only check for containerpath

Signed-off-by: Venky Natham <vrnatham@amazon.com>
This commit is contained in:
Venky Natham 2021-12-09 14:50:27 -08:00
parent 51dcc574d5
commit f705c40714
1 changed files with 21 additions and 39 deletions

View File

@ -6,7 +6,6 @@ import (
"fmt"
"io/ioutil"
"path"
"path/filepath"
"reflect"
"regexp"
"strconv"
@ -435,18 +434,18 @@ func parse(flags *pflag.FlagSet, copts *containerOptions, serverOS string) (*con
for _, device := range copts.devices.GetAll() {
var (
validated string
parsedDeviceMappings []container.DeviceMapping
deviceMapping container.DeviceMapping
err error
)
validated, err = validateDevice(device, serverOS)
if err != nil {
return nil, err
}
parsedDeviceMappings, err = parseDevice(validated, serverOS)
deviceMapping, err = parseDevice(validated, serverOS)
if err != nil {
return nil, err
}
deviceMappings = append(deviceMappings, parsedDeviceMappings...)
deviceMappings = append(deviceMappings, deviceMapping)
}
// collect all the environment variables for the container
@ -895,21 +894,19 @@ func parseStorageOpts(storageOpts []string) (map[string]string, error) {
}
// parseDevice parses a device mapping string to a container.DeviceMapping struct
func parseDevice(device, serverOS string) ([]container.DeviceMapping, error) {
var deviceMappings []container.DeviceMapping
func parseDevice(device, serverOS string) (container.DeviceMapping, error) {
switch serverOS {
case "linux":
return parseLinuxDevice(device)
case "windows":
return parseWindowsDevice(device)
}
return append(deviceMappings, container.DeviceMapping{}), errors.Errorf("unknown server OS: %s", serverOS)
return container.DeviceMapping{}, errors.Errorf("unknown server OS: %s", serverOS)
}
// parseLinuxDevice parses a device mapping string to a container.DeviceMapping struct
// knowing that the target is a Linux daemon
func parseLinuxDevice(device string) ([]container.DeviceMapping, error) {
var deviceMappings []container.DeviceMapping
func parseLinuxDevice(device string) (container.DeviceMapping, error) {
src := ""
dst := ""
permissions := "rwm"
@ -929,25 +926,13 @@ func parseLinuxDevice(device string) ([]container.DeviceMapping, error) {
src = arr[0]
if strings.HasSuffix(src, "*") {
if dst != "" {
return deviceMappings, errors.Errorf("device with * suffix can't have dst: %s", device)
return container.DeviceMapping{}, errors.Errorf("device with * suffix can't have dst: %s", device)
}
}
default:
return deviceMappings, errors.Errorf("invalid device specification: %s", device)
return container.DeviceMapping{}, errors.Errorf("invalid device specification: %s", device)
}
if strings.HasSuffix(src, "*") {
devicePaths, _ := filepath.Glob(src)
for _, devicePath := range devicePaths {
deviceMapping := container.DeviceMapping{
PathOnHost: devicePath,
PathInContainer: devicePath,
CgroupPermissions: permissions,
}
deviceMappings = append(deviceMappings, deviceMapping)
}
} else {
if dst == "" {
dst = src
}
@ -957,16 +942,13 @@ func parseLinuxDevice(device string) ([]container.DeviceMapping, error) {
PathInContainer: dst,
CgroupPermissions: permissions,
}
deviceMappings = append(deviceMappings, deviceMapping)
}
return deviceMappings, nil
return deviceMapping, nil
}
// parseWindowsDevice parses a device mapping string to a container.DeviceMapping struct
// knowing that the target is a Windows daemon
func parseWindowsDevice(device string) ([]container.DeviceMapping, error) {
var deviceMappings []container.DeviceMapping
return append(deviceMappings, container.DeviceMapping{PathOnHost: device}), nil
func parseWindowsDevice(device string) (container.DeviceMapping, error) {
return container.DeviceMapping{PathOnHost: device}, nil
}
// validateDeviceCgroupRule validates a device cgroup rule string format