/* Copyright 2014 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package rbd import ( "fmt" dstrings "strings" "github.com/golang/glog" "k8s.io/kubernetes/pkg/api" "k8s.io/kubernetes/pkg/api/resource" clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" "k8s.io/kubernetes/pkg/types" "k8s.io/kubernetes/pkg/util/exec" "k8s.io/kubernetes/pkg/util/mount" "k8s.io/kubernetes/pkg/util/strings" "k8s.io/kubernetes/pkg/util/uuid" "k8s.io/kubernetes/pkg/volume" volutil "k8s.io/kubernetes/pkg/volume/util" ) // This is the primary entrypoint for volume plugins. func ProbeVolumePlugins() []volume.VolumePlugin { return []volume.VolumePlugin{&rbdPlugin{nil, exec.New()}} } type rbdPlugin struct { host volume.VolumeHost exe exec.Interface } var _ volume.VolumePlugin = &rbdPlugin{} var _ volume.PersistentVolumePlugin = &rbdPlugin{} var _ volume.DeletableVolumePlugin = &rbdPlugin{} var _ volume.ProvisionableVolumePlugin = &rbdPlugin{} const ( rbdPluginName = "kubernetes.io/rbd" annCephAdminID = "rbd.kubernetes.io/admin" annCephAdminSecretName = "rbd.kubernetes.io/adminsecretname" annCephAdminSecretNameSpace = "rbd.kubernetes.io/adminsecretnamespace" secretKeyName = "key" // key name used in secret ) func (plugin *rbdPlugin) Init(host volume.VolumeHost) error { plugin.host = host return nil } func (plugin *rbdPlugin) GetPluginName() string { return rbdPluginName } func (plugin *rbdPlugin) GetVolumeName(spec *volume.Spec) (string, error) { volumeSource, _, err := getVolumeSource(spec) if err != nil { return "", err } return fmt.Sprintf( "%v:%v", volumeSource.CephMonitors, volumeSource.RBDImage), nil } func (plugin *rbdPlugin) CanSupport(spec *volume.Spec) bool { if (spec.Volume != nil && spec.Volume.RBD == nil) || (spec.PersistentVolume != nil && spec.PersistentVolume.Spec.RBD == nil) { return false } return true } func (plugin *rbdPlugin) RequiresRemount() bool { return false } func (plugin *rbdPlugin) GetAccessModes() []api.PersistentVolumeAccessMode { return []api.PersistentVolumeAccessMode{ api.ReadWriteOnce, api.ReadOnlyMany, } } func (plugin *rbdPlugin) NewMounter(spec *volume.Spec, pod *api.Pod, _ volume.VolumeOptions) (volume.Mounter, error) { var secret string var err error source, _ := plugin.getRBDVolumeSource(spec) if source.SecretRef != nil { if secret, err = parseSecret(pod.Namespace, source.SecretRef.Name, plugin.host.GetKubeClient()); err != nil { glog.Errorf("Couldn't get secret from %v/%v", pod.Namespace, source.SecretRef) return nil, err } } // Inject real implementations here, test through the internal function. return plugin.newMounterInternal(spec, pod.UID, &RBDUtil{}, plugin.host.GetMounter(), secret) } func (plugin *rbdPlugin) getRBDVolumeSource(spec *volume.Spec) (*api.RBDVolumeSource, bool) { // rbd volumes used directly in a pod have a ReadOnly flag set by the pod author. // rbd volumes used as a PersistentVolume gets the ReadOnly flag indirectly through the persistent-claim volume used to mount the PV if spec.Volume != nil && spec.Volume.RBD != nil { return spec.Volume.RBD, spec.Volume.RBD.ReadOnly } else { return spec.PersistentVolume.Spec.RBD, spec.ReadOnly } } func (plugin *rbdPlugin) newMounterInternal(spec *volume.Spec, podUID types.UID, manager diskManager, mounter mount.Interface, secret string) (volume.Mounter, error) { source, readOnly := plugin.getRBDVolumeSource(spec) pool := source.RBDPool id := source.RadosUser keyring := source.Keyring return &rbdMounter{ rbd: &rbd{ podUID: podUID, volName: spec.Name(), Image: source.RBDImage, Pool: pool, ReadOnly: readOnly, manager: manager, mounter: &mount.SafeFormatAndMount{Interface: mounter, Runner: exec.New()}, plugin: plugin, }, Mon: source.CephMonitors, Id: id, Keyring: keyring, Secret: secret, fsType: source.FSType, }, nil } func (plugin *rbdPlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) { // Inject real implementations here, test through the internal function. return plugin.newUnmounterInternal(volName, podUID, &RBDUtil{}, plugin.host.GetMounter()) } func (plugin *rbdPlugin) newUnmounterInternal(volName string, podUID types.UID, manager diskManager, mounter mount.Interface) (volume.Unmounter, error) { return &rbdUnmounter{ rbdMounter: &rbdMounter{ rbd: &rbd{ podUID: podUID, volName: volName, manager: manager, mounter: &mount.SafeFormatAndMount{Interface: mounter, Runner: exec.New()}, plugin: plugin, }, Mon: make([]string, 0), }, }, nil } func (plugin *rbdPlugin) ConstructVolumeSpec(volumeName, mountPath string) (*volume.Spec, error) { rbdVolume := &api.Volume{ Name: volumeName, VolumeSource: api.VolumeSource{ RBD: &api.RBDVolumeSource{ CephMonitors: []string{}, }, }, } return volume.NewSpecFromVolume(rbdVolume), nil } func (plugin *rbdPlugin) NewDeleter(spec *volume.Spec) (volume.Deleter, error) { if spec.PersistentVolume != nil && spec.PersistentVolume.Spec.RBD == nil { return nil, fmt.Errorf("spec.PersistentVolumeSource.Spec.RBD is nil") } admin, adminSecretName, adminSecretNamespace, err := annotationsToParam(spec.PersistentVolume) if err != nil { return nil, fmt.Errorf("cannot find Ceph credentials to delete rbd PV: %v", err) } secret, err := parseSecret(adminSecretNamespace, adminSecretName, plugin.host.GetKubeClient()) if err != nil { // log error but don't return yet glog.Errorf("failed to get admin secret from [%q/%q]: %v", adminSecretNamespace, adminSecretName, err) } return plugin.newDeleterInternal(spec, admin, secret, &RBDUtil{}) } func (plugin *rbdPlugin) newDeleterInternal(spec *volume.Spec, admin, secret string, manager diskManager) (volume.Deleter, error) { return &rbdVolumeDeleter{ rbdMounter: &rbdMounter{ rbd: &rbd{ volName: spec.Name(), Image: spec.PersistentVolume.Spec.RBD.RBDImage, Pool: spec.PersistentVolume.Spec.RBD.RBDPool, manager: manager, plugin: plugin, }, Mon: spec.PersistentVolume.Spec.RBD.CephMonitors, adminId: admin, adminSecret: secret, }}, nil } func (plugin *rbdPlugin) NewProvisioner(options volume.VolumeOptions) (volume.Provisioner, error) { if len(options.AccessModes) == 0 { options.AccessModes = plugin.GetAccessModes() } return plugin.newProvisionerInternal(options, &RBDUtil{}) } func (plugin *rbdPlugin) newProvisionerInternal(options volume.VolumeOptions, manager diskManager) (volume.Provisioner, error) { return &rbdVolumeProvisioner{ rbdMounter: &rbdMounter{ rbd: &rbd{ manager: manager, plugin: plugin, }, }, options: options, }, nil } type rbdVolumeProvisioner struct { *rbdMounter options volume.VolumeOptions } func (r *rbdVolumeProvisioner) Provision() (*api.PersistentVolume, error) { if r.options.Selector != nil { return nil, fmt.Errorf("claim Selector is not supported") } var err error adminSecretName := "" adminSecretNamespace := "default" secretName := "" secret := "" for k, v := range r.options.Parameters { switch dstrings.ToLower(k) { case "monitors": arr := dstrings.Split(v, ",") for _, m := range arr { r.Mon = append(r.Mon, m) } case "adminid": r.adminId = v case "adminsecretname": adminSecretName = v case "adminsecretnamespace": adminSecretNamespace = v case "userid": r.Id = v case "pool": r.Pool = v case "usersecretname": secretName = v default: return nil, fmt.Errorf("invalid option %q for volume plugin %s", k, r.plugin.GetPluginName()) } } // sanity check if adminSecretName == "" { return nil, fmt.Errorf("missing Ceph admin secret name") } if secret, err = parseSecret(adminSecretNamespace, adminSecretName, r.plugin.host.GetKubeClient()); err != nil { // log error but don't return yet glog.Errorf("failed to get admin secret from [%q/%q]", adminSecretNamespace, adminSecretName) } r.adminSecret = secret if len(r.Mon) < 1 { return nil, fmt.Errorf("missing Ceph monitors") } if secretName == "" { return nil, fmt.Errorf("missing user secret name") } if r.adminId == "" { r.adminId = "admin" } if r.Pool == "" { r.Pool = "rbd" } if r.Id == "" { r.Id = r.adminId } // create random image name image := fmt.Sprintf("kubernetes-dynamic-pvc-%s", uuid.NewUUID()) r.rbdMounter.Image = image rbd, sizeMB, err := r.manager.CreateImage(r) if err != nil { glog.Errorf("rbd: create volume failed, err: %v", err) return nil, fmt.Errorf("rbd: create volume failed, err: %v", err) } glog.Infof("successfully created rbd image %q", image) pv := new(api.PersistentVolume) rbd.SecretRef = new(api.LocalObjectReference) rbd.SecretRef.Name = secretName rbd.RadosUser = r.Id pv.Spec.PersistentVolumeSource.RBD = rbd pv.Spec.PersistentVolumeReclaimPolicy = r.options.PersistentVolumeReclaimPolicy pv.Spec.AccessModes = r.options.AccessModes pv.Spec.Capacity = api.ResourceList{ api.ResourceName(api.ResourceStorage): resource.MustParse(fmt.Sprintf("%dMi", sizeMB)), } // place parameters in pv selector paramToAnnotations(r.adminId, adminSecretNamespace, adminSecretName, pv) return pv, nil } type rbdVolumeDeleter struct { *rbdMounter } func (r *rbdVolumeDeleter) GetPath() string { name := rbdPluginName return r.plugin.host.GetPodVolumeDir(r.podUID, strings.EscapeQualifiedNameForDisk(name), r.volName) } func (r *rbdVolumeDeleter) Delete() error { return r.manager.DeleteImage(r) } func paramToAnnotations(admin, adminSecretNamespace, adminSecretName string, pv *api.PersistentVolume) { if pv.Annotations == nil { pv.Annotations = make(map[string]string) } pv.Annotations[annCephAdminID] = admin pv.Annotations[annCephAdminSecretName] = adminSecretName pv.Annotations[annCephAdminSecretNameSpace] = adminSecretNamespace } func annotationsToParam(pv *api.PersistentVolume) (string, string, string, error) { if pv.Annotations == nil { return "", "", "", fmt.Errorf("PV has no annotation, cannot get Ceph admin credentials") } var admin, adminSecretName, adminSecretNamespace string found := false admin, found = pv.Annotations[annCephAdminID] if !found { return "", "", "", fmt.Errorf("Cannot get Ceph admin id from PV annotations") } adminSecretName, found = pv.Annotations[annCephAdminSecretName] if !found { return "", "", "", fmt.Errorf("Cannot get Ceph admin secret from PV annotations") } adminSecretNamespace, found = pv.Annotations[annCephAdminSecretNameSpace] if !found { return "", "", "", fmt.Errorf("Cannot get Ceph admin secret namespace from PV annotations") } return admin, adminSecretName, adminSecretNamespace, nil } type rbd struct { volName string podUID types.UID Pool string Image string ReadOnly bool plugin *rbdPlugin mounter *mount.SafeFormatAndMount // Utility interface that provides API calls to the provider to attach/detach disks. manager diskManager volume.MetricsNil } func (rbd *rbd) GetPath() string { name := rbdPluginName // safe to use PodVolumeDir now: volume teardown occurs before pod is cleaned up return rbd.plugin.host.GetPodVolumeDir(rbd.podUID, strings.EscapeQualifiedNameForDisk(name), rbd.volName) } type rbdMounter struct { *rbd // capitalized so they can be exported in persistRBD() Mon []string Id string Keyring string Secret string fsType string adminSecret string adminId string } var _ volume.Mounter = &rbdMounter{} func (b *rbd) GetAttributes() volume.Attributes { return volume.Attributes{ ReadOnly: b.ReadOnly, Managed: !b.ReadOnly, SupportsSELinux: true, } } func (b *rbdMounter) SetUp(fsGroup *int64) error { return b.SetUpAt(b.GetPath(), fsGroup) } func (b *rbdMounter) SetUpAt(dir string, fsGroup *int64) error { // diskSetUp checks mountpoints and prevent repeated calls glog.V(4).Infof("rbd: attempting to SetUp and mount %s", dir) err := diskSetUp(b.manager, *b, dir, b.mounter, fsGroup) if err != nil { glog.Errorf("rbd: failed to setup mount %s %v", dir, err) } return err } type rbdUnmounter struct { *rbdMounter } var _ volume.Unmounter = &rbdUnmounter{} // Unmounts the bind mount, and detaches the disk only if the disk // resource was the last reference to that disk on the kubelet. func (c *rbdUnmounter) TearDown() error { return c.TearDownAt(c.GetPath()) } func (c *rbdUnmounter) TearDownAt(dir string) error { return diskTearDown(c.manager, *c, dir, c.mounter) } func (plugin *rbdPlugin) execCommand(command string, args []string) ([]byte, error) { cmd := plugin.exe.Command(command, args...) return cmd.CombinedOutput() } func getVolumeSource( spec *volume.Spec) (*api.RBDVolumeSource, bool, error) { if spec.Volume != nil && spec.Volume.RBD != nil { return spec.Volume.RBD, spec.Volume.RBD.ReadOnly, nil } else if spec.PersistentVolume != nil && spec.PersistentVolume.Spec.RBD != nil { return spec.PersistentVolume.Spec.RBD, spec.ReadOnly, nil } return nil, false, fmt.Errorf("Spec does not reference a RBD volume type") } // parseSecretMap locates the secret by key name. func parseSecret(namespace, secretName string, kubeClient clientset.Interface) (string, error) { secretMap, err := volutil.GetSecret(namespace, secretName, kubeClient) if err != nil { glog.Errorf("failed to get secret from [%q/%q]", namespace, secretName) return "", fmt.Errorf("failed to get secret from [%q/%q]", namespace, secretName) } if len(secretMap) == 0 { return "", fmt.Errorf("empty secret map") } secret := "" for k, v := range secretMap { if k == secretKeyName { return v, nil } secret = v } // If not found, the last secret in the map wins as done before return secret, nil }