2015-02-18 01:26:41 +00:00
|
|
|
/*
|
2015-05-01 16:19:44 +00:00
|
|
|
Copyright 2015 The Kubernetes Authors All rights reserved.
|
2015-02-18 01:26:41 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package secret
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"path"
|
|
|
|
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/types"
|
2015-03-24 14:39:51 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util"
|
2015-03-19 05:18:31 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/volume"
|
2015-04-22 14:48:23 +00:00
|
|
|
volumeutil "github.com/GoogleCloudPlatform/kubernetes/pkg/volume/util"
|
2015-02-18 01:26:41 +00:00
|
|
|
"github.com/golang/glog"
|
|
|
|
)
|
|
|
|
|
|
|
|
// ProbeVolumePlugin is the entry point for plugin detection in a package.
|
2015-03-19 05:18:31 +00:00
|
|
|
func ProbeVolumePlugins() []volume.VolumePlugin {
|
|
|
|
return []volume.VolumePlugin{&secretPlugin{}}
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
|
|
|
secretPluginName = "kubernetes.io/secret"
|
|
|
|
)
|
|
|
|
|
|
|
|
// secretPlugin implements the VolumePlugin interface.
|
|
|
|
type secretPlugin struct {
|
2015-03-19 05:18:31 +00:00
|
|
|
host volume.VolumeHost
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
2015-03-19 05:18:31 +00:00
|
|
|
func (plugin *secretPlugin) Init(host volume.VolumeHost) {
|
2015-02-18 01:26:41 +00:00
|
|
|
plugin.host = host
|
|
|
|
}
|
|
|
|
|
|
|
|
func (plugin *secretPlugin) Name() string {
|
|
|
|
return secretPluginName
|
|
|
|
}
|
|
|
|
|
2015-04-14 16:29:33 +00:00
|
|
|
func (plugin *secretPlugin) CanSupport(spec *volume.Spec) bool {
|
|
|
|
return spec.VolumeSource.Secret != nil
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
2015-04-14 16:29:33 +00:00
|
|
|
func (plugin *secretPlugin) NewBuilder(spec *volume.Spec, podRef *api.ObjectReference, opts volume.VolumeOptions) (volume.Builder, error) {
|
2015-04-10 20:56:11 +00:00
|
|
|
return plugin.newBuilderInternal(spec, podRef, opts)
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
2015-04-14 16:29:33 +00:00
|
|
|
func (plugin *secretPlugin) newBuilderInternal(spec *volume.Spec, podRef *api.ObjectReference, opts volume.VolumeOptions) (volume.Builder, error) {
|
|
|
|
return &secretVolume{spec.Name, *podRef, plugin, spec.VolumeSource.Secret.SecretName, &opts}, nil
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (plugin *secretPlugin) NewCleaner(volName string, podUID types.UID) (volume.Cleaner, error) {
|
|
|
|
return plugin.newCleanerInternal(volName, podUID)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (plugin *secretPlugin) newCleanerInternal(volName string, podUID types.UID) (volume.Cleaner, error) {
|
2015-04-10 20:56:11 +00:00
|
|
|
return &secretVolume{volName, api.ObjectReference{UID: podUID}, plugin, "", nil}, nil
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// secretVolume handles retrieving secrets from the API server
|
|
|
|
// and placing them into the volume on the host.
|
|
|
|
type secretVolume struct {
|
2015-03-24 17:17:14 +00:00
|
|
|
volName string
|
|
|
|
podRef api.ObjectReference
|
|
|
|
plugin *secretPlugin
|
|
|
|
secretName string
|
2015-04-10 20:56:11 +00:00
|
|
|
opts *volume.VolumeOptions
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sv *secretVolume) SetUp() error {
|
2015-03-07 21:38:50 +00:00
|
|
|
return sv.SetUpAt(sv.GetPath())
|
|
|
|
}
|
|
|
|
|
|
|
|
// This is the spec for the volume that this plugin wraps.
|
2015-04-14 16:29:33 +00:00
|
|
|
var wrappedVolumeSpec = &volume.Spec{
|
2015-03-07 21:38:50 +00:00
|
|
|
Name: "not-used",
|
|
|
|
VolumeSource: api.VolumeSource{EmptyDir: &api.EmptyDirVolumeSource{Medium: api.StorageTypeMemory}},
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sv *secretVolume) SetUpAt(dir string) error {
|
2015-04-22 14:48:23 +00:00
|
|
|
if volumeutil.IsReady(sv.getMetaDir()) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-03-07 21:38:50 +00:00
|
|
|
glog.V(3).Infof("Setting up volume %v for pod %v at %v", sv.volName, sv.podRef.UID, dir)
|
|
|
|
|
|
|
|
// Wrap EmptyDir, let it do the setup.
|
2015-04-10 20:56:11 +00:00
|
|
|
wrapped, err := sv.plugin.host.NewWrapperBuilder(wrappedVolumeSpec, &sv.podRef, *sv.opts)
|
2015-02-18 01:26:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-07 21:38:50 +00:00
|
|
|
if err := wrapped.SetUpAt(dir); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-02-18 01:26:41 +00:00
|
|
|
|
|
|
|
kubeClient := sv.plugin.host.GetKubeClient()
|
|
|
|
if kubeClient == nil {
|
|
|
|
return fmt.Errorf("Cannot setup secret volume %v because kube client is not configured", sv)
|
|
|
|
}
|
|
|
|
|
2015-03-24 17:17:14 +00:00
|
|
|
secret, err := kubeClient.Secrets(sv.podRef.Namespace).Get(sv.secretName)
|
2015-02-18 01:26:41 +00:00
|
|
|
if err != nil {
|
2015-03-24 17:17:14 +00:00
|
|
|
glog.Errorf("Couldn't get secret %v/%v", sv.podRef.Namespace, sv.secretName)
|
2015-02-18 01:26:41 +00:00
|
|
|
return err
|
2015-03-25 21:25:13 +00:00
|
|
|
} else {
|
|
|
|
totalBytes := totalSecretBytes(secret)
|
|
|
|
glog.V(3).Infof("Received secret %v/%v containing (%v) pieces of data, %v total bytes",
|
|
|
|
sv.podRef.Namespace,
|
|
|
|
sv.secretName,
|
|
|
|
len(secret.Data),
|
|
|
|
totalBytes)
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for name, data := range secret.Data {
|
2015-03-07 21:38:50 +00:00
|
|
|
hostFilePath := path.Join(dir, name)
|
2015-04-13 13:45:21 +00:00
|
|
|
glog.V(3).Infof("Writing secret data %v/%v/%v (%v bytes) to host file %v", sv.podRef.Namespace, sv.secretName, name, len(data), hostFilePath)
|
2015-04-10 20:56:11 +00:00
|
|
|
err := ioutil.WriteFile(hostFilePath, data, 0444)
|
2015-02-18 01:26:41 +00:00
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Error writing secret data to host path: %v, %v", hostFilePath, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-22 14:48:23 +00:00
|
|
|
volumeutil.SetReady(sv.getMetaDir())
|
|
|
|
|
2015-02-18 01:26:41 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-03-25 21:25:13 +00:00
|
|
|
func totalSecretBytes(secret *api.Secret) int {
|
|
|
|
totalSize := 0
|
|
|
|
for _, bytes := range secret.Data {
|
|
|
|
totalSize += len(bytes)
|
|
|
|
}
|
|
|
|
|
|
|
|
return totalSize
|
|
|
|
}
|
|
|
|
|
2015-02-18 01:26:41 +00:00
|
|
|
func (sv *secretVolume) GetPath() string {
|
2015-03-24 14:39:51 +00:00
|
|
|
return sv.plugin.host.GetPodVolumeDir(sv.podRef.UID, util.EscapeQualifiedNameForDisk(secretPluginName), sv.volName)
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sv *secretVolume) TearDown() error {
|
2015-03-07 21:38:50 +00:00
|
|
|
return sv.TearDownAt(sv.GetPath())
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sv *secretVolume) TearDownAt(dir string) error {
|
|
|
|
glog.V(3).Infof("Tearing down volume %v for pod %v at %v", sv.volName, sv.podRef.UID, dir)
|
|
|
|
|
|
|
|
// Wrap EmptyDir, let it do the teardown.
|
|
|
|
wrapped, err := sv.plugin.host.NewWrapperCleaner(wrappedVolumeSpec, sv.podRef.UID)
|
2015-02-18 01:26:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-07 21:38:50 +00:00
|
|
|
return wrapped.TearDownAt(dir)
|
2015-02-18 01:26:41 +00:00
|
|
|
}
|
2015-04-22 14:48:23 +00:00
|
|
|
|
|
|
|
func (sv *secretVolume) getMetaDir() string {
|
|
|
|
return path.Join(sv.plugin.host.GetPodPluginDir(sv.podRef.UID, util.EscapeQualifiedNameForDisk(secretPluginName)), sv.volName)
|
|
|
|
}
|