Merge pull request #11728 from BbolroC/fix-sealed-secret-volume

runtime-rs: Adjust path for sealed secret mount check
This commit is contained in:
Hyounggyu Choi
2025-09-02 16:57:33 +02:00
committed by GitHub
2 changed files with 4 additions and 15 deletions

View File

@@ -38,7 +38,7 @@ const INLINE_VIRTIO_FS: &str = "inline-virtio-fs";
const KATA_HOST_SHARED_DIR: &str = "/run/kata-containers/shared/sandboxes/";
/// share fs (for example virtio-fs) mount path in the guest
const KATA_GUEST_SHARE_DIR: &str = "/run/kata-containers/shared/containers/";
pub const KATA_GUEST_SHARE_DIR: &str = "/run/kata-containers/shared/containers/";
pub(crate) const DEFAULT_KATA_GUEST_SANDBOX_DIR: &str = "/run/kata-containers/sandbox/";

View File

@@ -31,8 +31,7 @@ use tokio::{
use walkdir::WalkDir;
use super::Volume;
use crate::share_fs::DEFAULT_KATA_GUEST_SANDBOX_DIR;
use crate::share_fs::PASSTHROUGH_FS_DIR;
use crate::share_fs::KATA_GUEST_SHARE_DIR;
use crate::share_fs::{MountedInfo, ShareFs, ShareFsVolumeConfig};
use kata_types::{
k8s::{is_configmap, is_downward_api, is_projected, is_secret},
@@ -286,12 +285,7 @@ impl ShareFsVolume {
// If the mount source is a file, we can copy it to the sandbox
if src.is_file() {
// This is where we set the value for the guest path
let dest = [
DEFAULT_KATA_GUEST_SANDBOX_DIR,
PASSTHROUGH_FS_DIR,
file_name.clone().as_str(),
]
.join("/");
let dest = [KATA_GUEST_SHARE_DIR, file_name.clone().as_str()].join("/");
debug!(
sl!(),
@@ -347,12 +341,7 @@ impl ShareFsVolume {
info!(sl!(), "copying directory {:?} to guest", &source_path);
// create target path in guest
let dest_dir = [
DEFAULT_KATA_GUEST_SANDBOX_DIR,
PASSTHROUGH_FS_DIR,
file_name.clone().as_str(),
]
.join("/");
let dest_dir = [KATA_GUEST_SHARE_DIR, file_name.clone().as_str()].join("/");
// create directory
let dir_metadata = std::fs::metadata(src.clone())