summaryrefslogtreecommitdiff
path: root/vendor/k8s.io/kubernetes/pkg/util/mount/fake.go
diff options
context:
space:
mode:
authorMatthew Heon <matthew.heon@gmail.com>2017-11-01 11:24:59 -0400
committerMatthew Heon <matthew.heon@gmail.com>2017-11-01 11:24:59 -0400
commita031b83a09a8628435317a03f199cdc18b78262f (patch)
treebc017a96769ce6de33745b8b0b1304ccf38e9df0 /vendor/k8s.io/kubernetes/pkg/util/mount/fake.go
parent2b74391cd5281f6fdf391ff8ad50fd1490f6bf89 (diff)
downloadpodman-a031b83a09a8628435317a03f199cdc18b78262f.tar.gz
podman-a031b83a09a8628435317a03f199cdc18b78262f.tar.bz2
podman-a031b83a09a8628435317a03f199cdc18b78262f.zip
Initial checkin from CRI-O repo
Signed-off-by: Matthew Heon <matthew.heon@gmail.com>
Diffstat (limited to 'vendor/k8s.io/kubernetes/pkg/util/mount/fake.go')
-rw-r--r--vendor/k8s.io/kubernetes/pkg/util/mount/fake.go173
1 files changed, 173 insertions, 0 deletions
diff --git a/vendor/k8s.io/kubernetes/pkg/util/mount/fake.go b/vendor/k8s.io/kubernetes/pkg/util/mount/fake.go
new file mode 100644
index 000000000..2b71fa0a7
--- /dev/null
+++ b/vendor/k8s.io/kubernetes/pkg/util/mount/fake.go
@@ -0,0 +1,173 @@
+/*
+Copyright 2015 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package mount
+
+import (
+ "path/filepath"
+ "sync"
+
+ "github.com/golang/glog"
+)
+
+// FakeMounter implements mount.Interface for tests.
+type FakeMounter struct {
+ MountPoints []MountPoint
+ Log []FakeAction
+ // Some tests run things in parallel, make sure the mounter does not produce
+ // any golang's DATA RACE warnings.
+ mutex sync.Mutex
+}
+
+var _ Interface = &FakeMounter{}
+
+// Values for FakeAction.Action
+const FakeActionMount = "mount"
+const FakeActionUnmount = "unmount"
+
+// FakeAction objects are logged every time a fake mount or unmount is called.
+type FakeAction struct {
+ Action string // "mount" or "unmount"
+ Target string // applies to both mount and unmount actions
+ Source string // applies only to "mount" actions
+ FSType string // applies only to "mount" actions
+}
+
+func (f *FakeMounter) ResetLog() {
+ f.mutex.Lock()
+ defer f.mutex.Unlock()
+
+ f.Log = []FakeAction{}
+}
+
+func (f *FakeMounter) Mount(source string, target string, fstype string, options []string) error {
+ f.mutex.Lock()
+ defer f.mutex.Unlock()
+
+ // find 'bind' option
+ for _, option := range options {
+ if option == "bind" {
+ // This is a bind-mount. In order to mimic linux behaviour, we must
+ // use the original device of the bind-mount as the real source.
+ // E.g. when mounted /dev/sda like this:
+ // $ mount /dev/sda /mnt/test
+ // $ mount -o bind /mnt/test /mnt/bound
+ // then /proc/mount contains:
+ // /dev/sda /mnt/test
+ // /dev/sda /mnt/bound
+ // (and not /mnt/test /mnt/bound)
+ // I.e. we must use /dev/sda as source instead of /mnt/test in the
+ // bind mount.
+ for _, mnt := range f.MountPoints {
+ if source == mnt.Path {
+ source = mnt.Device
+ break
+ }
+ }
+ break
+ }
+ }
+
+ // If target is a symlink, get its absolute path
+ absTarget, err := filepath.EvalSymlinks(target)
+ if err != nil {
+ absTarget = target
+ }
+
+ f.MountPoints = append(f.MountPoints, MountPoint{Device: source, Path: absTarget, Type: fstype})
+ glog.V(5).Infof("Fake mounter: mounted %s to %s", source, absTarget)
+ f.Log = append(f.Log, FakeAction{Action: FakeActionMount, Target: absTarget, Source: source, FSType: fstype})
+ return nil
+}
+
+func (f *FakeMounter) Unmount(target string) error {
+ f.mutex.Lock()
+ defer f.mutex.Unlock()
+
+ // If target is a symlink, get its absolute path
+ absTarget, err := filepath.EvalSymlinks(target)
+ if err != nil {
+ absTarget = target
+ }
+
+ newMountpoints := []MountPoint{}
+ for _, mp := range f.MountPoints {
+ if mp.Path == absTarget {
+ glog.V(5).Infof("Fake mounter: unmounted %s from %s", mp.Device, absTarget)
+ // Don't copy it to newMountpoints
+ continue
+ }
+ newMountpoints = append(newMountpoints, MountPoint{Device: mp.Device, Path: mp.Path, Type: mp.Type})
+ }
+ f.MountPoints = newMountpoints
+ f.Log = append(f.Log, FakeAction{Action: FakeActionUnmount, Target: absTarget})
+ return nil
+}
+
+func (f *FakeMounter) List() ([]MountPoint, error) {
+ f.mutex.Lock()
+ defer f.mutex.Unlock()
+
+ return f.MountPoints, nil
+}
+
+func (f *FakeMounter) IsMountPointMatch(mp MountPoint, dir string) bool {
+ return (mp.Path == dir)
+}
+
+func (f *FakeMounter) IsNotMountPoint(dir string) (bool, error) {
+ return IsNotMountPoint(f, dir)
+}
+
+func (f *FakeMounter) IsLikelyNotMountPoint(file string) (bool, error) {
+ f.mutex.Lock()
+ defer f.mutex.Unlock()
+
+ // If file is a symlink, get its absolute path
+ absFile, err := filepath.EvalSymlinks(file)
+ if err != nil {
+ absFile = file
+ }
+
+ for _, mp := range f.MountPoints {
+ if mp.Path == absFile {
+ glog.V(5).Infof("isLikelyNotMountPoint for %s: mounted %s, false", file, mp.Path)
+ return false, nil
+ }
+ }
+ glog.V(5).Infof("isLikelyNotMountPoint for %s: true", file)
+ return true, nil
+}
+
+func (f *FakeMounter) DeviceOpened(pathname string) (bool, error) {
+ f.mutex.Lock()
+ defer f.mutex.Unlock()
+
+ for _, mp := range f.MountPoints {
+ if mp.Device == pathname {
+ return true, nil
+ }
+ }
+ return false, nil
+}
+
+func (f *FakeMounter) PathIsDevice(pathname string) (bool, error) {
+ return true, nil
+}
+
+func (f *FakeMounter) GetDeviceNameFromMount(mountPath, pluginDir string) (string, error) {
+ return getDeviceNameFromMount(f, mountPath, pluginDir)
+}