196 lines
5.5 KiB
Go
196 lines
5.5 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package mount
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/Microsoft/go-winio/pkg/bindfilter"
|
|
"github.com/Microsoft/hcsshim"
|
|
"github.com/containerd/containerd/log"
|
|
"golang.org/x/sys/windows"
|
|
)
|
|
|
|
const sourceStreamName = "containerd.io-source"
|
|
|
|
var (
|
|
// ErrNotImplementOnWindows is returned when an action is not implemented for windows
|
|
ErrNotImplementOnWindows = errors.New("not implemented under windows")
|
|
)
|
|
|
|
func (m *Mount) ReadOnly() bool {
|
|
for _, option := range m.Options {
|
|
if option == "ro" {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// Mount to the provided target.
|
|
func (m *Mount) mount(target string) (retErr error) {
|
|
if m.Type == "bind" {
|
|
if err := bindfilter.ApplyFileBinding(target, m.Source, m.ReadOnly()); err != nil {
|
|
return fmt.Errorf("failed to bind-mount to %s: %w", target, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if m.Type != "windows-layer" {
|
|
return fmt.Errorf("invalid windows mount type: '%s'", m.Type)
|
|
}
|
|
|
|
home, layerID := filepath.Split(m.Source)
|
|
|
|
parentLayerPaths, err := m.GetParentPaths()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var di = hcsshim.DriverInfo{
|
|
HomeDir: home,
|
|
}
|
|
|
|
if err := hcsshim.ActivateLayer(di, layerID); err != nil {
|
|
return fmt.Errorf("failed to activate layer %s: %w", m.Source, err)
|
|
}
|
|
defer func() {
|
|
if retErr != nil {
|
|
if layerErr := hcsshim.DeactivateLayer(di, layerID); layerErr != nil {
|
|
log.G(context.TODO()).WithError(layerErr).Error("failed to deactivate layer during mount failure cleanup")
|
|
}
|
|
}
|
|
}()
|
|
|
|
if err := hcsshim.PrepareLayer(di, layerID, parentLayerPaths); err != nil {
|
|
return fmt.Errorf("failed to prepare layer %s: %w", m.Source, err)
|
|
}
|
|
|
|
defer func() {
|
|
if retErr != nil {
|
|
if layerErr := hcsshim.UnprepareLayer(di, layerID); layerErr != nil {
|
|
log.G(context.TODO()).WithError(layerErr).Error("failed to unprepare layer during mount failure cleanup")
|
|
}
|
|
}
|
|
}()
|
|
|
|
volume, err := hcsshim.GetLayerMountPath(di, layerID)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get volume path for layer %s: %w", m.Source, err)
|
|
}
|
|
|
|
if err := bindfilter.ApplyFileBinding(target, volume, m.ReadOnly()); err != nil {
|
|
return fmt.Errorf("failed to set volume mount path for layer %s: %w", m.Source, err)
|
|
}
|
|
defer func() {
|
|
if retErr != nil {
|
|
if bindErr := bindfilter.RemoveFileBinding(target); bindErr != nil {
|
|
log.G(context.TODO()).WithError(bindErr).Error("failed to remove binding during mount failure cleanup")
|
|
}
|
|
}
|
|
}()
|
|
|
|
// Add an Alternate Data Stream to record the layer source.
|
|
// See https://docs.microsoft.com/en-au/archive/blogs/askcore/alternate-data-streams-in-ntfs
|
|
// for details on Alternate Data Streams.
|
|
if err := os.WriteFile(filepath.Clean(target)+":"+sourceStreamName, []byte(m.Source), 0666); err != nil {
|
|
return fmt.Errorf("failed to record source for layer %s: %w", m.Source, err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ParentLayerPathsFlag is the options flag used to represent the JSON encoded
|
|
// list of parent layers required to use the layer
|
|
const ParentLayerPathsFlag = "parentLayerPaths="
|
|
|
|
// GetParentPaths of the mount
|
|
func (m *Mount) GetParentPaths() ([]string, error) {
|
|
var parentLayerPaths []string
|
|
for _, option := range m.Options {
|
|
if strings.HasPrefix(option, ParentLayerPathsFlag) {
|
|
err := json.Unmarshal([]byte(option[len(ParentLayerPathsFlag):]), &parentLayerPaths)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to unmarshal parent layer paths from mount: %w", err)
|
|
}
|
|
}
|
|
}
|
|
return parentLayerPaths, nil
|
|
}
|
|
|
|
// Unmount the mount at the provided path
|
|
func Unmount(mount string, flags int) error {
|
|
mount = filepath.Clean(mount)
|
|
adsFile := mount + ":" + sourceStreamName
|
|
var layerPath string
|
|
|
|
if _, err := os.Lstat(adsFile); err == nil {
|
|
layerPathb, err := os.ReadFile(mount + ":" + sourceStreamName)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to retrieve source for layer %s: %w", mount, err)
|
|
}
|
|
layerPath = string(layerPathb)
|
|
}
|
|
|
|
if err := bindfilter.RemoveFileBinding(mount); err != nil {
|
|
if errors.Is(err, windows.ERROR_INVALID_PARAMETER) || errors.Is(err, windows.ERROR_NOT_FOUND) {
|
|
// not a mount point
|
|
return nil
|
|
}
|
|
return fmt.Errorf("removing mount: %w", err)
|
|
}
|
|
|
|
if layerPath != "" {
|
|
var (
|
|
home, layerID = filepath.Split(layerPath)
|
|
di = hcsshim.DriverInfo{
|
|
HomeDir: home,
|
|
}
|
|
)
|
|
|
|
if err := hcsshim.UnprepareLayer(di, layerID); err != nil {
|
|
return fmt.Errorf("failed to unprepare layer %s: %w", mount, err)
|
|
}
|
|
|
|
if err := hcsshim.DeactivateLayer(di, layerID); err != nil {
|
|
return fmt.Errorf("failed to deactivate layer %s: %w", mount, err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// UnmountAll unmounts from the provided path
|
|
func UnmountAll(mount string, flags int) error {
|
|
if mount == "" {
|
|
// This isn't an error, per the EINVAL handling in the Linux version
|
|
return nil
|
|
}
|
|
|
|
return Unmount(mount, flags)
|
|
}
|
|
|
|
// UnmountRecursive unmounts from the provided path
|
|
func UnmountRecursive(mount string, flags int) error {
|
|
return UnmountAll(mount, flags)
|
|
}
|