// GenerateMounts maps MountPoint paths to volumes, returning a list of Mounts. func GenerateMounts(ra *schema.RuntimeApp, volumes map[types.ACName]types.Volume) []schema.Mount { app := ra.App mnts := make(map[string]schema.Mount) for _, m := range ra.Mounts { mnts[m.Path] = m } for _, mp := range app.MountPoints { // there's already an injected mount for this target path, skip if _, ok := mnts[mp.Path]; ok { continue } vol, ok := volumes[mp.Name] // there is no volume for this mount point, creating an "empty" volume // implicitly if !ok { emptyVol := types.Volume{ Name: mp.Name, Kind: "empty", } fmt.Fprintf(os.Stderr, "rkt: warning: no volume specified for mount point %q, implicitly creating an \"empty\" volume. This volume will be removed when the pod is garbage-collected.\n", mp.Name) volumes[mp.Name] = emptyVol ra.Mounts = append(ra.Mounts, schema.Mount{Volume: mp.Name, Path: mp.Path}) } else { ra.Mounts = append(ra.Mounts, schema.Mount{Volume: vol.Name, Path: mp.Path}) } } return ra.Mounts }
func GenerateMounts(ra *schema.RuntimeApp, volumes map[types.ACName]types.Volume) ([]schema.Mount, error) { appName := ra.Name id := ra.Image.ID app := ra.App mnts := make(map[string]schema.Mount) for _, m := range ra.Mounts { mnts[m.Path] = m } for _, mp := range app.MountPoints { // there's already an injected mount for this target path, skip if _, ok := mnts[mp.Path]; ok { continue } vol, ok := volumes[mp.Name] if !ok { catCmd := fmt.Sprintf("sudo rkt image cat-manifest --pretty-print %v", id) volumeCmd := "" for _, mp := range app.MountPoints { volumeCmd += fmt.Sprintf("--volume %s,kind=host,source=/some/path ", mp.Name) } return nil, fmt.Errorf("no volume for mountpoint %q:%q in app %q.\n"+ "You can inspect the volumes with:\n\t%v\n"+ "App %q requires the following volumes:\n\t%v", mp.Name, mp.Path, appName, catCmd, appName, volumeCmd) } ra.Mounts = append(ra.Mounts, schema.Mount{Volume: vol.Name, Path: mp.Path}) } return ra.Mounts, nil }
// appToNspawnArgs transforms the given app manifest, with the given associated // app name, into a subset of applicable systemd-nspawn argument func (p *Pod) appToNspawnArgs(ra *schema.RuntimeApp) ([]string, error) { var args []string appName := ra.Name id := ra.Image.ID app := ra.App vols := make(map[types.ACName]types.Volume) mounts := make(map[string]schema.Mount) for _, m := range ra.Mounts { mounts[m.Path] = m } sharedVolPath := common.SharedVolumesPath(p.Root) if err := os.MkdirAll(sharedVolPath, sharedVolPerm); err != nil { return nil, fmt.Errorf("could not create shared volumes directory: %v", err) } if err := os.Chmod(sharedVolPath, sharedVolPerm); err != nil { return nil, fmt.Errorf("could not change permissions of %q: %v", sharedVolPath, err) } // Here we bind the volumes to the mountpoints via runtime mounts (--mount) for _, v := range p.Manifest.Volumes { vols[v.Name] = v if v.Kind == "empty" { if err := os.MkdirAll(filepath.Join(sharedVolPath, v.Name.String()), sharedVolPerm); err != nil { return nil, fmt.Errorf("could not create shared volume %q: %v", v.Name, err) } } } for _, mp := range app.MountPoints { // there's already an injected mount for this target path, skip if _, ok := mounts[mp.Path]; ok { continue } vol, ok := vols[mp.Name] if !ok { catCmd := fmt.Sprintf("sudo rkt image cat-manifest --pretty-print %v", id) volumeCmd := "" for _, mp := range app.MountPoints { volumeCmd += fmt.Sprintf("--volume %s,kind=host,source=/some/path ", mp.Name) } return nil, fmt.Errorf("no volume for mountpoint %q:%q in app %q.\n"+ "You can inspect the volumes with:\n\t%v\n"+ "App %q requires the following volumes:\n\t%v", mp.Name, mp.Path, appName, catCmd, appName, volumeCmd) } ra.Mounts = append(ra.Mounts, schema.Mount{Volume: vol.Name, Path: mp.Path}) } for _, m := range ra.Mounts { vol := vols[m.Volume] opt := make([]string, 4) // If the readonly flag in the pod manifest is not nil, // then use it to override the readonly flag in the image manifest. readOnly := isMPReadOnly(app.MountPoints, vol.Name) if vol.ReadOnly != nil { readOnly = *vol.ReadOnly } if readOnly { opt[0] = "--bind-ro=" } else { opt[0] = "--bind=" } switch vol.Kind { case "host": opt[1] = vol.Source case "empty": absRoot, err := filepath.Abs(p.Root) if err != nil { return nil, fmt.Errorf("cannot get pod's root absolute path: %v\n", err) } opt[1] = filepath.Join(common.SharedVolumesPath(absRoot), vol.Name.String()) default: return nil, fmt.Errorf(`invalid volume kind %q. Must be one of "host" or "empty".`, vol.Kind) } opt[2] = ":" opt[3] = filepath.Join(common.RelAppRootfsPath(appName), m.Path) args = append(args, strings.Join(opt, "")) } for _, i := range app.Isolators { switch v := i.Value().(type) { case types.LinuxCapabilitiesSet: var caps []string // TODO: cleanup the API on LinuxCapabilitiesSet to give strings easily. for _, c := range v.Set() { caps = append(caps, string(c)) } if i.Name == types.LinuxCapabilitiesRetainSetName { capList := strings.Join(caps, ",") args = append(args, "--capability="+capList) } } } return args, nil }