mirror of
https://github.com/rancher/plugins.git
synced 2025-09-02 05:58:44 +00:00
Windows: Updates Windows Vendoring
Updates windows dependent libraries for vendoing.
This commit is contained in:
71
vendor/github.com/Microsoft/hcsshim/internal/runhcs/container.go
generated
vendored
Normal file
71
vendor/github.com/Microsoft/hcsshim/internal/runhcs/container.go
generated
vendored
Normal file
@@ -0,0 +1,71 @@
|
||||
package runhcs
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
"io/ioutil"
|
||||
"os"
|
||||
"syscall"
|
||||
"time"
|
||||
|
||||
"github.com/Microsoft/hcsshim/internal/guid"
|
||||
)
|
||||
|
||||
// ContainerState represents the platform agnostic pieces relating to a
|
||||
// running container's status and state
|
||||
type ContainerState struct {
|
||||
// Version is the OCI version for the container
|
||||
Version string `json:"ociVersion"`
|
||||
// ID is the container ID
|
||||
ID string `json:"id"`
|
||||
// InitProcessPid is the init process id in the parent namespace
|
||||
InitProcessPid int `json:"pid"`
|
||||
// Status is the current status of the container, running, paused, ...
|
||||
Status string `json:"status"`
|
||||
// Bundle is the path on the filesystem to the bundle
|
||||
Bundle string `json:"bundle"`
|
||||
// Rootfs is a path to a directory containing the container's root filesystem.
|
||||
Rootfs string `json:"rootfs"`
|
||||
// Created is the unix timestamp for the creation time of the container in UTC
|
||||
Created time.Time `json:"created"`
|
||||
// Annotations is the user defined annotations added to the config.
|
||||
Annotations map[string]string `json:"annotations,omitempty"`
|
||||
// The owner of the state directory (the owner of the container).
|
||||
Owner string `json:"owner"`
|
||||
}
|
||||
|
||||
// GetErrorFromPipe returns reads from `pipe` and verifies if the operation
|
||||
// returned success or error. If error converts that to an error and returns. If
|
||||
// `p` is not nill will issue a `Kill` and `Wait` for exit.
|
||||
func GetErrorFromPipe(pipe io.Reader, p *os.Process) error {
|
||||
serr, err := ioutil.ReadAll(pipe)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if bytes.Equal(serr, ShimSuccess) {
|
||||
return nil
|
||||
}
|
||||
|
||||
extra := ""
|
||||
if p != nil {
|
||||
p.Kill()
|
||||
state, err := p.Wait()
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
extra = fmt.Sprintf(", exit code %d", state.Sys().(syscall.WaitStatus).ExitCode)
|
||||
}
|
||||
if len(serr) == 0 {
|
||||
return fmt.Errorf("unknown shim failure%s", extra)
|
||||
}
|
||||
|
||||
return errors.New(string(serr))
|
||||
}
|
||||
|
||||
// VMPipePath returns the named pipe path for the vm shim.
|
||||
func VMPipePath(hostUniqueID guid.GUID) string {
|
||||
return SafePipePath("runhcs-vm-" + hostUniqueID.String())
|
||||
}
|
16
vendor/github.com/Microsoft/hcsshim/internal/runhcs/util.go
generated
vendored
Normal file
16
vendor/github.com/Microsoft/hcsshim/internal/runhcs/util.go
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
package runhcs
|
||||
|
||||
import "net/url"
|
||||
|
||||
const (
|
||||
SafePipePrefix = `\\.\pipe\ProtectedPrefix\Administrators\`
|
||||
)
|
||||
|
||||
// ShimSuccess is the byte stream returned on a successful operation.
|
||||
var ShimSuccess = []byte{0, 'O', 'K', 0}
|
||||
|
||||
func SafePipePath(name string) string {
|
||||
// Use a pipe in the Administrators protected prefixed to prevent malicious
|
||||
// squatting.
|
||||
return SafePipePrefix + url.PathEscape(name)
|
||||
}
|
17
vendor/github.com/Microsoft/hcsshim/internal/runhcs/util_test.go
generated
vendored
Normal file
17
vendor/github.com/Microsoft/hcsshim/internal/runhcs/util_test.go
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
package runhcs
|
||||
|
||||
import (
|
||||
"testing"
|
||||
)
|
||||
|
||||
func Test_SafePipePath(t *testing.T) {
|
||||
tests := []string{"test", "test with spaces", "test/with\\\\.\\slashes", "test.with..dots..."}
|
||||
expected := []string{"test", "test%20with%20spaces", "test%2Fwith%5C%5C.%5Cslashes", "test.with..dots..."}
|
||||
for i, test := range tests {
|
||||
actual := SafePipePath(test)
|
||||
e := SafePipePrefix + expected[i]
|
||||
if actual != e {
|
||||
t.Fatalf("SafePipePath: actual '%s' != '%s'", actual, expected[i])
|
||||
}
|
||||
}
|
||||
}
|
43
vendor/github.com/Microsoft/hcsshim/internal/runhcs/vm.go
generated
vendored
Normal file
43
vendor/github.com/Microsoft/hcsshim/internal/runhcs/vm.go
generated
vendored
Normal file
@@ -0,0 +1,43 @@
|
||||
package runhcs
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
|
||||
"github.com/Microsoft/go-winio"
|
||||
)
|
||||
|
||||
// VMRequestOp is an operation that can be issued to a VM shim.
|
||||
type VMRequestOp string
|
||||
|
||||
const (
|
||||
// OpCreateContainer is a create container request.
|
||||
OpCreateContainer VMRequestOp = "create"
|
||||
// OpSyncNamespace is a `cni.NamespaceTypeGuest` sync request with the UVM.
|
||||
OpSyncNamespace VMRequestOp = "sync"
|
||||
// OpUnmountContainer is a container unmount request.
|
||||
OpUnmountContainer VMRequestOp = "unmount"
|
||||
// OpUnmountContainerDiskOnly is a container unmount disk request.
|
||||
OpUnmountContainerDiskOnly VMRequestOp = "unmount-disk"
|
||||
)
|
||||
|
||||
// VMRequest is an operation request that is issued to a VM shim.
|
||||
type VMRequest struct {
|
||||
ID string
|
||||
Op VMRequestOp
|
||||
}
|
||||
|
||||
// IssueVMRequest issues a request to a shim at the given pipe.
|
||||
func IssueVMRequest(pipepath string, req *VMRequest) error {
|
||||
pipe, err := winio.DialPipe(pipepath, nil)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
defer pipe.Close()
|
||||
if err := json.NewEncoder(pipe).Encode(req); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := GetErrorFromPipe(pipe, nil); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
Reference in New Issue
Block a user