mirror of https://github.com/containers/podman.git
				
				
				
			
		
			
				
	
	
		
			73 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
| //go:build !linux || !cgo
 | |
| // +build !linux !cgo
 | |
| 
 | |
| package rootless
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"os"
 | |
| 
 | |
| 	"github.com/containers/storage/pkg/idtools"
 | |
| )
 | |
| 
 | |
| // IsRootless returns whether the user is rootless
 | |
| func IsRootless() bool {
 | |
| 	uid := os.Geteuid()
 | |
| 	// os.Geteuid() on Windows returns -1
 | |
| 	if uid == -1 {
 | |
| 		return false
 | |
| 	}
 | |
| 	return uid != 0
 | |
| }
 | |
| 
 | |
| // BecomeRootInUserNS re-exec podman in a new userNS.  It returns whether podman was re-executed
 | |
| // into a new user namespace and the return code from the re-executed podman process.
 | |
| // If podman was re-executed the caller needs to propagate the error code returned by the child
 | |
| // process.  It is a convenience function for BecomeRootInUserNSWithOpts with a default configuration.
 | |
| func BecomeRootInUserNS(pausePid string) (bool, int, error) {
 | |
| 	return false, -1, errors.New("this function is not supported on this os")
 | |
| }
 | |
| 
 | |
| // GetRootlessUID returns the UID of the user in the parent userNS
 | |
| func GetRootlessUID() int {
 | |
| 	return -1
 | |
| }
 | |
| 
 | |
| // GetRootlessGID returns the GID of the user in the parent userNS
 | |
| func GetRootlessGID() int {
 | |
| 	return -1
 | |
| }
 | |
| 
 | |
| // TryJoinFromFilePaths attempts to join the namespaces of the pid files in paths.
 | |
| // This is useful when there are already running containers and we
 | |
| // don't have a pause process yet.  We can use the paths to the conmon
 | |
| // processes to attempt joining their namespaces.
 | |
| // If needNewNamespace is set, the file is read from a temporary user
 | |
| // namespace, this is useful for containers that are running with a
 | |
| // different uidmap and the unprivileged user has no way to read the
 | |
| // file owned by the root in the container.
 | |
| func TryJoinFromFilePaths(pausePidPath string, needNewNamespace bool, paths []string) (bool, int, error) {
 | |
| 	return false, -1, errors.New("this function is not supported on this os")
 | |
| }
 | |
| 
 | |
| // ConfigurationMatches checks whether the additional uids/gids configured for the user
 | |
| // match the current user namespace.
 | |
| func ConfigurationMatches() (bool, error) {
 | |
| 	return true, nil
 | |
| }
 | |
| 
 | |
| // GetConfiguredMappings returns the additional IDs configured for the current user.
 | |
| func GetConfiguredMappings() ([]idtools.IDMap, []idtools.IDMap, error) {
 | |
| 	return nil, nil, errors.New("this function is not supported on this os")
 | |
| }
 | |
| 
 | |
| // ReadMappingsProc returns the uid_map and gid_map
 | |
| func ReadMappingsProc(path string) ([]idtools.IDMap, error) {
 | |
| 	return nil, nil
 | |
| }
 | |
| 
 | |
| // IsFdInherited checks whether the fd is opened and valid to use
 | |
| func IsFdInherited(fd int) bool {
 | |
| 	return false
 | |
| }
 |