- type IDMap
- type Identity
- type IdentityMapping
- func (i *IdentityMapping) Empty() bool
- func (i *IdentityMapping) GIDs() []IDMap
- func (i *IdentityMapping) RootPair() Identity
- func (i *IdentityMapping) ToContainer(pair Identity) (int, int, error)
- func (i *IdentityMapping) ToHost(pair Identity) (Identity, error)
- func (i *IdentityMapping) UIDs() []IDMap
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func AddNamespaceRangesUser ¶
AddNamespaceRangesUser takes a username and uses the standard system utility to create a system user/group pair used to hold the /etc/sub{uid,gid} ranges which will be used for user namespace mapping ranges in containers.
func CanAccess ¶ added in v1.13.0
CanAccess takes a valid (existing) directory and a uid, gid pair and determines if that uid, gid pair has access (execute bit) to the directory
func GetRootUIDGID ¶
GetRootUIDGID retrieves the remapped root uid/gid pair from the set of maps. If the maps are empty, then the root uid/gid will default to "real" 0/0
func LookupGID ¶ added in v1.13.0
LookupGID uses traditional local system files lookup (from libcontainer/user) on a group ID, followed by a call to `getent` for supporting host configured non-files passwd and group dbs
func LookupGroup ¶ added in v1.13.0
LookupGroup uses traditional local system files lookup (from libcontainer/user) on a group name, followed by a call to `getent` for supporting host configured non-files passwd and group dbs
func LookupUID ¶ added in v1.13.0
LookupUID uses traditional local system files lookup (from libcontainer/user) on a uid, followed by a call to `getent` for supporting host configured non-files passwd and group dbs
func LookupUser ¶ added in v1.13.0
LookupUser uses traditional local system files lookup (from libcontainer/user) on a username, followed by a call to `getent` for supporting host configured non-files passwd and group dbs
func MkdirAllAndChown ¶
MkdirAllAndChown creates a directory (include any along the path) and then modifies ownership to the requested uid/gid. If the directory already exists, this function will still change ownership to the requested uid/gid pair.
func MkdirAllAndChownNew ¶
MkdirAllAndChownNew creates a directory (include any along the path) and then modifies ownership ONLY of newly created directories to the requested uid/gid. If the directories along the path exist, no change of ownership will be performed
func MkdirAndChown ¶
MkdirAndChown creates a directory and then modifies ownership to the requested uid/gid. If the directory already exists, this function still changes ownership. Note that unlike os.Mkdir(), this function does not return IsExist error in case path already exists.
Types ¶
type IDMap ¶
type IDMap struct { ContainerID int `json:"container_id"` HostID int `json:"host_id"` Size int `json:"size"` }
IDMap contains a single entry for user namespace range remapping. An array of IDMap entries represents the structure that will be provided to the Linux kernel for creating a user namespace.
type IdentityMapping ¶
type IdentityMapping struct {
// contains filtered or unexported fields
}
IdentityMapping contains a mappings of UIDs and GIDs
func NewIDMappingsFromMaps ¶
func NewIDMappingsFromMaps(uids []IDMap, gids []IDMap) *IdentityMapping
NewIDMappingsFromMaps creates a new mapping from two slices Deprecated: this is a temporary shim while transitioning to IDMapping
func NewIdentityMapping ¶
func NewIdentityMapping(name string) (*IdentityMapping, error)
NewIdentityMapping takes a requested username and using the data from /etc/sub{uid,gid} ranges, creates the proper uid and gid remapping ranges for that user/group pair
func (*IdentityMapping) Empty ¶
func (i *IdentityMapping) Empty() bool
Empty returns true if there are no id mappings
func (*IdentityMapping) GIDs ¶
func (i *IdentityMapping) GIDs() []IDMap
GIDs return the UID mapping TODO: remove this once everything has been refactored to use pairs
func (*IdentityMapping) RootPair ¶
func (i *IdentityMapping) RootPair() Identity
RootPair returns a uid and gid pair for the root user. The error is ignored because a root user always exists, and the defaults are correct when the uid and gid maps are empty.
func (*IdentityMapping) ToContainer ¶
func (i *IdentityMapping) ToContainer(pair Identity) (int, int, error)
ToContainer returns the container UID and GID for the host uid and gid
func (*IdentityMapping) ToHost ¶
func (i *IdentityMapping) ToHost(pair Identity) (Identity, error)
ToHost returns the host UID and GID for the container uid, gid. Remapping is only performed if the ids aren't already the remapped root ids
func (*IdentityMapping) UIDs ¶
func (i *IdentityMapping) UIDs() []IDMap
UIDs return the UID mapping TODO: remove this once everything has been refactored to use pairs