123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562 |
- // +build !providerless
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package awsebs
- import (
- "context"
- "fmt"
- "os"
- "path/filepath"
- "regexp"
- "runtime"
- "strconv"
- "strings"
- "k8s.io/klog"
- "k8s.io/utils/mount"
- v1 "k8s.io/api/core/v1"
- "k8s.io/apimachinery/pkg/api/resource"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/types"
- utilfeature "k8s.io/apiserver/pkg/util/feature"
- "k8s.io/kubernetes/pkg/features"
- "k8s.io/kubernetes/pkg/volume"
- "k8s.io/kubernetes/pkg/volume/util"
- "k8s.io/legacy-cloud-providers/aws"
- utilstrings "k8s.io/utils/strings"
- )
- // ProbeVolumePlugins is the primary entrypoint for volume plugins.
- func ProbeVolumePlugins() []volume.VolumePlugin {
- return []volume.VolumePlugin{&awsElasticBlockStorePlugin{nil}}
- }
- type awsElasticBlockStorePlugin struct {
- host volume.VolumeHost
- }
- var _ volume.VolumePlugin = &awsElasticBlockStorePlugin{}
- var _ volume.PersistentVolumePlugin = &awsElasticBlockStorePlugin{}
- var _ volume.DeletableVolumePlugin = &awsElasticBlockStorePlugin{}
- var _ volume.ProvisionableVolumePlugin = &awsElasticBlockStorePlugin{}
- const (
- awsElasticBlockStorePluginName = "kubernetes.io/aws-ebs"
- awsURLNamePrefix = "aws://"
- )
- func getPath(uid types.UID, volName string, host volume.VolumeHost) string {
- return host.GetPodVolumeDir(uid, utilstrings.EscapeQualifiedName(awsElasticBlockStorePluginName), volName)
- }
- func (plugin *awsElasticBlockStorePlugin) Init(host volume.VolumeHost) error {
- plugin.host = host
- return nil
- }
- func (plugin *awsElasticBlockStorePlugin) GetPluginName() string {
- return awsElasticBlockStorePluginName
- }
- func (plugin *awsElasticBlockStorePlugin) GetVolumeName(spec *volume.Spec) (string, error) {
- volumeSource, _, err := getVolumeSource(spec)
- if err != nil {
- return "", err
- }
- return volumeSource.VolumeID, nil
- }
- func (plugin *awsElasticBlockStorePlugin) CanSupport(spec *volume.Spec) bool {
- return (spec.PersistentVolume != nil && spec.PersistentVolume.Spec.AWSElasticBlockStore != nil) ||
- (spec.Volume != nil && spec.Volume.AWSElasticBlockStore != nil)
- }
- func (plugin *awsElasticBlockStorePlugin) RequiresRemount() bool {
- return false
- }
- func (plugin *awsElasticBlockStorePlugin) SupportsMountOption() bool {
- return true
- }
- func (plugin *awsElasticBlockStorePlugin) SupportsBulkVolumeVerification() bool {
- return true
- }
- func (plugin *awsElasticBlockStorePlugin) GetVolumeLimits() (map[string]int64, error) {
- volumeLimits := map[string]int64{
- util.EBSVolumeLimitKey: util.DefaultMaxEBSVolumes,
- }
- cloud := plugin.host.GetCloudProvider()
- // if we can't fetch cloudprovider we return an error
- // hoping external CCM or admin can set it. Returning
- // default values from here will mean, no one can
- // override them.
- if cloud == nil {
- return nil, fmt.Errorf("No cloudprovider present")
- }
- if cloud.ProviderName() != aws.ProviderName {
- return nil, fmt.Errorf("Expected aws cloud, found %s", cloud.ProviderName())
- }
- instances, ok := cloud.Instances()
- if !ok {
- klog.V(3).Infof("Failed to get instances from cloud provider")
- return volumeLimits, nil
- }
- instanceType, err := instances.InstanceType(context.TODO(), plugin.host.GetNodeName())
- if err != nil {
- klog.Errorf("Failed to get instance type from AWS cloud provider")
- return volumeLimits, nil
- }
- if ok, _ := regexp.MatchString(util.EBSNitroLimitRegex, instanceType); ok {
- volumeLimits[util.EBSVolumeLimitKey] = util.DefaultMaxEBSNitroVolumeLimit
- }
- return volumeLimits, nil
- }
- func (plugin *awsElasticBlockStorePlugin) VolumeLimitKey(spec *volume.Spec) string {
- return util.EBSVolumeLimitKey
- }
- func (plugin *awsElasticBlockStorePlugin) GetAccessModes() []v1.PersistentVolumeAccessMode {
- return []v1.PersistentVolumeAccessMode{
- v1.ReadWriteOnce,
- }
- }
- func (plugin *awsElasticBlockStorePlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, _ volume.VolumeOptions) (volume.Mounter, error) {
- // Inject real implementations here, test through the internal function.
- return plugin.newMounterInternal(spec, pod.UID, &AWSDiskUtil{}, plugin.host.GetMounter(plugin.GetPluginName()))
- }
- func (plugin *awsElasticBlockStorePlugin) newMounterInternal(spec *volume.Spec, podUID types.UID, manager ebsManager, mounter mount.Interface) (volume.Mounter, error) {
- // EBSs used directly in a pod have a ReadOnly flag set by the pod author.
- // EBSs used as a PersistentVolume gets the ReadOnly flag indirectly through the persistent-claim volume used to mount the PV
- ebs, readOnly, err := getVolumeSource(spec)
- if err != nil {
- return nil, err
- }
- volumeID := aws.KubernetesVolumeID(ebs.VolumeID)
- fsType := ebs.FSType
- partition := ""
- if ebs.Partition != 0 {
- partition = strconv.Itoa(int(ebs.Partition))
- }
- return &awsElasticBlockStoreMounter{
- awsElasticBlockStore: &awsElasticBlockStore{
- podUID: podUID,
- volName: spec.Name(),
- volumeID: volumeID,
- partition: partition,
- manager: manager,
- mounter: mounter,
- plugin: plugin,
- MetricsProvider: volume.NewMetricsStatFS(getPath(podUID, spec.Name(), plugin.host)),
- },
- fsType: fsType,
- readOnly: readOnly,
- diskMounter: util.NewSafeFormatAndMountFromHost(plugin.GetPluginName(), plugin.host),
- mountOptions: util.MountOptionFromSpec(spec),
- }, nil
- }
- func (plugin *awsElasticBlockStorePlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) {
- // Inject real implementations here, test through the internal function.
- return plugin.newUnmounterInternal(volName, podUID, &AWSDiskUtil{}, plugin.host.GetMounter(plugin.GetPluginName()))
- }
- func (plugin *awsElasticBlockStorePlugin) newUnmounterInternal(volName string, podUID types.UID, manager ebsManager, mounter mount.Interface) (volume.Unmounter, error) {
- return &awsElasticBlockStoreUnmounter{&awsElasticBlockStore{
- podUID: podUID,
- volName: volName,
- manager: manager,
- mounter: mounter,
- plugin: plugin,
- MetricsProvider: volume.NewMetricsStatFS(getPath(podUID, volName, plugin.host)),
- }}, nil
- }
- func (plugin *awsElasticBlockStorePlugin) NewDeleter(spec *volume.Spec) (volume.Deleter, error) {
- return plugin.newDeleterInternal(spec, &AWSDiskUtil{})
- }
- func (plugin *awsElasticBlockStorePlugin) newDeleterInternal(spec *volume.Spec, manager ebsManager) (volume.Deleter, error) {
- if spec.PersistentVolume != nil && spec.PersistentVolume.Spec.AWSElasticBlockStore == nil {
- klog.Errorf("spec.PersistentVolumeSource.AWSElasticBlockStore is nil")
- return nil, fmt.Errorf("spec.PersistentVolumeSource.AWSElasticBlockStore is nil")
- }
- return &awsElasticBlockStoreDeleter{
- awsElasticBlockStore: &awsElasticBlockStore{
- volName: spec.Name(),
- volumeID: aws.KubernetesVolumeID(spec.PersistentVolume.Spec.AWSElasticBlockStore.VolumeID),
- manager: manager,
- plugin: plugin,
- }}, nil
- }
- func (plugin *awsElasticBlockStorePlugin) NewProvisioner(options volume.VolumeOptions) (volume.Provisioner, error) {
- return plugin.newProvisionerInternal(options, &AWSDiskUtil{})
- }
- func (plugin *awsElasticBlockStorePlugin) newProvisionerInternal(options volume.VolumeOptions, manager ebsManager) (volume.Provisioner, error) {
- return &awsElasticBlockStoreProvisioner{
- awsElasticBlockStore: &awsElasticBlockStore{
- manager: manager,
- plugin: plugin,
- },
- options: options,
- }, nil
- }
- func getVolumeSource(
- spec *volume.Spec) (*v1.AWSElasticBlockStoreVolumeSource, bool, error) {
- if spec.Volume != nil && spec.Volume.AWSElasticBlockStore != nil {
- return spec.Volume.AWSElasticBlockStore, spec.Volume.AWSElasticBlockStore.ReadOnly, nil
- } else if spec.PersistentVolume != nil &&
- spec.PersistentVolume.Spec.AWSElasticBlockStore != nil {
- return spec.PersistentVolume.Spec.AWSElasticBlockStore, spec.ReadOnly, nil
- }
- return nil, false, fmt.Errorf("Spec does not reference an AWS EBS volume type")
- }
- func (plugin *awsElasticBlockStorePlugin) ConstructVolumeSpec(volName, mountPath string) (*volume.Spec, error) {
- mounter := plugin.host.GetMounter(plugin.GetPluginName())
- kvh, ok := plugin.host.(volume.KubeletVolumeHost)
- if !ok {
- return nil, fmt.Errorf("plugin volume host does not implement KubeletVolumeHost interface")
- }
- hu := kvh.GetHostUtil()
- pluginMntDir := util.GetPluginMountDir(plugin.host, plugin.GetPluginName())
- volumeID, err := hu.GetDeviceNameFromMount(mounter, mountPath, pluginMntDir)
- if err != nil {
- return nil, err
- }
- volumeID, err = formatVolumeID(volumeID)
- if err != nil {
- return nil, fmt.Errorf("failed to get AWS volume id from mount path %q: %v", mountPath, err)
- }
- file := v1.PersistentVolumeFilesystem
- return newAWSVolumeSpec(volName, volumeID, file), nil
- }
- func (plugin *awsElasticBlockStorePlugin) RequiresFSResize() bool {
- return true
- }
- func (plugin *awsElasticBlockStorePlugin) ExpandVolumeDevice(
- spec *volume.Spec,
- newSize resource.Quantity,
- oldSize resource.Quantity) (resource.Quantity, error) {
- var awsVolume aws.Volumes
- awsVolume, err := getCloudProvider(plugin.host.GetCloudProvider())
- if err != nil {
- return oldSize, err
- }
- // we don't expect to receive this call for non PVs
- rawVolumeName := spec.PersistentVolume.Spec.AWSElasticBlockStore.VolumeID
- volumeID := aws.KubernetesVolumeID(rawVolumeName)
- if volumeID == "" {
- return oldSize, fmt.Errorf("EBS.ExpandVolumeDevice Invalid volume id for %s", spec.Name())
- }
- return awsVolume.ResizeDisk(volumeID, oldSize, newSize)
- }
- func (plugin *awsElasticBlockStorePlugin) NodeExpand(resizeOptions volume.NodeResizeOptions) (bool, error) {
- fsVolume, err := util.CheckVolumeModeFilesystem(resizeOptions.VolumeSpec)
- if err != nil {
- return false, fmt.Errorf("error checking VolumeMode: %v", err)
- }
- // if volume is not a fs file system, there is nothing for us to do here.
- if !fsVolume {
- return true, nil
- }
- _, err = util.GenericResizeFS(plugin.host, plugin.GetPluginName(), resizeOptions.DevicePath, resizeOptions.DeviceMountPath)
- if err != nil {
- return false, err
- }
- return true, nil
- }
- var _ volume.NodeExpandableVolumePlugin = &awsElasticBlockStorePlugin{}
- var _ volume.ExpandableVolumePlugin = &awsElasticBlockStorePlugin{}
- var _ volume.VolumePluginWithAttachLimits = &awsElasticBlockStorePlugin{}
- // Abstract interface to PD operations.
- type ebsManager interface {
- CreateVolume(provisioner *awsElasticBlockStoreProvisioner, node *v1.Node, allowedTopologies []v1.TopologySelectorTerm) (volumeID aws.KubernetesVolumeID, volumeSizeGB int, labels map[string]string, fstype string, err error)
- // Deletes a volume
- DeleteVolume(deleter *awsElasticBlockStoreDeleter) error
- }
- // awsElasticBlockStore volumes are disk resources provided by Amazon Web Services
- // that are attached to the kubelet's host machine and exposed to the pod.
- type awsElasticBlockStore struct {
- volName string
- podUID types.UID
- // Unique id of the PD, used to find the disk resource in the provider.
- volumeID aws.KubernetesVolumeID
- // Specifies the partition to mount
- partition string
- // Utility interface that provides API calls to the provider to attach/detach disks.
- manager ebsManager
- // Mounter interface that provides system calls to mount the global path to the pod local path.
- mounter mount.Interface
- plugin *awsElasticBlockStorePlugin
- volume.MetricsProvider
- }
- type awsElasticBlockStoreMounter struct {
- *awsElasticBlockStore
- // Filesystem type, optional.
- fsType string
- // Specifies whether the disk will be attached as read-only.
- readOnly bool
- // diskMounter provides the interface that is used to mount the actual block device.
- diskMounter *mount.SafeFormatAndMount
- mountOptions []string
- }
- var _ volume.Mounter = &awsElasticBlockStoreMounter{}
- func (b *awsElasticBlockStoreMounter) GetAttributes() volume.Attributes {
- return volume.Attributes{
- ReadOnly: b.readOnly,
- Managed: !b.readOnly,
- SupportsSELinux: true,
- }
- }
- // Checks prior to mount operations to verify that the required components (binaries, etc.)
- // to mount the volume are available on the underlying node.
- // If not, it returns an error
- func (b *awsElasticBlockStoreMounter) CanMount() error {
- return nil
- }
- // SetUp attaches the disk and bind mounts to the volume path.
- func (b *awsElasticBlockStoreMounter) SetUp(mounterArgs volume.MounterArgs) error {
- return b.SetUpAt(b.GetPath(), mounterArgs)
- }
- // SetUpAt attaches the disk and bind mounts to the volume path.
- func (b *awsElasticBlockStoreMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
- // TODO: handle failed mounts here.
- notMnt, err := b.mounter.IsLikelyNotMountPoint(dir)
- klog.V(4).Infof("PersistentDisk set up: %s %v %v", dir, !notMnt, err)
- if err != nil && !os.IsNotExist(err) {
- klog.Errorf("cannot validate mount point: %s %v", dir, err)
- return err
- }
- if !notMnt {
- return nil
- }
- globalPDPath := makeGlobalPDPath(b.plugin.host, b.volumeID)
- if runtime.GOOS != "windows" {
- // On Windows, Mount will create the parent of dir and mklink (create a symbolic link) at dir later, so don't create a
- // directory at dir now. Otherwise mklink will error: "Cannot create a file when that file already exists".
- // Instead, do nothing. For example when dir is:
- // C:\var\lib\kubelet\pods\xxx\volumes\kubernetes.io~aws-ebs\pvc-xxx
- // do nothing. Mount will make pvc-xxx a symlink to the global mount path (e.g. C:\var\lib\kubelet\plugins\kubernetes.io\aws-ebs\mounts\aws\us-west-2b\vol-xxx)
- if err := os.MkdirAll(dir, 0750); err != nil {
- return err
- }
- }
- // Perform a bind mount to the full path to allow duplicate mounts of the same PD.
- options := []string{"bind"}
- if b.readOnly {
- options = append(options, "ro")
- }
- mountOptions := util.JoinMountOptions(options, b.mountOptions)
- err = b.mounter.Mount(globalPDPath, dir, "", mountOptions)
- if err != nil {
- notMnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
- if mntErr != nil {
- klog.Errorf("IsLikelyNotMountPoint check failed for %s: %v", dir, mntErr)
- return err
- }
- if !notMnt {
- if mntErr = b.mounter.Unmount(dir); mntErr != nil {
- klog.Errorf("failed to unmount %s: %v", dir, mntErr)
- return err
- }
- notMnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
- if mntErr != nil {
- klog.Errorf("IsLikelyNotMountPoint check failed for %s: %v", dir, mntErr)
- return err
- }
- if !notMnt {
- // This is very odd, we don't expect it. We'll try again next sync loop.
- klog.Errorf("%s is still mounted, despite call to unmount(). Will try again next sync loop.", dir)
- return err
- }
- }
- os.Remove(dir)
- klog.Errorf("Mount of disk %s failed: %v", dir, err)
- return err
- }
- if !b.readOnly {
- volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
- }
- klog.V(4).Infof("Successfully mounted %s", dir)
- return nil
- }
- func makeGlobalPDPath(host volume.VolumeHost, volumeID aws.KubernetesVolumeID) string {
- // Clean up the URI to be more fs-friendly
- name := string(volumeID)
- name = strings.Replace(name, "://", "/", -1)
- return filepath.Join(host.GetPluginDir(awsElasticBlockStorePluginName), util.MountsInGlobalPDPath, name)
- }
- func (ebs *awsElasticBlockStore) GetPath() string {
- return getPath(ebs.podUID, ebs.volName, ebs.plugin.host)
- }
- type awsElasticBlockStoreUnmounter struct {
- *awsElasticBlockStore
- }
- var _ volume.Unmounter = &awsElasticBlockStoreUnmounter{}
- // Unmounts the bind mount, and detaches the disk only if the PD
- // resource was the last reference to that disk on the kubelet.
- func (c *awsElasticBlockStoreUnmounter) TearDown() error {
- return c.TearDownAt(c.GetPath())
- }
- // Unmounts the bind mount
- func (c *awsElasticBlockStoreUnmounter) TearDownAt(dir string) error {
- return mount.CleanupMountPoint(dir, c.mounter, false)
- }
- type awsElasticBlockStoreDeleter struct {
- *awsElasticBlockStore
- }
- var _ volume.Deleter = &awsElasticBlockStoreDeleter{}
- func (d *awsElasticBlockStoreDeleter) GetPath() string {
- return getPath(d.podUID, d.volName, d.plugin.host)
- }
- func (d *awsElasticBlockStoreDeleter) Delete() error {
- return d.manager.DeleteVolume(d)
- }
- type awsElasticBlockStoreProvisioner struct {
- *awsElasticBlockStore
- options volume.VolumeOptions
- }
- var _ volume.Provisioner = &awsElasticBlockStoreProvisioner{}
- func (c *awsElasticBlockStoreProvisioner) Provision(selectedNode *v1.Node, allowedTopologies []v1.TopologySelectorTerm) (*v1.PersistentVolume, error) {
- if !util.AccessModesContainedInAll(c.plugin.GetAccessModes(), c.options.PVC.Spec.AccessModes) {
- return nil, fmt.Errorf("invalid AccessModes %v: only AccessModes %v are supported", c.options.PVC.Spec.AccessModes, c.plugin.GetAccessModes())
- }
- volumeID, sizeGB, labels, fstype, err := c.manager.CreateVolume(c, selectedNode, allowedTopologies)
- if err != nil {
- klog.Errorf("Provision failed: %v", err)
- return nil, err
- }
- if fstype == "" {
- fstype = "ext4"
- }
- var volumeMode *v1.PersistentVolumeMode
- if utilfeature.DefaultFeatureGate.Enabled(features.BlockVolume) {
- volumeMode = c.options.PVC.Spec.VolumeMode
- if volumeMode != nil && *volumeMode == v1.PersistentVolumeBlock {
- // Block volumes should not have any FSType
- fstype = ""
- }
- }
- pv := &v1.PersistentVolume{
- ObjectMeta: metav1.ObjectMeta{
- Name: c.options.PVName,
- Labels: map[string]string{},
- Annotations: map[string]string{
- util.VolumeDynamicallyCreatedByKey: "aws-ebs-dynamic-provisioner",
- },
- },
- Spec: v1.PersistentVolumeSpec{
- PersistentVolumeReclaimPolicy: c.options.PersistentVolumeReclaimPolicy,
- AccessModes: c.options.PVC.Spec.AccessModes,
- Capacity: v1.ResourceList{
- v1.ResourceName(v1.ResourceStorage): resource.MustParse(fmt.Sprintf("%dGi", sizeGB)),
- },
- VolumeMode: volumeMode,
- PersistentVolumeSource: v1.PersistentVolumeSource{
- AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{
- VolumeID: string(volumeID),
- FSType: fstype,
- Partition: 0,
- ReadOnly: false,
- },
- },
- MountOptions: c.options.MountOptions,
- },
- }
- if len(c.options.PVC.Spec.AccessModes) == 0 {
- pv.Spec.AccessModes = c.plugin.GetAccessModes()
- }
- requirements := make([]v1.NodeSelectorRequirement, 0)
- if len(labels) != 0 {
- if pv.Labels == nil {
- pv.Labels = make(map[string]string)
- }
- for k, v := range labels {
- pv.Labels[k] = v
- requirements = append(requirements, v1.NodeSelectorRequirement{Key: k, Operator: v1.NodeSelectorOpIn, Values: []string{v}})
- }
- }
- pv.Spec.NodeAffinity = new(v1.VolumeNodeAffinity)
- pv.Spec.NodeAffinity.Required = new(v1.NodeSelector)
- pv.Spec.NodeAffinity.Required.NodeSelectorTerms = make([]v1.NodeSelectorTerm, 1)
- pv.Spec.NodeAffinity.Required.NodeSelectorTerms[0].MatchExpressions = requirements
- return pv, nil
- }
|