[pve-devel] FreeNAS plugin: Status

datanom.net mir at datanom.net
Thu Jun 8 11:58:59 CEST 2017


On 2017-06-08 09:31, Fabian Grünbichler wrote:
> 
> no, IMHO this should work. I think the problem is (this time almost
> certainly ;)) the colon. the path is just quoted using
> PVE::Tools::shellquote, which is a wrapper around
> String::ShellQuote::shell_quote. Similarly, PVE::Tools::run_command 
> will
> us shellquote, but of course does not know about the semantics of the
> command which is run, so cannot decide magically whether to encode
> certain special characters which are not problematic for the shell
> itself.
> 
I have found out that live resize is not possible since the LUN needs to 
be re-exposed for the OS to see the new size. Re-exposing causing VM to 
crash. So I bail if $running is true.

> if the "device" string of a call to "mount" contains a ':', its
> autodetection seems to think you are trying to mount an NFS export
> (where the ':' is the demarkation between server and export).
> 
Sounds like a good explanation.

> did you test whether anything breaks when your plugin's path method
> escapes the colons?
> 
No. Any other place it works fine.

> 
> possibly same as above - or are you recreating the device when resizing
> in your plugin? because there is a call to activate_volumes a few lines
> above the call to PVE::Storage::volume_resize in PVE::API2::LXC's
> resize_vm API path?
> 
For the FreeNAS plugin disks (LUNs) are only exposed when the VM is 
running so any disk will only be exposed after calling activate_volume. 
Since volume_resize implicitly activates and deactivates the LUN for the 
remote OS to notice changes I need to activate it again before e2fsck 
and resize2fs on the volume is called since e2fsck and resize2fs are 
executed on the client.

-- 
Hilsen/Regards
Michael Rasmussen

Get my public GnuPG keys:
michael <at> rasmussen <dot> cc
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xD3C9A00E
mir <at> datanom <dot> net
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE501F51C
mir <at> miras <dot> org
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE3E80917
--------------------------------------------------------------

----

This mail was virus scanned and spam checked before delivery.
This mail is also DKIM signed. See header dkim-signature.




More information about the pve-devel mailing list