mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			217 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			217 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2018 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package csi
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"path/filepath"
 | 
						|
	"strconv"
 | 
						|
	"time"
 | 
						|
 | 
						|
	api "k8s.io/api/core/v1"
 | 
						|
	storage "k8s.io/api/storage/v1"
 | 
						|
	meta "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/client-go/kubernetes"
 | 
						|
	"k8s.io/klog/v2"
 | 
						|
	"k8s.io/kubernetes/pkg/volume"
 | 
						|
	utilstrings "k8s.io/utils/strings"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	// TestInformerSyncPeriod is informer sync period duration for testing
 | 
						|
	TestInformerSyncPeriod = 100 * time.Millisecond
 | 
						|
	// TestInformerSyncTimeout is informer timeout duration for testing
 | 
						|
	TestInformerSyncTimeout = 30 * time.Second
 | 
						|
)
 | 
						|
 | 
						|
func getCredentialsFromSecret(k8s kubernetes.Interface, secretRef *api.SecretReference) (map[string]string, error) {
 | 
						|
	credentials := map[string]string{}
 | 
						|
	secret, err := k8s.CoreV1().Secrets(secretRef.Namespace).Get(context.TODO(), secretRef.Name, meta.GetOptions{})
 | 
						|
	if err != nil {
 | 
						|
		return credentials, errors.New(log("failed to find the secret %s in the namespace %s with error: %v", secretRef.Name, secretRef.Namespace, err))
 | 
						|
	}
 | 
						|
	for key, value := range secret.Data {
 | 
						|
		credentials[key] = string(value)
 | 
						|
	}
 | 
						|
 | 
						|
	return credentials, nil
 | 
						|
}
 | 
						|
 | 
						|
// saveVolumeData persists parameter data as json file at the provided location
 | 
						|
func saveVolumeData(dir string, fileName string, data map[string]string) error {
 | 
						|
	dataFilePath := filepath.Join(dir, fileName)
 | 
						|
	klog.V(4).Info(log("saving volume data file [%s]", dataFilePath))
 | 
						|
	file, err := os.Create(dataFilePath)
 | 
						|
	if err != nil {
 | 
						|
		return errors.New(log("failed to save volume data file %s: %v", dataFilePath, err))
 | 
						|
	}
 | 
						|
	defer file.Close()
 | 
						|
	if err := json.NewEncoder(file).Encode(data); err != nil {
 | 
						|
		return errors.New(log("failed to save volume data file %s: %v", dataFilePath, err))
 | 
						|
	}
 | 
						|
	klog.V(4).Info(log("volume data file saved successfully [%s]", dataFilePath))
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// loadVolumeData loads volume info from specified json file/location
 | 
						|
func loadVolumeData(dir string, fileName string) (map[string]string, error) {
 | 
						|
	// remove /mount at the end
 | 
						|
	dataFileName := filepath.Join(dir, fileName)
 | 
						|
	klog.V(4).Info(log("loading volume data file [%s]", dataFileName))
 | 
						|
 | 
						|
	file, err := os.Open(dataFileName)
 | 
						|
	if err != nil {
 | 
						|
		return nil, errors.New(log("failed to open volume data file [%s]: %v", dataFileName, err))
 | 
						|
	}
 | 
						|
	defer file.Close()
 | 
						|
	data := map[string]string{}
 | 
						|
	if err := json.NewDecoder(file).Decode(&data); err != nil {
 | 
						|
		return nil, errors.New(log("failed to parse volume data file [%s]: %v", dataFileName, err))
 | 
						|
	}
 | 
						|
 | 
						|
	return data, nil
 | 
						|
}
 | 
						|
 | 
						|
func getCSISourceFromSpec(spec *volume.Spec) (*api.CSIPersistentVolumeSource, error) {
 | 
						|
	return getPVSourceFromSpec(spec)
 | 
						|
}
 | 
						|
 | 
						|
func getReadOnlyFromSpec(spec *volume.Spec) (bool, error) {
 | 
						|
	if spec.PersistentVolume != nil &&
 | 
						|
		spec.PersistentVolume.Spec.CSI != nil {
 | 
						|
		return spec.ReadOnly, nil
 | 
						|
	}
 | 
						|
 | 
						|
	return false, fmt.Errorf("CSIPersistentVolumeSource not defined in spec")
 | 
						|
}
 | 
						|
 | 
						|
// log prepends log string with `kubernetes.io/csi`
 | 
						|
func log(msg string, parts ...interface{}) string {
 | 
						|
	return fmt.Sprintf(fmt.Sprintf("%s: %s", CSIPluginName, msg), parts...)
 | 
						|
}
 | 
						|
 | 
						|
// getVolumePluginDir returns the path where CSI plugin keeps metadata for given volume
 | 
						|
func getVolumePluginDir(specVolID string, host volume.VolumeHost) string {
 | 
						|
	sanitizedSpecVolID := utilstrings.EscapeQualifiedName(specVolID)
 | 
						|
	return filepath.Join(host.GetVolumeDevicePluginDir(CSIPluginName), sanitizedSpecVolID)
 | 
						|
}
 | 
						|
 | 
						|
// getVolumeDevicePluginDir returns the path where the CSI plugin keeps the
 | 
						|
// symlink for a block device associated with a given specVolumeID.
 | 
						|
// path: plugins/kubernetes.io/csi/volumeDevices/{specVolumeID}/dev
 | 
						|
func getVolumeDevicePluginDir(specVolID string, host volume.VolumeHost) string {
 | 
						|
	return filepath.Join(getVolumePluginDir(specVolID, host), "dev")
 | 
						|
}
 | 
						|
 | 
						|
// getVolumeDeviceDataDir returns the path where the CSI plugin keeps the
 | 
						|
// volume data for a block device associated with a given specVolumeID.
 | 
						|
// path: plugins/kubernetes.io/csi/volumeDevices/{specVolumeID}/data
 | 
						|
func getVolumeDeviceDataDir(specVolID string, host volume.VolumeHost) string {
 | 
						|
	return filepath.Join(getVolumePluginDir(specVolID, host), "data")
 | 
						|
}
 | 
						|
 | 
						|
// hasReadWriteOnce returns true if modes contains v1.ReadWriteOnce
 | 
						|
func hasReadWriteOnce(modes []api.PersistentVolumeAccessMode) bool {
 | 
						|
	if modes == nil {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	for _, mode := range modes {
 | 
						|
		if mode == api.ReadWriteOnce {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// getSourceFromSpec returns either CSIVolumeSource or CSIPersistentVolumeSource, but not both
 | 
						|
func getSourceFromSpec(spec *volume.Spec) (*api.CSIVolumeSource, *api.CSIPersistentVolumeSource, error) {
 | 
						|
	if spec == nil {
 | 
						|
		return nil, nil, fmt.Errorf("volume.Spec nil")
 | 
						|
	}
 | 
						|
	if spec.Volume != nil && spec.PersistentVolume != nil {
 | 
						|
		return nil, nil, fmt.Errorf("volume.Spec has both volume and persistent volume sources")
 | 
						|
	}
 | 
						|
	if spec.Volume != nil && spec.Volume.CSI != nil {
 | 
						|
		return spec.Volume.CSI, nil, nil
 | 
						|
	}
 | 
						|
	if spec.PersistentVolume != nil &&
 | 
						|
		spec.PersistentVolume.Spec.CSI != nil {
 | 
						|
		return nil, spec.PersistentVolume.Spec.CSI, nil
 | 
						|
	}
 | 
						|
 | 
						|
	return nil, nil, fmt.Errorf("volume source not found in volume.Spec")
 | 
						|
}
 | 
						|
 | 
						|
// getPVSourceFromSpec ensures only CSIPersistentVolumeSource is present in volume.Spec
 | 
						|
func getPVSourceFromSpec(spec *volume.Spec) (*api.CSIPersistentVolumeSource, error) {
 | 
						|
	volSrc, pvSrc, err := getSourceFromSpec(spec)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if volSrc != nil {
 | 
						|
		return nil, fmt.Errorf("unexpected api.CSIVolumeSource found in volume.Spec")
 | 
						|
	}
 | 
						|
	return pvSrc, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetCSIMounterPath returns the mounter path given the base path.
 | 
						|
func GetCSIMounterPath(path string) string {
 | 
						|
	return filepath.Join(path, "/mount")
 | 
						|
}
 | 
						|
 | 
						|
// GetCSIDriverName returns the csi driver name
 | 
						|
func GetCSIDriverName(spec *volume.Spec) (string, error) {
 | 
						|
	volSrc, pvSrc, err := getSourceFromSpec(spec)
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
 | 
						|
	switch {
 | 
						|
	case volSrc != nil:
 | 
						|
		return volSrc.Driver, nil
 | 
						|
	case pvSrc != nil:
 | 
						|
		return pvSrc.Driver, nil
 | 
						|
	default:
 | 
						|
		return "", errors.New(log("volume source not found in volume.Spec"))
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func createCSIOperationContext(volumeSpec *volume.Spec, timeout time.Duration) (context.Context, context.CancelFunc) {
 | 
						|
	migrated := false
 | 
						|
	if volumeSpec != nil {
 | 
						|
		migrated = volumeSpec.Migrated
 | 
						|
	}
 | 
						|
	ctx := context.WithValue(context.Background(), additionalInfoKey, additionalInfo{Migrated: strconv.FormatBool(migrated)})
 | 
						|
	return context.WithTimeout(ctx, timeout)
 | 
						|
}
 | 
						|
 | 
						|
// getPodInfoAttrs returns pod info for NodePublish
 | 
						|
func getPodInfoAttrs(pod *api.Pod, volumeMode storage.VolumeLifecycleMode) map[string]string {
 | 
						|
	attrs := map[string]string{
 | 
						|
		"csi.storage.k8s.io/pod.name":            pod.Name,
 | 
						|
		"csi.storage.k8s.io/pod.namespace":       pod.Namespace,
 | 
						|
		"csi.storage.k8s.io/pod.uid":             string(pod.UID),
 | 
						|
		"csi.storage.k8s.io/serviceAccount.name": pod.Spec.ServiceAccountName,
 | 
						|
		"csi.storage.k8s.io/ephemeral":           strconv.FormatBool(volumeMode == storage.VolumeLifecycleEphemeral),
 | 
						|
	}
 | 
						|
	return attrs
 | 
						|
}
 |