Skip to content

Commit 01e41c5

Browse files
authored
Merge pull request #45 from tri-adam/go1.16
Bump Go to 1.16
2 parents adda671 + 4cc9b54 commit 01e41c5

File tree

3 files changed

+14
-13
lines changed

3 files changed

+14
-13
lines changed

.circleci/config.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ orbs:
66
parameters:
77
go-version:
88
type: string
9-
default: 1.15.12
9+
default: 1.16.4
1010

1111
executors:
1212
golang:

e2e/internal/e2e/priv_linux.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
// Copyright (c) 2019,2020 Sylabs Inc. All rights reserved.
1+
// Copyright (c) 2019-2021 Sylabs Inc. All rights reserved.
22
// This software is licensed under a 3-clause BSD license. Please consult the
33
// LICENSE.md file distributed with the sources of this project regarding your
44
// rights to use or distribute this software.
@@ -7,10 +7,10 @@ package e2e
77

88
import (
99
"runtime"
10-
"syscall"
1110
"testing"
1211

1312
"github.com/pkg/errors"
13+
"golang.org/x/sys/unix"
1414
)
1515

1616
// Privileged wraps the supplied test function with calls to ensure
@@ -21,21 +21,21 @@ func Privileged(f func(*testing.T)) func(*testing.T) {
2121

2222
runtime.LockOSThread()
2323

24-
if err := syscall.Setresuid(0, 0, origUID); err != nil {
24+
if err := unix.Setresuid(0, 0, origUID); err != nil {
2525
err = errors.Wrap(err, "changing user ID to 0")
2626
t.Fatalf("privileges escalation failed: %+v", err)
2727
}
28-
if err := syscall.Setresgid(0, 0, origGID); err != nil {
28+
if err := unix.Setresgid(0, 0, origGID); err != nil {
2929
err = errors.Wrap(err, "changing group ID to 0")
3030
t.Fatalf("privileges escalation failed: %+v", err)
3131
}
3232

3333
defer func() {
34-
if err := syscall.Setresgid(origGID, origGID, 0); err != nil {
34+
if err := unix.Setresgid(origGID, origGID, 0); err != nil {
3535
err = errors.Wrapf(err, "changing group ID to %d", origUID)
3636
t.Fatalf("privileges drop failed: %+v", err)
3737
}
38-
if err := syscall.Setresuid(origUID, origUID, 0); err != nil {
38+
if err := unix.Setresuid(origUID, origUID, 0); err != nil {
3939
err = errors.Wrapf(err, "changing group ID to %d", origGID)
4040
t.Fatalf("privileges drop failed: %+v", err)
4141
}

internal/pkg/test/privilege_linux.go

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
// Copyright (c) 2018-2019, Sylabs Inc. All rights reserved.
1+
// Copyright (c) 2018-2021, Sylabs Inc. All rights reserved.
22
// This software is licensed under a 3-clause BSD license. Please consult the
33
// LICENSE.md file distributed with the sources of this project regarding your
44
// rights to use or distribute this software.
@@ -13,8 +13,9 @@ import (
1313
"os/user"
1414
"runtime"
1515
"strconv"
16-
"syscall"
1716
"testing"
17+
18+
"golang.org/x/sys/unix"
1819
)
1920

2021
var origUID, origGID, unprivUID, unprivGID int
@@ -38,12 +39,12 @@ func DropPrivilege(t *testing.T) {
3839
runtime.LockOSThread()
3940

4041
if os.Getgid() == 0 {
41-
if err := syscall.Setresgid(unprivGID, unprivGID, origGID); err != nil {
42+
if err := unix.Setresgid(unprivGID, unprivGID, origGID); err != nil {
4243
t.Fatalf("failed to set group identity: %v", err)
4344
}
4445
}
4546
if os.Getuid() == 0 {
46-
if err := syscall.Setresuid(unprivUID, unprivUID, origUID); err != nil {
47+
if err := unix.Setresuid(unprivUID, unprivUID, origUID); err != nil {
4748
t.Fatalf("failed to set user identity: %v", err)
4849
}
4950

@@ -55,10 +56,10 @@ func DropPrivilege(t *testing.T) {
5556

5657
// ResetPrivilege returns effective privilege to the original user.
5758
func ResetPrivilege(t *testing.T) {
58-
if err := syscall.Setresuid(origUID, origUID, unprivUID); err != nil {
59+
if err := unix.Setresuid(origUID, origUID, unprivUID); err != nil {
5960
t.Fatalf("failed to reset user identity: %v", err)
6061
}
61-
if err := syscall.Setresgid(origGID, origGID, unprivGID); err != nil {
62+
if err := unix.Setresgid(origGID, origGID, unprivGID); err != nil {
6263
t.Fatalf("failed to reset group identity: %v", err)
6364
}
6465
if err := os.Setenv("HOME", origHome); err != nil {

0 commit comments

Comments
 (0)