81fa9feb |
package volume
|
a7e686a7 |
import ( |
a793564b |
"fmt" |
a7e686a7 |
"os"
"strings" |
322cc99c |
"syscall" |
2b6bc294 |
"github.com/docker/docker/pkg/stringid" |
4e080347 |
"github.com/docker/docker/pkg/system" |
322cc99c |
"github.com/opencontainers/runc/libcontainer/label" |
a7e686a7 |
)
|
9af963ab |
// DefaultDriverName is the driver name used for the driver
// implemented in the local package. |
2f40b1b2 |
const DefaultDriverName = "local"
// Scopes define if a volume has is cluster-wide (global) or local only.
// Scopes are returned by the volume driver when it is queried for capabilities and then set on a volume
const (
LocalScope = "local"
GlobalScope = "global"
) |
81fa9feb |
|
9af963ab |
// Driver is for creating and removing volumes. |
81fa9feb |
type Driver interface {
// Name returns the name of the volume driver.
Name() string
// Create makes a new volume with the given id. |
b3b7eb27 |
Create(name string, opts map[string]string) (Volume, error) |
81fa9feb |
// Remove deletes the volume. |
d3eca445 |
Remove(vol Volume) (err error)
// List lists all the volumes the driver has
List() ([]Volume, error) |
99a39690 |
// Get retrieves the volume with the requested name |
d3eca445 |
Get(name string) (Volume, error) |
2f40b1b2 |
// Scope returns the scope of the driver (e.g. `golbal` or `local`).
// Scope determines how the driver is handled at a cluster level
Scope() string
}
// Capability defines a set of capabilities that a driver is able to handle.
type Capability struct {
// Scope is the scope of the driver, `global` or `local`
// A `global` scope indicates that the driver manages volumes across the cluster
// A `local` scope indicates that the driver only manages volumes resources local to the host
// Scope is declared by the driver
Scope string |
81fa9feb |
}
|
9af963ab |
// Volume is a place to store data. It is backed by a specific driver, and can be mounted. |
81fa9feb |
type Volume interface {
// Name returns the name of the volume
Name() string
// DriverName returns the name of the driver which owns this volume.
DriverName() string
// Path returns the absolute path to the volume.
Path() string
// Mount mounts the volume and returns the absolute path to
// where it can be consumed. |
2b6bc294 |
Mount(id string) (string, error) |
81fa9feb |
// Unmount unmounts the volume when it is no longer in use. |
2b6bc294 |
Unmount(id string) error |
36a1c56c |
// Status returns low-level status information about a volume
Status() map[string]interface{} |
81fa9feb |
} |
dfc6c04f |
|
2f40b1b2 |
// LabeledVolume wraps a Volume with user-defined labels
type LabeledVolume interface {
Labels() map[string]string
Volume
}
// ScopedVolume wraps a volume with a cluster scope (e.g., `local` or `global`)
type ScopedVolume interface {
Scope() string
Volume
}
|
a7e686a7 |
// MountPoint is the intersection point between a volume and a container. It
// specifies which volume is to be used and where inside a container it should
// be mounted.
type MountPoint struct {
Source string // Container host directory
Destination string // Inside the container
RW bool // True if writable
Name string // Name set by user
Driver string // Volume driver to use
Volume Volume `json:"-"`
// Note Mode is not used on Windows
Mode string `json:"Relabel"` // Originally field was `Relabel`" |
a2dc4f79 |
// Note Propagation is not used on Windows
Propagation string // Mount propagation string |
dd7d1c8a |
Named bool // specifies if the mountpoint was specified by name |
b0ac69b6 |
// Specifies if data should be copied from the container before the first mount
// Use a pointer here so we can tell if the user set this value explicitly
// This allows us to error out when the user explicitly enabled copy but we can't copy due to the volume being populated
CopyData bool `json:"-"` |
2b6bc294 |
// ID is the opaque ID used to pass to the volume driver.
// This should be set by calls to `Mount` and unset by calls to `Unmount`
ID string |
a7e686a7 |
}
// Setup sets up a mount point by either mounting the volume if it is
// configured, or creating the source directory if supplied. |
322cc99c |
func (m *MountPoint) Setup(mountLabel string) (string, error) { |
a7e686a7 |
if m.Volume != nil { |
2b6bc294 |
if m.ID == "" {
m.ID = stringid.GenerateNonCryptoID()
}
return m.Volume.Mount(m.ID) |
a7e686a7 |
} |
4e080347 |
if len(m.Source) == 0 {
return "", fmt.Errorf("Unable to setup mount point, neither source nor volume defined")
}
// system.MkdirAll() produces an error if m.Source exists and is a file (not a directory), |
322cc99c |
if err := system.MkdirAll(m.Source, 0755); err != nil {
if perr, ok := err.(*os.PathError); ok {
if perr.Err != syscall.ENOTDIR {
return "", err
} |
4e080347 |
} |
322cc99c |
}
if label.RelabelNeeded(m.Mode) {
if err := label.Relabel(m.Source, mountLabel, label.IsShared(m.Mode)); err != nil { |
4e080347 |
return "", err |
a7e686a7 |
}
} |
4e080347 |
return m.Source, nil |
dfc6c04f |
}
|
a7e686a7 |
// Path returns the path of a volume in a mount point.
func (m *MountPoint) Path() string {
if m.Volume != nil {
return m.Volume.Path()
}
return m.Source |
dfc6c04f |
}
|
534a90a9 |
// Type returns the type of mount point
func (m *MountPoint) Type() string {
if m.Name != "" { |
4d7d354c |
return "volume" |
534a90a9 |
}
if m.Source != "" { |
4d7d354c |
return "bind" |
534a90a9 |
} |
4d7d354c |
return "ephemeral" |
534a90a9 |
}
|
34b82a69 |
// ParseVolumesFrom ensures that the supplied volumes-from is valid. |
a7e686a7 |
func ParseVolumesFrom(spec string) (string, string, error) {
if len(spec) == 0 { |
a793564b |
return "", "", fmt.Errorf("malformed volumes-from specification: %s", spec) |
a7e686a7 |
}
specParts := strings.SplitN(spec, ":", 2)
id := specParts[0]
mode := "rw"
if len(specParts) == 2 {
mode = specParts[1]
if !ValidMountMode(mode) { |
a793564b |
return "", "", errInvalidMode(mode) |
a7e686a7 |
} |
a2dc4f79 |
// For now don't allow propagation properties while importing
// volumes from data container. These volumes will inherit
// the same propagation property as of the original volume
// in data container. This probably can be relaxed in future.
if HasPropagation(mode) { |
a793564b |
return "", "", errInvalidMode(mode) |
a2dc4f79 |
} |
b0ac69b6 |
// Do not allow copy modes on volumes-from
if _, isSet := getCopyMode(mode); isSet {
return "", "", errInvalidMode(mode)
} |
a7e686a7 |
}
return id, mode, nil
} |
a793564b |
func errInvalidMode(mode string) error {
return fmt.Errorf("invalid mode: %v", mode)
}
func errInvalidSpec(spec string) error {
return fmt.Errorf("Invalid volume specification: '%s'", spec)
} |