diff options
author | Jakob Unterwurzacher | 2025-02-26 21:21:57 +0100 |
---|---|---|
committer | Jakob Unterwurzacher | 2025-02-26 21:27:29 +0100 |
commit | 987ced003ec2971797e8969e0cf0a37a751ebc84 (patch) | |
tree | cff93745a96ed7a1fea5de9b4eb3c5f879b252a2 /internal/syscallcompat/thread_credentials.go | |
parent | 22cd9cf174e8a93787b01f6dd7b09247f9642286 (diff) |
syscallcompat: rename thread_credentials files to include "linux"
As with the other files, include "linux" because the code only
builds on linux
renamed: internal/syscallcompat/thread_credentials.go -> internal/syscallcompat/thread_credentials_linux.go
renamed: internal/syscallcompat/thread_credentials_368_arm.go -> internal/syscallcompat/thread_credentials_linux_368_arm.go
renamed: internal/syscallcompat/thread_credentials_other.go -> internal/syscallcompat/thread_credentials_linux_other.go
Diffstat (limited to 'internal/syscallcompat/thread_credentials.go')
-rw-r--r-- | internal/syscallcompat/thread_credentials.go | 60 |
1 files changed, 0 insertions, 60 deletions
diff --git a/internal/syscallcompat/thread_credentials.go b/internal/syscallcompat/thread_credentials.go deleted file mode 100644 index 8cfb703..0000000 --- a/internal/syscallcompat/thread_credentials.go +++ /dev/null @@ -1,60 +0,0 @@ -//go:build linux - -// golang.org/x/sys/unix commit -// https://github.com/golang/sys/commit/d0df966e6959f00dc1c74363e537872647352d51 -// changed unix.Setreuid/unix.Setregid functions to affect the whole thread, which is -// what gocryptfs does NOT want (https://github.com/rfjakob/gocryptfs/issues/893). -// The functions Setreuid/Setegid are copy-pasted from one commit before -// (9e1f76180b77a12eb07c82eb8e1ea8a7f8d202e7). -// -// Looking at the diff at https://github.com/golang/sys/commit/d0df966e6959f00dc1c74363e537872647352d51 -// we see that only two architectures, 386 and arm, use SYS_SETREUID32/SYS_SETREGID32 -// (see "man 2 setreuid" for why). -// All the others architectures use SYS_SETREUID/SYS_SETREGID. -// -// As of golang.org/x/sys/unix v0.30.0, Setgroups/setgroups is still per-thread, but -// it is likely that this will change, too. Setgroups/setgroups are copy-pasted from -// v0.30.0. The SYS_SETGROUPS32/SYS_SETGROUPS split is the same as for Setreuid. -// -// Note: _Gid_t is always uint32 on linux, so we can directly use uint32 for setgroups. -package syscallcompat - -import ( - "log" -) - -func Setgroups(gids []int) (err error) { - if len(gids) == 0 { - return setgroups(0, nil) - } - - a := make([]uint32, len(gids)) - for i, v := range gids { - a[i] = uint32(v) - } - return setgroups(len(a), &a[0]) -} - -// SetgroupsPanic calls Setgroups and panics on error -func SetgroupsPanic(gids []int) { - err := Setgroups(gids) - if err != nil { - log.Panic(err) - } -} - -// SetregidPanic calls Setregid and panics on error -func SetregidPanic(rgid int, egid int) { - err := Setregid(rgid, egid) - if err != nil { - log.Panic(err) - } -} - -// SetreuidPanic calls Setreuid and panics on error -func SetreuidPanic(ruid int, euid int) { - err := Setreuid(ruid, euid) - if err != nil { - log.Panic(err) - } -} |