 9bdcbe0447
			
		
	
	9bdcbe0447
	
	
	
		
			
			Major integrations and fixes: - Added BACKBEAT SDK integration for P2P operation timing - Implemented beat-aware status tracking for distributed operations - Added Docker secrets support for secure license management - Resolved KACHING license validation via HTTPS/TLS - Updated docker-compose configuration for clean stack deployment - Disabled rollback policies to prevent deployment failures - Added license credential storage (CHORUS-DEV-MULTI-001) Technical improvements: - BACKBEAT P2P operation tracking with phase management - Enhanced configuration system with file-based secrets - Improved error handling for license validation - Clean separation of KACHING and CHORUS deployment stacks 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
		
			
				
	
	
		
			74 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			74 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package cgroups
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"strings"
 | |
| )
 | |
| 
 | |
| // V1 returns all the groups in the default cgroups mountpoint in a single hierarchy
 | |
| func V1() ([]Subsystem, error) {
 | |
| 	root, err := v1MountPoint()
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	subsystems, err := defaults(root)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	var enabled []Subsystem
 | |
| 	for _, s := range pathers(subsystems) {
 | |
| 		// check and remove the default groups that do not exist
 | |
| 		if _, err := os.Lstat(s.Path("/")); err == nil {
 | |
| 			enabled = append(enabled, s)
 | |
| 		}
 | |
| 	}
 | |
| 	return enabled, nil
 | |
| }
 | |
| 
 | |
| // v1MountPoint returns the mount point where the cgroup
 | |
| // mountpoints are mounted in a single hiearchy
 | |
| func v1MountPoint() (string, error) {
 | |
| 	f, err := os.Open("/proc/self/mountinfo")
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	defer f.Close()
 | |
| 	scanner := bufio.NewScanner(f)
 | |
| 	for scanner.Scan() {
 | |
| 		var (
 | |
| 			text      = scanner.Text()
 | |
| 			fields    = strings.Split(text, " ")
 | |
| 			numFields = len(fields)
 | |
| 		)
 | |
| 		if numFields < 10 {
 | |
| 			return "", fmt.Errorf("mountinfo: bad entry %q", text)
 | |
| 		}
 | |
| 		if fields[numFields-3] == "cgroup" {
 | |
| 			return filepath.Dir(fields[4]), nil
 | |
| 		}
 | |
| 	}
 | |
| 	if err := scanner.Err(); err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	return "", ErrMountPointNotExist
 | |
| }
 |