-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Specifying security type of mount #11
Comments
@briantopping You haven't missed anything so far, as the documentation is pretty thin. I'll be refreshing this code quite a bit after the first of the year, as the CSI spec finally nears 0.1 status. As it stands today, it is quite a bit different from the current state of the spec, especially as it pertains to the Volume IDs. The current version of |
Awesome, thanks for the detail, Travis! I'm using the plugin from within REX-Ray, so So I suppose what I can offer right now is "beginner mind" kind of feedback and end up meeting you halfway as I get better with Go and the rest of life allows you the opportunity to get the next release out. Glad the answer wasn't RTFM! 8) |
@briantopping And thank you for the feedback. Fresh perspectives welcome! We are definitely in early days with CSI, and the REX-Ray integration to the |
Ok, so here's a thought experiment: If I were magically able to build a PR that was accepted for the the REX-Ray integration to the |
So I've spent a couple of days tweaking the configuration to work around this issue but am coming up empty. As of this morning, I was wondering why a volume was mounting just fine on There's not quite enough debug data there to explore it beyond this message that there's something going wrong with the copy and it's weird that Apologies for the TMI, just sharing what's going on in the field... |
Hi @briantopping, I haven't tried running things under Marathon myself, so I'm afraid I'm not much help with what you are toying with. I am going to update REX-Ray's docs to have an example of using
You would want to look at: https://github.com/thecodeteam/rexray/blob/master/agent/csi/mod_csi_docker_bridge.go That is setting the filesystem type, and, is also setting the mount flags here: https://github.com/thecodeteam/rexray/blob/bf500f31232f414f85486d2697cf4e6bfe1a59f0/agent/csi/mod_csi_docker_bridge.go#L923-L937 If you look close, you'll notice that no mount flags are ever passed in. That is because Docker doesn't give them to us. The "mount" under Docker happens when you do a Which is not very useful. REX-Ray tries very hard to be stateless today, which precludes the option of caching those options when doing a create and re-using them during a mount. That info would be lost on a restart of REX-Ray. There would also be no way to override those options when doing a mount (like doing I was going to link you to the docs showing how to use Docker's native NFS integration, but as I was looking for it, I found something new to me, which is the |
Wow, manna from heaven! Thanks @codenrhoden! I'm going to burn on this through the weekend, this is a real gem of a message. Happy Friday to you! |
Hi @codenrhoden, thanks again for your work on these, including your recent doc on CSI-NFS in RR. I left a comment at https://github.com/thecodeteam/rexray/pull/1133/files#r157861451, I considered there that I may be misapplying RR and friends, expecting it to fill the gap that non-Swarm environments (or at least DC/OS) have WRT volume management across agent nodes. If the only focus of RR is to act as a venue for storage and orchestrators to meet (laudable in itself, of course), then I'm left wondering if DC/OS is leaning on RR for too much and the problem is actually poor volume management in DC/OS. To your point in the PR above, CSI-NFS is not intended as a replacement for the local NFS services available in https://docs.docker.com/engine/reference/commandline/volume_create/#driver-specific-options. Nevertheless, a large DC/OS deployment still needs to have the volumes maintained across all agents and I may have mistakenly projected the gap from the DC/OS docs that RR configs made this possible. So I guess my next direction ought to be whether cluster-wide volume management is scope creep for RR. If so, I need to re-analyze how I'm going to solve that first, then see if RR is a part of that solution. It seems to me to be a pretty natural fit, but suddenly it's starting to look more like Ceph or Portworx. |
It's unclear how to specify a mount option such as
sec=sys
. When using a NFSv4 volume from a modern operating system, the negotiation will naturally take the highest level of security that is available.Unfortunately, if that resolves to krb5, an arbitrary container is unlikely to have a ticket or the ability to acquire one. In that case, the contents of the volume will either be inaccessible or mapped to
nobody
.sec=sys
is not ideal, but sufficient in a controlled security context.Apologies if this is already addressed and I missed it in the documentation.
The text was updated successfully, but these errors were encountered: