Files
kata-containers/tests/integration/kubernetes/k8s-hostpath-volume.bats
Aurélien Bombo 5c21b1faf3 runtime: Simplify mounting guest devices when using hostPath volumes
This change crystallizes and simplifies the current handling of /dev
hostPath mounts with virtually no functional change.

Before this change:

 - If a mount DESTINATION is in /dev and it is a non-regular file on the HOST,
   the shim passes the OCI bind mount as is to the guest (e.g.
   /dev/kmsg:/dev/kmsg). The container rightfully sees the GUEST device.

 - If the mount DESTINATION does not exist on the host, the shim relies on
   k8s/containerd to automatically create a directory (ie. non-regular file) on
   the HOST. The shim then also passes the OCI bind mount as is to the guest.  The
   container rightfully sees the GUEST device.

 - For other /dev mounts, the shim passes the device major/minor to the guest
   over virtio-fs. The container rightfully sees the GUEST device.

After this change:

 - If a mount SOURCE is in /dev and it is a non-regular file on the HOST,
   the shim passes the OCI bind mount as is to the guest. The container
   rightfully sees the GUEST device.

 - The shim does not anymore rely on k8s/containerd to create missing mount
   directories. Instead it explicitely handles missing mount SOURCES, and
   treats them like the previous bullet point.

 - The shim no longer uses virtio-fs to pass /dev device major/minor to the
   guest, instead it passes the OCI bind mount as is.

Signed-off-by: Aurélien Bombo <abombo@microsoft.com>
2025-10-01 15:32:21 -05:00

58 lines
1.8 KiB
Bash

#!/usr/bin/env bats
#
# Copyright (c) 2025 Microsoft Corporation
#
# SPDX-License-Identifier: Apache-2.0
#
load "${BATS_TEST_DIRNAME}/../../common.bash"
load "${BATS_TEST_DIRNAME}/lib.sh"
load "${BATS_TEST_DIRNAME}/tests_common.sh"
setup() {
setup_common
get_pod_config_dir
pod_name="hostpath-kmsg"
yaml_file="${pod_config_dir}/pod-hostpath-kmsg.yaml"
cmd_mountinfo=(sh -c "grep /dev/kmsg /proc/self/mountinfo")
cmd_stat=(sh -c "stat -c '%t,%T' /dev/kmsg")
cmd_head=(sh -c "head -10 /dev/kmsg")
policy_settings_dir="$(create_tmp_policy_settings_dir "${pod_config_dir}")"
add_exec_to_policy_settings "${policy_settings_dir}" "${cmd_mountinfo[@]}"
add_exec_to_policy_settings "${policy_settings_dir}" "${cmd_stat[@]}"
add_exec_to_policy_settings "${policy_settings_dir}" "${cmd_head[@]}"
add_requests_to_policy_settings "${policy_settings_dir}" "ReadStreamRequest"
auto_generate_policy "${policy_settings_dir}" "${yaml_file}"
}
@test "/dev hostPath volume bind mounts the guest device and skips virtio-fs" {
kubectl apply -f "${yaml_file}"
kubectl wait --for=condition=Ready --timeout="${timeout}" pod "${pod_name}"
# Check the mount info.
mount_info="$(kubectl exec "${pod_name}" -- "${cmd_mountinfo[@]}")"
read root mountpoint fstype < <(awk '{print $4, $5, $9}' <<< "$mount_info")
[ "$root" == "/kmsg" ] # Would look like "/<CONTAINER_ID>-<RANDOM_ID>-kmsg" with virtio-fs.
[ "$mountpoint" == "/dev/kmsg" ]
[ "$fstype" == "devtmpfs" ] # Would be "virtiofs" with virtio-fs.
# Check the device major/minor.
majminor="$(kubectl exec "${pod_name}" -- "${cmd_stat[@]}")"
[ "$majminor" == "1,b" ]
# Check that the device is actually accessible.
kubectl exec "${pod_name}" -- "${cmd_head[@]}"
}
teardown() {
delete_tmp_policy_settings_dir "${policy_settings_dir}"
teardown_common "${node}" "${node_start_time:-}"
}