mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
098a44c07f
Finish the refactor which was partially completed with commit
34536c498d
, passing around IdentityMapping structs instead of pairs of
[]IDMap slices.
Existing code which uses []IDMap relies on zero-valued fields to be
valid, empty mappings. So in order to successfully finish the
refactoring without introducing bugs, their replacement therefore also
needs to have a useful zero value which represents an empty mapping.
Change IdentityMapping to be a pass-by-value type so that there are no
nil pointers to worry about.
The functionality provided by the deprecated NewIDMappingsFromMaps
function is required by unit tests to to construct arbitrary
IdentityMapping values. And the daemon will always need to access the
mappings to pass them to the Linux kernel. Accommodate these use cases
by exporting the struct fields instead. BuildKit currently depends on
the UIDs and GIDs methods so we cannot get rid of them yet.
Signed-off-by: Cory Snider <csnider@mirantis.com>
649 lines
17 KiB
Go
649 lines
17 KiB
Go
//go:build linux
|
|
// +build linux
|
|
|
|
/*
|
|
|
|
aufs driver directory structure
|
|
|
|
.
|
|
├── layers // Metadata of layers
|
|
│ ├── 1
|
|
│ ├── 2
|
|
│ └── 3
|
|
├── diff // Content of the layer
|
|
│ ├── 1 // Contains layers that need to be mounted for the id
|
|
│ ├── 2
|
|
│ └── 3
|
|
└── mnt // Mount points for the rw layers to be mounted
|
|
├── 1
|
|
├── 2
|
|
└── 3
|
|
|
|
*/
|
|
|
|
package aufs // import "github.com/docker/docker/daemon/graphdriver/aufs"
|
|
|
|
import (
|
|
"bufio"
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"os/exec"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/containerd/containerd/pkg/userns"
|
|
"github.com/docker/docker/daemon/graphdriver"
|
|
"github.com/docker/docker/pkg/archive"
|
|
"github.com/docker/docker/pkg/chrootarchive"
|
|
"github.com/docker/docker/pkg/containerfs"
|
|
"github.com/docker/docker/pkg/directory"
|
|
"github.com/docker/docker/pkg/idtools"
|
|
"github.com/moby/locker"
|
|
"github.com/moby/sys/mount"
|
|
"github.com/opencontainers/selinux/go-selinux/label"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/vbatts/tar-split/tar/storage"
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
var (
|
|
// ErrAufsNotSupported is returned if aufs is not supported by the host.
|
|
ErrAufsNotSupported = fmt.Errorf("AUFS was not found in /proc/filesystems")
|
|
// ErrAufsNested means aufs cannot be used bc we are in a user namespace
|
|
ErrAufsNested = fmt.Errorf("AUFS cannot be used in non-init user namespace")
|
|
backingFs = "<unknown>"
|
|
|
|
enableDirpermLock sync.Once
|
|
enableDirperm bool
|
|
|
|
logger = logrus.WithField("storage-driver", "aufs")
|
|
)
|
|
|
|
func init() {
|
|
graphdriver.Register("aufs", Init)
|
|
}
|
|
|
|
// Driver contains information about the filesystem mounted.
|
|
type Driver struct {
|
|
root string
|
|
idMap idtools.IdentityMapping
|
|
ctr *graphdriver.RefCounter
|
|
pathCacheLock sync.Mutex
|
|
pathCache map[string]string
|
|
naiveDiff graphdriver.DiffDriver
|
|
locker *locker.Locker
|
|
mntL sync.Mutex
|
|
}
|
|
|
|
// Init returns a new AUFS driver.
|
|
// An error is returned if AUFS is not supported.
|
|
func Init(root string, options []string, idMap idtools.IdentityMapping) (graphdriver.Driver, error) {
|
|
// Try to load the aufs kernel module
|
|
if err := supportsAufs(); err != nil {
|
|
logger.Error(err)
|
|
return nil, graphdriver.ErrNotSupported
|
|
}
|
|
|
|
// Perform feature detection on /var/lib/docker/aufs if it's an existing directory.
|
|
// This covers situations where /var/lib/docker/aufs is a mount, and on a different
|
|
// filesystem than /var/lib/docker.
|
|
// If the path does not exist, fall back to using /var/lib/docker for feature detection.
|
|
testdir := root
|
|
if _, err := os.Stat(testdir); os.IsNotExist(err) {
|
|
testdir = filepath.Dir(testdir)
|
|
}
|
|
|
|
fsMagic, err := graphdriver.GetFSMagic(testdir)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if fsName, ok := graphdriver.FsNames[fsMagic]; ok {
|
|
backingFs = fsName
|
|
}
|
|
|
|
switch fsMagic {
|
|
case graphdriver.FsMagicAufs, graphdriver.FsMagicBtrfs, graphdriver.FsMagicEcryptfs:
|
|
logger.Errorf("AUFS is not supported over %s", backingFs)
|
|
return nil, graphdriver.ErrIncompatibleFS
|
|
}
|
|
|
|
paths := []string{
|
|
"mnt",
|
|
"diff",
|
|
"layers",
|
|
}
|
|
|
|
a := &Driver{
|
|
root: root,
|
|
idMap: idMap,
|
|
pathCache: make(map[string]string),
|
|
ctr: graphdriver.NewRefCounter(graphdriver.NewFsChecker(graphdriver.FsMagicAufs)),
|
|
locker: locker.New(),
|
|
}
|
|
|
|
currentID := idtools.CurrentIdentity()
|
|
dirID := idtools.Identity{
|
|
UID: currentID.UID,
|
|
GID: a.idMap.RootPair().GID,
|
|
}
|
|
|
|
// Create the root aufs driver dir
|
|
if err := idtools.MkdirAllAndChown(root, 0710, dirID); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Populate the dir structure
|
|
for _, p := range paths {
|
|
if err := idtools.MkdirAllAndChown(path.Join(root, p), 0710, dirID); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
for _, path := range []string{"mnt", "diff"} {
|
|
p := filepath.Join(root, path)
|
|
entries, err := os.ReadDir(p)
|
|
if err != nil {
|
|
logger.WithError(err).WithField("dir", p).Error("error reading dir entries")
|
|
continue
|
|
}
|
|
for _, entry := range entries {
|
|
if !entry.IsDir() {
|
|
continue
|
|
}
|
|
if strings.HasSuffix(entry.Name(), "-removing") {
|
|
logger.WithField("dir", entry.Name()).Debug("Cleaning up stale layer dir")
|
|
if err := containerfs.EnsureRemoveAll(filepath.Join(p, entry.Name())); err != nil {
|
|
logger.WithField("dir", entry.Name()).WithError(err).Error("Error removing stale layer dir")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
a.naiveDiff = graphdriver.NewNaiveDiffDriver(a, a.idMap)
|
|
return a, nil
|
|
}
|
|
|
|
// Return a nil error if the kernel supports aufs
|
|
// We cannot modprobe because inside dind modprobe fails
|
|
// to run
|
|
func supportsAufs() error {
|
|
// We can try to modprobe aufs first before looking at
|
|
// proc/filesystems for when aufs is supported
|
|
exec.Command("modprobe", "aufs").Run()
|
|
|
|
if userns.RunningInUserNS() {
|
|
return ErrAufsNested
|
|
}
|
|
|
|
f, err := os.Open("/proc/filesystems")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer f.Close()
|
|
|
|
s := bufio.NewScanner(f)
|
|
for s.Scan() {
|
|
if strings.Contains(s.Text(), "aufs") {
|
|
return nil
|
|
}
|
|
}
|
|
return ErrAufsNotSupported
|
|
}
|
|
|
|
func (a *Driver) rootPath() string {
|
|
return a.root
|
|
}
|
|
|
|
func (*Driver) String() string {
|
|
return "aufs"
|
|
}
|
|
|
|
// Status returns current information about the filesystem such as root directory, number of directories mounted, etc.
|
|
func (a *Driver) Status() [][2]string {
|
|
ids, _ := loadIds(path.Join(a.rootPath(), "layers"))
|
|
return [][2]string{
|
|
{"Root Dir", a.rootPath()},
|
|
{"Backing Filesystem", backingFs},
|
|
{"Dirs", fmt.Sprintf("%d", len(ids))},
|
|
{"Dirperm1 Supported", fmt.Sprintf("%v", useDirperm())},
|
|
}
|
|
}
|
|
|
|
// GetMetadata not implemented
|
|
func (a *Driver) GetMetadata(id string) (map[string]string, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
// Exists returns true if the given id is registered with
|
|
// this driver
|
|
func (a *Driver) Exists(id string) bool {
|
|
if _, err := os.Lstat(path.Join(a.rootPath(), "layers", id)); err != nil {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
// CreateReadWrite creates a layer that is writable for use as a container
|
|
// file system.
|
|
func (a *Driver) CreateReadWrite(id, parent string, opts *graphdriver.CreateOpts) error {
|
|
return a.Create(id, parent, opts)
|
|
}
|
|
|
|
// Create three folders for each id
|
|
// mnt, layers, and diff
|
|
func (a *Driver) Create(id, parent string, opts *graphdriver.CreateOpts) error {
|
|
|
|
if opts != nil && len(opts.StorageOpt) != 0 {
|
|
return fmt.Errorf("--storage-opt is not supported for aufs")
|
|
}
|
|
|
|
if err := a.createDirsFor(id); err != nil {
|
|
return err
|
|
}
|
|
// Write the layers metadata
|
|
f, err := os.Create(path.Join(a.rootPath(), "layers", id))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer f.Close()
|
|
|
|
if parent != "" {
|
|
ids, err := getParentIDs(a.rootPath(), parent)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := fmt.Fprintln(f, parent); err != nil {
|
|
return err
|
|
}
|
|
for _, i := range ids {
|
|
if _, err := fmt.Fprintln(f, i); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// createDirsFor creates two directories for the given id.
|
|
// mnt and diff
|
|
func (a *Driver) createDirsFor(id string) error {
|
|
paths := []string{
|
|
"mnt",
|
|
"diff",
|
|
}
|
|
|
|
// Directory permission is 0755.
|
|
// The path of directories are <aufs_root_path>/mnt/<image_id>
|
|
// and <aufs_root_path>/diff/<image_id>
|
|
for _, p := range paths {
|
|
if err := idtools.MkdirAllAndChown(path.Join(a.rootPath(), p, id), 0755, a.idMap.RootPair()); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Remove will unmount and remove the given id.
|
|
func (a *Driver) Remove(id string) error {
|
|
a.locker.Lock(id)
|
|
defer a.locker.Unlock(id)
|
|
a.pathCacheLock.Lock()
|
|
mountpoint, exists := a.pathCache[id]
|
|
a.pathCacheLock.Unlock()
|
|
if !exists {
|
|
mountpoint = a.getMountpoint(id)
|
|
}
|
|
|
|
if err := a.unmount(mountpoint); err != nil {
|
|
logger.WithError(err).WithField("method", "Remove()").Warn()
|
|
return err
|
|
}
|
|
|
|
// Remove the layers file for the id
|
|
if err := os.Remove(path.Join(a.rootPath(), "layers", id)); err != nil && !os.IsNotExist(err) {
|
|
return errors.Wrapf(err, "error removing layers dir for %s", id)
|
|
}
|
|
|
|
if err := atomicRemove(a.getDiffPath(id)); err != nil {
|
|
return errors.Wrapf(err, "could not remove diff path for id %s", id)
|
|
}
|
|
|
|
// Atomically remove each directory in turn by first moving it out of the
|
|
// way (so that docker doesn't find it anymore) before doing removal of
|
|
// the whole tree.
|
|
if err := atomicRemove(mountpoint); err != nil {
|
|
if errors.Is(err, unix.EBUSY) {
|
|
logger.WithField("dir", mountpoint).WithError(err).Warn("error performing atomic remove due to EBUSY")
|
|
}
|
|
return errors.Wrapf(err, "could not remove mountpoint for id %s", id)
|
|
}
|
|
|
|
a.pathCacheLock.Lock()
|
|
delete(a.pathCache, id)
|
|
a.pathCacheLock.Unlock()
|
|
return nil
|
|
}
|
|
|
|
func atomicRemove(source string) error {
|
|
target := source + "-removing"
|
|
|
|
err := os.Rename(source, target)
|
|
switch {
|
|
case err == nil, os.IsNotExist(err):
|
|
case os.IsExist(err):
|
|
// Got error saying the target dir already exists, maybe the source doesn't exist due to a previous (failed) remove
|
|
if _, e := os.Stat(source); !os.IsNotExist(e) {
|
|
return errors.Wrapf(err, "target rename dir %q exists but should not, this needs to be manually cleaned up", target)
|
|
}
|
|
default:
|
|
return errors.Wrapf(err, "error preparing atomic delete")
|
|
}
|
|
|
|
return containerfs.EnsureRemoveAll(target)
|
|
}
|
|
|
|
// Get returns the rootfs path for the id.
|
|
// This will mount the dir at its given path
|
|
func (a *Driver) Get(id, mountLabel string) (containerfs.ContainerFS, error) {
|
|
a.locker.Lock(id)
|
|
defer a.locker.Unlock(id)
|
|
parents, err := a.getParentLayerPaths(id)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return nil, err
|
|
}
|
|
|
|
a.pathCacheLock.Lock()
|
|
m, exists := a.pathCache[id]
|
|
a.pathCacheLock.Unlock()
|
|
|
|
if !exists {
|
|
m = a.getDiffPath(id)
|
|
if len(parents) > 0 {
|
|
m = a.getMountpoint(id)
|
|
}
|
|
}
|
|
if count := a.ctr.Increment(m); count > 1 {
|
|
return containerfs.NewLocalContainerFS(m), nil
|
|
}
|
|
|
|
// If a dir does not have a parent ( no layers )do not try to mount
|
|
// just return the diff path to the data
|
|
if len(parents) > 0 {
|
|
if err := a.mount(id, m, mountLabel, parents); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
a.pathCacheLock.Lock()
|
|
a.pathCache[id] = m
|
|
a.pathCacheLock.Unlock()
|
|
return containerfs.NewLocalContainerFS(m), nil
|
|
}
|
|
|
|
// Put unmounts and updates list of active mounts.
|
|
func (a *Driver) Put(id string) error {
|
|
a.locker.Lock(id)
|
|
defer a.locker.Unlock(id)
|
|
a.pathCacheLock.Lock()
|
|
m, exists := a.pathCache[id]
|
|
if !exists {
|
|
m = a.getMountpoint(id)
|
|
a.pathCache[id] = m
|
|
}
|
|
a.pathCacheLock.Unlock()
|
|
if count := a.ctr.Decrement(m); count > 0 {
|
|
return nil
|
|
}
|
|
|
|
err := a.unmount(m)
|
|
if err != nil {
|
|
logger.WithError(err).WithField("method", "Put()").Warn()
|
|
}
|
|
return err
|
|
}
|
|
|
|
// isParent returns if the passed in parent is the direct parent of the passed in layer
|
|
func (a *Driver) isParent(id, parent string) bool {
|
|
parents, _ := getParentIDs(a.rootPath(), id)
|
|
if parent == "" && len(parents) > 0 {
|
|
return false
|
|
}
|
|
return !(len(parents) > 0 && parent != parents[0])
|
|
}
|
|
|
|
// Diff produces an archive of the changes between the specified
|
|
// layer and its parent layer which may be "".
|
|
func (a *Driver) Diff(id, parent string) (io.ReadCloser, error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.Diff(id, parent)
|
|
}
|
|
|
|
// AUFS doesn't need the parent layer to produce a diff.
|
|
return archive.TarWithOptions(path.Join(a.rootPath(), "diff", id), &archive.TarOptions{
|
|
Compression: archive.Uncompressed,
|
|
ExcludePatterns: []string{archive.WhiteoutMetaPrefix + "*", "!" + archive.WhiteoutOpaqueDir},
|
|
IDMap: a.idMap,
|
|
})
|
|
}
|
|
|
|
type fileGetNilCloser struct {
|
|
storage.FileGetter
|
|
}
|
|
|
|
func (f fileGetNilCloser) Close() error {
|
|
return nil
|
|
}
|
|
|
|
// DiffGetter returns a FileGetCloser that can read files from the directory that
|
|
// contains files for the layer differences. Used for direct access for tar-split.
|
|
func (a *Driver) DiffGetter(id string) (graphdriver.FileGetCloser, error) {
|
|
p := path.Join(a.rootPath(), "diff", id)
|
|
return fileGetNilCloser{storage.NewPathFileGetter(p)}, nil
|
|
}
|
|
|
|
func (a *Driver) applyDiff(id string, diff io.Reader) error {
|
|
return chrootarchive.UntarUncompressed(diff, path.Join(a.rootPath(), "diff", id), &archive.TarOptions{
|
|
IDMap: a.idMap,
|
|
})
|
|
}
|
|
|
|
// DiffSize calculates the changes between the specified id
|
|
// and its parent and returns the size in bytes of the changes
|
|
// relative to its base filesystem directory.
|
|
func (a *Driver) DiffSize(id, parent string) (size int64, err error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.DiffSize(id, parent)
|
|
}
|
|
// AUFS doesn't need the parent layer to calculate the diff size.
|
|
return directory.Size(context.TODO(), path.Join(a.rootPath(), "diff", id))
|
|
}
|
|
|
|
// ApplyDiff extracts the changeset from the given diff into the
|
|
// layer with the specified id and parent, returning the size of the
|
|
// new layer in bytes.
|
|
func (a *Driver) ApplyDiff(id, parent string, diff io.Reader) (size int64, err error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.ApplyDiff(id, parent, diff)
|
|
}
|
|
|
|
// AUFS doesn't need the parent id to apply the diff if it is the direct parent.
|
|
if err = a.applyDiff(id, diff); err != nil {
|
|
return
|
|
}
|
|
|
|
return a.DiffSize(id, parent)
|
|
}
|
|
|
|
// Changes produces a list of changes between the specified layer
|
|
// and its parent layer. If parent is "", then all changes will be ADD changes.
|
|
func (a *Driver) Changes(id, parent string) ([]archive.Change, error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.Changes(id, parent)
|
|
}
|
|
|
|
// AUFS doesn't have snapshots, so we need to get changes from all parent
|
|
// layers.
|
|
layers, err := a.getParentLayerPaths(id)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return archive.Changes(layers, path.Join(a.rootPath(), "diff", id))
|
|
}
|
|
|
|
func (a *Driver) getParentLayerPaths(id string) ([]string, error) {
|
|
parentIds, err := getParentIDs(a.rootPath(), id)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
layers := make([]string, len(parentIds))
|
|
|
|
// Get the diff paths for all the parent ids
|
|
for i, p := range parentIds {
|
|
layers[i] = path.Join(a.rootPath(), "diff", p)
|
|
}
|
|
return layers, nil
|
|
}
|
|
|
|
func (a *Driver) mount(id string, target string, mountLabel string, layers []string) error {
|
|
// If the id is mounted or we get an error return
|
|
if mounted, err := a.mounted(target); err != nil || mounted {
|
|
return err
|
|
}
|
|
|
|
rw := a.getDiffPath(id)
|
|
|
|
if err := a.aufsMount(layers, rw, target, mountLabel); err != nil {
|
|
return fmt.Errorf("error creating aufs mount to %s: %v", target, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (a *Driver) unmount(mountPath string) error {
|
|
if mounted, err := a.mounted(mountPath); err != nil || !mounted {
|
|
return err
|
|
}
|
|
return Unmount(mountPath)
|
|
}
|
|
|
|
func (a *Driver) mounted(mountpoint string) (bool, error) {
|
|
return graphdriver.Mounted(graphdriver.FsMagicAufs, mountpoint)
|
|
}
|
|
|
|
// Cleanup aufs and unmount all mountpoints
|
|
func (a *Driver) Cleanup() error {
|
|
dir := a.mntPath()
|
|
files, err := os.ReadDir(dir)
|
|
if err != nil {
|
|
return errors.Wrap(err, "aufs readdir error")
|
|
}
|
|
for _, f := range files {
|
|
if !f.IsDir() {
|
|
continue
|
|
}
|
|
|
|
m := path.Join(dir, f.Name())
|
|
|
|
if err := a.unmount(m); err != nil {
|
|
logger.WithError(err).WithField("method", "Cleanup()").Warn()
|
|
}
|
|
}
|
|
return mount.RecursiveUnmount(a.root)
|
|
}
|
|
|
|
func (a *Driver) aufsMount(ro []string, rw, target, mountLabel string) (err error) {
|
|
defer func() {
|
|
if err != nil {
|
|
mount.Unmount(target)
|
|
}
|
|
}()
|
|
|
|
// Mount options are clipped to page size(4096 bytes). If there are more
|
|
// layers then these are remounted individually using append.
|
|
|
|
offset := 54
|
|
if useDirperm() {
|
|
offset += len(",dirperm1")
|
|
}
|
|
b := make([]byte, unix.Getpagesize()-len(mountLabel)-offset) // room for xino & mountLabel
|
|
bp := copy(b, fmt.Sprintf("br:%s=rw", rw))
|
|
|
|
index := 0
|
|
for ; index < len(ro); index++ {
|
|
layer := fmt.Sprintf(":%s=ro+wh", ro[index])
|
|
if bp+len(layer) > len(b) {
|
|
break
|
|
}
|
|
bp += copy(b[bp:], layer)
|
|
}
|
|
|
|
opts := "dio,xino=/dev/shm/aufs.xino"
|
|
if useDirperm() {
|
|
opts += ",dirperm1"
|
|
}
|
|
data := label.FormatMountLabel(fmt.Sprintf("%s,%s", string(b[:bp]), opts), mountLabel)
|
|
a.mntL.Lock()
|
|
err = unix.Mount("none", target, "aufs", 0, data)
|
|
a.mntL.Unlock()
|
|
if err != nil {
|
|
err = errors.Wrap(err, "mount target="+target+" data="+data)
|
|
return
|
|
}
|
|
|
|
for index < len(ro) {
|
|
bp = 0
|
|
for ; index < len(ro); index++ {
|
|
layer := fmt.Sprintf("append:%s=ro+wh,", ro[index])
|
|
if bp+len(layer) > len(b) {
|
|
break
|
|
}
|
|
bp += copy(b[bp:], layer)
|
|
}
|
|
data := label.FormatMountLabel(string(b[:bp]), mountLabel)
|
|
a.mntL.Lock()
|
|
err = unix.Mount("none", target, "aufs", unix.MS_REMOUNT, data)
|
|
a.mntL.Unlock()
|
|
if err != nil {
|
|
err = errors.Wrap(err, "mount target="+target+" flags=MS_REMOUNT data="+data)
|
|
return
|
|
}
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// useDirperm checks dirperm1 mount option can be used with the current
|
|
// version of aufs.
|
|
func useDirperm() bool {
|
|
enableDirpermLock.Do(func() {
|
|
base, err := os.MkdirTemp("", "docker-aufs-base")
|
|
if err != nil {
|
|
logger.Errorf("error checking dirperm1: %v", err)
|
|
return
|
|
}
|
|
defer os.RemoveAll(base)
|
|
|
|
union, err := os.MkdirTemp("", "docker-aufs-union")
|
|
if err != nil {
|
|
logger.Errorf("error checking dirperm1: %v", err)
|
|
return
|
|
}
|
|
defer os.RemoveAll(union)
|
|
|
|
opts := fmt.Sprintf("br:%s,dirperm1,xino=/dev/shm/aufs.xino", base)
|
|
if err := unix.Mount("none", union, "aufs", 0, opts); err != nil {
|
|
return
|
|
}
|
|
enableDirperm = true
|
|
if err := Unmount(union); err != nil {
|
|
logger.Errorf("error checking dirperm1: failed to unmount %v", err)
|
|
}
|
|
})
|
|
return enableDirperm
|
|
}
|