123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384 |
- package iptables
- import (
- "os"
- "sync"
- "syscall"
- )
- const (
-
-
-
-
-
- xtablesLockFilePath = "/var/run/xtables.lock"
- defaultFilePerm = 0600
- )
- type Unlocker interface {
- Unlock() error
- }
- type nopUnlocker struct{}
- func (_ nopUnlocker) Unlock() error { return nil }
- type fileLock struct {
-
- mu sync.Mutex
- fd int
- }
- func (l *fileLock) tryLock() (Unlocker, error) {
- l.mu.Lock()
- err := syscall.Flock(l.fd, syscall.LOCK_EX|syscall.LOCK_NB)
- switch err {
- case syscall.EWOULDBLOCK:
- l.mu.Unlock()
- return nopUnlocker{}, nil
- case nil:
- return l, nil
- default:
- l.mu.Unlock()
- return nil, err
- }
- }
- func (l *fileLock) Unlock() error {
- defer l.mu.Unlock()
- return syscall.Close(l.fd)
- }
- func newXtablesFileLock() (*fileLock, error) {
- fd, err := syscall.Open(xtablesLockFilePath, os.O_CREATE, defaultFilePerm)
- if err != nil {
- return nil, err
- }
- return &fileLock{fd: fd}, nil
- }
|