mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-28 14:07:14 +00:00
implement proposal 34058: hostPath volume type
This commit is contained in:
parent
625eb9ab7a
commit
5c45db564f
@ -355,6 +355,15 @@ var Funcs = func(codecs runtimeserializer.CodecFactory) []interface{} {
|
|||||||
r.Keyring = "/etc/ceph/keyring"
|
r.Keyring = "/etc/ceph/keyring"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
func(obj *api.HostPathVolumeSource, c fuzz.Continue) {
|
||||||
|
c.FuzzNoCustom(obj)
|
||||||
|
types := []api.HostPathType{api.HostPathDirectoryOrCreate, api.HostPathDirectory, api.HostPathFileOrCreate,
|
||||||
|
api.HostPathFile, api.HostPathSocket, api.HostPathCharDev, api.HostPathBlockDev}
|
||||||
|
typeVol := types[c.Rand.Intn(len(types))]
|
||||||
|
if obj.Path != "" && obj.Type == nil {
|
||||||
|
obj.Type = &typeVol
|
||||||
|
}
|
||||||
|
},
|
||||||
func(pv *api.PersistentVolume, c fuzz.Continue) {
|
func(pv *api.PersistentVolume, c fuzz.Continue) {
|
||||||
c.FuzzNoCustom(pv) // fuzz self without calling this function again
|
c.FuzzNoCustom(pv) // fuzz self without calling this function again
|
||||||
types := []api.PersistentVolumePhase{api.VolumeAvailable, api.VolumePending, api.VolumeBound, api.VolumeReleased, api.VolumeFailed}
|
types := []api.PersistentVolumePhase{api.VolumeAvailable, api.VolumePending, api.VolumeBound, api.VolumeReleased, api.VolumeFailed}
|
||||||
|
@ -597,10 +597,34 @@ const (
|
|||||||
ClaimLost PersistentVolumeClaimPhase = "Lost"
|
ClaimLost PersistentVolumeClaimPhase = "Lost"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type HostPathType string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// If nothing exists at the given path, an empty directory will be created there
|
||||||
|
// as needed with file mode 0755, having the same group and ownership with Kubelet.
|
||||||
|
HostPathDirectoryOrCreate HostPathType = "DirectoryOrCreate"
|
||||||
|
// A directory must exist at the given path
|
||||||
|
HostPathDirectory HostPathType = "Directory"
|
||||||
|
// If nothing exists at the given path, an empty file will be created there
|
||||||
|
// as needed with file mode 0644, having the same group and ownership with Kubelet.
|
||||||
|
HostPathFileOrCreate HostPathType = "FileOrCreate"
|
||||||
|
// A file must exist at the given path
|
||||||
|
HostPathFile HostPathType = "File"
|
||||||
|
// A UNIX socket must exist at the given path
|
||||||
|
HostPathSocket HostPathType = "Socket"
|
||||||
|
// A character device must exist at the given path
|
||||||
|
HostPathCharDev HostPathType = "CharDevice"
|
||||||
|
// A block device must exist at the given path
|
||||||
|
HostPathBlockDev HostPathType = "BlockDevice"
|
||||||
|
)
|
||||||
|
|
||||||
// Represents a host path mapped into a pod.
|
// Represents a host path mapped into a pod.
|
||||||
// Host path volumes do not support ownership management or SELinux relabeling.
|
// Host path volumes do not support ownership management or SELinux relabeling.
|
||||||
type HostPathVolumeSource struct {
|
type HostPathVolumeSource struct {
|
||||||
|
// If the path is a symlink, it will follow the link to the real path.
|
||||||
Path string
|
Path string
|
||||||
|
// Defaults to DirectoryOrCreate
|
||||||
|
Type *HostPathType
|
||||||
}
|
}
|
||||||
|
|
||||||
// Represents an empty directory for a pod.
|
// Represents an empty directory for a pod.
|
||||||
|
@ -369,3 +369,10 @@ func SetDefaults_ScaleIOVolumeSource(obj *v1.ScaleIOVolumeSource) {
|
|||||||
obj.FSType = "xfs"
|
obj.FSType = "xfs"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func SetDefaults_HostPathVolumeSource(obj *v1.HostPathVolumeSource) {
|
||||||
|
typeVol := v1.HostPathDirectoryOrCreate
|
||||||
|
if obj.Type == nil {
|
||||||
|
obj.Type = &typeVol
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -623,6 +623,7 @@ func validateHostPathVolumeSource(hostPath *api.HostPathVolumeSource, fldPath *f
|
|||||||
}
|
}
|
||||||
|
|
||||||
allErrs = append(allErrs, validatePathNoBacksteps(hostPath.Path, fldPath.Child("path"))...)
|
allErrs = append(allErrs, validatePathNoBacksteps(hostPath.Path, fldPath.Child("path"))...)
|
||||||
|
allErrs = append(allErrs, validateHostPathType(hostPath.Type, fldPath.Child("type"))...)
|
||||||
return allErrs
|
return allErrs
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -974,6 +975,25 @@ func validateProjectedVolumeSource(projection *api.ProjectedVolumeSource, fldPat
|
|||||||
return allErrs
|
return allErrs
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var supportedHostPathTypes = sets.NewString(
|
||||||
|
string(api.HostPathDirectoryOrCreate),
|
||||||
|
string(api.HostPathDirectory),
|
||||||
|
string(api.HostPathFileOrCreate),
|
||||||
|
string(api.HostPathFile),
|
||||||
|
string(api.HostPathSocket),
|
||||||
|
string(api.HostPathCharDev),
|
||||||
|
string(api.HostPathBlockDev))
|
||||||
|
|
||||||
|
func validateHostPathType(hostPathType *api.HostPathType, fldPath *field.Path) field.ErrorList {
|
||||||
|
allErrs := field.ErrorList{}
|
||||||
|
|
||||||
|
if !supportedHostPathTypes.Has(string(*hostPathType)) {
|
||||||
|
allErrs = append(allErrs, field.NotSupported(fldPath, hostPathType, supportedHostPathTypes.List()))
|
||||||
|
}
|
||||||
|
|
||||||
|
return allErrs
|
||||||
|
}
|
||||||
|
|
||||||
// This validate will make sure targetPath:
|
// This validate will make sure targetPath:
|
||||||
// 1. is not abs path
|
// 1. is not abs path
|
||||||
// 2. does not have any element which is ".."
|
// 2. does not have any element which is ".."
|
||||||
|
@ -43,6 +43,12 @@ const (
|
|||||||
envVarNameErrMsg = "a valid environment variable name must consist of"
|
envVarNameErrMsg = "a valid environment variable name must consist of"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func newHostPathType(pathType string) *api.HostPathType {
|
||||||
|
hostPathType := new(api.HostPathType)
|
||||||
|
*hostPathType = api.HostPathType(pathType)
|
||||||
|
return hostPathType
|
||||||
|
}
|
||||||
|
|
||||||
func testVolume(name string, namespace string, spec api.PersistentVolumeSpec) *api.PersistentVolume {
|
func testVolume(name string, namespace string, spec api.PersistentVolumeSpec) *api.PersistentVolume {
|
||||||
objMeta := metav1.ObjectMeta{Name: name}
|
objMeta := metav1.ObjectMeta{Name: name}
|
||||||
if namespace != "" {
|
if namespace != "" {
|
||||||
@ -86,7 +92,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
StorageClassName: "valid",
|
StorageClassName: "valid",
|
||||||
}),
|
}),
|
||||||
@ -99,7 +108,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRetain,
|
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRetain,
|
||||||
}),
|
}),
|
||||||
@ -112,7 +124,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{"fakemode"},
|
AccessModes: []api.PersistentVolumeAccessMode{"fakemode"},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}),
|
}),
|
||||||
},
|
},
|
||||||
@ -124,7 +139,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
PersistentVolumeReclaimPolicy: "fakeReclaimPolicy",
|
PersistentVolumeReclaimPolicy: "fakeReclaimPolicy",
|
||||||
}),
|
}),
|
||||||
@ -137,7 +155,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}),
|
}),
|
||||||
},
|
},
|
||||||
@ -149,7 +170,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}),
|
}),
|
||||||
},
|
},
|
||||||
@ -173,7 +197,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
api.ResourceName(api.ResourceStorage): resource.MustParse("10G"),
|
api.ResourceName(api.ResourceStorage): resource.MustParse("10G"),
|
||||||
},
|
},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}),
|
}),
|
||||||
},
|
},
|
||||||
@ -184,7 +211,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
api.ResourceName(api.ResourceStorage): resource.MustParse("5G"),
|
api.ResourceName(api.ResourceStorage): resource.MustParse("5G"),
|
||||||
},
|
},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
GCEPersistentDisk: &api.GCEPersistentDiskVolumeSource{PDName: "foo", FSType: "ext4"},
|
GCEPersistentDisk: &api.GCEPersistentDiskVolumeSource{PDName: "foo", FSType: "ext4"},
|
||||||
},
|
},
|
||||||
}),
|
}),
|
||||||
@ -197,7 +227,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRecycle,
|
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRecycle,
|
||||||
}),
|
}),
|
||||||
@ -210,7 +243,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/a/.."},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/a/..",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRecycle,
|
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRecycle,
|
||||||
}),
|
}),
|
||||||
@ -223,7 +259,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
StorageClassName: "-invalid-",
|
StorageClassName: "-invalid-",
|
||||||
}),
|
}),
|
||||||
@ -272,7 +311,10 @@ func TestValidatePersistentVolumes(t *testing.T) {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo/.."},
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/foo/..",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
StorageClassName: "backstep-hostpath",
|
StorageClassName: "backstep-hostpath",
|
||||||
}),
|
}),
|
||||||
@ -1109,6 +1151,7 @@ func TestValidateVolumes(t *testing.T) {
|
|||||||
EmptyDir: &api.EmptyDirVolumeSource{},
|
EmptyDir: &api.EmptyDirVolumeSource{},
|
||||||
HostPath: &api.HostPathVolumeSource{
|
HostPath: &api.HostPathVolumeSource{
|
||||||
Path: "/mnt/path",
|
Path: "/mnt/path",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -1116,7 +1159,20 @@ func TestValidateVolumes(t *testing.T) {
|
|||||||
errfield: "hostPath",
|
errfield: "hostPath",
|
||||||
errdetail: "may not specify more than 1 volume",
|
errdetail: "may not specify more than 1 volume",
|
||||||
},
|
},
|
||||||
// HostPath
|
// HostPath Default
|
||||||
|
{
|
||||||
|
name: "default HostPath",
|
||||||
|
vol: api.Volume{
|
||||||
|
Name: "hostpath",
|
||||||
|
VolumeSource: api.VolumeSource{
|
||||||
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/mnt/path",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// HostPath Supported
|
||||||
{
|
{
|
||||||
name: "valid HostPath",
|
name: "valid HostPath",
|
||||||
vol: api.Volume{
|
vol: api.Volume{
|
||||||
@ -1124,10 +1180,26 @@ func TestValidateVolumes(t *testing.T) {
|
|||||||
VolumeSource: api.VolumeSource{
|
VolumeSource: api.VolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{
|
HostPath: &api.HostPathVolumeSource{
|
||||||
Path: "/mnt/path",
|
Path: "/mnt/path",
|
||||||
|
Type: newHostPathType(string(api.HostPathSocket)),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
// HostPath Invalid
|
||||||
|
{
|
||||||
|
name: "invalid HostPath",
|
||||||
|
vol: api.Volume{
|
||||||
|
Name: "hostpath",
|
||||||
|
VolumeSource: api.VolumeSource{
|
||||||
|
HostPath: &api.HostPathVolumeSource{
|
||||||
|
Path: "/mnt/path",
|
||||||
|
Type: newHostPathType("invalid"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
errtype: field.ErrorTypeNotSupported,
|
||||||
|
errfield: "type",
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "invalid HostPath backsteps",
|
name: "invalid HostPath backsteps",
|
||||||
vol: api.Volume{
|
vol: api.Volume{
|
||||||
@ -1135,6 +1207,7 @@ func TestValidateVolumes(t *testing.T) {
|
|||||||
VolumeSource: api.VolumeSource{
|
VolumeSource: api.VolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{
|
HostPath: &api.HostPathVolumeSource{
|
||||||
Path: "/mnt/path/..",
|
Path: "/mnt/path/..",
|
||||||
|
Type: newHostPathType(string(api.HostPathDirectory)),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -69,6 +69,7 @@ func (kl *Kubelet) newVolumeMounterFromPlugins(spec *volume.Spec, pod *v1.Pod, o
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("can't use volume plugins for %s: %v", spec.Name(), err)
|
return nil, fmt.Errorf("can't use volume plugins for %s: %v", spec.Name(), err)
|
||||||
}
|
}
|
||||||
|
opts.Containerized = kl.kubeletConfiguration.Containerized
|
||||||
physicalMounter, err := plugin.NewMounter(spec, pod, opts)
|
physicalMounter, err := plugin.NewMounter(spec, pod, opts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to instantiate mounter for volume: %s using plugin: %s with a root cause: %v", spec.Name(), plugin.GetPluginName(), err)
|
return nil, fmt.Errorf("failed to instantiate mounter for volume: %s using plugin: %s with a root cause: %v", spec.Name(), plugin.GetPluginName(), err)
|
||||||
|
@ -46,6 +46,12 @@ func newStorage(t *testing.T) (*REST, *StatusREST, *etcdtesting.EtcdTestServer)
|
|||||||
return persistentVolumeStorage, statusStorage, server
|
return persistentVolumeStorage, statusStorage, server
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func newHostPathType(pathType string) *api.HostPathType {
|
||||||
|
hostPathType := new(api.HostPathType)
|
||||||
|
*hostPathType = api.HostPathType(pathType)
|
||||||
|
return hostPathType
|
||||||
|
}
|
||||||
|
|
||||||
func validNewPersistentVolume(name string) *api.PersistentVolume {
|
func validNewPersistentVolume(name string) *api.PersistentVolume {
|
||||||
pv := &api.PersistentVolume{
|
pv := &api.PersistentVolume{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
@ -57,7 +63,7 @@ func validNewPersistentVolume(name string) *api.PersistentVolume {
|
|||||||
},
|
},
|
||||||
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
AccessModes: []api.PersistentVolumeAccessMode{api.ReadWriteOnce},
|
||||||
PersistentVolumeSource: api.PersistentVolumeSource{
|
PersistentVolumeSource: api.PersistentVolumeSource{
|
||||||
HostPath: &api.HostPathVolumeSource{Path: "/foo"},
|
HostPath: &api.HostPathVolumeSource{Path: "/foo", Type: newHostPathType(string(api.HostPathDirectoryOrCreate))},
|
||||||
},
|
},
|
||||||
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRetain,
|
PersistentVolumeReclaimPolicy: api.PersistentVolumeReclaimRetain,
|
||||||
},
|
},
|
||||||
|
@ -11,6 +11,7 @@ go_library(
|
|||||||
srcs = [
|
srcs = [
|
||||||
"doc.go",
|
"doc.go",
|
||||||
"host_path.go",
|
"host_path.go",
|
||||||
|
"host_path_unix.go",
|
||||||
],
|
],
|
||||||
deps = [
|
deps = [
|
||||||
"//pkg/volume:go_default_library",
|
"//pkg/volume:go_default_library",
|
||||||
|
@ -99,14 +99,15 @@ func (plugin *hostPathPlugin) GetAccessModes() []v1.PersistentVolumeAccessMode {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (plugin *hostPathPlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, _ volume.VolumeOptions) (volume.Mounter, error) {
|
func (plugin *hostPathPlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, opts volume.VolumeOptions) (volume.Mounter, error) {
|
||||||
hostPathVolumeSource, readOnly, err := getVolumeSource(spec)
|
hostPathVolumeSource, readOnly, err := getVolumeSource(spec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
path := hostPathVolumeSource.Path
|
||||||
return &hostPathMounter{
|
return &hostPathMounter{
|
||||||
hostPath: &hostPath{path: hostPathVolumeSource.Path},
|
hostPath: &hostPath{path: path, pathType: hostPathVolumeSource.Type},
|
||||||
readOnly: readOnly,
|
readOnly: readOnly,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
@ -175,7 +176,8 @@ func newProvisioner(options volume.VolumeOptions, host volume.VolumeHost, plugin
|
|||||||
// HostPath volumes represent a bare host file or directory mount.
|
// HostPath volumes represent a bare host file or directory mount.
|
||||||
// The direct at the specified path will be directly exposed to the container.
|
// The direct at the specified path will be directly exposed to the container.
|
||||||
type hostPath struct {
|
type hostPath struct {
|
||||||
path string
|
path string
|
||||||
|
pathType *v1.HostPathType
|
||||||
volume.MetricsNil
|
volume.MetricsNil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -211,7 +213,8 @@ func (b *hostPathMounter) SetUp(fsGroup *int64) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("invalid HostPath `%s`: %v", b.GetPath(), err)
|
return fmt.Errorf("invalid HostPath `%s`: %v", b.GetPath(), err)
|
||||||
}
|
}
|
||||||
return nil
|
|
||||||
|
return checkType(b.GetPath(), b.pathType)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetUpAt does not make sense for host paths - probably programmer error.
|
// SetUpAt does not make sense for host paths - probably programmer error.
|
||||||
@ -314,3 +317,170 @@ func getVolumeSource(spec *volume.Spec) (*v1.HostPathVolumeSource, bool, error)
|
|||||||
|
|
||||||
return nil, false, fmt.Errorf("Spec does not reference an HostPath volume type")
|
return nil, false, fmt.Errorf("Spec does not reference an HostPath volume type")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type hostPathTypeChecker interface {
|
||||||
|
Exists() bool
|
||||||
|
IsFile() bool
|
||||||
|
MakeFile() error
|
||||||
|
IsDir() bool
|
||||||
|
MakeDir() error
|
||||||
|
IsBlock() bool
|
||||||
|
IsChar() bool
|
||||||
|
IsSocket() bool
|
||||||
|
GetPath() string
|
||||||
|
}
|
||||||
|
|
||||||
|
type fileTypeChecker interface {
|
||||||
|
getFileType(fileInfo os.FileInfo) (v1.HostPathType, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// this is implemented in per-OS files
|
||||||
|
type defaultFileTypeChecker struct{}
|
||||||
|
|
||||||
|
type osFileTypeChecker struct {
|
||||||
|
path string
|
||||||
|
exists bool
|
||||||
|
info os.FileInfo
|
||||||
|
checker fileTypeChecker
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) Exists() bool {
|
||||||
|
return ftc.exists
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) IsFile() bool {
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return !ftc.info.IsDir()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) MakeFile() error {
|
||||||
|
f, err := os.OpenFile(ftc.path, os.O_CREATE, os.FileMode(0644))
|
||||||
|
defer f.Close()
|
||||||
|
if err != nil {
|
||||||
|
if !os.IsExist(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) IsDir() bool {
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return ftc.info.IsDir()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) MakeDir() error {
|
||||||
|
err := os.MkdirAll(ftc.path, os.FileMode(0755))
|
||||||
|
if err != nil {
|
||||||
|
if !os.IsExist(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) IsBlock() bool {
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
blkDevType, err := ftc.checker.getFileType(ftc.info)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return blkDevType == v1.HostPathBlockDev
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) IsChar() bool {
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
charDevType, err := ftc.checker.getFileType(ftc.info)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return charDevType == v1.HostPathCharDev
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) IsSocket() bool {
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
socketType, err := ftc.checker.getFileType(ftc.info)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return socketType == v1.HostPathSocket
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *osFileTypeChecker) GetPath() string {
|
||||||
|
return ftc.path
|
||||||
|
}
|
||||||
|
|
||||||
|
func newOSFileTypeChecker(path string, checker fileTypeChecker) (hostPathTypeChecker, error) {
|
||||||
|
ftc := osFileTypeChecker{path: path, checker: checker}
|
||||||
|
info, err := os.Stat(path)
|
||||||
|
if err != nil {
|
||||||
|
ftc.exists = false
|
||||||
|
if !os.IsNotExist(err) {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
ftc.info = info
|
||||||
|
ftc.exists = true
|
||||||
|
}
|
||||||
|
return &ftc, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkType(path string, pathType *v1.HostPathType) error {
|
||||||
|
ftc, err := newOSFileTypeChecker(path, &defaultFileTypeChecker{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return checkTypeInternal(ftc, pathType)
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkTypeInternal(ftc hostPathTypeChecker, pathType *v1.HostPathType) error {
|
||||||
|
switch *pathType {
|
||||||
|
case v1.HostPathDirectoryOrCreate:
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return ftc.MakeDir()
|
||||||
|
}
|
||||||
|
fallthrough
|
||||||
|
case v1.HostPathDirectory:
|
||||||
|
if !ftc.IsDir() {
|
||||||
|
return fmt.Errorf("hostPath type check failed: %s is not a directory", ftc.GetPath())
|
||||||
|
}
|
||||||
|
case v1.HostPathFileOrCreate:
|
||||||
|
if !ftc.Exists() {
|
||||||
|
return ftc.MakeFile()
|
||||||
|
}
|
||||||
|
fallthrough
|
||||||
|
case v1.HostPathFile:
|
||||||
|
if !ftc.IsFile() {
|
||||||
|
return fmt.Errorf("hostPath type check failed: %s is not a file", ftc.GetPath())
|
||||||
|
}
|
||||||
|
case v1.HostPathSocket:
|
||||||
|
if !ftc.IsSocket() {
|
||||||
|
return fmt.Errorf("hostPath type check failed: %s is not a socket file", ftc.GetPath())
|
||||||
|
}
|
||||||
|
case v1.HostPathCharDev:
|
||||||
|
if !ftc.IsChar() {
|
||||||
|
return fmt.Errorf("hostPath type check failed: %s is not a character device", ftc.GetPath())
|
||||||
|
}
|
||||||
|
case v1.HostPathBlockDev:
|
||||||
|
if !ftc.IsBlock() {
|
||||||
|
return fmt.Errorf("hostPath type check failed: %s is not a block device", ftc.GetPath())
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("%s is an invalid volume type", *pathType)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
@ -34,6 +34,21 @@ import (
|
|||||||
volumetest "k8s.io/kubernetes/pkg/volume/testing"
|
volumetest "k8s.io/kubernetes/pkg/volume/testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func newHostPathType(pathType string) *v1.HostPathType {
|
||||||
|
hostPathType := new(v1.HostPathType)
|
||||||
|
*hostPathType = v1.HostPathType(pathType)
|
||||||
|
return hostPathType
|
||||||
|
}
|
||||||
|
|
||||||
|
func newHostPathTypeList(pathType ...string) []*v1.HostPathType {
|
||||||
|
typeList := []*v1.HostPathType{}
|
||||||
|
for _, ele := range pathType {
|
||||||
|
typeList = append(typeList, newHostPathType(ele))
|
||||||
|
}
|
||||||
|
|
||||||
|
return typeList
|
||||||
|
}
|
||||||
|
|
||||||
func TestCanSupport(t *testing.T) {
|
func TestCanSupport(t *testing.T) {
|
||||||
plugMgr := volume.VolumePluginMgr{}
|
plugMgr := volume.VolumePluginMgr{}
|
||||||
plugMgr.InitPlugins(ProbeVolumePlugins(volume.VolumeConfig{}), volumetest.NewFakeVolumeHost("fake", nil, nil))
|
plugMgr.InitPlugins(ProbeVolumePlugins(volume.VolumeConfig{}), volumetest.NewFakeVolumeHost("fake", nil, nil))
|
||||||
@ -108,7 +123,7 @@ func TestDeleter(t *testing.T) {
|
|||||||
if err := deleter.Delete(); err != nil {
|
if err := deleter.Delete(); err != nil {
|
||||||
t.Errorf("Mock Recycler expected to return nil but got %s", err)
|
t.Errorf("Mock Recycler expected to return nil but got %s", err)
|
||||||
}
|
}
|
||||||
if exists, _ := utilfile.FileExists("foo"); exists {
|
if exists, _ := utilfile.FileExists(tempPath); exists {
|
||||||
t.Errorf("Temp path expected to be deleted, but was found at %s", tempPath)
|
t.Errorf("Temp path expected to be deleted, but was found at %s", tempPath)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -215,11 +230,14 @@ func TestPlugin(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("Can't find the plugin by name")
|
t.Errorf("Can't find the plugin by name")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
volPath := "/tmp/vol1"
|
||||||
spec := &v1.Volume{
|
spec := &v1.Volume{
|
||||||
Name: "vol1",
|
Name: "vol1",
|
||||||
VolumeSource: v1.VolumeSource{HostPath: &v1.HostPathVolumeSource{Path: "/vol1"}},
|
VolumeSource: v1.VolumeSource{HostPath: &v1.HostPathVolumeSource{Path: volPath, Type: newHostPathType(string(v1.HostPathDirectoryOrCreate))}},
|
||||||
}
|
}
|
||||||
pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
|
pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
|
||||||
|
defer os.RemoveAll(volPath)
|
||||||
mounter, err := plug.NewMounter(volume.NewSpecFromVolume(spec), pod, volume.VolumeOptions{})
|
mounter, err := plug.NewMounter(volume.NewSpecFromVolume(spec), pod, volume.VolumeOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("Failed to make a new Mounter: %v", err)
|
t.Errorf("Failed to make a new Mounter: %v", err)
|
||||||
@ -229,7 +247,7 @@ func TestPlugin(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
path := mounter.GetPath()
|
path := mounter.GetPath()
|
||||||
if path != "/vol1" {
|
if path != volPath {
|
||||||
t.Errorf("Got unexpected path: %s", path)
|
t.Errorf("Got unexpected path: %s", path)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -257,13 +275,14 @@ func TestPersistentClaimReadOnlyFlag(t *testing.T) {
|
|||||||
},
|
},
|
||||||
Spec: v1.PersistentVolumeSpec{
|
Spec: v1.PersistentVolumeSpec{
|
||||||
PersistentVolumeSource: v1.PersistentVolumeSource{
|
PersistentVolumeSource: v1.PersistentVolumeSource{
|
||||||
HostPath: &v1.HostPathVolumeSource{Path: "foo"},
|
HostPath: &v1.HostPathVolumeSource{Path: "foo", Type: newHostPathType(string(v1.HostPathDirectoryOrCreate))},
|
||||||
},
|
},
|
||||||
ClaimRef: &v1.ObjectReference{
|
ClaimRef: &v1.ObjectReference{
|
||||||
Name: "claimA",
|
Name: "claimA",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
defer os.RemoveAll("foo")
|
||||||
|
|
||||||
claim := &v1.PersistentVolumeClaim{
|
claim := &v1.PersistentVolumeClaim{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
@ -293,3 +312,297 @@ func TestPersistentClaimReadOnlyFlag(t *testing.T) {
|
|||||||
t.Errorf("Expected true for mounter.IsReadOnly")
|
t.Errorf("Expected true for mounter.IsReadOnly")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type fakeFileTypeChecker struct {
|
||||||
|
desiredType string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fftc *fakeFileTypeChecker) getFileType(_ os.FileInfo) (v1.HostPathType, error) {
|
||||||
|
return *newHostPathType(fftc.desiredType), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func setUp() error {
|
||||||
|
err := os.MkdirAll("/tmp/ExistingFolder", os.FileMode(0755))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := os.OpenFile("/tmp/ExistingFolder/foo", os.O_CREATE, os.FileMode(0644))
|
||||||
|
defer f.Close()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func tearDown() {
|
||||||
|
os.RemoveAll("/tmp/ExistingFolder")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestOSFileTypeChecker(t *testing.T) {
|
||||||
|
err := setUp()
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
defer tearDown()
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
path string
|
||||||
|
desiredType string
|
||||||
|
isDir bool
|
||||||
|
isFile bool
|
||||||
|
isSocket bool
|
||||||
|
isBlock bool
|
||||||
|
isChar bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Existing Folder",
|
||||||
|
path: "/tmp/ExistingFolder",
|
||||||
|
isDir: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing File",
|
||||||
|
path: "/tmp/ExistingFolder/foo",
|
||||||
|
isFile: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing Socket File",
|
||||||
|
path: "/tmp/ExistingFolder/foo",
|
||||||
|
desiredType: string(v1.HostPathSocket),
|
||||||
|
isSocket: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing Character Device",
|
||||||
|
path: "/tmp/ExistingFolder/foo",
|
||||||
|
desiredType: string(v1.HostPathCharDev),
|
||||||
|
isChar: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing Block Device",
|
||||||
|
path: "/tmp/ExistingFolder/foo",
|
||||||
|
desiredType: string(v1.HostPathBlockDev),
|
||||||
|
isBlock: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
oftc, err := newOSFileTypeChecker(tc.path,
|
||||||
|
&fakeFileTypeChecker{desiredType: tc.desiredType})
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("[%d: %q] expect nil, but got %v", i, tc.name, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
path := oftc.GetPath()
|
||||||
|
if path != tc.path {
|
||||||
|
t.Errorf("[%d: %q] got unexpected path: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
exist := oftc.Exists()
|
||||||
|
if !exist {
|
||||||
|
t.Errorf("[%d: %q] path: %s does not exist", i, tc.name, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.isDir {
|
||||||
|
if !oftc.IsDir() {
|
||||||
|
t.Errorf("[%d: %q] expected folder, got unexpected: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsFile() {
|
||||||
|
t.Errorf("[%d: %q] expected folder, got unexpected file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsSocket() {
|
||||||
|
t.Errorf("[%d: %q] expected folder, got unexpected socket file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsBlock() {
|
||||||
|
t.Errorf("[%d: %q] expected folder, got unexpected block device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsChar() {
|
||||||
|
t.Errorf("[%d: %q] expected folder, got unexpected character device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.isFile {
|
||||||
|
if !oftc.IsFile() {
|
||||||
|
t.Errorf("[%d: %q] expected file, got unexpected: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsDir() {
|
||||||
|
t.Errorf("[%d: %q] expected file, got unexpected folder: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsSocket() {
|
||||||
|
t.Errorf("[%d: %q] expected file, got unexpected socket file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsBlock() {
|
||||||
|
t.Errorf("[%d: %q] expected file, got unexpected block device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsChar() {
|
||||||
|
t.Errorf("[%d: %q] expected file, got unexpected character device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.isSocket {
|
||||||
|
if !oftc.IsSocket() {
|
||||||
|
t.Errorf("[%d: %q] expected socket file, got unexpected: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsDir() {
|
||||||
|
t.Errorf("[%d: %q] expected socket file, got unexpected folder: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if !oftc.IsFile() {
|
||||||
|
t.Errorf("[%d: %q] expected socket file, got unexpected file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsBlock() {
|
||||||
|
t.Errorf("[%d: %q] expected socket file, got unexpected block device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsChar() {
|
||||||
|
t.Errorf("[%d: %q] expected socket file, got unexpected character device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.isChar {
|
||||||
|
if !oftc.IsChar() {
|
||||||
|
t.Errorf("[%d: %q] expected character device, got unexpected: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsDir() {
|
||||||
|
t.Errorf("[%d: %q] expected character device, got unexpected folder: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if !oftc.IsFile() {
|
||||||
|
t.Errorf("[%d: %q] expected character device, got unexpected file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsSocket() {
|
||||||
|
t.Errorf("[%d: %q] expected character device, got unexpected socket file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsBlock() {
|
||||||
|
t.Errorf("[%d: %q] expected character device, got unexpected block device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.isBlock {
|
||||||
|
if !oftc.IsBlock() {
|
||||||
|
t.Errorf("[%d: %q] expected block device, got unexpected: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsDir() {
|
||||||
|
t.Errorf("[%d: %q] expected block device, got unexpected folder: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if !oftc.IsFile() {
|
||||||
|
t.Errorf("[%d: %q] expected block device, got unexpected file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsSocket() {
|
||||||
|
t.Errorf("[%d: %q] expected block device, got unexpected socket file: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
if oftc.IsChar() {
|
||||||
|
t.Errorf("[%d: %q] expected block device, got unexpected character device: %s", i, tc.name, path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
type fakeHostPathTypeChecker struct {
|
||||||
|
name string
|
||||||
|
path string
|
||||||
|
exists bool
|
||||||
|
isDir bool
|
||||||
|
isFile bool
|
||||||
|
isSocket bool
|
||||||
|
isBlock bool
|
||||||
|
isChar bool
|
||||||
|
validpathType []*v1.HostPathType
|
||||||
|
invalidpathType []*v1.HostPathType
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ftc *fakeHostPathTypeChecker) MakeFile() error { return nil }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) MakeDir() error { return nil }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) Exists() bool { return ftc.exists }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) IsFile() bool { return ftc.isFile }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) IsDir() bool { return ftc.isDir }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) IsBlock() bool { return ftc.isBlock }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) IsChar() bool { return ftc.isChar }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) IsSocket() bool { return ftc.isSocket }
|
||||||
|
func (ftc *fakeHostPathTypeChecker) GetPath() string { return ftc.path }
|
||||||
|
|
||||||
|
func TestHostPathTypeCheckerInternal(t *testing.T) {
|
||||||
|
testCases := []fakeHostPathTypeChecker{
|
||||||
|
{
|
||||||
|
name: "Existing Folder",
|
||||||
|
path: "/existingFolder",
|
||||||
|
isDir: true,
|
||||||
|
exists: true,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathDirectoryOrCreate), string(v1.HostPathDirectory)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathFileOrCreate), string(v1.HostPathFile),
|
||||||
|
string(v1.HostPathSocket), string(v1.HostPathCharDev), string(v1.HostPathBlockDev)),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "New Folder",
|
||||||
|
path: "/newFolder",
|
||||||
|
isDir: false,
|
||||||
|
exists: false,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathDirectoryOrCreate)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathDirectory), string(v1.HostPathFile),
|
||||||
|
string(v1.HostPathSocket), string(v1.HostPathCharDev), string(v1.HostPathBlockDev)),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing File",
|
||||||
|
path: "/existingFile",
|
||||||
|
isFile: true,
|
||||||
|
exists: true,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathFileOrCreate), string(v1.HostPathFile)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathDirectoryOrCreate), string(v1.HostPathDirectory),
|
||||||
|
string(v1.HostPathSocket), string(v1.HostPathCharDev), string(v1.HostPathBlockDev)),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "New File",
|
||||||
|
path: "/newFile",
|
||||||
|
isFile: false,
|
||||||
|
exists: false,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathFileOrCreate)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathFile), string(v1.HostPathDirectory),
|
||||||
|
string(v1.HostPathSocket), string(v1.HostPathCharDev), string(v1.HostPathBlockDev)),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing Socket",
|
||||||
|
path: "/existing.socket",
|
||||||
|
isSocket: true,
|
||||||
|
isFile: true,
|
||||||
|
exists: true,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathSocket), string(v1.HostPathFileOrCreate), string(v1.HostPathFile)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathDirectoryOrCreate), string(v1.HostPathDirectory),
|
||||||
|
string(v1.HostPathCharDev), string(v1.HostPathBlockDev)),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing Character Device",
|
||||||
|
path: "/existing.char",
|
||||||
|
isChar: true,
|
||||||
|
isFile: true,
|
||||||
|
exists: true,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathCharDev), string(v1.HostPathFileOrCreate), string(v1.HostPathFile)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathDirectoryOrCreate), string(v1.HostPathDirectory),
|
||||||
|
string(v1.HostPathSocket), string(v1.HostPathBlockDev)),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Existing Block Device",
|
||||||
|
path: "/existing.block",
|
||||||
|
isBlock: true,
|
||||||
|
isFile: true,
|
||||||
|
exists: true,
|
||||||
|
validpathType: newHostPathTypeList(string(v1.HostPathBlockDev), string(v1.HostPathFileOrCreate), string(v1.HostPathFile)),
|
||||||
|
invalidpathType: newHostPathTypeList(string(v1.HostPathDirectoryOrCreate), string(v1.HostPathDirectory),
|
||||||
|
string(v1.HostPathSocket), string(v1.HostPathCharDev)),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
for _, pathType := range tc.validpathType {
|
||||||
|
err := checkTypeInternal(&tc, pathType)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("[%d: %q] [%q] expected nil, got %v", i, tc.name, string(*pathType), err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, pathType := range tc.invalidpathType {
|
||||||
|
checkResult := checkTypeInternal(&tc, pathType)
|
||||||
|
if checkResult == nil {
|
||||||
|
t.Errorf("[%d: %q] [%q] expected error, got nil", i, tc.name, string(*pathType))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
40
pkg/volume/host_path/host_path_unix.go
Normal file
40
pkg/volume/host_path/host_path_unix.go
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
// +build linux darwin
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package host_path
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"k8s.io/api/core/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (dftc *defaultFileTypeChecker) getFileType(info os.FileInfo) (v1.HostPathType, error) {
|
||||||
|
mode := info.Sys().(*syscall.Stat_t).Mode
|
||||||
|
switch mode & syscall.S_IFMT {
|
||||||
|
case syscall.S_IFSOCK:
|
||||||
|
return v1.HostPathSocket, nil
|
||||||
|
case syscall.S_IFBLK:
|
||||||
|
return v1.HostPathBlockDev, nil
|
||||||
|
case syscall.S_IFCHR:
|
||||||
|
return v1.HostPathCharDev, nil
|
||||||
|
}
|
||||||
|
return "", fmt.Errorf("only recognise socket, block device and character device")
|
||||||
|
}
|
38
pkg/volume/host_path/host_path_windows.go
Normal file
38
pkg/volume/host_path/host_path_windows.go
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package host_path
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"k8s.io/api/core/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (dftc *defaultFileTypeChecker) getFileType(info os.FileInfo) (v1.HostPathType, error) {
|
||||||
|
mode := info.Sys().(*syscall.Win32FileAttributeData).FileAttributes
|
||||||
|
switch mode & syscall.S_IFMT {
|
||||||
|
case syscall.S_IFSOCK:
|
||||||
|
return v1.HostPathSocket, nil
|
||||||
|
case syscall.S_IFBLK:
|
||||||
|
return v1.HostPathBlockDev, nil
|
||||||
|
case syscall.S_IFCHR:
|
||||||
|
return v1.HostPathCharDev, nil
|
||||||
|
}
|
||||||
|
return "", fmt.Errorf("only recognise socket, block device and character device")
|
||||||
|
}
|
@ -66,6 +66,8 @@ type VolumeOptions struct {
|
|||||||
CloudTags *map[string]string
|
CloudTags *map[string]string
|
||||||
// Volume provisioning parameters from StorageClass
|
// Volume provisioning parameters from StorageClass
|
||||||
Parameters map[string]string
|
Parameters map[string]string
|
||||||
|
// This flag helps identify whether kubelet is running in a container
|
||||||
|
Containerized bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// VolumePlugin is an interface to volume plugins that can be used on a
|
// VolumePlugin is an interface to volume plugins that can be used on a
|
||||||
|
@ -681,12 +681,39 @@ const (
|
|||||||
ClaimLost PersistentVolumeClaimPhase = "Lost"
|
ClaimLost PersistentVolumeClaimPhase = "Lost"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type HostPathType string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// If nothing exists at the given path, an empty directory will be created there
|
||||||
|
// as needed with file mode 0755, having the same group and ownership with Kubelet.
|
||||||
|
HostPathDirectoryOrCreate HostPathType = "DirectoryOrCreate"
|
||||||
|
// A directory must exist at the given path
|
||||||
|
HostPathDirectory HostPathType = "Directory"
|
||||||
|
// If nothing exists at the given path, an empty file will be created there
|
||||||
|
// as needed with file mode 0644, having the same group and ownership with Kubelet.
|
||||||
|
HostPathFileOrCreate HostPathType = "FileOrCreate"
|
||||||
|
// A file must exist at the given path
|
||||||
|
HostPathFile HostPathType = "File"
|
||||||
|
// A UNIX socket must exist at the given path
|
||||||
|
HostPathSocket HostPathType = "Socket"
|
||||||
|
// A character device must exist at the given path
|
||||||
|
HostPathCharDev HostPathType = "CharDevice"
|
||||||
|
// A block device must exist at the given path
|
||||||
|
HostPathBlockDev HostPathType = "BlockDevice"
|
||||||
|
)
|
||||||
|
|
||||||
// Represents a host path mapped into a pod.
|
// Represents a host path mapped into a pod.
|
||||||
// Host path volumes do not support ownership management or SELinux relabeling.
|
// Host path volumes do not support ownership management or SELinux relabeling.
|
||||||
type HostPathVolumeSource struct {
|
type HostPathVolumeSource struct {
|
||||||
// Path of the directory on the host.
|
// Path of the directory on the host.
|
||||||
|
// If the path is a symlink, it will follow the link to the real path.
|
||||||
// More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath
|
// More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath
|
||||||
Path string `json:"path" protobuf:"bytes,1,opt,name=path"`
|
Path string `json:"path" protobuf:"bytes,1,opt,name=path"`
|
||||||
|
// Type for HostPath Volume
|
||||||
|
// Defaults to DirectoryOrCreate
|
||||||
|
// More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath
|
||||||
|
// +optional
|
||||||
|
Type *HostPathType `json:"type,omitempty" protobuf:"bytes,2,opt,name=type"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Represents an empty directory for a pod.
|
// Represents an empty directory for a pod.
|
||||||
|
Loading…
Reference in New Issue
Block a user