mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-29 22:46:12 +00:00
Pass additional flags to subpath mount to avoid flakes in certain conditions
This commit is contained in:
parent
9ff3b7e744
commit
296b30f143
@ -209,8 +209,9 @@ func doBindSubPath(mounter mount.Interface, subpath Subpath) (hostPath string, e
|
|||||||
|
|
||||||
// Do the bind mount
|
// Do the bind mount
|
||||||
options := []string{"bind"}
|
options := []string{"bind"}
|
||||||
|
mountFlags := []string{"--no-canonicalize"}
|
||||||
klog.V(5).Infof("bind mounting %q at %q", mountSource, bindPathTarget)
|
klog.V(5).Infof("bind mounting %q at %q", mountSource, bindPathTarget)
|
||||||
if err = mounter.MountSensitiveWithoutSystemd(mountSource, bindPathTarget, "" /*fstype*/, options, nil); err != nil {
|
if err = mounter.MountSensitiveWithoutSystemdWithMountFlags(mountSource, bindPathTarget, "" /*fstype*/, options, nil /* sensitiveOptions */, mountFlags); err != nil {
|
||||||
return "", fmt.Errorf("error mounting %s: %s", subpath.Path, err)
|
return "", fmt.Errorf("error mounting %s: %s", subpath.Path, err)
|
||||||
}
|
}
|
||||||
success = true
|
success = true
|
||||||
|
@ -136,6 +136,10 @@ func (f *FakeMounter) MountSensitiveWithoutSystemd(source string, target string,
|
|||||||
return f.MountSensitive(source, target, fstype, options, nil /* sensitiveOptions */)
|
return f.MountSensitive(source, target, fstype, options, nil /* sensitiveOptions */)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (f *FakeMounter) MountSensitiveWithoutSystemdWithMountFlags(source string, target string, fstype string, options []string, sensitiveOptions []string, mountFlags []string) error {
|
||||||
|
return f.MountSensitive(source, target, fstype, options, nil /* sensitiveOptions */)
|
||||||
|
}
|
||||||
|
|
||||||
// Unmount records the unmount event and updates the in-memory mount points for FakeMounter
|
// Unmount records the unmount event and updates the in-memory mount points for FakeMounter
|
||||||
func (f *FakeMounter) Unmount(target string) error {
|
func (f *FakeMounter) Unmount(target string) error {
|
||||||
f.mutex.Lock()
|
f.mutex.Lock()
|
||||||
|
@ -49,6 +49,8 @@ type Interface interface {
|
|||||||
MountSensitive(source string, target string, fstype string, options []string, sensitiveOptions []string) error
|
MountSensitive(source string, target string, fstype string, options []string, sensitiveOptions []string) error
|
||||||
// MountSensitiveWithoutSystemd is the same as MountSensitive() but this method disable using systemd mount.
|
// MountSensitiveWithoutSystemd is the same as MountSensitive() but this method disable using systemd mount.
|
||||||
MountSensitiveWithoutSystemd(source string, target string, fstype string, options []string, sensitiveOptions []string) error
|
MountSensitiveWithoutSystemd(source string, target string, fstype string, options []string, sensitiveOptions []string) error
|
||||||
|
// MountSensitiveWithoutSystemdWithMountFlags is the same as MountSensitiveWithoutSystemd() with additional mount flags
|
||||||
|
MountSensitiveWithoutSystemdWithMountFlags(source string, target string, fstype string, options []string, sensitiveOptions []string, mountFlags []string) error
|
||||||
// Unmount unmounts given target.
|
// Unmount unmounts given target.
|
||||||
Unmount(target string) error
|
Unmount(target string) error
|
||||||
// List returns a list of all mounted filesystems. This can be large.
|
// List returns a list of all mounted filesystems. This can be large.
|
||||||
|
@ -87,11 +87,11 @@ func (mounter *Mounter) MountSensitive(source string, target string, fstype stri
|
|||||||
mounterPath := ""
|
mounterPath := ""
|
||||||
bind, bindOpts, bindRemountOpts, bindRemountOptsSensitive := MakeBindOptsSensitive(options, sensitiveOptions)
|
bind, bindOpts, bindRemountOpts, bindRemountOptsSensitive := MakeBindOptsSensitive(options, sensitiveOptions)
|
||||||
if bind {
|
if bind {
|
||||||
err := mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindOpts, bindRemountOptsSensitive, true)
|
err := mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindOpts, bindRemountOptsSensitive, nil /* mountFlags */, true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindRemountOpts, bindRemountOptsSensitive, true)
|
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindRemountOpts, bindRemountOptsSensitive, nil /* mountFlags */, true)
|
||||||
}
|
}
|
||||||
// The list of filesystems that require containerized mounter on GCI image cluster
|
// The list of filesystems that require containerized mounter on GCI image cluster
|
||||||
fsTypesNeedMounter := map[string]struct{}{
|
fsTypesNeedMounter := map[string]struct{}{
|
||||||
@ -103,19 +103,24 @@ func (mounter *Mounter) MountSensitive(source string, target string, fstype stri
|
|||||||
if _, ok := fsTypesNeedMounter[fstype]; ok {
|
if _, ok := fsTypesNeedMounter[fstype]; ok {
|
||||||
mounterPath = mounter.mounterPath
|
mounterPath = mounter.mounterPath
|
||||||
}
|
}
|
||||||
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, options, sensitiveOptions, true)
|
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, options, sensitiveOptions, nil /* mountFlags */, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
// MountSensitiveWithoutSystemd is the same as MountSensitive() but disable using systemd mount.
|
// MountSensitiveWithoutSystemd is the same as MountSensitive() but disable using systemd mount.
|
||||||
func (mounter *Mounter) MountSensitiveWithoutSystemd(source string, target string, fstype string, options []string, sensitiveOptions []string) error {
|
func (mounter *Mounter) MountSensitiveWithoutSystemd(source string, target string, fstype string, options []string, sensitiveOptions []string) error {
|
||||||
|
return mounter.MountSensitiveWithoutSystemdWithMountFlags(source, target, fstype, options, sensitiveOptions, nil /* mountFlags */)
|
||||||
|
}
|
||||||
|
|
||||||
|
// MountSensitiveWithoutSystemdWithMountFlags is the same as MountSensitiveWithoutSystemd with additional mount flags.
|
||||||
|
func (mounter *Mounter) MountSensitiveWithoutSystemdWithMountFlags(source string, target string, fstype string, options []string, sensitiveOptions []string, mountFlags []string) error {
|
||||||
mounterPath := ""
|
mounterPath := ""
|
||||||
bind, bindOpts, bindRemountOpts, bindRemountOptsSensitive := MakeBindOptsSensitive(options, sensitiveOptions)
|
bind, bindOpts, bindRemountOpts, bindRemountOptsSensitive := MakeBindOptsSensitive(options, sensitiveOptions)
|
||||||
if bind {
|
if bind {
|
||||||
err := mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindOpts, bindRemountOptsSensitive, false)
|
err := mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindOpts, bindRemountOptsSensitive, mountFlags, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindRemountOpts, bindRemountOptsSensitive, false)
|
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, bindRemountOpts, bindRemountOptsSensitive, mountFlags, false)
|
||||||
}
|
}
|
||||||
// The list of filesystems that require containerized mounter on GCI image cluster
|
// The list of filesystems that require containerized mounter on GCI image cluster
|
||||||
fsTypesNeedMounter := map[string]struct{}{
|
fsTypesNeedMounter := map[string]struct{}{
|
||||||
@ -127,14 +132,14 @@ func (mounter *Mounter) MountSensitiveWithoutSystemd(source string, target strin
|
|||||||
if _, ok := fsTypesNeedMounter[fstype]; ok {
|
if _, ok := fsTypesNeedMounter[fstype]; ok {
|
||||||
mounterPath = mounter.mounterPath
|
mounterPath = mounter.mounterPath
|
||||||
}
|
}
|
||||||
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, options, sensitiveOptions, false)
|
return mounter.doMount(mounterPath, defaultMountCommand, source, target, fstype, options, sensitiveOptions, mountFlags, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
// doMount runs the mount command. mounterPath is the path to mounter binary if containerized mounter is used.
|
// doMount runs the mount command. mounterPath is the path to mounter binary if containerized mounter is used.
|
||||||
// sensitiveOptions is an extension of options except they will not be logged (because they may contain sensitive material)
|
// sensitiveOptions is an extension of options except they will not be logged (because they may contain sensitive material)
|
||||||
// systemdMountRequired is an extension of option to decide whether uses systemd mount.
|
// systemdMountRequired is an extension of option to decide whether uses systemd mount.
|
||||||
func (mounter *Mounter) doMount(mounterPath string, mountCmd string, source string, target string, fstype string, options []string, sensitiveOptions []string, systemdMountRequired bool) error {
|
func (mounter *Mounter) doMount(mounterPath string, mountCmd string, source string, target string, fstype string, options []string, sensitiveOptions []string, mountFlags []string, systemdMountRequired bool) error {
|
||||||
mountArgs, mountArgsLogStr := MakeMountArgsSensitive(source, target, fstype, options, sensitiveOptions)
|
mountArgs, mountArgsLogStr := MakeMountArgsSensitive(source, target, fstype, options, sensitiveOptions, mountFlags)
|
||||||
if len(mounterPath) > 0 {
|
if len(mounterPath) > 0 {
|
||||||
mountArgs = append([]string{mountCmd}, mountArgs...)
|
mountArgs = append([]string{mountCmd}, mountArgs...)
|
||||||
mountArgsLogStr = mountCmd + " " + mountArgsLogStr
|
mountArgsLogStr = mountCmd + " " + mountArgsLogStr
|
||||||
@ -210,17 +215,21 @@ func detectSystemd() bool {
|
|||||||
// MakeMountArgs makes the arguments to the mount(8) command.
|
// MakeMountArgs makes the arguments to the mount(8) command.
|
||||||
// options MUST not contain sensitive material (like passwords).
|
// options MUST not contain sensitive material (like passwords).
|
||||||
func MakeMountArgs(source, target, fstype string, options []string) (mountArgs []string) {
|
func MakeMountArgs(source, target, fstype string, options []string) (mountArgs []string) {
|
||||||
mountArgs, _ = MakeMountArgsSensitive(source, target, fstype, options, nil /* sensitiveOptions */)
|
mountArgs, _ = MakeMountArgsSensitive(source, target, fstype, options, nil /* sensitiveOptions */, nil /* mountFlags */)
|
||||||
return mountArgs
|
return mountArgs
|
||||||
}
|
}
|
||||||
|
|
||||||
// MakeMountArgsSensitive makes the arguments to the mount(8) command.
|
// MakeMountArgsSensitive makes the arguments to the mount(8) command.
|
||||||
// sensitiveOptions is an extension of options except they will not be logged (because they may contain sensitive material)
|
// sensitiveOptions is an extension of options except they will not be logged (because they may contain sensitive material)
|
||||||
func MakeMountArgsSensitive(source, target, fstype string, options []string, sensitiveOptions []string) (mountArgs []string, mountArgsLogStr string) {
|
func MakeMountArgsSensitive(source, target, fstype string, options []string, sensitiveOptions []string, mountFlags []string) (mountArgs []string, mountArgsLogStr string) {
|
||||||
// Build mount command as follows:
|
// Build mount command as follows:
|
||||||
// mount [-t $fstype] [-o $options] [$source] $target
|
// mount [--$mountFlags] [-t $fstype] [-o $options] [$source] $target
|
||||||
mountArgs = []string{}
|
mountArgs = []string{}
|
||||||
mountArgsLogStr = ""
|
mountArgsLogStr = ""
|
||||||
|
|
||||||
|
mountArgs = append(mountArgs, mountFlags...)
|
||||||
|
mountArgsLogStr += strings.Join(mountFlags, " ")
|
||||||
|
|
||||||
if len(fstype) > 0 {
|
if len(fstype) > 0 {
|
||||||
mountArgs = append(mountArgs, "-t", fstype)
|
mountArgs = append(mountArgs, "-t", fstype)
|
||||||
mountArgsLogStr += strings.Join(mountArgs, " ")
|
mountArgsLogStr += strings.Join(mountArgs, " ")
|
||||||
|
@ -64,6 +64,12 @@ func (mounter *Mounter) MountSensitiveWithoutSystemd(source string, target strin
|
|||||||
return mounter.MountSensitive(source, target, fstype, options, sensitiveOptions /* sensitiveOptions */)
|
return mounter.MountSensitive(source, target, fstype, options, sensitiveOptions /* sensitiveOptions */)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// MountSensitiveWithoutSystemdWithMountFlags is the same as MountSensitiveWithoutSystemd with additional mount flags
|
||||||
|
// Windows not supported systemd mount, this function degrades to MountSensitive().
|
||||||
|
func (mounter *Mounter) MountSensitiveWithoutSystemdWithMountFlags(source string, target string, fstype string, options []string, sensitiveOptions []string, mountFlags []string) error {
|
||||||
|
return mounter.MountSensitive(source, target, fstype, options, sensitiveOptions /* sensitiveOptions */)
|
||||||
|
}
|
||||||
|
|
||||||
// MountSensitive is the same as Mount() but this method allows
|
// MountSensitive is the same as Mount() but this method allows
|
||||||
// sensitiveOptions to be passed in a separate parameter from the normal
|
// sensitiveOptions to be passed in a separate parameter from the normal
|
||||||
// mount options and ensures the sensitiveOptions are never logged. This
|
// mount options and ensures the sensitiveOptions are never logged. This
|
||||||
|
Loading…
Reference in New Issue
Block a user