Temperory workaround for the regression to pass

Currently the cephfs PVC create/delete and all other operations
related to cephfs are failing. One of the recent commits in rook
900abbc967e108ad622648b740a7c57f1268209f has modified ceph-mgr
to run as ceph user rather than root user. The ceph user currently
has no permission to write to the root of the cephfs filesystem.
The fix will be external to CSI itself, but until that lands, sending
a workaround patch so the CSI CI is unblocked

In this patch, we are setting the permission 777 on root of the cephfs
filesystem. Thus ceph user will be able to modify the cephfs filesystem.

Signed-off-by: Poornima G <pgurusid@redhat.com>
This commit is contained in:
Poornima G 2019-07-24 05:51:25 +00:00 committed by mergify[bot]
parent 5d5a6c4d91
commit 7d8f465746
2 changed files with 15 additions and 0 deletions

View File

@ -39,6 +39,7 @@ var _ = Describe("cephfs", func() {
deployCephfsPlugin() deployCephfsPlugin()
createCephfsStorageClass(f.ClientSet, f) createCephfsStorageClass(f.ClientSet, f)
createCephfsSecret(f.ClientSet, f) createCephfsSecret(f.ClientSet, f)
GivePermToCephfsRoot(f)
}) })
AfterEach(func() { AfterEach(func() {

View File

@ -745,3 +745,17 @@ func listSnapshots(f *framework.Framework, pool, imageName string) ([]snapInfo,
err := json.Unmarshal([]byte(stdout), &snapInfos) err := json.Unmarshal([]byte(stdout), &snapInfos)
return snapInfos, err return snapInfos, err
} }
func GivePermToCephfsRoot(f *framework.Framework) {
opt := metav1.ListOptions{
LabelSelector: "app=rook-ceph-tools",
}
out := execCommandInPod(f, "mkdir /mnt/cephfs", rookNS, &opt)
e2elog.Logf("Creating temperory mount point in tools pod %s", out)
out = execCommandInPod(f, "ceph-fuse /mnt/cephfs >/dev/null 2>&1", rookNS, &opt)
e2elog.Logf("Mounting ceph file system at /mnt/cephfs %s", out)
out = execCommandInPod(f, "chmod 777 /mnt/cephfs/", rookNS, &opt)
e2elog.Logf("Setting chmod 777 on the cepfs root %s", out)
}