Documentation ¶
Overview ¶
Package mount defines an interface to mounting filesystems.
TODO(thockin): This whole pkg is pretty linux-centric. As soon as we have an alternate platform, we will need to abstract further.
Index ¶
Constants ¶
const FakeActionMount = "mount"
Values for FakeAction.Action
const FakeActionUnmount = "unmount"
Variables ¶
This section is empty.
Functions ¶
func GetDeviceNameFromMount ¶ added in v0.15.0
GetDeviceNameFromMount: given a mnt point, find the device from /proc/mounts returns the device name, reference count, and error code
Types ¶
type FakeAction ¶ added in v0.13.1
type FakeAction struct { Action string // "mount" or "unmount" Target string // applies to both mount and unmount actions Source string // applies only to "mount" actions FSType string // applies only to "mount" actions }
FakeAction objects are logged every time a fake mount or unmount is called.
type FakeMounter ¶ added in v0.13.0
type FakeMounter struct { MountPoints []MountPoint Log []FakeAction }
FakeMounter implements mount.Interface for tests.
func (*FakeMounter) IsMountPoint ¶ added in v0.15.0
func (f *FakeMounter) IsMountPoint(file string) (bool, error)
func (*FakeMounter) List ¶ added in v0.13.0
func (f *FakeMounter) List() ([]MountPoint, error)
func (*FakeMounter) ResetLog ¶ added in v0.13.1
func (f *FakeMounter) ResetLog()
func (*FakeMounter) Unmount ¶ added in v0.13.0
func (f *FakeMounter) Unmount(target string) error
type Interface ¶
type Interface interface { // Mount mounts source to target as fstype with given options. Mount(source string, target string, fstype string, options []string) error // Unmount unmounts given target. Unmount(target string) error // List returns a list of all mounted filesystems. This can be large. // On some platforms, reading mounts is not guaranteed consistent (i.e. // it could change between chunked reads). This is guaranteed to be // consistent. List() ([]MountPoint, error) // IsMountPoint determines if a directory is a mountpoint. IsMountPoint(file string) (bool, error) }
type MountPoint ¶
This represents a single line in /proc/mounts or /etc/fstab.
type Mounter ¶ added in v0.10.0
type Mounter struct{}
Mounter provides the default implementation of mount.Interface for the linux platform. This implementation assumes that the kubelet is running in the host's root mount namespace.
func (*Mounter) IsMountPoint ¶ added in v0.15.0
IsMountPoint determines if a directory is a mountpoint, by comparing the device for the directory with the device for it's parent. If they are the same, it's not a mountpoint, if they're different, it is.
func (*Mounter) List ¶ added in v0.10.0
func (*Mounter) List() ([]MountPoint, error)
List returns a list of all mounted filesystems.
func (*Mounter) Mount ¶ added in v0.10.0
Mount mounts source to target as fstype with given options. 'source' and 'fstype' must be an emtpy string in case it's not required, e.g. for remount, or for auto filesystem type, where kernel handles fs type for you. The mount 'options' is a list of options, currently come from mount(8), e.g. "ro", "remount", "bind", etc. If no more option is required, call Mount with an empty string list or nil.
type NsenterMounter ¶ added in v0.17.0
type NsenterMounter struct {
// contains filtered or unexported fields
}
NsenterMounter is part of experimental support for running the kubelet in a container. Currently, all docker containers receive their own mount namespaces. NsenterMounter works by executing nsenter to run commands in the host's mount namespace.
NsenterMounter requires:
- Docker >= 1.6 due to the dependency on the slave propagation mode of the bind-mount of the kubelet root directory in the container. Docker 1.5 used a private propagation mode for bind-mounts, so mounts performed in the host's mount namespace do not propagate out to the bind-mount in this docker version.
- The host's root filesystem must be available at /rootfs
- The nsenter binary must be on the Kubelet process' PATH in the container's filesystem.
- The Kubelet process must have CAP_SYS_ADMIN (required by nsenter); at the present, this effectively means that the kubelet is running in a privileged container.
- The volume path used by the Kubelet must be the same inside and outside the container and be writable by the container (to initialize volume) contents. TODO: remove this requirement.
- The host image must have mount, findmnt, and umount binaries in /bin, /usr/sbin, or /usr/bin
For more information about mount propagation modes, see:
https://www.kernel.org/doc/Documentation/filesystems/sharedsubtree.txt
func NewNsenterMounter ¶ added in v1.0.6
func NewNsenterMounter() *NsenterMounter
func (*NsenterMounter) IsMountPoint ¶ added in v0.17.0
func (n *NsenterMounter) IsMountPoint(file string) (bool, error)
IsMountPoint determines whether a path is a mountpoint by calling findmnt in the host's root mount namespace.
func (*NsenterMounter) List ¶ added in v0.17.0
func (*NsenterMounter) List() ([]MountPoint, error)
List returns a list of all mounted filesystems in the host's mount namespace.
func (*NsenterMounter) Mount ¶ added in v0.17.0
Mount runs mount(8) in the host's root mount namespace. Aside from this aspect, Mount has the same semantics as the mounter returned by mount.New()
func (*NsenterMounter) Unmount ¶ added in v0.17.0
func (n *NsenterMounter) Unmount(target string) error
Unmount runs umount(8) in the host's mount namespace.