Merge pull request #1027 from umohnani8/secrets_1.0

Fix logic flaw in secrets mount
This commit is contained in:
Mrunal Patel 2017-10-17 13:56:42 -07:00 committed by GitHub
commit 70f6306a51
3 changed files with 7 additions and 8 deletions

View file

@ -393,7 +393,6 @@ func addSecretsBindMounts(mountLabel, ctrRunDir string, defaultMounts []string,
}
for _, m := range mounts {
specgen.AddBindMount(m.Source, m.Destination, nil)
}
return nil
}

View file

@ -113,18 +113,18 @@ func secretMounts(defaultMountsPaths []string, mountLabel, containerWorkingDir s
continue
}
ctrDir = filepath.Join(containerWorkingDir, ctrDir)
ctrDirOnHost := filepath.Join(containerWorkingDir, ctrDir)
// skip if ctrDir has already been mounted by caller
if isAlreadyMounted(runtimeMounts, ctrDir) {
logrus.Warnf("%q has already been mounted; cannot override mount", ctrDir)
continue
}
if err := os.RemoveAll(ctrDir); err != nil {
if err := os.RemoveAll(ctrDirOnHost); err != nil {
return nil, fmt.Errorf("remove container directory failed: %v", err)
}
if err := os.MkdirAll(ctrDir, 0755); err != nil {
if err := os.MkdirAll(ctrDirOnHost, 0755); err != nil {
return nil, fmt.Errorf("making container directory failed: %v", err)
}
@ -138,12 +138,12 @@ func secretMounts(defaultMountsPaths []string, mountLabel, containerWorkingDir s
return nil, errors.Wrapf(err, "getting host secret data failed")
}
for _, s := range data {
s.SaveTo(ctrDir)
s.SaveTo(ctrDirOnHost)
}
label.Relabel(ctrDir, mountLabel, false)
label.Relabel(ctrDirOnHost, mountLabel, false)
m := rspec.Mount{
Source: hostDir,
Source: ctrDirOnHost,
Destination: ctrDir,
}

View file

@ -24,7 +24,7 @@ function teardown() {
echo "$output"
[ "$status" -eq 0 ]
mount_info="$output"
grep $ctr_id/userdata/container/path1 <<< "$mount_info"
grep /container/path1 <<< "$mount_info"
echo "$output"
[ "$status" -eq 0 ]
rm -rf MOUNT_PATH