Follow up changes on secrets patch

Deleted mounts.conf file and moved the secrets mount paths
to a list (default-mounts) in crio.conf

Signed-off-by: umohnani8 <umohnani@redhat.com>
This commit is contained in:
umohnani8 2017-10-12 14:14:42 -04:00
parent 5b41729b6c
commit d1aea31786
8 changed files with 35 additions and 72 deletions

View file

@ -108,8 +108,9 @@ cgroup_manager = "{{ .CgroupManager }}"
# hooks_dir_path is the oci hooks directory for automatically executed hooks # hooks_dir_path is the oci hooks directory for automatically executed hooks
hooks_dir_path = "{{ .HooksDirPath }}" hooks_dir_path = "{{ .HooksDirPath }}"
# default_mounts_path is the secrets mounts file path # default_mounts is the mounts list to be mounted for the container when created
default_mounts_path = "{{ .DefaultMountsPath }}" default_mounts = [
{{ range $mount := .DefaultMounts }}{{ printf "\t%q, \n" $mount }}{{ end }}]
# pids_limit is the number of processes allowed in a container # pids_limit is the number of processes allowed in a container
pids_limit = {{ .PidsLimit }} pids_limit = {{ .PidsLimit }}

View file

@ -127,8 +127,8 @@ func mergeConfig(config *server.Config, ctx *cli.Context) error {
if ctx.GlobalIsSet("hooks-dir-path") { if ctx.GlobalIsSet("hooks-dir-path") {
config.HooksDirPath = ctx.GlobalString("hooks-dir-path") config.HooksDirPath = ctx.GlobalString("hooks-dir-path")
} }
if ctx.GlobalIsSet("default-mounts-path") { if ctx.GlobalIsSet("default-mounts") {
config.DefaultMountsPath = ctx.GlobalString("default-mounts-path") config.DefaultMounts = ctx.GlobalStringSlice("default-mounts")
} }
if ctx.GlobalIsSet("pids-limit") { if ctx.GlobalIsSet("pids-limit") {
config.PidsLimit = ctx.GlobalInt64("pids-limit") config.PidsLimit = ctx.GlobalInt64("pids-limit")
@ -325,9 +325,9 @@ func main() {
Value: libkpod.DefaultHooksDirPath, Value: libkpod.DefaultHooksDirPath,
Hidden: true, Hidden: true,
}, },
cli.StringFlag{ cli.StringSliceFlag{
Name: "default-mounts-path", Name: "default-mounts",
Usage: "set the default mounts file path", Usage: "add one or more default mount paths in the form host:container",
Hidden: true, Hidden: true,
}, },
cli.BoolFlag{ cli.BoolFlag{

View file

@ -105,6 +105,9 @@ Example:
**no_pivot**=*true*|*false* **no_pivot**=*true*|*false*
Instructs the runtime to not use pivot_root, but instead use MS_MOVE Instructs the runtime to not use pivot_root, but instead use MS_MOVE
**default_mounts**=[]
List of mount points, in the form host:container, to be mounted in every container
## CRIO.IMAGE TABLE ## CRIO.IMAGE TABLE
**default_transport** **default_transport**

View file

@ -24,10 +24,6 @@ const (
cgroupManager = oci.CgroupfsCgroupsManager cgroupManager = oci.CgroupfsCgroupsManager
lockPath = "/run/crio.lock" lockPath = "/run/crio.lock"
containerExitsDir = oci.ContainerExitsDir containerExitsDir = oci.ContainerExitsDir
// DefaultMountsFile holds the default mount paths in the form "host:container"
DefaultMountsFile = "/usr/share/containers/mounts.conf"
// OverrideMountsFile holds the override mount paths in the form "host:container"
OverrideMountsFile = "/etc/containers/mounts.conf"
) )
// Config represents the entire set of configuration values that can be set for // Config represents the entire set of configuration values that can be set for
@ -149,8 +145,9 @@ type RuntimeConfig struct {
// HooksDirPath location of oci hooks config files // HooksDirPath location of oci hooks config files
HooksDirPath string `toml:"hooks_dir_path"` HooksDirPath string `toml:"hooks_dir_path"`
// DefaultMountsPath location of the default mounts file // DefaultMounts is the list of mounts to be mounted for each container
DefaultMountsPath string `toml:"default_mounts_path"` // The format of each mount is "host-path:container-path"
DefaultMounts []string `toml:"default_mounts"`
// Hooks List of hooks to run with container // Hooks List of hooks to run with container
Hooks map[string]HookParams Hooks map[string]HookParams
@ -295,7 +292,6 @@ func DefaultConfig() *Config {
ContainerExitsDir: containerExitsDir, ContainerExitsDir: containerExitsDir,
HooksDirPath: DefaultHooksDirPath, HooksDirPath: DefaultHooksDirPath,
LogSizeMax: DefaultLogSizeMax, LogSizeMax: DefaultLogSizeMax,
DefaultMountsPath: DefaultMountsFile,
}, },
ImageConfig: ImageConfig{ ImageConfig: ImageConfig{
DefaultTransport: defaultTransport, DefaultTransport: defaultTransport,

View file

@ -385,22 +385,15 @@ func ensureSaneLogPath(logPath string) error {
} }
// addSecretsBindMounts mounts user defined secrets to the container // addSecretsBindMounts mounts user defined secrets to the container
func addSecretsBindMounts(mountLabel, ctrRunDir, configDefaultMountsPath string, specgen generate.Generator) error { func addSecretsBindMounts(mountLabel, ctrRunDir string, defaultMounts []string, specgen generate.Generator) error {
mountPaths := []string{libkpod.OverrideMountsFile, libkpod.DefaultMountsFile} containerMounts := specgen.Spec().Mounts
// configDefaultMountsPath is used to override the mount file path for testing purposes only when set in the runtime config mounts, err := secretMounts(defaultMounts, mountLabel, ctrRunDir, containerMounts)
if configDefaultMountsPath != "" { if err != nil {
mountPaths = []string{configDefaultMountsPath} return err
} }
for _, path := range mountPaths { for _, m := range mounts {
containerMounts := specgen.Spec().Mounts specgen.AddBindMount(m.Source, m.Destination, nil)
mounts, err := secretMounts(mountLabel, path, ctrRunDir, containerMounts)
if err != nil {
return err
}
for _, m := range mounts {
specgen.AddBindMount(m.Source, m.Destination, nil)
}
} }
return nil return nil
} }
@ -932,8 +925,10 @@ func (s *Server) createSandboxContainer(ctx context.Context, containerID string,
return nil, err return nil, err
} }
if err = addSecretsBindMounts(mountLabel, containerInfo.RunDir, s.config.DefaultMountsPath, specgen); err != nil { if len(s.config.DefaultMounts) > 0 {
return nil, fmt.Errorf("failed to mount secrets: %v", err) if err = addSecretsBindMounts(mountLabel, containerInfo.RunDir, s.config.DefaultMounts, specgen); err != nil {
return nil, fmt.Errorf("failed to mount secrets: %v", err)
}
} }
mountPoint, err := s.StorageRuntimeServer().StartContainer(containerID) mountPoint, err := s.StorageRuntimeServer().StartContainer(containerID)

View file

@ -1,7 +1,6 @@
package server package server
import ( import (
"bufio"
"fmt" "fmt"
"io/ioutil" "io/ioutil"
"os" "os"
@ -29,25 +28,6 @@ func (s SecretData) SaveTo(dir string) error {
return ioutil.WriteFile(path, s.Data, 0700) return ioutil.WriteFile(path, s.Data, 0700)
} }
// readMountFile returns a list of the host:container paths
func readMountFile(mountFilePath string) ([]string, error) {
var mountPaths []string
file, err := os.Open(mountFilePath)
if err != nil {
logrus.Warnf("file doesn't exist %q", mountFilePath)
return nil, nil
}
defer file.Close()
scanner := bufio.NewScanner(file)
scanner.Split(bufio.ScanLines)
for scanner.Scan() {
mountPaths = append(mountPaths, scanner.Text())
}
return mountPaths, nil
}
func readAll(root, prefix string) ([]SecretData, error) { func readAll(root, prefix string) ([]SecretData, error) {
path := filepath.Join(root, prefix) path := filepath.Join(root, prefix)
@ -120,13 +100,9 @@ func getHostSecretData(hostDir string) ([]SecretData, error) {
// secretMount copies the contents of host directory to container directory // secretMount copies the contents of host directory to container directory
// and returns a list of mounts // and returns a list of mounts
func secretMounts(mountLabel, mountFilePath, containerWorkingDir string, runtimeMounts []rspec.Mount) ([]rspec.Mount, error) { func secretMounts(defaultMountsPaths []string, mountLabel, containerWorkingDir string, runtimeMounts []rspec.Mount) ([]rspec.Mount, error) {
var mounts []rspec.Mount var mounts []rspec.Mount
mountPaths, err := readMountFile(mountFilePath) for _, path := range defaultMountsPaths {
if err != nil {
return nil, err
}
for _, path := range mountPaths {
hostDir, ctrDir, err := getMountsMap(path) hostDir, ctrDir, err := getMountsMap(path)
if err != nil { if err != nil {
return nil, err return nil, err

View file

@ -8,16 +8,6 @@ function teardown() {
cleanup_test cleanup_test
} }
function setup() {
MOUNT_PATH="$TESTDIR/secrets"
mkdir ${MOUNT_PATH}
MOUNT_FILE="${MOUNT_PATH}/test.txt"
touch ${MOUNT_FILE}
echo "Testing secrets mounts!" > ${MOUNT_FILE}
echo "${MOUNT_PATH}:/container/path1" > ${DEFAULT_MOUNTS_FILE}
}
@test "bind secrets mounts to container" { @test "bind secrets mounts to container" {
start_crio start_crio
run crioctl pod run --config "$TESTDATA"/sandbox_config.json run crioctl pod run --config "$TESTDATA"/sandbox_config.json

View file

@ -69,12 +69,14 @@ HOOKSDIR=$TESTDIR/hooks
mkdir ${HOOKSDIR} mkdir ${HOOKSDIR}
HOOKS_OPTS="--hooks-dir-path=$HOOKSDIR" HOOKS_OPTS="--hooks-dir-path=$HOOKSDIR"
# Setup default secrets mounts file # Setup default secrets mounts
MOUNTS_DIR="$TESTDIR/containers" MOUNT_PATH="$TESTDIR/secrets"
mkdir ${MOUNTS_DIR} mkdir ${MOUNT_PATH}
DEFAULT_MOUNTS_FILE="${MOUNTS_DIR}/mounts.conf" MOUNT_FILE="${MOUNT_PATH}/test.txt"
touch ${DEFAULT_MOUNTS_FILE} touch ${MOUNT_FILE}
DEFAULT_MOUNTS_OPTS="--default-mounts-path=$DEFAULT_MOUNTS_FILE" echo "Testing secrets mounts!" > ${MOUNT_FILE}
DEFAULT_MOUNTS_OPTS="--default-mounts=${MOUNT_PATH}:/container/path1"
# We may need to set some default storage options. # We may need to set some default storage options.
case "$(stat -f -c %T ${TESTDIR})" in case "$(stat -f -c %T ${TESTDIR})" in