summaryrefslogtreecommitdiff
path: root/vendor/github.com/containerd/cgroups/v3/cgroup2/paths.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/containerd/cgroups/v3/cgroup2/paths.go')
-rw-r--r--vendor/github.com/containerd/cgroups/v3/cgroup2/paths.go60
1 files changed, 0 insertions, 60 deletions
diff --git a/vendor/github.com/containerd/cgroups/v3/cgroup2/paths.go b/vendor/github.com/containerd/cgroups/v3/cgroup2/paths.go
deleted file mode 100644
index 074bb83bc..000000000
--- a/vendor/github.com/containerd/cgroups/v3/cgroup2/paths.go
+++ /dev/null
@@ -1,60 +0,0 @@
-/*
- Copyright The containerd Authors.
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
-*/
-
-package cgroup2
-
-import (
- "fmt"
- "path/filepath"
- "strings"
-)
-
-// NestedGroupPath will nest the cgroups based on the calling processes cgroup
-// placing its child processes inside its own path
-func NestedGroupPath(suffix string) (string, error) {
- path, err := parseCgroupFile("/proc/self/cgroup")
- if err != nil {
- return "", err
- }
- return filepath.Join(path, suffix), nil
-}
-
-// PidGroupPath will return the correct cgroup paths for an existing process running inside a cgroup
-// This is commonly used for the Load function to restore an existing container
-func PidGroupPath(pid int) (string, error) {
- p := fmt.Sprintf("/proc/%d/cgroup", pid)
- return parseCgroupFile(p)
-}
-
-// VerifyGroupPath verifies the format of group path string g.
-// The format is same as the third field in /proc/PID/cgroup.
-// e.g. "/user.slice/user-1001.slice/session-1.scope"
-//
-// g must be a "clean" absolute path starts with "/", and must not contain "/sys/fs/cgroup" prefix.
-//
-// VerifyGroupPath doesn't verify whether g actually exists on the system.
-func VerifyGroupPath(g string) error {
- if !strings.HasPrefix(g, "/") {
- return ErrInvalidGroupPath
- }
- if filepath.Clean(g) != g {
- return ErrInvalidGroupPath
- }
- if strings.HasPrefix(g, "/sys/fs/cgroup") {
- return ErrInvalidGroupPath
- }
- return nil
-}