]> git.proxmox.com Git - mirror_lxc.git/commitdiff
rename am_unpriv to am_host_unpriv
authorTycho Andersen <tycho@tycho.ws>
Fri, 26 Jan 2018 22:11:09 +0000 (22:11 +0000)
committerTycho Andersen <tycho@tycho.ws>
Fri, 26 Jan 2018 22:11:50 +0000 (22:11 +0000)
Signed-off-by: Tycho Andersen <tycho@tycho.ws>
src/lxc/lxccontainer.c
src/lxc/network.c
src/lxc/start.c
src/lxc/storage/aufs.c
src/lxc/storage/btrfs.c
src/lxc/storage/overlay.c
src/lxc/storage/storage.c
src/lxc/utils.h

index f6f07bac13cded3ee068aa908facf083759b0cde..cca9f89b986b6f19d14c1757918662cc55d1e95c 100644 (file)
@@ -2678,7 +2678,7 @@ static bool has_snapshots(struct lxc_container *c)
 static bool do_destroy_container(struct lxc_conf *conf) {
        int ret;
 
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ret = userns_exec_full(conf, storage_destroy_wrapper, conf,
                                       "storage_destroy_wrapper");
                if (ret < 0)
@@ -2800,7 +2800,7 @@ static bool container_destroy(struct lxc_container *c,
                if (ret < 0 || (size_t)ret >= len)
                        goto out;
 
-               if (am_unpriv())
+               if (am_host_unpriv())
                        ret = userns_exec_1(conf, lxc_unlink_exec_wrapper, path,
                                            "lxc_unlink_exec_wrapper");
                else
@@ -2819,7 +2819,7 @@ static bool container_destroy(struct lxc_container *c,
        ret = snprintf(path, len, "%s/%s", p1, c->name);
        if (ret < 0 || (size_t)ret >= len)
                goto out;
-       if (am_unpriv())
+       if (am_host_unpriv())
                ret = userns_exec_full(conf, lxc_rmdir_onedev_wrapper, path,
                                       "lxc_rmdir_onedev_wrapper");
        else
@@ -3602,7 +3602,7 @@ static struct lxc_container *do_lxcapi_clone(struct lxc_container *c, const char
                }
        }
 
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                if (chown_mapped_root(newpath, c->lxc_conf) < 0) {
                        ERROR("Error chowning %s to container root", newpath);
                        goto out;
@@ -3680,7 +3680,7 @@ static struct lxc_container *do_lxcapi_clone(struct lxc_container *c, const char
        data.c1 = c2;
        data.flags = flags;
        data.hookargs = hookargs;
-       if (am_unpriv())
+       if (am_host_unpriv())
                ret = userns_exec_full(c->lxc_conf, clone_update_rootfs_wrapper,
                                       &data, "clone_update_rootfs_wrapper");
        else
@@ -4355,7 +4355,7 @@ static bool add_remove_device_node(struct lxc_container *c, const char *src_path
 
 static bool do_lxcapi_add_device_node(struct lxc_container *c, const char *src_path, const char *dest_path)
 {
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ERROR(NOT_SUPPORTED_ERROR, __FUNCTION__);
                return false;
        }
@@ -4366,7 +4366,7 @@ WRAP_API_2(bool, lxcapi_add_device_node, const char *, const char *)
 
 static bool do_lxcapi_remove_device_node(struct lxc_container *c, const char *src_path, const char *dest_path)
 {
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ERROR(NOT_SUPPORTED_ERROR, __FUNCTION__);
                return false;
        }
@@ -4382,7 +4382,7 @@ static bool do_lxcapi_attach_interface(struct lxc_container *c,
        pid_t init_pid;
        int ret = 0;
 
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ERROR(NOT_SUPPORTED_ERROR, __FUNCTION__);
                return false;
        }
@@ -4421,7 +4421,7 @@ static bool do_lxcapi_detach_interface(struct lxc_container *c,
        int ret;
        pid_t pid, pid_outside;
 
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ERROR(NOT_SUPPORTED_ERROR, __FUNCTION__);
                return false;
        }
index e52f0cf0bb15cc66191e3bf5344055a4046d53ba..0a23dc3eb2ef907f2c3b83d226b7f35c3f78d390 100644 (file)
@@ -2449,7 +2449,7 @@ int lxc_network_move_created_netdev_priv(const char *lxcpath, const char *lxcnam
        char ifname[IFNAMSIZ];
        struct lxc_list *iterator;
 
-       if (am_unpriv())
+       if (am_host_unpriv())
                return 0;
 
        lxc_list_for_each(iterator, network) {
@@ -2487,7 +2487,7 @@ int lxc_create_network_unpriv(const char *lxcpath, const char *lxcname,
 {
        struct lxc_list *iterator;
 
-       if (!am_unpriv())
+       if (!am_host_unpriv())
                return 0;
 
        lxc_list_for_each(iterator, network) {
index 9886bfcf1b7c82842f6f760613d5e107566944e8..d79fbe2395f473c1c2f5cd88f4479cfacea05f7e 100644 (file)
@@ -648,11 +648,11 @@ struct lxc_handler *lxc_init_handler(const char *name, struct lxc_conf *conf,
 
        memset(handler, 0, sizeof(*handler));
 
-       /* Note that am_unpriv() checks the effective uid. We probably don't
+       /* Note that am_host_unpriv() checks the effective uid. We probably don't
         * care if we are real root only if we are running as root so this
         * should be fine.
         */
-       handler->am_root = !am_unpriv();
+       handler->am_root = !am_host_unpriv();
        handler->data_sock[0] = handler->data_sock[1] = -1;
        handler->conf = conf;
        handler->lxcpath = lxcpath;
index a39cd60aa6e1a05e7bed56280b6c199b8d5c4b31..0d53c3d8d1a3abcbcbb1abcaff4bb0aea7ab14ec 100644 (file)
@@ -89,7 +89,7 @@ int aufs_clonepaths(struct lxc_storage *orig, struct lxc_storage *new,
        if (mkdir_p(new->dest, 0755) < 0)
                return -1;
 
-       if (am_unpriv() && chown_mapped_root(new->dest, conf) < 0)
+       if (am_host_unpriv() && chown_mapped_root(new->dest, conf) < 0)
                WARN("Failed to update ownership of %s", new->dest);
 
        if (strcmp(orig->type, "dir") == 0) {
@@ -116,7 +116,7 @@ int aufs_clonepaths(struct lxc_storage *orig, struct lxc_storage *new,
                        free(delta);
                        return -1;
                }
-               if (am_unpriv() && chown_mapped_root(delta, conf) < 0)
+               if (am_host_unpriv() && chown_mapped_root(delta, conf) < 0)
                        WARN("Failed to update ownership of %s", delta);
 
                // the src will be 'aufs:lowerdir:upperdir'
@@ -157,13 +157,13 @@ int aufs_clonepaths(struct lxc_storage *orig, struct lxc_storage *new,
                        free(ndelta);
                        return -1;
                }
-               if (am_unpriv() && chown_mapped_root(ndelta, conf) < 0)
+               if (am_host_unpriv() && chown_mapped_root(ndelta, conf) < 0)
                        WARN("Failed to update ownership of %s", ndelta);
 
                struct rsync_data_char rdata;
                rdata.src = odelta;
                rdata.dest = ndelta;
-               if (am_unpriv())
+               if (am_host_unpriv())
                        ret = userns_exec_full(conf, lxc_rsync_delta_wrapper,
                                               &rdata, "lxc_rsync_delta_wrapper");
                else
index ec7ba62ee6a10133683ad7f6455130b5c3ad7ed7..4e21020fdfc370ec7ca1126ad3c68c6b645e0a33 100644 (file)
@@ -434,7 +434,7 @@ bool btrfs_create_clone(struct lxc_conf *conf, struct lxc_storage *orig,
        /* rsync the contents from source to target */
        data.orig = orig;
        data.new = new;
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ret = userns_exec_full(conf, lxc_storage_rsync_exec_wrapper,
                                       &data, "lxc_storage_rsync_exec_wrapper");
                if (ret < 0) {
@@ -466,7 +466,7 @@ bool btrfs_create_snapshot(struct lxc_conf *conf, struct lxc_storage *orig,
        if (ret < 0 && errno != ENOENT)
                return false;
 
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                struct rsync_data_char args;
 
                args.src = orig->src;
index d2f3ed00c1aa33bf90f114280cd30c1cd5e8640e..e3aae8a29e797d5ef1c135ab86d19fdf811be3a8 100644 (file)
@@ -73,7 +73,7 @@ int ovl_clonepaths(struct lxc_storage *orig, struct lxc_storage *new, const char
                return -1;
        }
 
-       if (am_unpriv()) {
+       if (am_host_unpriv()) {
                ret = chown_mapped_root(new->dest, conf);
                if (ret < 0)
                        WARN("Failed to update ownership of %s", new->dest);
@@ -120,7 +120,7 @@ int ovl_clonepaths(struct lxc_storage *orig, struct lxc_storage *new, const char
                        return -1;
                }
 
-               if (am_unpriv()) {
+               if (am_host_unpriv()) {
                        ret = chown_mapped_root(delta, conf);
                        if (ret < 0)
                                WARN("Failed to update ownership of %s", delta);
@@ -153,7 +153,7 @@ int ovl_clonepaths(struct lxc_storage *orig, struct lxc_storage *new, const char
                        return -1;
                }
 
-               if (am_unpriv()) {
+               if (am_host_unpriv()) {
                        ret = chown_mapped_root(work, conf);
                        if (ret < 0)
                                WARN("Failed to update ownership of %s", work);
@@ -224,7 +224,7 @@ int ovl_clonepaths(struct lxc_storage *orig, struct lxc_storage *new, const char
                        return -1;
                }
 
-               if (am_unpriv()) {
+               if (am_host_unpriv()) {
                        ret = chown_mapped_root(ndelta, conf);
                        if (ret < 0)
                                WARN("Failed to update ownership of %s",
@@ -265,7 +265,7 @@ int ovl_clonepaths(struct lxc_storage *orig, struct lxc_storage *new, const char
                        return -1;
                }
 
-               if (am_unpriv()) {
+               if (am_host_unpriv()) {
                        ret = chown_mapped_root(work, conf);
                        if (ret < 0)
                                WARN("Failed to update ownership of %s", work);
@@ -960,7 +960,7 @@ static int ovl_do_rsync(const char *src, const char *dest,
 
        rdata.src = (char *)src;
        rdata.dest = (char *)dest;
-       if (am_unpriv())
+       if (am_host_unpriv())
                ret = userns_exec_full(conf, lxc_rsync_exec_wrapper, &rdata,
                                       "lxc_rsync_exec_wrapper");
        else
index e080ad87ad4a52e417bafa9ce0e2948a001ceb2e..6cb98f6b7ea4544c23dbdf0cd119d46e92130f3b 100644 (file)
@@ -406,7 +406,7 @@ struct lxc_storage *storage_copy(struct lxc_container *c, const char *cname,
        if (!bdevtype && !keepbdevtype && snap && !strcmp(orig->type, "dir"))
                bdevtype = "overlay";
 
-       if (am_unpriv() && !unpriv_snap_allowed(orig, bdevtype, snap, maybe_snap)) {
+       if (am_host_unpriv() && !unpriv_snap_allowed(orig, bdevtype, snap, maybe_snap)) {
                ERROR("Unsupported snapshot type \"%s\" for unprivileged users",
                      bdevtype ? bdevtype : "(null)");
                goto on_error_put_orig;
@@ -505,7 +505,7 @@ struct lxc_storage *storage_copy(struct lxc_container *c, const char *cname,
                else
                        src_no_prefix = lxc_storage_get_path(new->src, new->type);
 
-               if (am_unpriv()) {
+               if (am_host_unpriv()) {
                        ret = chown_mapped_root(src_no_prefix, c->lxc_conf);
                        if (ret < 0)
                                WARN("Failed to chown \"%s\"", new->src);
@@ -518,7 +518,7 @@ struct lxc_storage *storage_copy(struct lxc_container *c, const char *cname,
        /* rsync the contents from source to target */
        data.orig = orig;
        data.new = new;
-       if (am_unpriv())
+       if (am_host_unpriv())
                ret = userns_exec_full(c->lxc_conf,
                                       lxc_storage_rsync_exec_wrapper, &data,
                                       "lxc_storage_rsync_exec_wrapper");
index f13213c447ac71b60d97a669e90effd6f26b194d..92e13c507a3f33c1fec9a68313442c694e4e807a 100644 (file)
@@ -427,7 +427,7 @@ extern int lxc_strmunmap(void *addr, size_t length);
 /* initialize rand with urandom */
 extern int randseed(bool);
 
-inline static bool am_unpriv(void)
+inline static bool am_host_unpriv(void)
 {
        FILE *f;
        uid_t user, host, count;