2016-05-10 19:02:41 +00:00
|
|
|
/*
|
2016-06-03 00:25:58 +00:00
|
|
|
Copyright 2016 The Kubernetes Authors.
|
2016-05-10 19:02:41 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2018-09-04 23:11:20 +00:00
|
|
|
package awsebs
|
2016-05-10 19:02:41 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strconv"
|
|
|
|
"time"
|
|
|
|
|
2018-11-09 18:49:10 +00:00
|
|
|
"k8s.io/klog"
|
2018-10-11 20:41:31 +00:00
|
|
|
|
2017-08-09 14:24:29 +00:00
|
|
|
"k8s.io/api/core/v1"
|
2017-01-11 14:09:48 +00:00
|
|
|
"k8s.io/apimachinery/pkg/types"
|
2016-06-21 12:27:37 +00:00
|
|
|
"k8s.io/kubernetes/pkg/cloudprovider/providers/aws"
|
2016-05-10 19:02:41 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/mount"
|
|
|
|
"k8s.io/kubernetes/pkg/volume"
|
2016-08-15 23:29:21 +00:00
|
|
|
volumeutil "k8s.io/kubernetes/pkg/volume/util"
|
2016-05-10 19:02:41 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type awsElasticBlockStoreAttacher struct {
|
2016-06-21 12:27:37 +00:00
|
|
|
host volume.VolumeHost
|
|
|
|
awsVolumes aws.Volumes
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var _ volume.Attacher = &awsElasticBlockStoreAttacher{}
|
|
|
|
|
2018-08-01 13:00:45 +00:00
|
|
|
var _ volume.DeviceMounter = &awsElasticBlockStoreAttacher{}
|
|
|
|
|
2016-05-10 19:02:41 +00:00
|
|
|
var _ volume.AttachableVolumePlugin = &awsElasticBlockStorePlugin{}
|
|
|
|
|
2018-08-01 13:00:45 +00:00
|
|
|
var _ volume.DeviceMountableVolumePlugin = &awsElasticBlockStorePlugin{}
|
|
|
|
|
2016-05-10 19:02:41 +00:00
|
|
|
func (plugin *awsElasticBlockStorePlugin) NewAttacher() (volume.Attacher, error) {
|
2016-06-21 12:27:37 +00:00
|
|
|
awsCloud, err := getCloudProvider(plugin.host.GetCloudProvider())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &awsElasticBlockStoreAttacher{
|
|
|
|
host: plugin.host,
|
|
|
|
awsVolumes: awsCloud,
|
|
|
|
}, nil
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
2018-08-01 13:00:45 +00:00
|
|
|
func (plugin *awsElasticBlockStorePlugin) NewDeviceMounter() (volume.DeviceMounter, error) {
|
|
|
|
return plugin.NewAttacher()
|
|
|
|
}
|
|
|
|
|
2016-06-23 19:46:21 +00:00
|
|
|
func (plugin *awsElasticBlockStorePlugin) GetDeviceMountRefs(deviceMountPath string) ([]string, error) {
|
2017-08-14 10:16:26 +00:00
|
|
|
mounter := plugin.host.GetMounter(plugin.GetPluginName())
|
2018-05-29 04:36:31 +00:00
|
|
|
return mounter.GetMountRefs(deviceMountPath)
|
2016-06-23 19:46:21 +00:00
|
|
|
}
|
|
|
|
|
2016-07-16 06:10:29 +00:00
|
|
|
func (attacher *awsElasticBlockStoreAttacher) Attach(spec *volume.Spec, nodeName types.NodeName) (string, error) {
|
2018-05-28 14:24:19 +00:00
|
|
|
volumeSource, _, err := getVolumeSource(spec)
|
2016-05-30 02:22:22 +00:00
|
|
|
if err != nil {
|
2016-06-17 03:11:09 +00:00
|
|
|
return "", err
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
2016-10-31 01:49:14 +00:00
|
|
|
volumeID := aws.KubernetesVolumeID(volumeSource.VolumeID)
|
2016-05-10 19:02:41 +00:00
|
|
|
|
2016-06-17 03:11:09 +00:00
|
|
|
// awsCloud.AttachDisk checks if disk is already attached to node and
|
|
|
|
// succeeds in that case, so no need to do that separately.
|
2018-05-28 14:24:19 +00:00
|
|
|
devicePath, err := attacher.awsVolumes.AttachDisk(volumeID, nodeName)
|
2016-05-10 19:02:41 +00:00
|
|
|
if err != nil {
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Errorf("Error attaching volume %q to node %q: %+v", volumeID, nodeName, err)
|
2016-06-17 03:11:09 +00:00
|
|
|
return "", err
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
2016-06-17 03:11:09 +00:00
|
|
|
|
|
|
|
return devicePath, nil
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
2016-10-14 21:21:58 +00:00
|
|
|
func (attacher *awsElasticBlockStoreAttacher) VolumesAreAttached(specs []*volume.Spec, nodeName types.NodeName) (map[*volume.Spec]bool, error) {
|
2017-02-13 04:40:30 +00:00
|
|
|
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Warningf("Attacher.VolumesAreAttached called for node %q - Please use BulkVerifyVolumes for AWS", nodeName)
|
2017-02-13 04:40:30 +00:00
|
|
|
volumeNodeMap := map[types.NodeName][]*volume.Spec{
|
|
|
|
nodeName: specs,
|
|
|
|
}
|
|
|
|
nodeVolumesResult := make(map[*volume.Spec]bool)
|
|
|
|
nodesVerificationMap, err := attacher.BulkVerifyVolumes(volumeNodeMap)
|
|
|
|
if err != nil {
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Errorf("Attacher.VolumesAreAttached - error checking volumes for node %q with %v", nodeName, err)
|
2017-02-13 04:40:30 +00:00
|
|
|
return nodeVolumesResult, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if result, ok := nodesVerificationMap[nodeName]; ok {
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
return nodeVolumesResult, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (attacher *awsElasticBlockStoreAttacher) BulkVerifyVolumes(volumesByNode map[types.NodeName][]*volume.Spec) (map[types.NodeName]map[*volume.Spec]bool, error) {
|
|
|
|
volumesAttachedCheck := make(map[types.NodeName]map[*volume.Spec]bool)
|
|
|
|
diskNamesByNode := make(map[types.NodeName][]aws.KubernetesVolumeID)
|
2016-10-31 01:49:14 +00:00
|
|
|
volumeSpecMap := make(map[aws.KubernetesVolumeID]*volume.Spec)
|
2016-10-14 21:21:58 +00:00
|
|
|
|
2017-02-13 04:40:30 +00:00
|
|
|
for nodeName, volumeSpecs := range volumesByNode {
|
|
|
|
for _, volumeSpec := range volumeSpecs {
|
|
|
|
volumeSource, _, err := getVolumeSource(volumeSpec)
|
|
|
|
|
|
|
|
if err != nil {
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Errorf("Error getting volume (%q) source : %v", volumeSpec.Name(), err)
|
2017-02-13 04:40:30 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
name := aws.KubernetesVolumeID(volumeSource.VolumeID)
|
|
|
|
diskNamesByNode[nodeName] = append(diskNamesByNode[nodeName], name)
|
|
|
|
|
|
|
|
nodeDisk, nodeDiskExists := volumesAttachedCheck[nodeName]
|
|
|
|
|
|
|
|
if !nodeDiskExists {
|
|
|
|
nodeDisk = make(map[*volume.Spec]bool)
|
|
|
|
}
|
|
|
|
nodeDisk[volumeSpec] = true
|
|
|
|
volumeSpecMap[name] = volumeSpec
|
|
|
|
volumesAttachedCheck[nodeName] = nodeDisk
|
|
|
|
}
|
2016-10-14 21:21:58 +00:00
|
|
|
}
|
2017-02-13 04:40:30 +00:00
|
|
|
attachedResult, err := attacher.awsVolumes.DisksAreAttached(diskNamesByNode)
|
|
|
|
|
2016-10-14 21:21:58 +00:00
|
|
|
if err != nil {
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Errorf("Error checking if volumes are attached to nodes err = %v", err)
|
2016-10-14 21:21:58 +00:00
|
|
|
return volumesAttachedCheck, err
|
|
|
|
}
|
|
|
|
|
2017-02-13 04:40:30 +00:00
|
|
|
for nodeName, nodeDisks := range attachedResult {
|
|
|
|
for diskName, attached := range nodeDisks {
|
|
|
|
if !attached {
|
|
|
|
spec := volumeSpecMap[diskName]
|
|
|
|
setNodeDisk(volumesAttachedCheck, spec, nodeName, false)
|
|
|
|
}
|
2016-10-14 21:21:58 +00:00
|
|
|
}
|
|
|
|
}
|
2017-02-13 04:40:30 +00:00
|
|
|
|
2016-10-14 21:21:58 +00:00
|
|
|
return volumesAttachedCheck, nil
|
|
|
|
}
|
|
|
|
|
2017-08-09 14:24:29 +00:00
|
|
|
func (attacher *awsElasticBlockStoreAttacher) WaitForAttach(spec *volume.Spec, devicePath string, _ *v1.Pod, timeout time.Duration) (string, error) {
|
2016-05-30 02:22:22 +00:00
|
|
|
volumeSource, _, err := getVolumeSource(spec)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2016-05-10 19:02:41 +00:00
|
|
|
volumeID := volumeSource.VolumeID
|
|
|
|
partition := ""
|
|
|
|
if volumeSource.Partition != 0 {
|
|
|
|
partition = strconv.Itoa(int(volumeSource.Partition))
|
|
|
|
}
|
|
|
|
|
2016-06-16 06:48:04 +00:00
|
|
|
if devicePath == "" {
|
2018-09-04 23:11:20 +00:00
|
|
|
return "", fmt.Errorf("waitForAttach failed for AWS Volume %q: devicePath is empty", volumeID)
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ticker := time.NewTicker(checkSleepDuration)
|
|
|
|
defer ticker.Stop()
|
|
|
|
timer := time.NewTimer(timeout)
|
|
|
|
defer timer.Stop()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ticker.C:
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.V(5).Infof("Checking AWS Volume %q is attached.", volumeID)
|
2018-09-04 23:11:20 +00:00
|
|
|
devicePaths := getDiskByIDPaths(aws.KubernetesVolumeID(volumeSource.VolumeID), partition, devicePath)
|
2018-01-18 04:36:14 +00:00
|
|
|
path, err := verifyDevicePath(devicePaths)
|
|
|
|
if err != nil {
|
|
|
|
// Log error, if any, and continue checking periodically. See issue #11321
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Errorf("Error verifying AWS Volume (%q) is attached: %v", volumeID, err)
|
2018-01-18 04:36:14 +00:00
|
|
|
} else if path != "" {
|
|
|
|
// A device path has successfully been created for the PD
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Infof("Successfully found attached AWS Volume %q.", volumeID)
|
2018-01-18 04:36:14 +00:00
|
|
|
return path, nil
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
case <-timer.C:
|
2018-09-04 23:11:20 +00:00
|
|
|
return "", fmt.Errorf("could not find attached AWS Volume %q. Timeout waiting for mount paths to be created", volumeID)
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-30 02:22:22 +00:00
|
|
|
func (attacher *awsElasticBlockStoreAttacher) GetDeviceMountPath(
|
|
|
|
spec *volume.Spec) (string, error) {
|
|
|
|
volumeSource, _, err := getVolumeSource(spec)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2016-10-31 01:49:14 +00:00
|
|
|
return makeGlobalPDPath(attacher.host, aws.KubernetesVolumeID(volumeSource.VolumeID)), nil
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME: this method can be further pruned.
|
2016-05-30 02:22:22 +00:00
|
|
|
func (attacher *awsElasticBlockStoreAttacher) MountDevice(spec *volume.Spec, devicePath string, deviceMountPath string) error {
|
2017-08-14 10:16:26 +00:00
|
|
|
mounter := attacher.host.GetMounter(awsElasticBlockStorePluginName)
|
2016-05-10 19:02:41 +00:00
|
|
|
notMnt, err := mounter.IsLikelyNotMountPoint(deviceMountPath)
|
|
|
|
if err != nil {
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
if err := os.MkdirAll(deviceMountPath, 0750); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
notMnt = true
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-30 02:22:22 +00:00
|
|
|
volumeSource, readOnly, err := getVolumeSource(spec)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-05-10 19:02:41 +00:00
|
|
|
|
|
|
|
options := []string{}
|
|
|
|
if readOnly {
|
|
|
|
options = append(options, "ro")
|
|
|
|
}
|
|
|
|
if notMnt {
|
2018-02-06 08:38:41 +00:00
|
|
|
diskMounter := volumeutil.NewSafeFormatAndMountFromHost(awsElasticBlockStorePluginName, attacher.host)
|
|
|
|
mountOptions := volumeutil.MountOptionFromSpec(spec, options...)
|
2017-02-21 18:19:48 +00:00
|
|
|
err = diskMounter.FormatAndMount(devicePath, deviceMountPath, volumeSource.FSType, mountOptions)
|
2016-05-10 19:02:41 +00:00
|
|
|
if err != nil {
|
|
|
|
os.Remove(deviceMountPath)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type awsElasticBlockStoreDetacher struct {
|
2016-06-21 12:27:37 +00:00
|
|
|
mounter mount.Interface
|
|
|
|
awsVolumes aws.Volumes
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var _ volume.Detacher = &awsElasticBlockStoreDetacher{}
|
|
|
|
|
2018-08-01 13:00:45 +00:00
|
|
|
var _ volume.DeviceUnmounter = &awsElasticBlockStoreDetacher{}
|
|
|
|
|
2016-05-10 19:02:41 +00:00
|
|
|
func (plugin *awsElasticBlockStorePlugin) NewDetacher() (volume.Detacher, error) {
|
2016-06-21 12:27:37 +00:00
|
|
|
awsCloud, err := getCloudProvider(plugin.host.GetCloudProvider())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &awsElasticBlockStoreDetacher{
|
2017-08-14 10:16:26 +00:00
|
|
|
mounter: plugin.host.GetMounter(plugin.GetPluginName()),
|
2016-06-21 12:27:37 +00:00
|
|
|
awsVolumes: awsCloud,
|
|
|
|
}, nil
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
|
|
|
|
2018-08-01 13:00:45 +00:00
|
|
|
func (plugin *awsElasticBlockStorePlugin) NewDeviceUnmounter() (volume.DeviceUnmounter, error) {
|
|
|
|
return plugin.NewDetacher()
|
|
|
|
}
|
|
|
|
|
2017-10-31 09:55:19 +00:00
|
|
|
func (detacher *awsElasticBlockStoreDetacher) Detach(volumeName string, nodeName types.NodeName) error {
|
|
|
|
volumeID := aws.KubernetesVolumeID(path.Base(volumeName))
|
2016-05-10 19:02:41 +00:00
|
|
|
|
2017-11-16 14:31:09 +00:00
|
|
|
if _, err := detacher.awsVolumes.DetachDisk(volumeID, nodeName); err != nil {
|
2018-11-09 18:49:10 +00:00
|
|
|
klog.Errorf("Error detaching volumeID %q: %v", volumeID, err)
|
2016-05-10 19:02:41 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-05-30 02:22:22 +00:00
|
|
|
func (detacher *awsElasticBlockStoreDetacher) UnmountDevice(deviceMountPath string) error {
|
2019-01-07 05:24:59 +00:00
|
|
|
return mount.CleanupMountPoint(deviceMountPath, detacher.mounter, false)
|
2016-05-10 19:02:41 +00:00
|
|
|
}
|
2017-02-13 04:40:30 +00:00
|
|
|
|
2018-10-19 19:07:33 +00:00
|
|
|
func (plugin *awsElasticBlockStorePlugin) CanAttach(spec *volume.Spec) bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2017-02-13 04:40:30 +00:00
|
|
|
func setNodeDisk(
|
|
|
|
nodeDiskMap map[types.NodeName]map[*volume.Spec]bool,
|
|
|
|
volumeSpec *volume.Spec,
|
|
|
|
nodeName types.NodeName,
|
|
|
|
check bool) {
|
|
|
|
|
|
|
|
volumeMap := nodeDiskMap[nodeName]
|
|
|
|
if volumeMap == nil {
|
|
|
|
volumeMap = make(map[*volume.Spec]bool)
|
|
|
|
nodeDiskMap[nodeName] = volumeMap
|
|
|
|
}
|
|
|
|
volumeMap[volumeSpec] = check
|
|
|
|
}
|