Documentation ¶
Overview ¶
Package mount defines an interface to mounting filesystems.
TODO(thockin): This whole pkg is pretty linux-centric. As soon as we have an alternate platform, we will need to abstract further.
Index ¶
Constants ¶
const FakeActionMount = "mount"
Values for FakeAction.Action
const FakeActionUnmount = "unmount"
Variables ¶
This section is empty.
Functions ¶
func GetDeviceNameFromMount ¶
GetDeviceNameFromMount: given a mnt point, find the device from /proc/mounts returns the device name, reference count, and error code
Types ¶
type FakeAction ¶
type FakeAction struct { Action string // "mount" or "unmount" Target string // applies to both mount and unmount actions Source string // applies only to "mount" actions FSType string // applies only to "mount" actions }
FakeAction objects are logged every time a fake mount or unmount is called.
type FakeMounter ¶
type FakeMounter struct { MountPoints []MountPoint Log []FakeAction }
FakeMounter implements mount.Interface for tests.
func (*FakeMounter) IsMountPoint ¶
func (f *FakeMounter) IsMountPoint(file string) (bool, error)
func (*FakeMounter) List ¶
func (f *FakeMounter) List() ([]MountPoint, error)
func (*FakeMounter) ResetLog ¶
func (f *FakeMounter) ResetLog()
func (*FakeMounter) Unmount ¶
func (f *FakeMounter) Unmount(target string) error
type Interface ¶
type Interface interface { // Mount mounts source to target as fstype with given options. Mount(source string, target string, fstype string, options []string) error // Unmount unmounts given target. Unmount(target string) error // List returns a list of all mounted filesystems. This can be large. // On some platforms, reading mounts is not guaranteed consistent (i.e. // it could change between chunked reads). This is guaranteed to be // consistent. List() ([]MountPoint, error) // IsMountPoint determines if a directory is a mountpoint. IsMountPoint(file string) (bool, error) }
type MountPoint ¶
This represents a single line in /proc/mounts or /etc/fstab.
type Mounter ¶
type Mounter struct{}
Mounter provides the default implementation of mount.Interface for the linux platform. This implementation assumes that the kubelet is running in the host's root mount namespace.
func (*Mounter) IsMountPoint ¶
IsMountPoint determines if a directory is a mountpoint, by comparing the device for the directory with the device for it's parent. If they are the same, it's not a mountpoint, if they're different, it is.
func (*Mounter) List ¶
func (*Mounter) List() ([]MountPoint, error)
List returns a list of all mounted filesystems.
func (*Mounter) Mount ¶
Mount mounts source to target as fstype with given options. 'source' and 'fstype' must be an emtpy string in case it's not required, e.g. for remount, or for auto filesystem type, where kernel handles fs type for you. The mount 'options' is a list of options, currently come from mount(8), e.g. "ro", "remount", "bind", etc. If no more option is required, call Mount with an empty string list or nil.
type NsenterMounter ¶
type NsenterMounter struct {
// contains filtered or unexported fields
}
NsenterMounter is part of experimental support for running the kubelet in a container. Currently, all docker containers receive their own mount namespaces. NsenterMounter works by executing nsenter to run commands in the host's mount namespace.
NsenterMounter requires:
- Docker >= 1.6 due to the dependency on the slave propagation mode of the bind-mount of the kubelet root directory in the container. Docker 1.5 used a private propagation mode for bind-mounts, so mounts performed in the host's mount namespace do not propagate out to the bind-mount in this docker version.
- The host's root filesystem must be available at /rootfs
- The nsenter binary must be on the PATH in the container's filesystem.
- The Kubelet process must have CAP_SYS_ADMIN (required by nsenter); at the present, this effectively means that the kubelet is running in a privileged container.
- The volume path used by the Kubelet must be the same inside and outside the container and be writable by the container (to initialize volume) contents. TODO: remove this requirement.
For more information about mount propagation modes, see:
https://www.kernel.org/doc/Documentation/filesystems/sharedsubtree.txt
func NewNsenterMounter ¶
func NewNsenterMounter() *NsenterMounter
func (*NsenterMounter) IsMountPoint ¶
func (n *NsenterMounter) IsMountPoint(file string) (bool, error)
IsMountPoint determines whether a path is a mountpoint by calling findmnt in the host's root mount namespace.
func (*NsenterMounter) List ¶
func (*NsenterMounter) List() ([]MountPoint, error)
List returns a list of all mounted filesystems in the host's mount namespace.
func (*NsenterMounter) Mount ¶
Mount runs mount(8) in the host's root mount namespace. Aside from this aspect, Mount has the same semantics as the mounter returned by mount.New()
func (*NsenterMounter) Unmount ¶
func (n *NsenterMounter) Unmount(target string) error
Unmount runs umount(8) in the host's mount namespace.
type SafeFormatAndMount ¶ added in v1.0.6
SafeFormatAndMount probes a device to see if it is formatted. If so it mounts it otherwise it formats it and mounts it
func (*SafeFormatAndMount) Mount ¶ added in v1.0.6
func (mounter *SafeFormatAndMount) Mount(source string, target string, fstype string, options []string) error
Mount mounts the given disk. If the disk is not formatted and the disk is not being mounted as read only it will format the disk first then mount it.