8 Commits

12 changed files with 797 additions and 453 deletions

View File

@@ -5,7 +5,6 @@ This library aims at providing idiomatic `systemctl` bindings for go developers,
This tool tries to take guesswork out of arbitrarily shelling out to `systemctl` by providing a structured, thoroughly-tested wrapper for the `systemctl` functions most-likely to be used in a system program. This tool tries to take guesswork out of arbitrarily shelling out to `systemctl` by providing a structured, thoroughly-tested wrapper for the `systemctl` functions most-likely to be used in a system program.
If your system isn't running (or targeting another system running) `systemctl`, this library will be of little use to you. If your system isn't running (or targeting another system running) `systemctl`, this library will be of little use to you.
In fact, if `systemctl` isn't found in the `PATH`, this library will panic.
## What is systemctl ## What is systemctl

View File

@@ -1,3 +1,5 @@
//go:build linux
package systemctl package systemctl
import ( import (
@@ -21,7 +23,6 @@ var (
// Masked units can only be unmasked, but something else was attempted // Masked units can only be unmasked, but something else was attempted
// Unmask the unit before enabling or disabling it // Unmask the unit before enabling or disabling it
ErrMasked = errors.New("unit masked") ErrMasked = errors.New("unit masked")
// If this error occurs, the library isn't entirely useful, as it causes a panic
// Make sure systemctl is in the PATH before calling again // Make sure systemctl is in the PATH before calling again
ErrNotInstalled = errors.New("systemctl not in $PATH") ErrNotInstalled = errors.New("systemctl not in $PATH")
// A unit was expected to be running but was found inactive // A unit was expected to be running but was found inactive

View File

@@ -2,6 +2,7 @@ package systemctl
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"reflect" "reflect"
"runtime" "runtime"
@@ -63,7 +64,7 @@ func TestErrorFuncs(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := f(ctx, tc.unit, tc.opts) err := f(ctx, tc.unit, tc.opts)
if err != tc.err { if !errors.Is(err, tc.err) {
t.Errorf("error is %v, but should have been %v", err, tc.err) t.Errorf("error is %v, but should have been %v", err, tc.err)
} }
}) })

2
go.mod
View File

@@ -1,3 +1,3 @@
module github.com/taigrr/systemctl module github.com/taigrr/systemctl
go 1.17 go 1.12

View File

@@ -1,8 +1,13 @@
//go:build linux
package systemctl package systemctl
import ( import (
"context" "context"
"errors"
"os"
"strconv" "strconv"
"strings"
"time" "time"
"github.com/taigrr/systemctl/properties" "github.com/taigrr/systemctl/properties"
@@ -52,3 +57,115 @@ func GetPID(ctx context.Context, unit string, opts Options) (int, error) {
} }
return strconv.Atoi(value) return strconv.Atoi(value)
} }
func GetSocketsForServiceUnit(ctx context.Context, unit string, opts Options) ([]string, error) {
args := []string{"list-sockets", "--all", "--no-legend", "--no-pager"}
if opts.UserMode {
args = append(args, "--user")
}
stdout, _, _, err := execute(ctx, args)
if err != nil {
return []string{}, err
}
lines := strings.Split(stdout, "\n")
sockets := []string{}
for _, line := range lines {
fields := strings.Fields(line)
if len(fields) < 3 {
continue
}
socketUnit := fields[1]
serviceUnit := fields[2]
if serviceUnit == unit+".service" {
sockets = append(sockets, socketUnit)
}
}
return sockets, nil
}
func GetUnits(ctx context.Context, opts Options) ([]Unit, error) {
args := []string{"list-units", "--all", "--no-legend", "--full", "--no-pager"}
if opts.UserMode {
args = append(args, "--user")
}
stdout, stderr, _, err := execute(ctx, args)
if err != nil {
return []Unit{}, errors.Join(err, filterErr(stderr))
}
lines := strings.Split(stdout, "\n")
units := []Unit{}
for _, line := range lines {
entry := strings.Fields(line)
if len(entry) < 4 {
continue
}
unit := Unit{
Name: entry[0],
Load: entry[1],
Active: entry[2],
Sub: entry[3],
Description: strings.Join(entry[4:], " "),
}
units = append(units, unit)
}
return units, nil
}
func GetMaskedUnits(ctx context.Context, opts Options) ([]string, error) {
args := []string{"list-unit-files", "--state=masked"}
if opts.UserMode {
args = append(args, "--user")
}
stdout, stderr, _, err := execute(ctx, args)
if err != nil {
return []string{}, errors.Join(err, filterErr(stderr))
}
lines := strings.Split(stdout, "\n")
units := []string{}
for _, line := range lines {
if !strings.Contains(line, "masked") {
continue
}
entry := strings.Split(line, " ")
if len(entry) < 3 {
continue
}
if entry[1] == "masked" {
unit := entry[0]
uName := strings.Split(unit, ".")
unit = uName[0]
units = append(units, unit)
}
}
return units, nil
}
// check if systemd is the current init system
func IsSystemd() (bool, error) {
b, err := os.ReadFile("/proc/1/comm")
if err != nil {
return false, err
}
return strings.TrimSpace(string(b)) == "systemd", nil
}
// check if a service is masked
func IsMasked(ctx context.Context, unit string, opts Options) (bool, error) {
units, err := GetMaskedUnits(ctx, opts)
if err != nil {
return false, err
}
for _, u := range units {
if u == unit {
return true, nil
}
}
return false, nil
}
// check if a service is running
// https://unix.stackexchange.com/a/396633
func IsRunning(ctx context.Context, unit string, opts Options) (bool, error) {
status, err := Show(ctx, unit, properties.SubState, opts)
return status == "running", err
}

View File

@@ -2,6 +2,7 @@ package systemctl
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"syscall" "syscall"
"testing" "testing"
@@ -58,13 +59,13 @@ func TestGetStartTime(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
_, err := GetStartTime(ctx, tc.unit, tc.opts) _, err := GetStartTime(ctx, tc.unit, tc.opts)
if err != tc.err { if !errors.Is(err, tc.err) {
t.Errorf("error is %v, but should have been %v", err, tc.err) t.Errorf("error is %v, but should have been %v", err, tc.err)
} }
}) })
} }
// Prove start time changes after a restart // Prove start time changes after a restart
t.Run(fmt.Sprintf("prove start time changes"), func(t *testing.T) { t.Run("prove start time changes", func(t *testing.T) {
if userString != "root" && userString != "system" { if userString != "root" && userString != "system" {
t.Skip("skipping superuser test while running as user") t.Skip("skipping superuser test while running as user")
} }
@@ -93,12 +94,13 @@ func TestGetStartTime(t *testing.T) {
} }
func TestGetNumRestarts(t *testing.T) { func TestGetNumRestarts(t *testing.T) {
testCases := []struct { type testCase struct {
unit string unit string
err error err error
opts Options opts Options
runAsUser bool runAsUser bool
}{ }
testCases := []testCase{
// Run these tests only as a user // Run these tests only as a user
// try nonexistant unit in user mode as user // try nonexistant unit in user mode as user
@@ -118,23 +120,25 @@ func TestGetNumRestarts(t *testing.T) {
{"nginx", nil, Options{UserMode: false}, false}, {"nginx", nil, Options{UserMode: false}, false},
} }
for _, tc := range testCases { for _, tc := range testCases {
t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) { func(tc testCase) {
t.Parallel() t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) {
if (userString == "root" || userString == "system") && tc.runAsUser { t.Parallel()
t.Skip("skipping user test while running as superuser") if (userString == "root" || userString == "system") && tc.runAsUser {
} else if (userString != "root" && userString != "system") && !tc.runAsUser { t.Skip("skipping user test while running as superuser")
t.Skip("skipping superuser test while running as user") } else if (userString != "root" && userString != "system") && !tc.runAsUser {
} t.Skip("skipping superuser test while running as user")
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) }
defer cancel() ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
_, err := GetNumRestarts(ctx, tc.unit, tc.opts) defer cancel()
if err != tc.err { _, err := GetNumRestarts(ctx, tc.unit, tc.opts)
t.Errorf("error is %v, but should have been %v", err, tc.err) if !errors.Is(err, tc.err) {
} t.Errorf("error is %v, but should have been %v", err, tc.err)
}) }
})
}(tc)
} }
// Prove restart count increases by one after a restart // Prove restart count increases by one after a restart
t.Run(fmt.Sprintf("prove restart count increases by one after a restart"), func(t *testing.T) { t.Run("prove restart count increases by one after a restart", func(t *testing.T) {
if testing.Short() { if testing.Short() {
t.Skip("skipping in short mode") t.Skip("skipping in short mode")
} }
@@ -154,9 +158,9 @@ func TestGetNumRestarts(t *testing.T) {
} }
syscall.Kill(pid, syscall.SIGKILL) syscall.Kill(pid, syscall.SIGKILL)
for { for {
running, err := IsActive(ctx, "nginx", Options{UserMode: false}) running, errIsActive := IsActive(ctx, "nginx", Options{UserMode: false})
if err != nil { if errIsActive != nil {
t.Errorf("error asserting nginx is up: %v", err) t.Errorf("error asserting nginx is up: %v", errIsActive)
break break
} else if running { } else if running {
break break
@@ -173,12 +177,13 @@ func TestGetNumRestarts(t *testing.T) {
} }
func TestGetMemoryUsage(t *testing.T) { func TestGetMemoryUsage(t *testing.T) {
testCases := []struct { type testCase struct {
unit string unit string
err error err error
opts Options opts Options
runAsUser bool runAsUser bool
}{ }
testCases := []testCase{
// Run these tests only as a user // Run these tests only as a user
// try nonexistant unit in user mode as user // try nonexistant unit in user mode as user
@@ -198,23 +203,25 @@ func TestGetMemoryUsage(t *testing.T) {
{"nginx", nil, Options{UserMode: false}, false}, {"nginx", nil, Options{UserMode: false}, false},
} }
for _, tc := range testCases { for _, tc := range testCases {
t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) { func(tc testCase) {
t.Parallel() t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) {
if (userString == "root" || userString == "system") && tc.runAsUser { t.Parallel()
t.Skip("skipping user test while running as superuser") if (userString == "root" || userString == "system") && tc.runAsUser {
} else if (userString != "root" && userString != "system") && !tc.runAsUser { t.Skip("skipping user test while running as superuser")
t.Skip("skipping superuser test while running as user") } else if (userString != "root" && userString != "system") && !tc.runAsUser {
} t.Skip("skipping superuser test while running as user")
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) }
defer cancel() ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
_, err := GetMemoryUsage(ctx, tc.unit, tc.opts) defer cancel()
if err != tc.err { _, err := GetMemoryUsage(ctx, tc.unit, tc.opts)
t.Errorf("error is %v, but should have been %v", err, tc.err) if !errors.Is(err, tc.err) {
} t.Errorf("error is %v, but should have been %v", err, tc.err)
}) }
})
}(tc)
} }
// Prove memory usage values change across services // Prove memory usage values change across services
t.Run(fmt.Sprintf("prove memory usage values change across services"), func(t *testing.T) { t.Run("prove memory usage values change across services", func(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
bytes, err := GetMemoryUsage(ctx, "nginx", Options{UserMode: false}) bytes, err := GetMemoryUsage(ctx, "nginx", Options{UserMode: false})
@@ -231,13 +238,63 @@ func TestGetMemoryUsage(t *testing.T) {
}) })
} }
func TestGetUnits(t *testing.T) {
type testCase struct {
err error
runAsUser bool
opts Options
}
testCases := []testCase{{
// Run these tests only as a user
runAsUser: true,
opts: Options{UserMode: true},
err: nil,
}}
for _, tc := range testCases {
t.Run(fmt.Sprintf("as %s", userString), func(t *testing.T) {
if (userString == "root" || userString == "system") && tc.runAsUser {
t.Skip("skipping user test while running as superuser")
} else if (userString != "root" && userString != "system") && !tc.runAsUser {
t.Skip("skipping superuser test while running as user")
}
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel()
units, err := GetUnits(ctx, tc.opts)
if !errors.Is(err, tc.err) {
t.Errorf("error is %v, but should have been %v", err, tc.err)
}
if len(units) == 0 {
t.Errorf("Expected at least one unit, but got none")
}
unit := units[0]
if unit.Name == "" {
t.Errorf("Expected unit name to be non-empty, but got empty")
}
if unit.Load == "" {
t.Errorf("Expected unit load state to be non-empty, but got empty")
}
if unit.Active == "" {
t.Errorf("Expected unit active state to be non-empty, but got empty")
}
if unit.Sub == "" {
t.Errorf("Expected unit sub state to be non-empty, but got empty")
}
if unit.Description == "" {
t.Errorf("Expected unit description to be non-empty, but got empty")
}
})
}
}
func TestGetPID(t *testing.T) { func TestGetPID(t *testing.T) {
testCases := []struct { type testCase struct {
unit string unit string
err error err error
opts Options opts Options
runAsUser bool runAsUser bool
}{ }
testCases := []testCase{
// Run these tests only as a user // Run these tests only as a user
// try nonexistant unit in user mode as user // try nonexistant unit in user mode as user
@@ -257,22 +314,24 @@ func TestGetPID(t *testing.T) {
{"nginx", nil, Options{UserMode: false}, false}, {"nginx", nil, Options{UserMode: false}, false},
} }
for _, tc := range testCases { for _, tc := range testCases {
t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) { func(tc testCase) {
t.Parallel() t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) {
if (userString == "root" || userString == "system") && tc.runAsUser { t.Parallel()
t.Skip("skipping user test while running as superuser") if (userString == "root" || userString == "system") && tc.runAsUser {
} else if (userString != "root" && userString != "system") && !tc.runAsUser { t.Skip("skipping user test while running as superuser")
t.Skip("skipping superuser test while running as user") } else if (userString != "root" && userString != "system") && !tc.runAsUser {
} t.Skip("skipping superuser test while running as user")
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) }
defer cancel() ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
_, err := GetPID(ctx, tc.unit, tc.opts) defer cancel()
if err != tc.err { _, err := GetPID(ctx, tc.unit, tc.opts)
t.Errorf("error is %v, but should have been %v", err, tc.err) if !errors.Is(err, tc.err) {
} t.Errorf("error is %v, but should have been %v", err, tc.err)
}) }
})
}(tc)
} }
t.Run(fmt.Sprintf("prove pid changes"), func(t *testing.T) { t.Run("prove pid changes", func(t *testing.T) {
if testing.Short() { if testing.Short() {
t.Skip("skipping in short mode") t.Skip("skipping in short mode")
} }

View File

@@ -3,246 +3,330 @@ package properties
type Property string type Property string
const ( const (
ActiveEnterTimestamp Property = "ActiveEnterTimestamp" Accept Property = "Accept"
ActiveEnterTimestampMonotonic Property = "ActiveEnterTimestampMonotonic" ActiveEnterTimestamp Property = "ActiveEnterTimestamp"
ActiveExitTimestampMonotonic Property = "ActiveExitTimestampMonotonic" ActiveEnterTimestampMonotonic Property = "ActiveEnterTimestampMonotonic"
ActiveState Property = "ActiveState" ActiveExitTimestampMonotonic Property = "ActiveExitTimestampMonotonic"
After Property = "After" ActiveState Property = "ActiveState"
AllowIsolate Property = "AllowIsolate" After Property = "After"
AssertResult Property = "AssertResult" AllowIsolate Property = "AllowIsolate"
AssertTimestamp Property = "AssertTimestamp" AssertResult Property = "AssertResult"
AssertTimestampMonotonic Property = "AssertTimestampMonotonic" AssertTimestamp Property = "AssertTimestamp"
Before Property = "Before" AssertTimestampMonotonic Property = "AssertTimestampMonotonic"
BlockIOAccounting Property = "BlockIOAccounting" Backlog Property = "Backlog"
BlockIOWeight Property = "BlockIOWeight" Before Property = "Before"
CPUAccounting Property = "CPUAccounting" BindIPv6Only Property = "BindIPv6Only"
CPUAffinityFromNUMA Property = "CPUAffinityFromNUMA" BindLogSockets Property = "BindLogSockets"
CPUQuotaPerSecUSec Property = "CPUQuotaPerSecUSec" BlockIOAccounting Property = "BlockIOAccounting"
CPUQuotaPeriodUSec Property = "CPUQuotaPeriodUSec" BlockIOWeight Property = "BlockIOWeight"
CPUSchedulingPolicy Property = "CPUSchedulingPolicy" Broadcast Property = "Broadcast"
CPUSchedulingPriority Property = "CPUSchedulingPriority" CPUAccounting Property = "CPUAccounting"
CPUSchedulingResetOnFork Property = "CPUSchedulingResetOnFork" CPUAffinityFromNUMA Property = "CPUAffinityFromNUMA"
CPUShares Property = "CPUShares" CPUQuotaPerSecUSec Property = "CPUQuotaPerSecUSec"
CPUUsageNSec Property = "CPUUsageNSec" CPUQuotaPeriodUSec Property = "CPUQuotaPeriodUSec"
CPUWeight Property = "CPUWeight" CPUSchedulingPolicy Property = "CPUSchedulingPolicy"
CacheDirectoryMode Property = "CacheDirectoryMode" CPUSchedulingPriority Property = "CPUSchedulingPriority"
CanFreeze Property = "CanFreeze" CPUSchedulingResetOnFork Property = "CPUSchedulingResetOnFork"
CanIsolate Property = "CanIsolate" CPUShares Property = "CPUShares"
CanReload Property = "CanReload" CPUUsageNSec Property = "CPUUsageNSec"
CanStart Property = "CanStart" CPUWeight Property = "CPUWeight"
CanStop Property = "CanStop" CacheDirectoryMode Property = "CacheDirectoryMode"
CapabilityBoundingSet Property = "CapabilityBoundingSet" CanFreeze Property = "CanFreeze"
CleanResult Property = "CleanResult" CanIsolate Property = "CanIsolate"
CollectMode Property = "CollectMode" CanLiveMount Property = "CanLiveMount"
ConditionResult Property = "ConditionResult" CanReload Property = "CanReload"
ConditionTimestamp Property = "ConditionTimestamp" CanStart Property = "CanStart"
ConditionTimestampMonotonic Property = "ConditionTimestampMonotonic" CanStop Property = "CanStop"
ConfigurationDirectoryMode Property = "ConfigurationDirectoryMode" CapabilityBoundingSet Property = "CapabilityBoundingSet"
Conflicts Property = "Conflicts" CleanResult Property = "CleanResult"
ControlGroup Property = "ControlGroup" CollectMode Property = "CollectMode"
ControlPID Property = "ControlPID" ConditionResult Property = "ConditionResult"
CoredumpFilter Property = "CoredumpFilter" ConditionTimestamp Property = "ConditionTimestamp"
DefaultDependencies Property = "DefaultDependencies" ConditionTimestampMonotonic Property = "ConditionTimestampMonotonic"
DefaultMemoryLow Property = "DefaultMemoryLow" ConfigurationDirectoryMode Property = "ConfigurationDirectoryMode"
DefaultMemoryMin Property = "DefaultMemoryMin" Conflicts Property = "Conflicts"
Delegate Property = "Delegate" ControlGroup Property = "ControlGroup"
Description Property = "Description" ControlGroupId Property = "ControlGroupId"
DevicePolicy Property = "DevicePolicy" ControlPID Property = "ControlPID"
DynamicUser Property = "DynamicUser" CoredumpFilter Property = "CoredumpFilter"
EffectiveCPUs Property = "EffectiveCPUs" CoredumpReceive Property = "CoredumpReceive"
EffectiveMemoryNodes Property = "EffectiveMemoryNodes" DebugInvocation Property = "DebugInvocation"
ExecMainCode Property = "ExecMainCode" DefaultDependencies Property = "DefaultDependencies"
ExecMainExitTimestampMonotonic Property = "ExecMainExitTimestampMonotonic" DefaultMemoryLow Property = "DefaultMemoryLow"
ExecMainPID Property = "ExecMainPID" DefaultMemoryMin Property = "DefaultMemoryMin"
ExecMainStartTimestamp Property = "ExecMainStartTimestamp" DefaultStartupMemoryLow Property = "DefaultStartupMemoryLow"
ExecMainStartTimestampMonotonic Property = "ExecMainStartTimestampMonotonic" DeferAcceptUSec Property = "DeferAcceptUSec"
ExecMainStatus Property = "ExecMainStatus" Delegate Property = "Delegate"
ExecReload Property = "ExecReload" Description Property = "Description"
ExecReloadEx Property = "ExecReloadEx" DevicePolicy Property = "DevicePolicy"
ExecStart Property = "ExecStart" DirectoryMode Property = "DirectoryMode"
ExecStartEx Property = "ExecStartEx" DynamicUser Property = "DynamicUser"
FailureAction Property = "FailureAction" EffectiveCPUs Property = "EffectiveCPUs"
FileDescriptorStoreMax Property = "FileDescriptorStoreMax" EffectiveMemoryHigh Property = "EffectiveMemoryHigh"
FinalKillSignal Property = "FinalKillSignal" EffectiveMemoryMax Property = "EffectiveMemoryMax"
FragmentPath Property = "FragmentPath" EffectiveMemoryNodes Property = "EffectiveMemoryNodes"
FreezerState Property = "FreezerState" EffectiveTasksMax Property = "EffectiveTasksMax"
GID Property = "GID" ExecMainCode Property = "ExecMainCode"
GuessMainPID Property = "GuessMainPID" ExecMainExitTimestampMonotonic Property = "ExecMainExitTimestampMonotonic"
IOAccounting Property = "IOAccounting" ExecMainPID Property = "ExecMainPID"
IOReadBytes Property = "IOReadBytes" ExecMainStartTimestamp Property = "ExecMainStartTimestamp"
IOReadOperations Property = "IOReadOperations" ExecMainStartTimestampMonotonic Property = "ExecMainStartTimestampMonotonic"
IOSchedulingClass Property = "IOSchedulingClass" ExecMainStatus Property = "ExecMainStatus"
IOSchedulingPriority Property = "IOSchedulingPriority" ExecReload Property = "ExecReload"
IOWeight Property = "IOWeight" ExecReloadEx Property = "ExecReloadEx"
IOWriteBytes Property = "IOWriteBytes" ExecStart Property = "ExecStart"
IOWriteOperations Property = "IOWriteOperations" ExecStartEx Property = "ExecStartEx"
IPAccounting Property = "IPAccounting" ExtensionImagePolicy Property = "ExtensionImagePolicy"
IPEgressBytes Property = "IPEgressBytes" FailureAction Property = "FailureAction"
IPEgressPackets Property = "IPEgressPackets" FileDescriptorName Property = "FileDescriptorName"
IPIngressBytes Property = "IPIngressBytes" FileDescriptorStoreMax Property = "FileDescriptorStoreMax"
IPIngressPackets Property = "IPIngressPackets" FinalKillSignal Property = "FinalKillSignal"
Id Property = "Id" FlushPending Property = "FlushPending"
IgnoreOnIsolate Property = "IgnoreOnIsolate" FragmentPath Property = "FragmentPath"
IgnoreSIGPIPE Property = "IgnoreSIGPIPE" FreeBind Property = "FreeBind"
InactiveEnterTimestampMonotonic Property = "InactiveEnterTimestampMonotonic" FreezerState Property = "FreezerState"
InactiveExitTimestamp Property = "InactiveExitTimestamp" GID Property = "GID"
InactiveExitTimestampMonotonic Property = "InactiveExitTimestampMonotonic" GuessMainPID Property = "GuessMainPID"
InvocationID Property = "InvocationID" IOAccounting Property = "IOAccounting"
JobRunningTimeoutUSec Property = "JobRunningTimeoutUSec" IOReadBytes Property = "IOReadBytes"
JobTimeoutAction Property = "JobTimeoutAction" IOReadOperations Property = "IOReadOperations"
JobTimeoutUSec Property = "JobTimeoutUSec" IOSchedulingClass Property = "IOSchedulingClass"
KeyringMode Property = "KeyringMode" IOSchedulingPriority Property = "IOSchedulingPriority"
KillMode Property = "KillMode" IOWeight Property = "IOWeight"
KillSignal Property = "KillSignal" IOWriteBytes Property = "IOWriteBytes"
LimitAS Property = "LimitAS" IOWriteOperations Property = "IOWriteOperations"
LimitASSoft Property = "LimitASSoft" IPAccounting Property = "IPAccounting"
LimitCORE Property = "LimitCORE" IPEgressBytes Property = "IPEgressBytes"
LimitCORESoft Property = "LimitCORESoft" IPEgressPackets Property = "IPEgressPackets"
LimitCPU Property = "LimitCPU" IPIngressBytes Property = "IPIngressBytes"
LimitCPUSoft Property = "LimitCPUSoft" IPIngressPackets Property = "IPIngressPackets"
LimitDATA Property = "LimitDATA" IPTOS Property = "IPTOS"
LimitDATASoft Property = "LimitDATASoft" IPTTL Property = "IPTTL"
LimitFSIZE Property = "LimitFSIZE" Id Property = "Id"
LimitFSIZESoft Property = "LimitFSIZESoft" IgnoreOnIsolate Property = "IgnoreOnIsolate"
LimitLOCKS Property = "LimitLOCKS" IgnoreSIGPIPE Property = "IgnoreSIGPIPE"
LimitLOCKSSoft Property = "LimitLOCKSSoft" InactiveEnterTimestampMonotonic Property = "InactiveEnterTimestampMonotonic"
LimitMEMLOCK Property = "LimitMEMLOCK" InactiveExitTimestamp Property = "InactiveExitTimestamp"
LimitMEMLOCKSoft Property = "LimitMEMLOCKSoft" InactiveExitTimestampMonotonic Property = "InactiveExitTimestampMonotonic"
LimitMSGQUEUE Property = "LimitMSGQUEUE" InvocationID Property = "InvocationID"
LimitMSGQUEUESoft Property = "LimitMSGQUEUESoft" JobRunningTimeoutUSec Property = "JobRunningTimeoutUSec"
LimitNICE Property = "LimitNICE" JobTimeoutAction Property = "JobTimeoutAction"
LimitNICESoft Property = "LimitNICESoft" JobTimeoutUSec Property = "JobTimeoutUSec"
LimitNOFILE Property = "LimitNOFILE" KeepAlive Property = "KeepAlive"
LimitNOFILESoft Property = "LimitNOFILESoft" KeepAliveIntervalUSec Property = "KeepAliveIntervalUSec"
LimitNPROC Property = "LimitNPROC" KeepAliveProbes Property = "KeepAliveProbes"
LimitNPROCSoft Property = "LimitNPROCSoft" KeepAliveTimeUSec Property = "KeepAliveTimeUSec"
LimitRSS Property = "LimitRSS" KeyringMode Property = "KeyringMode"
LimitRSSSoft Property = "LimitRSSSoft" KillMode Property = "KillMode"
LimitRTPRIO Property = "LimitRTPRIO" KillSignal Property = "KillSignal"
LimitRTPRIOSoft Property = "LimitRTPRIOSoft" LimitAS Property = "LimitAS"
LimitRTTIME Property = "LimitRTTIME" LimitASSoft Property = "LimitASSoft"
LimitRTTIMESoft Property = "LimitRTTIMESoft" LimitCORE Property = "LimitCORE"
LimitSIGPENDING Property = "LimitSIGPENDING" LimitCORESoft Property = "LimitCORESoft"
LimitSIGPENDINGSoft Property = "LimitSIGPENDINGSoft" LimitCPU Property = "LimitCPU"
LimitSTACK Property = "LimitSTACK" LimitCPUSoft Property = "LimitCPUSoft"
LimitSTACKSoft Property = "LimitSTACKSoft" LimitDATA Property = "LimitDATA"
LoadState Property = "LoadState" LimitDATASoft Property = "LimitDATASoft"
LockPersonality Property = "LockPersonality" LimitFSIZE Property = "LimitFSIZE"
LogLevelMax Property = "LogLevelMax" LimitFSIZESoft Property = "LimitFSIZESoft"
LogRateLimitBurst Property = "LogRateLimitBurst" LimitLOCKS Property = "LimitLOCKS"
LogRateLimitIntervalUSec Property = "LogRateLimitIntervalUSec" LimitLOCKSSoft Property = "LimitLOCKSSoft"
LogsDirectoryMode Property = "LogsDirectoryMode" LimitMEMLOCK Property = "LimitMEMLOCK"
MainPID Property = "MainPID" LimitMEMLOCKSoft Property = "LimitMEMLOCKSoft"
ManagedOOMMemoryPressure Property = "ManagedOOMMemoryPressure" LimitMSGQUEUE Property = "LimitMSGQUEUE"
ManagedOOMMemoryPressureLimit Property = "ManagedOOMMemoryPressureLimit" LimitMSGQUEUESoft Property = "LimitMSGQUEUESoft"
ManagedOOMPreference Property = "ManagedOOMPreference" LimitNICE Property = "LimitNICE"
ManagedOOMSwap Property = "ManagedOOMSwap" LimitNICESoft Property = "LimitNICESoft"
MemoryAccounting Property = "MemoryAccounting" LimitNOFILE Property = "LimitNOFILE"
MemoryCurrent Property = "MemoryCurrent" LimitNOFILESoft Property = "LimitNOFILESoft"
MemoryDenyWriteExecute Property = "MemoryDenyWriteExecute" LimitNPROC Property = "LimitNPROC"
MemoryHigh Property = "MemoryHigh" LimitNPROCSoft Property = "LimitNPROCSoft"
MemoryLimit Property = "MemoryLimit" LimitRSS Property = "LimitRSS"
MemoryLow Property = "MemoryLow" LimitRSSSoft Property = "LimitRSSSoft"
MemoryMax Property = "MemoryMax" LimitRTPRIO Property = "LimitRTPRIO"
MemoryMin Property = "MemoryMin" LimitRTPRIOSoft Property = "LimitRTPRIOSoft"
MemorySwapMax Property = "MemorySwapMax" LimitRTTIME Property = "LimitRTTIME"
MountAPIVFS Property = "MountAPIVFS" LimitRTTIMESoft Property = "LimitRTTIMESoft"
NFileDescriptorStore Property = "NFileDescriptorStore" LimitSIGPENDING Property = "LimitSIGPENDING"
NRestarts Property = "NRestarts" LimitSIGPENDINGSoft Property = "LimitSIGPENDINGSoft"
NUMAPolicy Property = "NUMAPolicy" LimitSTACK Property = "LimitSTACK"
Names Property = "Names" LimitSTACKSoft Property = "LimitSTACKSoft"
NeedDaemonReload Property = "NeedDaemonReload" Listen Property = "Listen"
Nice Property = "Nice" LoadState Property = "LoadState"
NoNewPrivileges Property = "NoNewPrivileges" LockPersonality Property = "LockPersonality"
NonBlocking Property = "NonBlocking" LogLevelMax Property = "LogLevelMax"
NotifyAccess Property = "NotifyAccess" LogRateLimitBurst Property = "LogRateLimitBurst"
OOMPolicy Property = "OOMPolicy" LogRateLimitIntervalUSec Property = "LogRateLimitIntervalUSec"
OOMScoreAdjust Property = "OOMScoreAdjust" LogsDirectoryMode Property = "LogsDirectoryMode"
OnFailureJobMode Property = "OnFailureJobMode" MainPID Property = "MainPID"
PIDFile Property = "PIDFile" ManagedOOMMemoryPressure Property = "ManagedOOMMemoryPressure"
Perpetual Property = "Perpetual" ManagedOOMMemoryPressureDurationUSec Property = "ManagedOOMMemoryPressureDurationUSec"
PrivateDevices Property = "PrivateDevices" ManagedOOMMemoryPressureLimit Property = "ManagedOOMMemoryPressureLimit"
PrivateIPC Property = "PrivateIPC" ManagedOOMPreference Property = "ManagedOOMPreference"
PrivateMounts Property = "PrivateMounts" ManagedOOMSwap Property = "ManagedOOMSwap"
PrivateNetwork Property = "PrivateNetwork" Mark Property = "Mark"
PrivateTmp Property = "PrivateTmp" MaxConnections Property = "MaxConnections"
PrivateUsers Property = "PrivateUsers" MaxConnectionsPerSource Property = "MaxConnectionsPerSource"
ProcSubset Property = "ProcSubset" MemoryAccounting Property = "MemoryAccounting"
ProtectClock Property = "ProtectClock" MemoryAvailable Property = "MemoryAvailable"
ProtectControlGroups Property = "ProtectControlGroups" MemoryCurrent Property = "MemoryCurrent"
ProtectHome Property = "ProtectHome" MemoryDenyWriteExecute Property = "MemoryDenyWriteExecute"
ProtectHostname Property = "ProtectHostname" MemoryHigh Property = "MemoryHigh"
ProtectKernelLogs Property = "ProtectKernelLogs" MemoryKSM Property = "MemoryKSM"
ProtectKernelModules Property = "ProtectKernelModules" MemoryLimit Property = "MemoryLimit"
ProtectKernelTunables Property = "ProtectKernelTunables" MemoryLow Property = "MemoryLow"
ProtectProc Property = "ProtectProc" MemoryMax Property = "MemoryMax"
ProtectSystem Property = "ProtectSystem" MemoryMin Property = "MemoryMin"
RefuseManualStart Property = "RefuseManualStart" MemoryPeak Property = "MemoryPeak"
RefuseManualStop Property = "RefuseManualStop" MemoryPressureThresholdUSec Property = "MemoryPressureThresholdUSec"
ReloadResult Property = "ReloadResult" MemoryPressureWatch Property = "MemoryPressureWatch"
RemainAfterExit Property = "RemainAfterExit" MemorySwapCurrent Property = "MemorySwapCurrent"
RemoveIPC Property = "RemoveIPC" MemorySwapMax Property = "MemorySwapMax"
Requires Property = "Requires" MemorySwapPeak Property = "MemorySwapPeak"
Restart Property = "Restart" MemoryZSwapCurrent Property = "MemoryZSwapCurrent"
RestartKillSignal Property = "RestartKillSignal" MemoryZSwapMax Property = "MemoryZSwapMax"
RestartUSec Property = "RestartUSec" MemoryZSwapWriteback Property = "MemoryZSwapWriteback"
RestrictNamespaces Property = "RestrictNamespaces" MessageQueueMaxMessages Property = "MessageQueueMaxMessages"
RestrictRealtime Property = "RestrictRealtime" MessageQueueMessageSize Property = "MessageQueueMessageSize"
RestrictSUIDSGID Property = "RestrictSUIDSGID" MountAPIVFS Property = "MountAPIVFS"
Result Property = "Result" MountImagePolicy Property = "MountImagePolicy"
RootDirectoryStartOnly Property = "RootDirectoryStartOnly" NAccepted Property = "NAccepted"
RuntimeDirectoryMode Property = "RuntimeDirectoryMode" NConnections Property = "NConnections"
RuntimeDirectoryPreserve Property = "RuntimeDirectoryPreserve" NFileDescriptorStore Property = "NFileDescriptorStore"
RuntimeMaxUSec Property = "RuntimeMaxUSec" NRefused Property = "NRefused"
SameProcessGroup Property = "SameProcessGroup" NRestarts Property = "NRestarts"
SecureBits Property = "SecureBits" NUMAPolicy Property = "NUMAPolicy"
SendSIGHUP Property = "SendSIGHUP" Names Property = "Names"
SendSIGKILL Property = "SendSIGKILL" NeedDaemonReload Property = "NeedDaemonReload"
Slice Property = "Slice" Nice Property = "Nice"
StandardError Property = "StandardError" NoDelay Property = "NoDelay"
StandardInput Property = "StandardInput" NoNewPrivileges Property = "NoNewPrivileges"
StandardOutput Property = "StandardOutput" NonBlocking Property = "NonBlocking"
StartLimitAction Property = "StartLimitAction" NotifyAccess Property = "NotifyAccess"
StartLimitBurst Property = "StartLimitBurst" OOMPolicy Property = "OOMPolicy"
StartLimitIntervalUSec Property = "StartLimitIntervalUSec" OOMScoreAdjust Property = "OOMScoreAdjust"
StartupBlockIOWeight Property = "StartupBlockIOWeight" OnFailureJobMode Property = "OnFailureJobMode"
StartupCPUShares Property = "StartupCPUShares" OnSuccessJobMode Property = "OnSuccessJobMode"
StartupCPUWeight Property = "StartupCPUWeight" PIDFile Property = "PIDFile"
StartupIOWeight Property = "StartupIOWeight" PassCredentials Property = "PassCredentials"
StateChangeTimestamp Property = "StateChangeTimestamp" PassFileDescriptorsToExec Property = "PassFileDescriptorsToExec"
StateChangeTimestampMonotonic Property = "StateChangeTimestampMonotonic" PassPacketInfo Property = "PassPacketInfo"
StateDirectoryMode Property = "StateDirectoryMode" PassSecurity Property = "PassSecurity"
StatusErrno Property = "StatusErrno" Perpetual Property = "Perpetual"
StopWhenUnneeded Property = "StopWhenUnneeded" PipeSize Property = "PipeSize"
SubState Property = "SubState" PollLimitBurst Property = "PollLimitBurst"
SuccessAction Property = "SuccessAction" PollLimitIntervalUSec Property = "PollLimitIntervalUSec"
SyslogFacility Property = "SyslogFacility" Priority Property = "Priority"
SyslogLevel Property = "SyslogLevel" PrivateDevices Property = "PrivateDevices"
SyslogLevelPrefix Property = "SyslogLevelPrefix" PrivateIPC Property = "PrivateIPC"
SyslogPriority Property = "SyslogPriority" PrivateMounts Property = "PrivateMounts"
SystemCallErrorNumber Property = "SystemCallErrorNumber" PrivateNetwork Property = "PrivateNetwork"
TTYReset Property = "TTYReset" PrivatePIDs Property = "PrivatePIDs"
TTYVHangup Property = "TTYVHangup" PrivateTmp Property = "PrivateTmp"
TTYVTDisallocate Property = "TTYVTDisallocate" PrivateTmpEx Property = "PrivateTmpEx"
TasksAccounting Property = "TasksAccounting" PrivateUsers Property = "PrivateUsers"
TasksCurrent Property = "TasksCurrent" PrivateUsersEx Property = "PrivateUsersEx"
TasksMax Property = "TasksMax" ProcSubset Property = "ProcSubset"
TimeoutAbortUSec Property = "TimeoutAbortUSec" ProtectClock Property = "ProtectClock"
TimeoutCleanUSec Property = "TimeoutCleanUSec" ProtectControlGroups Property = "ProtectControlGroups"
TimeoutStartFailureMode Property = "TimeoutStartFailureMode" ProtectControlGroupsEx Property = "ProtectControlGroupsEx"
TimeoutStartUSec Property = "TimeoutStartUSec" ProtectHome Property = "ProtectHome"
TimeoutStopFailureMode Property = "TimeoutStopFailureMode" ProtectHostname Property = "ProtectHostname"
TimeoutStopUSec Property = "TimeoutStopUSec" ProtectKernelLogs Property = "ProtectKernelLogs"
TimerSlackNSec Property = "TimerSlackNSec" ProtectKernelModules Property = "ProtectKernelModules"
Transient Property = "Transient" ProtectKernelTunables Property = "ProtectKernelTunables"
Type Property = "Type" ProtectProc Property = "ProtectProc"
UID Property = "UID" ProtectSystem Property = "ProtectSystem"
UMask Property = "UMask" ReceiveBuffer Property = "ReceiveBuffer"
UnitFilePreset Property = "UnitFilePreset" RefuseManualStart Property = "RefuseManualStart"
UnitFileState Property = "UnitFileState" RefuseManualStop Property = "RefuseManualStop"
UtmpMode Property = "UtmpMode" ReloadResult Property = "ReloadResult"
WantedBy Property = "WantedBy" RemainAfterExit Property = "RemainAfterExit"
WatchdogSignal Property = "WatchdogSignal" RemoveIPC Property = "RemoveIPC"
WatchdogTimestampMonotonic Property = "WatchdogTimestampMonotonic" RemoveOnStop Property = "RemoveOnStop"
WatchdogUSec Property = "WatchdogUSec" RequiredBy Property = "RequiredBy"
Requires Property = "Requires"
RequiresMountsFor Property = "RequiresMountsFor"
Restart Property = "Restart"
RestartKillSignal Property = "RestartKillSignal"
RestartUSec Property = "RestartUSec"
RestrictNamespaces Property = "RestrictNamespaces"
RestrictRealtime Property = "RestrictRealtime"
RestrictSUIDSGID Property = "RestrictSUIDSGID"
Result Property = "Result"
ReusePort Property = "ReusePort"
RootDirectoryStartOnly Property = "RootDirectoryStartOnly"
RootEphemeral Property = "RootEphemeral"
RootImagePolicy Property = "RootImagePolicy"
RuntimeDirectoryMode Property = "RuntimeDirectoryMode"
RuntimeDirectoryPreserve Property = "RuntimeDirectoryPreserve"
RuntimeMaxUSec Property = "RuntimeMaxUSec"
SameProcessGroup Property = "SameProcessGroup"
SecureBits Property = "SecureBits"
SendBuffer Property = "SendBuffer"
SendSIGHUP Property = "SendSIGHUP"
SendSIGKILL Property = "SendSIGKILL"
SetLoginEnvironment Property = "SetLoginEnvironment"
Slice Property = "Slice"
SocketMode Property = "SocketMode"
SocketProtocol Property = "SocketProtocol"
StandardError Property = "StandardError"
StandardInput Property = "StandardInput"
StandardOutput Property = "StandardOutput"
StartLimitAction Property = "StartLimitAction"
StartLimitBurst Property = "StartLimitBurst"
StartLimitIntervalUSec Property = "StartLimitIntervalUSec"
StartupBlockIOWeight Property = "StartupBlockIOWeight"
StartupCPUShares Property = "StartupCPUShares"
StartupCPUWeight Property = "StartupCPUWeight"
StartupIOWeight Property = "StartupIOWeight"
StartupMemoryHigh Property = "StartupMemoryHigh"
StartupMemoryLow Property = "StartupMemoryLow"
StartupMemoryMax Property = "StartupMemoryMax"
StartupMemorySwapMax Property = "StartupMemorySwapMax"
StartupMemoryZSwapMax Property = "StartupMemoryZSwapMax"
StateChangeTimestamp Property = "StateChangeTimestamp"
StateChangeTimestampMonotonic Property = "StateChangeTimestampMonotonic"
StateDirectoryMode Property = "StateDirectoryMode"
StatusErrno Property = "StatusErrno"
StopWhenUnneeded Property = "StopWhenUnneeded"
SubState Property = "SubState"
SuccessAction Property = "SuccessAction"
SurviveFinalKillSignal Property = "SurviveFinalKillSignal"
SyslogFacility Property = "SyslogFacility"
SyslogLevel Property = "SyslogLevel"
SyslogLevelPrefix Property = "SyslogLevelPrefix"
SyslogPriority Property = "SyslogPriority"
SystemCallErrorNumber Property = "SystemCallErrorNumber"
TTYReset Property = "TTYReset"
TTYVHangup Property = "TTYVHangup"
TTYVTDisallocate Property = "TTYVTDisallocate"
TasksAccounting Property = "TasksAccounting"
TasksCurrent Property = "TasksCurrent"
TasksMax Property = "TasksMax"
TimeoutAbortUSec Property = "TimeoutAbortUSec"
TimeoutCleanUSec Property = "TimeoutCleanUSec"
TimeoutStartFailureMode Property = "TimeoutStartFailureMode"
TimeoutStartUSec Property = "TimeoutStartUSec"
TimeoutStopFailureMode Property = "TimeoutStopFailureMode"
TimeoutStopUSec Property = "TimeoutStopUSec"
TimeoutUSec Property = "TimeoutUSec"
TimerSlackNSec Property = "TimerSlackNSec"
Timestamping Property = "Timestamping"
Transient Property = "Transient"
Transparent Property = "Transparent"
TriggerLimitBurst Property = "TriggerLimitBurst"
TriggerLimitIntervalUSec Property = "TriggerLimitIntervalUSec"
Triggers Property = "Triggers"
Type Property = "Type"
UID Property = "UID"
UMask Property = "UMask"
UnitFilePreset Property = "UnitFilePreset"
UnitFileState Property = "UnitFileState"
UtmpMode Property = "UtmpMode"
WantedBy Property = "WantedBy"
WatchdogSignal Property = "WatchdogSignal"
WatchdogTimestampMonotonic Property = "WatchdogTimestampMonotonic"
WatchdogUSec Property = "WatchdogUSec"
Writable Property = "Writable"
) )

View File

@@ -1,6 +1,7 @@
package properties package properties
var Properties = []Property{ var Properties = []Property{
Accept,
ActiveEnterTimestamp, ActiveEnterTimestamp,
ActiveEnterTimestampMonotonic, ActiveEnterTimestampMonotonic,
ActiveExitTimestampMonotonic, ActiveExitTimestampMonotonic,
@@ -10,9 +11,13 @@ var Properties = []Property{
AssertResult, AssertResult,
AssertTimestamp, AssertTimestamp,
AssertTimestampMonotonic, AssertTimestampMonotonic,
Backlog,
Before, Before,
BindIPv6Only,
BindLogSockets,
BlockIOAccounting, BlockIOAccounting,
BlockIOWeight, BlockIOWeight,
Broadcast,
CPUAccounting, CPUAccounting,
CPUAffinityFromNUMA, CPUAffinityFromNUMA,
CPUQuotaPerSecUSec, CPUQuotaPerSecUSec,
@@ -26,6 +31,7 @@ var Properties = []Property{
CacheDirectoryMode, CacheDirectoryMode,
CanFreeze, CanFreeze,
CanIsolate, CanIsolate,
CanLiveMount,
CanReload, CanReload,
CanStart, CanStart,
CanStop, CanStop,
@@ -38,17 +44,26 @@ var Properties = []Property{
ConfigurationDirectoryMode, ConfigurationDirectoryMode,
Conflicts, Conflicts,
ControlGroup, ControlGroup,
ControlGroupId,
ControlPID, ControlPID,
CoredumpFilter, CoredumpFilter,
CoredumpReceive,
DebugInvocation,
DefaultDependencies, DefaultDependencies,
DefaultMemoryLow, DefaultMemoryLow,
DefaultMemoryMin, DefaultMemoryMin,
DefaultStartupMemoryLow,
DeferAcceptUSec,
Delegate, Delegate,
Description, Description,
DevicePolicy, DevicePolicy,
DirectoryMode,
DynamicUser, DynamicUser,
EffectiveCPUs, EffectiveCPUs,
EffectiveMemoryHigh,
EffectiveMemoryMax,
EffectiveMemoryNodes, EffectiveMemoryNodes,
EffectiveTasksMax,
ExecMainCode, ExecMainCode,
ExecMainExitTimestampMonotonic, ExecMainExitTimestampMonotonic,
ExecMainPID, ExecMainPID,
@@ -59,10 +74,14 @@ var Properties = []Property{
ExecReloadEx, ExecReloadEx,
ExecStart, ExecStart,
ExecStartEx, ExecStartEx,
ExtensionImagePolicy,
FailureAction, FailureAction,
FileDescriptorName,
FileDescriptorStoreMax, FileDescriptorStoreMax,
FinalKillSignal, FinalKillSignal,
FlushPending,
FragmentPath, FragmentPath,
FreeBind,
FreezerState, FreezerState,
GID, GID,
GuessMainPID, GuessMainPID,
@@ -79,6 +98,8 @@ var Properties = []Property{
IPEgressPackets, IPEgressPackets,
IPIngressBytes, IPIngressBytes,
IPIngressPackets, IPIngressPackets,
IPTOS,
IPTTL,
Id, Id,
IgnoreOnIsolate, IgnoreOnIsolate,
IgnoreSIGPIPE, IgnoreSIGPIPE,
@@ -89,6 +110,10 @@ var Properties = []Property{
JobRunningTimeoutUSec, JobRunningTimeoutUSec,
JobTimeoutAction, JobTimeoutAction,
JobTimeoutUSec, JobTimeoutUSec,
KeepAlive,
KeepAliveIntervalUSec,
KeepAliveProbes,
KeepAliveTimeUSec,
KeyringMode, KeyringMode,
KillMode, KillMode,
KillSignal, KillSignal,
@@ -124,6 +149,7 @@ var Properties = []Property{
LimitSIGPENDINGSoft, LimitSIGPENDINGSoft,
LimitSTACK, LimitSTACK,
LimitSTACKSoft, LimitSTACKSoft,
Listen,
LoadState, LoadState,
LockPersonality, LockPersonality,
LogLevelMax, LogLevelMax,
@@ -132,42 +158,76 @@ var Properties = []Property{
LogsDirectoryMode, LogsDirectoryMode,
MainPID, MainPID,
ManagedOOMMemoryPressure, ManagedOOMMemoryPressure,
ManagedOOMMemoryPressureDurationUSec,
ManagedOOMMemoryPressureLimit, ManagedOOMMemoryPressureLimit,
ManagedOOMPreference, ManagedOOMPreference,
ManagedOOMSwap, ManagedOOMSwap,
Mark,
MaxConnections,
MaxConnectionsPerSource,
MemoryAccounting, MemoryAccounting,
MemoryAvailable,
MemoryCurrent, MemoryCurrent,
MemoryDenyWriteExecute, MemoryDenyWriteExecute,
MemoryHigh, MemoryHigh,
MemoryKSM,
MemoryLimit, MemoryLimit,
MemoryLow, MemoryLow,
MemoryMax, MemoryMax,
MemoryMin, MemoryMin,
MemoryPeak,
MemoryPressureThresholdUSec,
MemoryPressureWatch,
MemorySwapCurrent,
MemorySwapMax, MemorySwapMax,
MemorySwapPeak,
MemoryZSwapCurrent,
MemoryZSwapMax,
MemoryZSwapWriteback,
MessageQueueMaxMessages,
MessageQueueMessageSize,
MountAPIVFS, MountAPIVFS,
MountImagePolicy,
NAccepted,
NConnections,
NFileDescriptorStore, NFileDescriptorStore,
NRefused,
NRestarts, NRestarts,
NUMAPolicy, NUMAPolicy,
Names, Names,
NeedDaemonReload, NeedDaemonReload,
Nice, Nice,
NoDelay,
NoNewPrivileges, NoNewPrivileges,
NonBlocking, NonBlocking,
NotifyAccess, NotifyAccess,
OOMPolicy, OOMPolicy,
OOMScoreAdjust, OOMScoreAdjust,
OnFailureJobMode, OnFailureJobMode,
OnSuccessJobMode,
PIDFile, PIDFile,
PassCredentials,
PassFileDescriptorsToExec,
PassPacketInfo,
PassSecurity,
Perpetual, Perpetual,
PipeSize,
PollLimitBurst,
PollLimitIntervalUSec,
Priority,
PrivateDevices, PrivateDevices,
PrivateIPC, PrivateIPC,
PrivateMounts, PrivateMounts,
PrivateNetwork, PrivateNetwork,
PrivatePIDs,
PrivateTmp, PrivateTmp,
PrivateTmpEx,
PrivateUsers, PrivateUsers,
PrivateUsersEx,
ProcSubset, ProcSubset,
ProtectClock, ProtectClock,
ProtectControlGroups, ProtectControlGroups,
ProtectControlGroupsEx,
ProtectHome, ProtectHome,
ProtectHostname, ProtectHostname,
ProtectKernelLogs, ProtectKernelLogs,
@@ -175,12 +235,16 @@ var Properties = []Property{
ProtectKernelTunables, ProtectKernelTunables,
ProtectProc, ProtectProc,
ProtectSystem, ProtectSystem,
ReceiveBuffer,
RefuseManualStart, RefuseManualStart,
RefuseManualStop, RefuseManualStop,
ReloadResult, ReloadResult,
RemainAfterExit, RemainAfterExit,
RemoveIPC, RemoveIPC,
RemoveOnStop,
RequiredBy,
Requires, Requires,
RequiresMountsFor,
Restart, Restart,
RestartKillSignal, RestartKillSignal,
RestartUSec, RestartUSec,
@@ -188,15 +252,22 @@ var Properties = []Property{
RestrictRealtime, RestrictRealtime,
RestrictSUIDSGID, RestrictSUIDSGID,
Result, Result,
ReusePort,
RootDirectoryStartOnly, RootDirectoryStartOnly,
RootEphemeral,
RootImagePolicy,
RuntimeDirectoryMode, RuntimeDirectoryMode,
RuntimeDirectoryPreserve, RuntimeDirectoryPreserve,
RuntimeMaxUSec, RuntimeMaxUSec,
SameProcessGroup, SameProcessGroup,
SecureBits, SecureBits,
SendBuffer,
SendSIGHUP, SendSIGHUP,
SendSIGKILL, SendSIGKILL,
SetLoginEnvironment,
Slice, Slice,
SocketMode,
SocketProtocol,
StandardError, StandardError,
StandardInput, StandardInput,
StandardOutput, StandardOutput,
@@ -207,6 +278,11 @@ var Properties = []Property{
StartupCPUShares, StartupCPUShares,
StartupCPUWeight, StartupCPUWeight,
StartupIOWeight, StartupIOWeight,
StartupMemoryHigh,
StartupMemoryLow,
StartupMemoryMax,
StartupMemorySwapMax,
StartupMemoryZSwapMax,
StateChangeTimestamp, StateChangeTimestamp,
StateChangeTimestampMonotonic, StateChangeTimestampMonotonic,
StateDirectoryMode, StateDirectoryMode,
@@ -214,6 +290,7 @@ var Properties = []Property{
StopWhenUnneeded, StopWhenUnneeded,
SubState, SubState,
SuccessAction, SuccessAction,
SurviveFinalKillSignal,
SyslogFacility, SyslogFacility,
SyslogLevel, SyslogLevel,
SyslogLevelPrefix, SyslogLevelPrefix,
@@ -231,8 +308,14 @@ var Properties = []Property{
TimeoutStartUSec, TimeoutStartUSec,
TimeoutStopFailureMode, TimeoutStopFailureMode,
TimeoutStopUSec, TimeoutStopUSec,
TimeoutUSec,
TimerSlackNSec, TimerSlackNSec,
Timestamping,
Transient, Transient,
Transparent,
TriggerLimitBurst,
TriggerLimitIntervalUSec,
Triggers,
Type, Type,
UID, UID,
UMask, UMask,
@@ -243,4 +326,5 @@ var Properties = []Property{
WatchdogSignal, WatchdogSignal,
WatchdogTimestampMonotonic, WatchdogTimestampMonotonic,
WatchdogUSec, WatchdogUSec,
Writable,
} }

View File

@@ -1,5 +1,15 @@
//go:build linux
package systemctl package systemctl
type Options struct { type Options struct {
UserMode bool UserMode bool
} }
type Unit struct {
Name string
Load string
Active string
Sub string
Description string
}

View File

@@ -1,3 +1,5 @@
//go:build linux
package systemctl package systemctl
import ( import (

View File

@@ -2,6 +2,7 @@ package systemctl
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"os" "os"
"os/user" "os/user"
@@ -41,7 +42,6 @@ func TestMain(m *testing.M) {
func TestDaemonReload(t *testing.T) { func TestDaemonReload(t *testing.T) {
testCases := []struct { testCases := []struct {
unit string
err error err error
opts Options opts Options
runAsUser bool runAsUser bool
@@ -49,22 +49,26 @@ func TestDaemonReload(t *testing.T) {
/* Run these tests only as a user */ /* Run these tests only as a user */
// fail to reload system daemon as user // fail to reload system daemon as user
{"", ErrInsufficientPermissions, Options{UserMode: false}, true}, {ErrInsufficientPermissions, Options{UserMode: false}, true},
// reload user's scope daemon // reload user's scope daemon
{"", nil, Options{UserMode: true}, true}, {nil, Options{UserMode: true}, true},
/* End user tests*/ /* End user tests*/
/* Run these tests only as a superuser */ /* Run these tests only as a superuser */
// succeed to reload daemon // succeed to reload daemon
{"", nil, Options{UserMode: false}, false}, {nil, Options{UserMode: false}, false},
// fail to connect to user bus as system // fail to connect to user bus as system
{"", ErrBusFailure, Options{UserMode: true}, false}, {ErrBusFailure, Options{UserMode: true}, false},
/* End superuser tests*/ /* End superuser tests*/
} }
for _, tc := range testCases { for _, tc := range testCases {
t.Run(fmt.Sprintf("%s as %s", tc.unit, userString), func(t *testing.T) { mode := "user"
if tc.opts.UserMode == false {
mode = "system"
}
t.Run(fmt.Sprintf("DaemonReload as %s, %s mode", userString, mode), func(t *testing.T) {
if (userString == "root" || userString == "system") && tc.runAsUser { if (userString == "root" || userString == "system") && tc.runAsUser {
t.Skip("skipping user test while running as superuser") t.Skip("skipping user test while running as superuser")
} else if (userString != "root" && userString != "system") && !tc.runAsUser { } else if (userString != "root" && userString != "system") && !tc.runAsUser {
@@ -73,7 +77,7 @@ func TestDaemonReload(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := DaemonReload(ctx, tc.opts) err := DaemonReload(ctx, tc.opts)
if err != tc.err { if !errors.Is(err, tc.err) {
t.Errorf("error is %v, but should have been %v", err, tc.err) t.Errorf("error is %v, but should have been %v", err, tc.err)
} }
}) })
@@ -81,78 +85,72 @@ func TestDaemonReload(t *testing.T) {
} }
func TestDisable(t *testing.T) { func TestDisable(t *testing.T) {
t.Run(fmt.Sprintf(""), func(t *testing.T) { if userString != "root" && userString != "system" {
if userString != "root" && userString != "system" { t.Skip("skipping superuser test while running as user")
t.Skip("skipping superuser test while running as user") }
} unit := "nginx"
unit := "nginx" ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second) defer cancel()
defer cancel() err := Mask(ctx, unit, Options{UserMode: false})
err := Mask(ctx, unit, Options{UserMode: false}) if err != nil {
if err != nil { Unmask(ctx, unit, Options{UserMode: false})
Unmask(ctx, unit, Options{UserMode: false}) t.Errorf("Unable to mask %s", unit)
t.Errorf("Unable to mask %s", unit) }
} err = Disable(ctx, unit, Options{UserMode: false})
err = Disable(ctx, unit, Options{UserMode: false}) if !errors.Is(err, ErrMasked) {
if err != ErrMasked { Unmask(ctx, unit, Options{UserMode: false})
Unmask(ctx, unit, Options{UserMode: false}) t.Errorf("error is %v, but should have been %v", err, ErrMasked)
t.Errorf("error is %v, but should have been %v", err, ErrMasked) }
} err = Unmask(ctx, unit, Options{UserMode: false})
err = Unmask(ctx, unit, Options{UserMode: false}) if err != nil {
if err != nil { t.Errorf("Unable to unmask %s", unit)
t.Errorf("Unable to unmask %s", unit) }
}
})
} }
func TestReenable(t *testing.T) { func TestReenable(t *testing.T) {
t.Run(fmt.Sprintf(""), func(t *testing.T) { if userString != "root" && userString != "system" {
if userString != "root" && userString != "system" { t.Skip("skipping superuser test while running as user")
t.Skip("skipping superuser test while running as user") }
} unit := "nginx"
unit := "nginx" ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second) defer cancel()
defer cancel() err := Mask(ctx, unit, Options{UserMode: false})
err := Mask(ctx, unit, Options{UserMode: false}) if err != nil {
if err != nil { Unmask(ctx, unit, Options{UserMode: false})
Unmask(ctx, unit, Options{UserMode: false}) t.Errorf("Unable to mask %s", unit)
t.Errorf("Unable to mask %s", unit) }
} err = Reenable(ctx, unit, Options{UserMode: false})
err = Reenable(ctx, unit, Options{UserMode: false}) if !errors.Is(err, ErrMasked) {
if err != ErrMasked { Unmask(ctx, unit, Options{UserMode: false})
Unmask(ctx, unit, Options{UserMode: false}) t.Errorf("error is %v, but should have been %v", err, ErrMasked)
t.Errorf("error is %v, but should have been %v", err, ErrMasked) }
} err = Unmask(ctx, unit, Options{UserMode: false})
err = Unmask(ctx, unit, Options{UserMode: false}) if err != nil {
if err != nil { t.Errorf("Unable to unmask %s", unit)
t.Errorf("Unable to unmask %s", unit) }
}
})
} }
func TestEnable(t *testing.T) { func TestEnable(t *testing.T) {
t.Run(fmt.Sprintf(""), func(t *testing.T) { if userString != "root" && userString != "system" {
if userString != "root" && userString != "system" { t.Skip("skipping superuser test while running as user")
t.Skip("skipping superuser test while running as user") }
} unit := "nginx"
unit := "nginx" ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second) defer cancel()
defer cancel() err := Mask(ctx, unit, Options{UserMode: false})
err := Mask(ctx, unit, Options{UserMode: false}) if err != nil {
if err != nil { Unmask(ctx, unit, Options{UserMode: false})
Unmask(ctx, unit, Options{UserMode: false}) t.Errorf("Unable to mask %s", unit)
t.Errorf("Unable to mask %s", unit) }
} err = Enable(ctx, unit, Options{UserMode: false})
err = Enable(ctx, unit, Options{UserMode: false}) if !errors.Is(err, ErrMasked) {
if err != ErrMasked { Unmask(ctx, unit, Options{UserMode: false})
Unmask(ctx, unit, Options{UserMode: false}) t.Errorf("error is %v, but should have been %v", err, ErrMasked)
t.Errorf("error is %v, but should have been %v", err, ErrMasked) }
} err = Unmask(ctx, unit, Options{UserMode: false})
err = Unmask(ctx, unit, Options{UserMode: false}) if err != nil {
if err != nil { t.Errorf("Unable to unmask %s", unit)
t.Errorf("Unable to unmask %s", unit) }
}
})
} }
func ExampleEnable() { func ExampleEnable() {
@@ -161,16 +159,16 @@ func ExampleEnable() {
defer cancel() defer cancel()
err := Enable(ctx, unit, Options{UserMode: true}) err := Enable(ctx, unit, Options{UserMode: true})
switch err { switch {
case ErrMasked: case errors.Is(err, ErrMasked):
fmt.Printf("%s is masked, unmask it before enabling\n", unit) fmt.Printf("%s is masked, unmask it before enabling\n", unit)
case ErrDoesNotExist: case errors.Is(err, ErrDoesNotExist):
fmt.Printf("%s does not exist\n", unit) fmt.Printf("%s does not exist\n", unit)
case ErrInsufficientPermissions: case errors.Is(err, ErrInsufficientPermissions):
fmt.Printf("permission to enable %s denied\n", unit) fmt.Printf("permission to enable %s denied\n", unit)
case ErrBusFailure: case errors.Is(err, ErrBusFailure):
fmt.Printf("Cannot communicate with the bus\n") fmt.Printf("Cannot communicate with the bus\n")
case nil: case err == nil:
fmt.Printf("%s enabled successfully\n", unit) fmt.Printf("%s enabled successfully\n", unit)
default: default:
fmt.Printf("Error: %v", err) fmt.Printf("Error: %v", err)
@@ -179,7 +177,7 @@ func ExampleEnable() {
func TestIsActive(t *testing.T) { func TestIsActive(t *testing.T) {
unit := "nginx" unit := "nginx"
t.Run(fmt.Sprintf("check active"), func(t *testing.T) { t.Run("check active", func(t *testing.T) {
if testing.Short() { if testing.Short() {
t.Skip("skipping in short mode") t.Skip("skipping in short mode")
} }
@@ -195,10 +193,10 @@ func TestIsActive(t *testing.T) {
time.Sleep(time.Second) time.Sleep(time.Second)
isActive, err := IsActive(ctx, unit, Options{UserMode: false}) isActive, err := IsActive(ctx, unit, Options{UserMode: false})
if !isActive { if !isActive {
t.Errorf("IsActive didn't return true for %s", unit) t.Errorf("IsActive didn't return true for %s: %v", unit, err)
} }
}) })
t.Run(fmt.Sprintf("check masked"), func(t *testing.T) { t.Run("check masked", func(t *testing.T) {
if userString != "root" && userString != "system" { if userString != "root" && userString != "system" {
t.Skip("skipping superuser test while running as user") t.Skip("skipping superuser test while running as user")
} }
@@ -214,7 +212,7 @@ func TestIsActive(t *testing.T) {
} }
Unmask(ctx, unit, Options{UserMode: false}) Unmask(ctx, unit, Options{UserMode: false})
}) })
t.Run(fmt.Sprintf("check masked"), func(t *testing.T) { t.Run("check masked", func(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
_, err := IsActive(ctx, "nonexistant", Options{UserMode: false}) _, err := IsActive(ctx, "nonexistant", Options{UserMode: false})
@@ -231,7 +229,7 @@ func TestIsEnabled(t *testing.T) {
userMode = true userMode = true
unit = "syncthing" unit = "syncthing"
} }
t.Run(fmt.Sprintf("check enabled"), func(t *testing.T) { t.Run("check enabled", func(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
defer cancel() defer cancel()
err := Enable(ctx, unit, Options{UserMode: userMode}) err := Enable(ctx, unit, Options{UserMode: userMode})
@@ -240,10 +238,10 @@ func TestIsEnabled(t *testing.T) {
} }
isEnabled, err := IsEnabled(ctx, unit, Options{UserMode: userMode}) isEnabled, err := IsEnabled(ctx, unit, Options{UserMode: userMode})
if !isEnabled { if !isEnabled {
t.Errorf("IsEnabled didn't return true for %s", unit) t.Errorf("IsEnabled didn't return true for %s: %v", unit, err)
} }
}) })
t.Run(fmt.Sprintf("check disabled"), func(t *testing.T) { t.Run("check disabled", func(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := Disable(ctx, unit, Options{UserMode: userMode}) err := Disable(ctx, unit, Options{UserMode: userMode})
@@ -259,7 +257,7 @@ func TestIsEnabled(t *testing.T) {
} }
Enable(ctx, unit, Options{UserMode: false}) Enable(ctx, unit, Options{UserMode: false})
}) })
t.Run(fmt.Sprintf("check masked"), func(t *testing.T) { t.Run("check masked", func(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := Mask(ctx, unit, Options{UserMode: userMode}) err := Mask(ctx, unit, Options{UserMode: userMode})
@@ -320,13 +318,13 @@ func TestMask(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := Mask(ctx, tc.unit, tc.opts) err := Mask(ctx, tc.unit, tc.opts)
if err != tc.err { if !errors.Is(err, tc.err) {
t.Errorf("error is %v, but should have been %v", err, tc.err) t.Errorf("error is %v, but should have been %v", err, tc.err)
} }
Unmask(ctx, tc.unit, tc.opts) Unmask(ctx, tc.unit, tc.opts)
}) })
} }
t.Run(fmt.Sprintf("test double masking existing"), func(t *testing.T) { t.Run("test double masking existing", func(t *testing.T) {
unit := "nginx" unit := "nginx"
userMode := false userMode := false
if userString != "root" && userString != "system" { if userString != "root" && userString != "system" {
@@ -346,17 +344,15 @@ func TestMask(t *testing.T) {
} }
Unmask(ctx, unit, opts) Unmask(ctx, unit, opts)
}) })
t.Run(fmt.Sprintf("test double masking nonexisting"), func(t *testing.T) { t.Run("test double masking nonexisting", func(t *testing.T) {
unit := "nonexistant" unit := "nonexistant"
userMode := false userMode := userString != "root" && userString != "system"
if userString != "root" && userString != "system" {
userMode = true
}
opts := Options{UserMode: userMode} opts := Options{UserMode: userMode}
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := Mask(ctx, unit, opts) err := Mask(ctx, unit, opts)
if err != ErrDoesNotExist { if !errors.Is(err, ErrDoesNotExist) {
t.Errorf("error on initial masking is %v, but should have been %v", err, ErrDoesNotExist) t.Errorf("error on initial masking is %v, but should have been %v", err, ErrDoesNotExist)
} }
err = Mask(ctx, unit, opts) err = Mask(ctx, unit, opts)
@@ -388,9 +384,9 @@ func TestRestart(t *testing.T) {
} }
syscall.Kill(pid, syscall.SIGKILL) syscall.Kill(pid, syscall.SIGKILL)
for { for {
running, err := IsActive(ctx, unit, opts) running, errIsActive := IsActive(ctx, unit, opts)
if err != nil { if errIsActive != nil {
t.Errorf("error asserting %s is up: %v", unit, err) t.Errorf("error asserting %s is up: %v", unit, errIsActive)
break break
} else if running { } else if running {
break break
@@ -415,15 +411,17 @@ func TestShow(t *testing.T) {
UserMode: false, UserMode: false,
} }
for _, x := range properties.Properties { for _, x := range properties.Properties {
t.Run(fmt.Sprintf("show property %s", string(x)), func(t *testing.T) { func(x properties.Property) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) t.Run(fmt.Sprintf("show property %s", string(x)), func(t *testing.T) {
defer cancel() ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
t.Parallel() defer cancel()
_, err := Show(ctx, unit, x, opts) t.Parallel()
if err != nil { _, err := Show(ctx, unit, x, opts)
t.Errorf("error is %v, but should have been %v", err, nil) if err != nil {
} t.Errorf("error is %v, but should have been %v", err, nil)
}) }
})
}(x)
} }
} }
@@ -551,13 +549,13 @@ func TestUnmask(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
err := Mask(ctx, tc.unit, tc.opts) err := Mask(ctx, tc.unit, tc.opts)
if err != tc.err { if !errors.Is(err, tc.err) {
t.Errorf("error is %v, but should have been %v", err, tc.err) t.Errorf("error is %v, but should have been %v", err, tc.err)
} }
Unmask(ctx, tc.unit, tc.opts) Unmask(ctx, tc.unit, tc.opts)
}) })
} }
t.Run(fmt.Sprintf("test double unmasking existing"), func(t *testing.T) { t.Run("test double unmasking existing", func(t *testing.T) {
unit := "nginx" unit := "nginx"
userMode := false userMode := false
if userString != "root" && userString != "system" { if userString != "root" && userString != "system" {
@@ -577,12 +575,10 @@ func TestUnmask(t *testing.T) {
} }
Unmask(ctx, unit, opts) Unmask(ctx, unit, opts)
}) })
t.Run(fmt.Sprintf("test double unmasking nonexisting"), func(t *testing.T) { t.Run("test double unmasking nonexisting", func(t *testing.T) {
unit := "nonexistant" unit := "nonexistant"
userMode := false userMode := userString != "root" && userString != "system"
if userString != "root" && userString != "system" {
userMode = true
}
opts := Options{UserMode: userMode} opts := Options{UserMode: userMode}
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)
defer cancel() defer cancel()
@@ -592,7 +588,7 @@ func TestUnmask(t *testing.T) {
t.Errorf("error on initial unmasking is %v, but should have been %v", err, nil) t.Errorf("error on initial unmasking is %v, but should have been %v", err, nil)
} }
err = Unmask(ctx, unit, opts) err = Unmask(ctx, unit, opts)
if err != ErrDoesNotExist { if !errors.Is(err, ErrDoesNotExist) {
t.Errorf("error on second unmasking is %v, but should have been %v", err, ErrDoesNotExist) t.Errorf("error on second unmasking is %v, but should have been %v", err, ErrDoesNotExist)
} }
}) })

63
util.go
View File

@@ -1,12 +1,14 @@
//go:build linux
package systemctl package systemctl
import ( import (
"bytes" "bytes"
"context" "context"
"errors"
"fmt" "fmt"
"log"
"os/exec" "os/exec"
"regexp" "strings"
) )
var systemctl string var systemctl string
@@ -14,12 +16,7 @@ var systemctl string
const killed = 130 const killed = 130
func init() { func init() {
path, err := exec.LookPath("systemctl") path, _ := exec.LookPath("systemctl")
if err != nil {
log.Printf("%v", ErrNotInstalled)
systemctl = ""
return
}
systemctl = path systemctl = path
} }
@@ -34,7 +31,7 @@ func execute(ctx context.Context, args []string) (string, string, int, error) {
) )
if systemctl == "" { if systemctl == "" {
panic(ErrNotInstalled) return "", "", 1, ErrNotInstalled
} }
cmd := exec.CommandContext(ctx, systemctl, args...) cmd := exec.CommandContext(ctx, systemctl, args...)
cmd.Stdout = &stdout cmd.Stdout = &stdout
@@ -56,32 +53,26 @@ func execute(ctx context.Context, args []string) (string, string, int, error) {
} }
func filterErr(stderr string) error { func filterErr(stderr string) error {
if matched, _ := regexp.MatchString(`does not exist`, stderr); matched { switch {
return ErrDoesNotExist case strings.Contains(stderr, `does not exist`):
return errors.Join(ErrDoesNotExist, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `not found.`):
return errors.Join(ErrDoesNotExist, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `not loaded.`):
return errors.Join(ErrUnitNotLoaded, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `No such file or directory`):
return errors.Join(ErrDoesNotExist, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `Interactive authentication required`):
return errors.Join(ErrInsufficientPermissions, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `Access denied`):
return errors.Join(ErrInsufficientPermissions, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `DBUS_SESSION_BUS_ADDRESS`):
return errors.Join(ErrBusFailure, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `is masked`):
return errors.Join(ErrMasked, fmt.Errorf("stderr: %s", stderr))
case strings.Contains(stderr, `Failed`):
return errors.Join(ErrUnspecified, fmt.Errorf("stderr: %s", stderr))
default:
return nil
} }
if matched, _ := regexp.MatchString(`not found.`, stderr); matched {
return ErrDoesNotExist
}
if matched, _ := regexp.MatchString(`not loaded.`, stderr); matched {
return ErrUnitNotLoaded
}
if matched, _ := regexp.MatchString(`No such file or directory`, stderr); matched {
return ErrDoesNotExist
}
if matched, _ := regexp.MatchString(`Interactive authentication required`, stderr); matched {
return ErrInsufficientPermissions
}
if matched, _ := regexp.MatchString(`Access denied`, stderr); matched {
return ErrInsufficientPermissions
}
if matched, _ := regexp.MatchString(`DBUS_SESSION_BUS_ADDRESS`, stderr); matched {
return ErrBusFailure
}
if matched, _ := regexp.MatchString(`is masked`, stderr); matched {
return ErrMasked
}
if matched, _ := regexp.MatchString(`Failed`, stderr); matched {
return ErrUnspecified
}
return nil
} }