1 | /* Entering namespaces for test case isolation. |
2 | Copyright (C) 2016-2017 Free Software Foundation, Inc. |
3 | This file is part of the GNU C Library. |
4 | |
5 | The GNU C Library is free software; you can redistribute it and/or |
6 | modify it under the terms of the GNU Lesser General Public |
7 | License as published by the Free Software Foundation; either |
8 | version 2.1 of the License, or (at your option) any later version. |
9 | |
10 | The GNU C Library is distributed in the hope that it will be useful, |
11 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
13 | Lesser General Public License for more details. |
14 | |
15 | You should have received a copy of the GNU Lesser General Public |
16 | License along with the GNU C Library; if not, see |
17 | <http://www.gnu.org/licenses/>. */ |
18 | |
19 | #ifndef SUPPORT_NAMESPACE_H |
20 | #define SUPPORT_NAMESPACE_H |
21 | |
22 | #include <stdbool.h> |
23 | #include <sys/cdefs.h> |
24 | |
25 | __BEGIN_DECLS |
26 | |
27 | /* Attempts to become root (or acquire root-like privileges), possibly |
28 | with the help of user namespaces. Return true if (restricted) root |
29 | privileges could be attained in some way. Print diagnostics to |
30 | standard output. |
31 | |
32 | Note that this function generally has to be called before a process |
33 | becomes multi-threaded, otherwise it may fail with insufficient |
34 | privileges on systems which would support this operation for |
35 | single-threaded processes. */ |
36 | bool support_become_root (void); |
37 | |
38 | /* Return true if this process can perform a chroot operation. In |
39 | general, this is only possible if support_become_root has been |
40 | called. Note that the actual test is performed in a subprocess, |
41 | after fork, so that the file system root of the original process is |
42 | not changed. */ |
43 | bool support_can_chroot (void); |
44 | |
45 | /* Enter a network namespace (and a UTS namespace if possible) and |
46 | configure the loopback interface. Return true if a network |
47 | namespace could be created. Print diagnostics to standard output. |
48 | If a network namespace could be created, but networking in it could |
49 | not be configured, terminate the process. It is recommended to |
50 | call support_become_root before this function so that the process |
51 | has sufficient privileges. */ |
52 | bool support_enter_network_namespace (void); |
53 | |
54 | /* Return true if support_enter_network_namespace managed to enter a |
55 | UTS namespace. */ |
56 | bool support_in_uts_namespace (void); |
57 | |
58 | /* Invoke CALLBACK (CLOSURE) in a subprocess created using fork. |
59 | Terminate the calling process if the subprocess exits with a |
60 | non-zero exit status. */ |
61 | void support_isolate_in_subprocess (void (*callback) (void *), void *closure); |
62 | |
63 | /* Describe the setup of a chroot environment, for |
64 | support_chroot_create below. */ |
65 | struct support_chroot_configuration |
66 | { |
67 | /* File contents. The files are not created if the field is |
68 | NULL. */ |
69 | const char *resolv_conf; |
70 | }; |
71 | |
72 | /* The result of the creation of a chroot. */ |
73 | struct support_chroot |
74 | { |
75 | /* Path information. All these paths are relative to the parent |
76 | chroot. */ |
77 | |
78 | /* Path to the chroot directory. */ |
79 | char *path_chroot; |
80 | |
81 | /* Path to the /etc/resolv.conf file. */ |
82 | char *path_resolv_conf; |
83 | }; |
84 | |
85 | /* Create a chroot environment. The returned data should be freed |
86 | using support_chroot_free below. The files will be deleted when |
87 | the process exits. This function does not enter the chroot. */ |
88 | struct support_chroot *support_chroot_create |
89 | (struct support_chroot_configuration); |
90 | |
91 | /* Deallocate the chroot information created by |
92 | support_chroot_create. */ |
93 | void support_chroot_free (struct support_chroot *); |
94 | |
95 | __END_DECLS |
96 | |
97 | #endif |
98 | |