-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/64978/
-----------------------------------------------------------

(Updated Jan. 15, 2018, 2:21 p.m.)


Review request for mesos, Benjamin Mahler, Gilbert Song, Jie Yu, and Vinod Kone.


Changes
-------

Addressed comments.


Bugs: MESOS-8279
    https://issues.apache.org/jira/browse/MESOS-8279


Repository: mesos


Description
-------

In MESOS-7225, we made a task can access any volumes specified in its
disk resources from its own sandbox by introducing a workaround to the
default executor, i.e., add a `SANDBOX_PATH` volume with type `PARENT`
to the corresponding nested container. It will be translated into a bind
mount in the nested container's mount namespace, thus not visible in the
host mount namespace, that means the task's volume directory can not be
visible in Mesos UI since it operates in the host mount namespace.

In this patch, to make the task's volume directory visible in Mesos UI,
we attached the executor's volume directory to it, so when users browse
task's volume directory in Mesos UI, what they actually browse is the
executor's volume directory. Note when calling `Files::attach()`, the
third argument `authorized` is not specified, that is because it is
already specified when we do the attach for the executor's sandbox and
it is also applied to the executor's tasks.


Diffs (updated)
-----

  src/slave/slave.hpp ef0eae21af811cc09f43cd1d4c4ccc0c33cbeb39 
  src/slave/slave.cpp aeb0fdaeda78f26de2ec790735bfa88c5be72850 


Diff: https://reviews.apache.org/r/64978/diff/4/

Changes: https://reviews.apache.org/r/64978/diff/3-4/


Testing
-------

sudo make check


Thanks,

Qian Zhang

Reply via email to