123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package configmap
- import (
- "fmt"
- "k8s.io/api/core/v1"
- "k8s.io/apimachinery/pkg/api/errors"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/klog"
- "k8s.io/kubernetes/pkg/util/mount"
- "k8s.io/kubernetes/pkg/volume"
- volumeutil "k8s.io/kubernetes/pkg/volume/util"
- utilstrings "k8s.io/utils/strings"
- )
- // ProbeVolumePlugins is the entry point for plugin detection in a package.
- func ProbeVolumePlugins() []volume.VolumePlugin {
- return []volume.VolumePlugin{&configMapPlugin{}}
- }
- const (
- configMapPluginName = "kubernetes.io/configmap"
- )
- // configMapPlugin implements the VolumePlugin interface.
- type configMapPlugin struct {
- host volume.VolumeHost
- getConfigMap func(namespace, name string) (*v1.ConfigMap, error)
- }
- var _ volume.VolumePlugin = &configMapPlugin{}
- func getPath(uid types.UID, volName string, host volume.VolumeHost) string {
- return host.GetPodVolumeDir(uid, utilstrings.EscapeQualifiedName(configMapPluginName), volName)
- }
- func (plugin *configMapPlugin) Init(host volume.VolumeHost) error {
- plugin.host = host
- plugin.getConfigMap = host.GetConfigMapFunc()
- return nil
- }
- func (plugin *configMapPlugin) GetPluginName() string {
- return configMapPluginName
- }
- func (plugin *configMapPlugin) GetVolumeName(spec *volume.Spec) (string, error) {
- volumeSource, _ := getVolumeSource(spec)
- if volumeSource == nil {
- return "", fmt.Errorf("Spec does not reference a ConfigMap volume type")
- }
- return fmt.Sprintf(
- "%v/%v",
- spec.Name(),
- volumeSource.Name), nil
- }
- func (plugin *configMapPlugin) CanSupport(spec *volume.Spec) bool {
- return spec.Volume != nil && spec.Volume.ConfigMap != nil
- }
- func (plugin *configMapPlugin) IsMigratedToCSI() bool {
- return false
- }
- func (plugin *configMapPlugin) RequiresRemount() bool {
- return true
- }
- func (plugin *configMapPlugin) SupportsMountOption() bool {
- return false
- }
- func (plugin *configMapPlugin) SupportsBulkVolumeVerification() bool {
- return false
- }
- func (plugin *configMapPlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, opts volume.VolumeOptions) (volume.Mounter, error) {
- return &configMapVolumeMounter{
- configMapVolume: &configMapVolume{
- spec.Name(),
- pod.UID,
- plugin,
- plugin.host.GetMounter(plugin.GetPluginName()),
- volume.NewCachedMetrics(volume.NewMetricsDu(getPath(pod.UID, spec.Name(), plugin.host))),
- },
- source: *spec.Volume.ConfigMap,
- pod: *pod,
- opts: &opts,
- getConfigMap: plugin.getConfigMap,
- }, nil
- }
- func (plugin *configMapPlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) {
- return &configMapVolumeUnmounter{
- &configMapVolume{
- volName,
- podUID,
- plugin,
- plugin.host.GetMounter(plugin.GetPluginName()),
- volume.NewCachedMetrics(volume.NewMetricsDu(getPath(podUID, volName, plugin.host))),
- },
- }, nil
- }
- func (plugin *configMapPlugin) ConstructVolumeSpec(volumeName, mountPath string) (*volume.Spec, error) {
- configMapVolume := &v1.Volume{
- Name: volumeName,
- VolumeSource: v1.VolumeSource{
- ConfigMap: &v1.ConfigMapVolumeSource{},
- },
- }
- return volume.NewSpecFromVolume(configMapVolume), nil
- }
- type configMapVolume struct {
- volName string
- podUID types.UID
- plugin *configMapPlugin
- mounter mount.Interface
- volume.MetricsProvider
- }
- var _ volume.Volume = &configMapVolume{}
- func (sv *configMapVolume) GetPath() string {
- return sv.plugin.host.GetPodVolumeDir(sv.podUID, utilstrings.EscapeQualifiedName(configMapPluginName), sv.volName)
- }
- // configMapVolumeMounter handles retrieving secrets from the API server
- // and placing them into the volume on the host.
- type configMapVolumeMounter struct {
- *configMapVolume
- source v1.ConfigMapVolumeSource
- pod v1.Pod
- opts *volume.VolumeOptions
- getConfigMap func(namespace, name string) (*v1.ConfigMap, error)
- }
- var _ volume.Mounter = &configMapVolumeMounter{}
- func (sv *configMapVolume) GetAttributes() volume.Attributes {
- return volume.Attributes{
- ReadOnly: true,
- Managed: true,
- SupportsSELinux: true,
- }
- }
- func wrappedVolumeSpec() volume.Spec {
- // This is the spec for the volume that this plugin wraps.
- return volume.Spec{
- // This should be on a tmpfs instead of the local disk; the problem is
- // charging the memory for the tmpfs to the right cgroup. We should make
- // this a tmpfs when we can do the accounting correctly.
- Volume: &v1.Volume{VolumeSource: v1.VolumeSource{EmptyDir: &v1.EmptyDirVolumeSource{}}},
- }
- }
- // Checks prior to mount operations to verify that the required components (binaries, etc.)
- // to mount the volume are available on the underlying node.
- // If not, it returns an error
- func (b *configMapVolumeMounter) CanMount() error {
- return nil
- }
- func (b *configMapVolumeMounter) SetUp(mounterArgs volume.MounterArgs) error {
- return b.SetUpAt(b.GetPath(), mounterArgs)
- }
- func (b *configMapVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
- klog.V(3).Infof("Setting up volume %v for pod %v at %v", b.volName, b.pod.UID, dir)
- // Wrap EmptyDir, let it do the setup.
- wrapped, err := b.plugin.host.NewWrapperMounter(b.volName, wrappedVolumeSpec(), &b.pod, *b.opts)
- if err != nil {
- return err
- }
- optional := b.source.Optional != nil && *b.source.Optional
- configMap, err := b.getConfigMap(b.pod.Namespace, b.source.Name)
- if err != nil {
- if !(errors.IsNotFound(err) && optional) {
- klog.Errorf("Couldn't get configMap %v/%v: %v", b.pod.Namespace, b.source.Name, err)
- return err
- }
- configMap = &v1.ConfigMap{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: b.pod.Namespace,
- Name: b.source.Name,
- },
- }
- }
- totalBytes := totalBytes(configMap)
- klog.V(3).Infof("Received configMap %v/%v containing (%v) pieces of data, %v total bytes",
- b.pod.Namespace,
- b.source.Name,
- len(configMap.Data)+len(configMap.BinaryData),
- totalBytes)
- payload, err := MakePayload(b.source.Items, configMap, b.source.DefaultMode, optional)
- if err != nil {
- return err
- }
- setupSuccess := false
- if err := wrapped.SetUpAt(dir, mounterArgs); err != nil {
- return err
- }
- if err := volumeutil.MakeNestedMountpoints(b.volName, dir, b.pod); err != nil {
- return err
- }
- defer func() {
- // Clean up directories if setup fails
- if !setupSuccess {
- unmounter, unmountCreateErr := b.plugin.NewUnmounter(b.volName, b.podUID)
- if unmountCreateErr != nil {
- klog.Errorf("error cleaning up mount %s after failure. Create unmounter failed with %v", b.volName, unmountCreateErr)
- return
- }
- tearDownErr := unmounter.TearDown()
- if tearDownErr != nil {
- klog.Errorf("Error tearing down volume %s with : %v", b.volName, tearDownErr)
- }
- }
- }()
- writerContext := fmt.Sprintf("pod %v/%v volume %v", b.pod.Namespace, b.pod.Name, b.volName)
- writer, err := volumeutil.NewAtomicWriter(dir, writerContext)
- if err != nil {
- klog.Errorf("Error creating atomic writer: %v", err)
- return err
- }
- err = writer.Write(payload)
- if err != nil {
- klog.Errorf("Error writing payload to dir: %v", err)
- return err
- }
- err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
- if err != nil {
- klog.Errorf("Error applying volume ownership settings for group: %v", mounterArgs.FsGroup)
- return err
- }
- setupSuccess = true
- return nil
- }
- // MakePayload function is exported so that it can be called from the projection volume driver
- func MakePayload(mappings []v1.KeyToPath, configMap *v1.ConfigMap, defaultMode *int32, optional bool) (map[string]volumeutil.FileProjection, error) {
- if defaultMode == nil {
- return nil, fmt.Errorf("No defaultMode used, not even the default value for it")
- }
- payload := make(map[string]volumeutil.FileProjection, (len(configMap.Data) + len(configMap.BinaryData)))
- var fileProjection volumeutil.FileProjection
- if len(mappings) == 0 {
- for name, data := range configMap.Data {
- fileProjection.Data = []byte(data)
- fileProjection.Mode = *defaultMode
- payload[name] = fileProjection
- }
- for name, data := range configMap.BinaryData {
- fileProjection.Data = data
- fileProjection.Mode = *defaultMode
- payload[name] = fileProjection
- }
- } else {
- for _, ktp := range mappings {
- if stringData, ok := configMap.Data[ktp.Key]; ok {
- fileProjection.Data = []byte(stringData)
- } else if binaryData, ok := configMap.BinaryData[ktp.Key]; ok {
- fileProjection.Data = binaryData
- } else {
- if optional {
- continue
- }
- return nil, fmt.Errorf("configmap references non-existent config key: %s", ktp.Key)
- }
- if ktp.Mode != nil {
- fileProjection.Mode = *ktp.Mode
- } else {
- fileProjection.Mode = *defaultMode
- }
- payload[ktp.Path] = fileProjection
- }
- }
- return payload, nil
- }
- func totalBytes(configMap *v1.ConfigMap) int {
- totalSize := 0
- for _, value := range configMap.Data {
- totalSize += len(value)
- }
- for _, value := range configMap.BinaryData {
- totalSize += len(value)
- }
- return totalSize
- }
- // configMapVolumeUnmounter handles cleaning up configMap volumes.
- type configMapVolumeUnmounter struct {
- *configMapVolume
- }
- var _ volume.Unmounter = &configMapVolumeUnmounter{}
- func (c *configMapVolumeUnmounter) TearDown() error {
- return c.TearDownAt(c.GetPath())
- }
- func (c *configMapVolumeUnmounter) TearDownAt(dir string) error {
- return volumeutil.UnmountViaEmptyDir(dir, c.plugin.host, c.volName, wrappedVolumeSpec(), c.podUID)
- }
- func getVolumeSource(spec *volume.Spec) (*v1.ConfigMapVolumeSource, bool) {
- var readOnly bool
- var volumeSource *v1.ConfigMapVolumeSource
- if spec.Volume != nil && spec.Volume.ConfigMap != nil {
- volumeSource = spec.Volume.ConfigMap
- readOnly = spec.ReadOnly
- }
- return volumeSource, readOnly
- }
|