@@ -346,16 +346,12 @@ func RunEtcdSnapshotSave(ctx context.Context, etcdHost *hosts.Host, prsMap map[s
346
346
}
347
347
hostCfg := & container.HostConfig {
348
348
Binds : []string {
349
- fmt .Sprintf ("%s:/backup" , EtcdSnapshotPath ),
350
- fmt .Sprintf ("%s:/etc/kubernetes" , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
349
+ fmt .Sprintf ("%s:/backup:z " , EtcdSnapshotPath ),
350
+ fmt .Sprintf ("%s:/etc/kubernetes:z " , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
351
351
NetworkMode : container .NetworkMode ("host" ),
352
352
RestartPolicy : container.RestartPolicy {Name : restartPolicy },
353
353
}
354
354
355
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
356
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
357
- }
358
-
359
355
if once {
360
356
log .Infof (ctx , "[etcd] Running snapshot save once on host [%s]" , etcdHost .Address )
361
357
logrus .Debugf ("[etcd] Using command [%s] for snapshot save once container [%s] on host [%s]" , getSanitizedSnapshotCmd (imageCfg , es .BackupConfig ), EtcdSnapshotOnceContainerName , etcdHost .Address )
@@ -417,16 +413,12 @@ func RunGetStateFileFromSnapshot(ctx context.Context, etcdHost *hosts.Host, prsM
417
413
}
418
414
hostCfg := & container.HostConfig {
419
415
Binds : []string {
420
- fmt .Sprintf ("%s:/backup" , EtcdSnapshotPath ),
416
+ fmt .Sprintf ("%s:/backup:z " , EtcdSnapshotPath ),
421
417
},
422
418
NetworkMode : container .NetworkMode ("host" ),
423
419
RestartPolicy : container.RestartPolicy {Name : "no" },
424
420
}
425
421
426
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
427
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
428
- }
429
-
430
422
if err := docker .DoRemoveContainer (ctx , etcdHost .DClient , EtcdStateFileContainerName , etcdHost .Address ); err != nil {
431
423
return "" , err
432
424
}
@@ -488,14 +480,11 @@ func DownloadEtcdSnapshotFromS3(ctx context.Context, etcdHost *hosts.Host, prsMa
488
480
log .Infof (ctx , s3Logline )
489
481
hostCfg := & container.HostConfig {
490
482
Binds : []string {
491
- fmt .Sprintf ("%s:/backup" , EtcdSnapshotPath ),
492
- fmt .Sprintf ("%s:/etc/kubernetes" , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
483
+ fmt .Sprintf ("%s:/backup:z " , EtcdSnapshotPath ),
484
+ fmt .Sprintf ("%s:/etc/kubernetes:z " , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
493
485
NetworkMode : container .NetworkMode ("host" ),
494
486
RestartPolicy : container.RestartPolicy {Name : "no" },
495
487
}
496
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
497
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
498
- }
499
488
if err := docker .DoRemoveContainer (ctx , etcdHost .DClient , EtcdDownloadBackupContainerName , etcdHost .Address ); err != nil {
500
489
return err
501
490
}
@@ -547,14 +536,11 @@ func RestoreEtcdSnapshot(ctx context.Context, etcdHost *hosts.Host, prsMap map[s
547
536
}
548
537
hostCfg := & container.HostConfig {
549
538
Binds : []string {
550
- "/opt/rke/:/opt/rke/" ,
551
- fmt .Sprintf ("%s:/var/lib/rancher/etcd" , path .Join (etcdHost .PrefixPath , "/var/lib/etcd" )),
552
- fmt .Sprintf ("%s:/etc/kubernetes" , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
539
+ "/opt/rke/:/opt/rke/:z " ,
540
+ fmt .Sprintf ("%s:/var/lib/rancher/etcd:z " , path .Join (etcdHost .PrefixPath , "/var/lib/etcd" )),
541
+ fmt .Sprintf ("%s:/etc/kubernetes:z " , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
553
542
NetworkMode : container .NetworkMode ("host" ),
554
543
}
555
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
556
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
557
- }
558
544
if err := docker .DoRemoveContainer (ctx , etcdHost .DClient , EtcdRestoreContainerName , etcdHost .Address ); err != nil {
559
545
return err
560
546
}
@@ -624,13 +610,10 @@ func RunEtcdSnapshotRemove(ctx context.Context, etcdHost *hosts.Host, prsMap map
624
610
625
611
hostCfg := & container.HostConfig {
626
612
Binds : []string {
627
- fmt .Sprintf ("%s:/backup" , EtcdSnapshotPath ),
613
+ fmt .Sprintf ("%s:/backup:z " , EtcdSnapshotPath ),
628
614
},
629
615
RestartPolicy : container.RestartPolicy {Name : "no" },
630
616
}
631
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
632
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
633
- }
634
617
if err := docker .DoRemoveContainer (ctx , etcdHost .DClient , EtcdSnapshotRemoveContainerName , etcdHost .Address ); err != nil {
635
618
return err
636
619
}
@@ -667,12 +650,9 @@ func GetEtcdSnapshotChecksum(ctx context.Context, etcdHost *hosts.Host, prsMap m
667
650
}
668
651
hostCfg := & container.HostConfig {
669
652
Binds : []string {
670
- "/opt/rke/:/opt/rke/" ,
653
+ "/opt/rke/:/opt/rke/:z " ,
671
654
}}
672
655
673
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
674
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
675
- }
676
656
if err := docker .DoRunContainer (ctx , etcdHost .DClient , imageCfg , hostCfg , EtcdChecksumContainerName , etcdHost .Address , ETCDRole , prsMap ); err != nil {
677
657
return checksum , err
678
658
}
@@ -751,14 +731,11 @@ func StartBackupServer(ctx context.Context, etcdHost *hosts.Host, prsMap map[str
751
731
752
732
hostCfg := & container.HostConfig {
753
733
Binds : []string {
754
- fmt .Sprintf ("%s:/backup" , EtcdSnapshotPath ),
755
- fmt .Sprintf ("%s:/etc/kubernetes" , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
734
+ fmt .Sprintf ("%s:/backup:z " , EtcdSnapshotPath ),
735
+ fmt .Sprintf ("%s:/etc/kubernetes:z " , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
756
736
NetworkMode : container .NetworkMode ("host" ),
757
737
RestartPolicy : container.RestartPolicy {Name : "no" },
758
738
}
759
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
760
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
761
- }
762
739
if err := docker .DoRemoveContainer (ctx , etcdHost .DClient , EtcdServeBackupContainerName , etcdHost .Address ); err != nil {
763
740
return err
764
741
}
@@ -802,14 +779,11 @@ func DownloadEtcdSnapshotFromBackupServer(ctx context.Context, etcdHost *hosts.H
802
779
803
780
hostCfg := & container.HostConfig {
804
781
Binds : []string {
805
- fmt .Sprintf ("%s:/backup" , EtcdSnapshotPath ),
806
- fmt .Sprintf ("%s:/etc/kubernetes" , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
782
+ fmt .Sprintf ("%s:/backup:z " , EtcdSnapshotPath ),
783
+ fmt .Sprintf ("%s:/etc/kubernetes:z " , path .Join (etcdHost .PrefixPath , "/etc/kubernetes" ))},
807
784
NetworkMode : container .NetworkMode ("host" ),
808
785
RestartPolicy : container.RestartPolicy {Name : "on-failure" },
809
786
}
810
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
811
- hostCfg .SecurityOpt = append (hostCfg .SecurityOpt , SELinuxLabel )
812
- }
813
787
if err := docker .DoRemoveContainer (ctx , etcdHost .DClient , EtcdDownloadBackupContainerName , etcdHost .Address ); err != nil {
814
788
return err
815
789
}
@@ -852,13 +826,6 @@ func setEtcdPermissions(ctx context.Context, etcdHost *hosts.Host, prsMap map[st
852
826
hostCfg := & container.HostConfig {
853
827
Binds : []string {dataBind },
854
828
}
855
-
856
- if hosts .IsDockerSELinuxEnabled (etcdHost ) {
857
- // We apply the label because we do not rewrite SELinux labels anymore on volume mounts (no :z)
858
- logrus .Debugf ("Applying security opt label [%s] for [%s] container on host [%s]" , SELinuxLabel , EtcdPermFixContainerName , etcdHost .Address )
859
- hostCfg .SecurityOpt = []string {SELinuxLabel }
860
- }
861
-
862
829
if err := docker .DoRunOnetimeContainer (ctx , etcdHost .DClient , imageCfg , hostCfg , EtcdPermFixContainerName ,
863
830
etcdHost .Address , ETCDRole , prsMap ); err != nil {
864
831
return err
0 commit comments