123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174 |
- /*
- Copyright 2018 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package csi
- import (
- "context"
- "encoding/json"
- "errors"
- "fmt"
- "os"
- "path/filepath"
- "time"
- api "k8s.io/api/core/v1"
- meta "k8s.io/apimachinery/pkg/apis/meta/v1"
- utilfeature "k8s.io/apiserver/pkg/util/feature"
- "k8s.io/client-go/kubernetes"
- "k8s.io/klog"
- "k8s.io/kubernetes/pkg/features"
- "k8s.io/kubernetes/pkg/volume"
- utilstrings "k8s.io/utils/strings"
- )
- const (
- // TestInformerSyncPeriod is informer sync period duration for testing
- TestInformerSyncPeriod = 100 * time.Millisecond
- // TestInformerSyncTimeout is informer timeout duration for testing
- TestInformerSyncTimeout = 30 * time.Second
- )
- func getCredentialsFromSecret(k8s kubernetes.Interface, secretRef *api.SecretReference) (map[string]string, error) {
- credentials := map[string]string{}
- secret, err := k8s.CoreV1().Secrets(secretRef.Namespace).Get(context.TODO(), secretRef.Name, meta.GetOptions{})
- if err != nil {
- return credentials, errors.New(log("failed to find the secret %s in the namespace %s with error: %v", secretRef.Name, secretRef.Namespace, err))
- }
- for key, value := range secret.Data {
- credentials[key] = string(value)
- }
- return credentials, nil
- }
- // saveVolumeData persists parameter data as json file at the provided location
- func saveVolumeData(dir string, fileName string, data map[string]string) error {
- dataFilePath := filepath.Join(dir, fileName)
- klog.V(4).Info(log("saving volume data file [%s]", dataFilePath))
- file, err := os.Create(dataFilePath)
- if err != nil {
- return errors.New(log("failed to save volume data file %s: %v", dataFilePath, err))
- }
- defer file.Close()
- if err := json.NewEncoder(file).Encode(data); err != nil {
- return errors.New(log("failed to save volume data file %s: %v", dataFilePath, err))
- }
- klog.V(4).Info(log("volume data file saved successfully [%s]", dataFilePath))
- return nil
- }
- // loadVolumeData loads volume info from specified json file/location
- func loadVolumeData(dir string, fileName string) (map[string]string, error) {
- // remove /mount at the end
- dataFileName := filepath.Join(dir, fileName)
- klog.V(4).Info(log("loading volume data file [%s]", dataFileName))
- file, err := os.Open(dataFileName)
- if err != nil {
- return nil, errors.New(log("failed to open volume data file [%s]: %v", dataFileName, err))
- }
- defer file.Close()
- data := map[string]string{}
- if err := json.NewDecoder(file).Decode(&data); err != nil {
- return nil, errors.New(log("failed to parse volume data file [%s]: %v", dataFileName, err))
- }
- return data, nil
- }
- func getCSISourceFromSpec(spec *volume.Spec) (*api.CSIPersistentVolumeSource, error) {
- return getPVSourceFromSpec(spec)
- }
- func getReadOnlyFromSpec(spec *volume.Spec) (bool, error) {
- if spec.PersistentVolume != nil &&
- spec.PersistentVolume.Spec.CSI != nil {
- return spec.ReadOnly, nil
- }
- return false, fmt.Errorf("CSIPersistentVolumeSource not defined in spec")
- }
- // log prepends log string with `kubernetes.io/csi`
- func log(msg string, parts ...interface{}) string {
- return fmt.Sprintf(fmt.Sprintf("%s: %s", CSIPluginName, msg), parts...)
- }
- // getVolumePluginDir returns the path where CSI plugin keeps metadata for given volume
- func getVolumePluginDir(specVolID string, host volume.VolumeHost) string {
- sanitizedSpecVolID := utilstrings.EscapeQualifiedName(specVolID)
- return filepath.Join(host.GetVolumeDevicePluginDir(CSIPluginName), sanitizedSpecVolID)
- }
- // getVolumeDevicePluginDir returns the path where the CSI plugin keeps the
- // symlink for a block device associated with a given specVolumeID.
- // path: plugins/kubernetes.io/csi/volumeDevices/{specVolumeID}/dev
- func getVolumeDevicePluginDir(specVolID string, host volume.VolumeHost) string {
- return filepath.Join(getVolumePluginDir(specVolID, host), "dev")
- }
- // getVolumeDeviceDataDir returns the path where the CSI plugin keeps the
- // volume data for a block device associated with a given specVolumeID.
- // path: plugins/kubernetes.io/csi/volumeDevices/{specVolumeID}/data
- func getVolumeDeviceDataDir(specVolID string, host volume.VolumeHost) string {
- return filepath.Join(getVolumePluginDir(specVolID, host), "data")
- }
- // hasReadWriteOnce returns true if modes contains v1.ReadWriteOnce
- func hasReadWriteOnce(modes []api.PersistentVolumeAccessMode) bool {
- if modes == nil {
- return false
- }
- for _, mode := range modes {
- if mode == api.ReadWriteOnce {
- return true
- }
- }
- return false
- }
- // getSourceFromSpec returns either CSIVolumeSource or CSIPersistentVolumeSource, but not both
- func getSourceFromSpec(spec *volume.Spec) (*api.CSIVolumeSource, *api.CSIPersistentVolumeSource, error) {
- if spec == nil {
- return nil, nil, fmt.Errorf("volume.Spec nil")
- }
- if spec.Volume != nil && spec.PersistentVolume != nil {
- return nil, nil, fmt.Errorf("volume.Spec has both volume and persistent volume sources")
- }
- if spec.Volume != nil && spec.Volume.CSI != nil && utilfeature.DefaultFeatureGate.Enabled(features.CSIInlineVolume) {
- return spec.Volume.CSI, nil, nil
- }
- if spec.PersistentVolume != nil &&
- spec.PersistentVolume.Spec.CSI != nil {
- return nil, spec.PersistentVolume.Spec.CSI, nil
- }
- return nil, nil, fmt.Errorf("volume source not found in volume.Spec")
- }
- // getPVSourceFromSpec ensures only CSIPersistentVolumeSource is present in volume.Spec
- func getPVSourceFromSpec(spec *volume.Spec) (*api.CSIPersistentVolumeSource, error) {
- volSrc, pvSrc, err := getSourceFromSpec(spec)
- if err != nil {
- return nil, err
- }
- if volSrc != nil {
- return nil, fmt.Errorf("unexpected api.CSIVolumeSource found in volume.Spec")
- }
- return pvSrc, nil
- }
|