5bbcc41c20
Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
265 lines
8.6 KiB
Go
265 lines
8.6 KiB
Go
package mounts // import "github.com/docker/docker/volume/mounts"
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"syscall"
|
|
|
|
"github.com/containerd/log"
|
|
mounttypes "github.com/docker/docker/api/types/mount"
|
|
"github.com/docker/docker/internal/safepath"
|
|
"github.com/docker/docker/pkg/idtools"
|
|
"github.com/docker/docker/pkg/stringid"
|
|
"github.com/docker/docker/volume"
|
|
"github.com/opencontainers/selinux/go-selinux/label"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
// MountPoint is the intersection point between a volume and a container. It
|
|
// specifies which volume is to be used and where inside a container it should
|
|
// be mounted.
|
|
//
|
|
// Note that this type is embedded in `container.Container` object and persisted to disk.
|
|
// Changes to this struct need to by synced with on disk state.
|
|
type MountPoint struct {
|
|
// Source is the source path of the mount.
|
|
// E.g. `mount --bind /foo /bar`, `/foo` is the `Source`.
|
|
Source string
|
|
// Destination is the path relative to the container root (`/`) to the mount point
|
|
// It is where the `Source` is mounted to
|
|
Destination string
|
|
// RW is set to true when the mountpoint should be mounted as read-write
|
|
RW bool
|
|
// Name is the name reference to the underlying data defined by `Source`
|
|
// e.g., the volume name
|
|
Name string
|
|
// Driver is the volume driver used to create the volume (if it is a volume)
|
|
Driver string
|
|
// Type of mount to use, see `Type<foo>` definitions in github.com/docker/docker/api/types/mount
|
|
Type mounttypes.Type `json:",omitempty"`
|
|
// Volume is the volume providing data to this mountpoint.
|
|
// This is nil unless `Type` is set to `TypeVolume`
|
|
Volume volume.Volume `json:"-"`
|
|
|
|
// Mode is the comma separated list of options supplied by the user when creating
|
|
// the bind/volume mount.
|
|
// Note Mode is not used on Windows
|
|
Mode string `json:"Relabel,omitempty"` // Originally field was `Relabel`"
|
|
|
|
// Propagation describes how the mounts are propagated from the host into the
|
|
// mount point, and vice-versa.
|
|
// See https://www.kernel.org/doc/Documentation/filesystems/sharedsubtree.txt
|
|
// Note Propagation is not used on Windows
|
|
Propagation mounttypes.Propagation `json:",omitempty"` // Mount propagation string
|
|
|
|
// Specifies if data should be copied from the container before the first mount
|
|
// Use a pointer here so we can tell if the user set this value explicitly
|
|
// This allows us to error out when the user explicitly enabled copy but we can't copy due to the volume being populated
|
|
CopyData bool `json:"-"`
|
|
// ID is the opaque ID used to pass to the volume driver.
|
|
// This should be set by calls to `Mount` and unset by calls to `Unmount`
|
|
ID string `json:",omitempty"`
|
|
|
|
// Spec is a copy of the API request that created this mount.
|
|
Spec mounttypes.Mount
|
|
|
|
// Some bind mounts should not be automatically created.
|
|
// (Some are auto-created for backwards-compatibility)
|
|
// This is checked on the API but setting this here prevents race conditions.
|
|
// where a bind dir existed during validation was removed before reaching the setup code.
|
|
SkipMountpointCreation bool
|
|
|
|
// Track usage of this mountpoint
|
|
// Specifically needed for containers which are running and calls to `docker cp`
|
|
// because both these actions require mounting the volumes.
|
|
active int
|
|
|
|
// SafePaths created by Setup that should be cleaned up before unmounting
|
|
// the volume.
|
|
safePaths []*safepath.SafePath
|
|
}
|
|
|
|
// Cleanup frees resources used by the mountpoint and cleans up all the paths
|
|
// returned by Setup that hasn't been cleaned up by the caller.
|
|
func (m *MountPoint) Cleanup(ctx context.Context) error {
|
|
if m.Volume == nil || m.ID == "" {
|
|
return nil
|
|
}
|
|
|
|
for _, p := range m.safePaths {
|
|
if !p.IsValid() {
|
|
continue
|
|
}
|
|
|
|
err := p.Close(ctx)
|
|
base, sub := p.SourcePath()
|
|
log.G(ctx).WithFields(log.Fields{
|
|
"error": err,
|
|
"path": p.Path(),
|
|
"sourceBase": base,
|
|
"sourceSubpath": sub,
|
|
}).Warn("cleaning up SafePath that hasn't been cleaned up by the caller")
|
|
}
|
|
|
|
if err := m.Volume.Unmount(m.ID); err != nil {
|
|
return errors.Wrapf(err, "error unmounting volume %s", m.Volume.Name())
|
|
}
|
|
|
|
m.active--
|
|
if m.active == 0 {
|
|
m.ID = ""
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Setup sets up a mount point by either mounting the volume if it is
|
|
// configured, or creating the source directory if supplied.
|
|
// The, optional, checkFun parameter allows doing additional checking
|
|
// before creating the source directory on the host.
|
|
//
|
|
// The returned path can be a temporary path, caller is responsible to
|
|
// call the returned cleanup function as soon as the path is not needed.
|
|
// Cleanup doesn't unmount the underlying volumes (if any), it only
|
|
// frees up the resources that were needed to guarantee that the path
|
|
// still points to the same target (to avoid TOCTOU attack).
|
|
//
|
|
// Cleanup function doesn't need to be called when error is returned.
|
|
func (m *MountPoint) Setup(ctx context.Context, mountLabel string, rootIDs idtools.Identity, checkFun func(m *MountPoint) error) (path string, cleanup func(context.Context) error, retErr error) {
|
|
if m.SkipMountpointCreation {
|
|
return m.Source, noCleanup, nil
|
|
}
|
|
|
|
defer func() {
|
|
if retErr != nil || !label.RelabelNeeded(m.Mode) {
|
|
return
|
|
}
|
|
|
|
sourcePath, err := filepath.EvalSymlinks(path)
|
|
if err != nil {
|
|
path = ""
|
|
retErr = errors.Wrapf(err, "error evaluating symlinks from mount source %q", m.Source)
|
|
if cleanupErr := cleanup(ctx); cleanupErr != nil {
|
|
log.G(ctx).WithError(cleanupErr).Warn("failed to cleanup after error")
|
|
}
|
|
cleanup = noCleanup
|
|
return
|
|
}
|
|
err = label.Relabel(sourcePath, mountLabel, label.IsShared(m.Mode))
|
|
if err != nil && !errors.Is(err, syscall.ENOTSUP) {
|
|
path = ""
|
|
retErr = errors.Wrapf(err, "error setting label on mount source '%s'", sourcePath)
|
|
if cleanupErr := cleanup(ctx); cleanupErr != nil {
|
|
log.G(ctx).WithError(cleanupErr).Warn("failed to cleanup after error")
|
|
}
|
|
cleanup = noCleanup
|
|
}
|
|
}()
|
|
|
|
if m.Volume != nil {
|
|
id := m.ID
|
|
if id == "" {
|
|
id = stringid.GenerateRandomID()
|
|
}
|
|
volumePath, err := m.Volume.Mount(id)
|
|
if err != nil {
|
|
return "", noCleanup, errors.Wrapf(err, "error while mounting volume '%s'", m.Source)
|
|
}
|
|
|
|
m.ID = id
|
|
clean := noCleanup
|
|
if m.Spec.VolumeOptions != nil && m.Spec.VolumeOptions.Subpath != "" {
|
|
subpath := m.Spec.VolumeOptions.Subpath
|
|
|
|
safePath, err := safepath.Join(ctx, volumePath, subpath)
|
|
if err != nil {
|
|
if err := m.Volume.Unmount(id); err != nil {
|
|
log.G(ctx).WithError(err).Error("failed to unmount after safepath.Join failed")
|
|
}
|
|
return "", noCleanup, err
|
|
}
|
|
m.safePaths = append(m.safePaths, safePath)
|
|
log.G(ctx).Debugf("mounting (%s|%s) via %s", volumePath, subpath, safePath.Path())
|
|
|
|
clean = safePath.Close
|
|
volumePath = safePath.Path()
|
|
}
|
|
|
|
m.active++
|
|
return volumePath, clean, nil
|
|
}
|
|
|
|
if len(m.Source) == 0 {
|
|
return "", noCleanup, fmt.Errorf("Unable to setup mount point, neither source nor volume defined")
|
|
}
|
|
|
|
if m.Type == mounttypes.TypeBind {
|
|
// Before creating the source directory on the host, invoke checkFun if it's not nil. One of
|
|
// the use case is to forbid creating the daemon socket as a directory if the daemon is in
|
|
// the process of shutting down.
|
|
if checkFun != nil {
|
|
if err := checkFun(m); err != nil {
|
|
return "", noCleanup, err
|
|
}
|
|
}
|
|
|
|
// idtools.MkdirAllNewAs() produces an error if m.Source exists and is a file (not a directory)
|
|
// also, makes sure that if the directory is created, the correct remapped rootUID/rootGID will own it
|
|
if err := idtools.MkdirAllAndChownNew(m.Source, 0o755, rootIDs); err != nil {
|
|
if perr, ok := err.(*os.PathError); ok {
|
|
if perr.Err != syscall.ENOTDIR {
|
|
return "", noCleanup, errors.Wrapf(err, "error while creating mount source path '%s'", m.Source)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return m.Source, noCleanup, nil
|
|
}
|
|
|
|
func (m *MountPoint) LiveRestore(ctx context.Context) error {
|
|
if m.Volume == nil {
|
|
log.G(ctx).Debug("No volume to restore")
|
|
return nil
|
|
}
|
|
|
|
lrv, ok := m.Volume.(volume.LiveRestorer)
|
|
if !ok {
|
|
log.G(ctx).WithField("volume", m.Volume.Name()).Debugf("Volume does not support live restore: %T", m.Volume)
|
|
return nil
|
|
}
|
|
|
|
id := m.ID
|
|
if id == "" {
|
|
id = stringid.GenerateRandomID()
|
|
}
|
|
|
|
if err := lrv.LiveRestoreVolume(ctx, id); err != nil {
|
|
return errors.Wrapf(err, "error while restoring volume '%s'", m.Source)
|
|
}
|
|
|
|
m.ID = id
|
|
m.active++
|
|
return nil
|
|
}
|
|
|
|
// Path returns the path of a volume in a mount point.
|
|
func (m *MountPoint) Path() string {
|
|
if m.Volume != nil {
|
|
return m.Volume.Path()
|
|
}
|
|
return m.Source
|
|
}
|
|
|
|
func errInvalidMode(mode string) error {
|
|
return errors.Errorf("invalid mode: %v", mode)
|
|
}
|
|
|
|
func errInvalidSpec(spec string) error {
|
|
return errors.Errorf("invalid volume specification: '%s'", spec)
|
|
}
|
|
|
|
// noCleanup is a no-op cleanup function.
|
|
func noCleanup(_ context.Context) error {
|
|
return nil
|
|
}
|