mirror of https://github.com/k3s-io/k3s
179 lines
6.1 KiB
Go
179 lines
6.1 KiB
Go
/*
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package csi
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
api "k8s.io/api/core/v1"
|
|
meta "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
|
"k8s.io/client-go/kubernetes"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/kubernetes/pkg/features"
|
|
"k8s.io/kubernetes/pkg/volume"
|
|
utilstrings "k8s.io/utils/strings"
|
|
)
|
|
|
|
const (
|
|
// TestInformerSyncPeriod is informer sync period duration for testing
|
|
TestInformerSyncPeriod = 100 * time.Millisecond
|
|
// TestInformerSyncTimeout is informer timeout duration for testing
|
|
TestInformerSyncTimeout = 30 * time.Second
|
|
)
|
|
|
|
func getCredentialsFromSecret(k8s kubernetes.Interface, secretRef *api.SecretReference) (map[string]string, error) {
|
|
credentials := map[string]string{}
|
|
secret, err := k8s.CoreV1().Secrets(secretRef.Namespace).Get(context.TODO(), secretRef.Name, meta.GetOptions{})
|
|
if err != nil {
|
|
return credentials, errors.New(log("failed to find the secret %s in the namespace %s with error: %v", secretRef.Name, secretRef.Namespace, err))
|
|
}
|
|
for key, value := range secret.Data {
|
|
credentials[key] = string(value)
|
|
}
|
|
|
|
return credentials, nil
|
|
}
|
|
|
|
// saveVolumeData persists parameter data as json file at the provided location
|
|
func saveVolumeData(dir string, fileName string, data map[string]string) error {
|
|
dataFilePath := filepath.Join(dir, fileName)
|
|
klog.V(4).Info(log("saving volume data file [%s]", dataFilePath))
|
|
file, err := os.Create(dataFilePath)
|
|
if err != nil {
|
|
return errors.New(log("failed to save volume data file %s: %v", dataFilePath, err))
|
|
}
|
|
defer file.Close()
|
|
if err := json.NewEncoder(file).Encode(data); err != nil {
|
|
return errors.New(log("failed to save volume data file %s: %v", dataFilePath, err))
|
|
}
|
|
klog.V(4).Info(log("volume data file saved successfully [%s]", dataFilePath))
|
|
return nil
|
|
}
|
|
|
|
// loadVolumeData loads volume info from specified json file/location
|
|
func loadVolumeData(dir string, fileName string) (map[string]string, error) {
|
|
// remove /mount at the end
|
|
dataFileName := filepath.Join(dir, fileName)
|
|
klog.V(4).Info(log("loading volume data file [%s]", dataFileName))
|
|
|
|
file, err := os.Open(dataFileName)
|
|
if err != nil {
|
|
return nil, errors.New(log("failed to open volume data file [%s]: %v", dataFileName, err))
|
|
}
|
|
defer file.Close()
|
|
data := map[string]string{}
|
|
if err := json.NewDecoder(file).Decode(&data); err != nil {
|
|
return nil, errors.New(log("failed to parse volume data file [%s]: %v", dataFileName, err))
|
|
}
|
|
|
|
return data, nil
|
|
}
|
|
|
|
func getCSISourceFromSpec(spec *volume.Spec) (*api.CSIPersistentVolumeSource, error) {
|
|
return getPVSourceFromSpec(spec)
|
|
}
|
|
|
|
func getReadOnlyFromSpec(spec *volume.Spec) (bool, error) {
|
|
if spec.PersistentVolume != nil &&
|
|
spec.PersistentVolume.Spec.CSI != nil {
|
|
return spec.ReadOnly, nil
|
|
}
|
|
|
|
return false, fmt.Errorf("CSIPersistentVolumeSource not defined in spec")
|
|
}
|
|
|
|
// log prepends log string with `kubernetes.io/csi`
|
|
func log(msg string, parts ...interface{}) string {
|
|
return fmt.Sprintf(fmt.Sprintf("%s: %s", CSIPluginName, msg), parts...)
|
|
}
|
|
|
|
// getVolumePluginDir returns the path where CSI plugin keeps metadata for given volume
|
|
func getVolumePluginDir(specVolID string, host volume.VolumeHost) string {
|
|
sanitizedSpecVolID := utilstrings.EscapeQualifiedName(specVolID)
|
|
return filepath.Join(host.GetVolumeDevicePluginDir(CSIPluginName), sanitizedSpecVolID)
|
|
}
|
|
|
|
// getVolumeDevicePluginDir returns the path where the CSI plugin keeps the
|
|
// symlink for a block device associated with a given specVolumeID.
|
|
// path: plugins/kubernetes.io/csi/volumeDevices/{specVolumeID}/dev
|
|
func getVolumeDevicePluginDir(specVolID string, host volume.VolumeHost) string {
|
|
return filepath.Join(getVolumePluginDir(specVolID, host), "dev")
|
|
}
|
|
|
|
// getVolumeDeviceDataDir returns the path where the CSI plugin keeps the
|
|
// volume data for a block device associated with a given specVolumeID.
|
|
// path: plugins/kubernetes.io/csi/volumeDevices/{specVolumeID}/data
|
|
func getVolumeDeviceDataDir(specVolID string, host volume.VolumeHost) string {
|
|
return filepath.Join(getVolumePluginDir(specVolID, host), "data")
|
|
}
|
|
|
|
// hasReadWriteOnce returns true if modes contains v1.ReadWriteOnce
|
|
func hasReadWriteOnce(modes []api.PersistentVolumeAccessMode) bool {
|
|
if modes == nil {
|
|
return false
|
|
}
|
|
for _, mode := range modes {
|
|
if mode == api.ReadWriteOnce {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// getSourceFromSpec returns either CSIVolumeSource or CSIPersistentVolumeSource, but not both
|
|
func getSourceFromSpec(spec *volume.Spec) (*api.CSIVolumeSource, *api.CSIPersistentVolumeSource, error) {
|
|
if spec == nil {
|
|
return nil, nil, fmt.Errorf("volume.Spec nil")
|
|
}
|
|
if spec.Volume != nil && spec.PersistentVolume != nil {
|
|
return nil, nil, fmt.Errorf("volume.Spec has both volume and persistent volume sources")
|
|
}
|
|
if spec.Volume != nil && spec.Volume.CSI != nil && utilfeature.DefaultFeatureGate.Enabled(features.CSIInlineVolume) {
|
|
return spec.Volume.CSI, nil, nil
|
|
}
|
|
if spec.PersistentVolume != nil &&
|
|
spec.PersistentVolume.Spec.CSI != nil {
|
|
return nil, spec.PersistentVolume.Spec.CSI, nil
|
|
}
|
|
|
|
return nil, nil, fmt.Errorf("volume source not found in volume.Spec")
|
|
}
|
|
|
|
// getPVSourceFromSpec ensures only CSIPersistentVolumeSource is present in volume.Spec
|
|
func getPVSourceFromSpec(spec *volume.Spec) (*api.CSIPersistentVolumeSource, error) {
|
|
volSrc, pvSrc, err := getSourceFromSpec(spec)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if volSrc != nil {
|
|
return nil, fmt.Errorf("unexpected api.CSIVolumeSource found in volume.Spec")
|
|
}
|
|
return pvSrc, nil
|
|
}
|
|
|
|
// GetCSIMounterPath returns the mounter path given the base path.
|
|
func GetCSIMounterPath(path string) string {
|
|
return filepath.Join(path, "/mount")
|
|
}
|