ceph-csi/vendor/k8s.io/kubernetes/pkg/volume/cinder/cinder.go

592 lines
19 KiB
Go
Raw Normal View History

2018-01-09 18:57:14 +00:00
/*
Copyright 2015 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package cinder
import (
"errors"
"fmt"
"os"
"path"
"k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/resource"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
2018-11-26 18:23:56 +00:00
utilfeature "k8s.io/apiserver/pkg/util/feature"
cloudprovider "k8s.io/cloud-provider"
"k8s.io/klog"
2018-01-09 18:57:14 +00:00
"k8s.io/kubernetes/pkg/cloudprovider/providers/openstack"
2018-11-26 18:23:56 +00:00
"k8s.io/kubernetes/pkg/features"
2018-01-09 18:57:14 +00:00
"k8s.io/kubernetes/pkg/util/keymutex"
"k8s.io/kubernetes/pkg/util/mount"
kstrings "k8s.io/kubernetes/pkg/util/strings"
"k8s.io/kubernetes/pkg/volume"
"k8s.io/kubernetes/pkg/volume/util"
)
2018-03-06 22:33:18 +00:00
const (
// DefaultCloudConfigPath is the default path for cloud configuration
DefaultCloudConfigPath = "/etc/kubernetes/cloud-config"
)
// ProbeVolumePlugins is the primary entrypoint for volume plugins.
2018-01-09 18:57:14 +00:00
func ProbeVolumePlugins() []volume.VolumePlugin {
return []volume.VolumePlugin{&cinderPlugin{}}
}
2018-03-06 22:33:18 +00:00
// BlockStorageProvider is the interface for accessing cinder functionality.
type BlockStorageProvider interface {
2018-01-09 18:57:14 +00:00
AttachDisk(instanceID, volumeID string) (string, error)
DetachDisk(instanceID, volumeID string) error
DeleteVolume(volumeID string) error
2018-11-26 18:23:56 +00:00
CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, string, bool, error)
2018-01-09 18:57:14 +00:00
GetDevicePath(volumeID string) string
InstanceID() (string, error)
GetAttachmentDiskPath(instanceID, volumeID string) (string, error)
OperationPending(diskName string) (bool, string, error)
DiskIsAttached(instanceID, volumeID string) (bool, error)
2018-03-06 22:33:18 +00:00
DiskIsAttachedByName(nodeName types.NodeName, volumeID string) (bool, string, error)
DisksAreAttachedByName(nodeName types.NodeName, volumeIDs []string) (map[string]bool, error)
2018-01-09 18:57:14 +00:00
ShouldTrustDevicePath() bool
Instances() (cloudprovider.Instances, bool)
ExpandVolume(volumeID string, oldSize resource.Quantity, newSize resource.Quantity) (resource.Quantity, error)
}
type cinderPlugin struct {
host volume.VolumeHost
// Guarding SetUp and TearDown operations
volumeLocks keymutex.KeyMutex
}
var _ volume.VolumePlugin = &cinderPlugin{}
var _ volume.PersistentVolumePlugin = &cinderPlugin{}
var _ volume.DeletableVolumePlugin = &cinderPlugin{}
var _ volume.ProvisionableVolumePlugin = &cinderPlugin{}
const (
cinderVolumePluginName = "kubernetes.io/cinder"
)
2018-07-18 14:47:22 +00:00
func getPath(uid types.UID, volName string, host volume.VolumeHost) string {
return host.GetPodVolumeDir(uid, kstrings.EscapeQualifiedNameForDisk(cinderVolumePluginName), volName)
}
2018-01-09 18:57:14 +00:00
func (plugin *cinderPlugin) Init(host volume.VolumeHost) error {
plugin.host = host
2018-11-26 18:23:56 +00:00
plugin.volumeLocks = keymutex.NewHashed(0)
2018-01-09 18:57:14 +00:00
return nil
}
func (plugin *cinderPlugin) GetPluginName() string {
return cinderVolumePluginName
}
func (plugin *cinderPlugin) GetVolumeName(spec *volume.Spec) (string, error) {
2018-07-18 14:47:22 +00:00
volumeID, _, _, err := getVolumeInfo(spec)
2018-01-09 18:57:14 +00:00
if err != nil {
return "", err
}
2018-07-18 14:47:22 +00:00
return volumeID, nil
2018-01-09 18:57:14 +00:00
}
func (plugin *cinderPlugin) CanSupport(spec *volume.Spec) bool {
return (spec.Volume != nil && spec.Volume.Cinder != nil) || (spec.PersistentVolume != nil && spec.PersistentVolume.Spec.Cinder != nil)
}
func (plugin *cinderPlugin) RequiresRemount() bool {
return false
}
func (plugin *cinderPlugin) SupportsMountOption() bool {
return true
}
func (plugin *cinderPlugin) SupportsBulkVolumeVerification() bool {
return false
}
func (plugin *cinderPlugin) GetAccessModes() []v1.PersistentVolumeAccessMode {
return []v1.PersistentVolumeAccessMode{
v1.ReadWriteOnce,
}
}
func (plugin *cinderPlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, _ volume.VolumeOptions) (volume.Mounter, error) {
2018-03-06 22:33:18 +00:00
return plugin.newMounterInternal(spec, pod.UID, &DiskUtil{}, plugin.host.GetMounter(plugin.GetPluginName()))
2018-01-09 18:57:14 +00:00
}
func (plugin *cinderPlugin) newMounterInternal(spec *volume.Spec, podUID types.UID, manager cdManager, mounter mount.Interface) (volume.Mounter, error) {
2018-07-18 14:47:22 +00:00
pdName, fsType, readOnly, err := getVolumeInfo(spec)
2018-01-09 18:57:14 +00:00
if err != nil {
return nil, err
}
return &cinderVolumeMounter{
cinderVolume: &cinderVolume{
2018-07-18 14:47:22 +00:00
podUID: podUID,
volName: spec.Name(),
pdName: pdName,
mounter: mounter,
manager: manager,
plugin: plugin,
MetricsProvider: volume.NewMetricsStatFS(getPath(podUID, spec.Name(), plugin.host)),
2018-01-09 18:57:14 +00:00
},
fsType: fsType,
readOnly: readOnly,
2018-11-26 18:23:56 +00:00
blockDeviceMounter: util.NewSafeFormatAndMountFromHost(plugin.GetPluginName(), plugin.host),
mountOptions: util.MountOptionFromSpec(spec),
}, nil
2018-01-09 18:57:14 +00:00
}
func (plugin *cinderPlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) {
2018-03-06 22:33:18 +00:00
return plugin.newUnmounterInternal(volName, podUID, &DiskUtil{}, plugin.host.GetMounter(plugin.GetPluginName()))
2018-01-09 18:57:14 +00:00
}
func (plugin *cinderPlugin) newUnmounterInternal(volName string, podUID types.UID, manager cdManager, mounter mount.Interface) (volume.Unmounter, error) {
return &cinderVolumeUnmounter{
&cinderVolume{
2018-07-18 14:47:22 +00:00
podUID: podUID,
volName: volName,
manager: manager,
mounter: mounter,
plugin: plugin,
MetricsProvider: volume.NewMetricsStatFS(getPath(podUID, volName, plugin.host)),
2018-01-09 18:57:14 +00:00
}}, nil
}
func (plugin *cinderPlugin) NewDeleter(spec *volume.Spec) (volume.Deleter, error) {
2018-03-06 22:33:18 +00:00
return plugin.newDeleterInternal(spec, &DiskUtil{})
2018-01-09 18:57:14 +00:00
}
func (plugin *cinderPlugin) newDeleterInternal(spec *volume.Spec, manager cdManager) (volume.Deleter, error) {
if spec.PersistentVolume != nil && spec.PersistentVolume.Spec.Cinder == nil {
return nil, fmt.Errorf("spec.PersistentVolumeSource.Cinder is nil")
}
return &cinderVolumeDeleter{
&cinderVolume{
volName: spec.Name(),
pdName: spec.PersistentVolume.Spec.Cinder.VolumeID,
manager: manager,
plugin: plugin,
}}, nil
}
func (plugin *cinderPlugin) NewProvisioner(options volume.VolumeOptions) (volume.Provisioner, error) {
2018-03-06 22:33:18 +00:00
return plugin.newProvisionerInternal(options, &DiskUtil{})
2018-01-09 18:57:14 +00:00
}
func (plugin *cinderPlugin) newProvisionerInternal(options volume.VolumeOptions, manager cdManager) (volume.Provisioner, error) {
return &cinderVolumeProvisioner{
cinderVolume: &cinderVolume{
manager: manager,
plugin: plugin,
},
options: options,
}, nil
}
2018-03-06 22:33:18 +00:00
func (plugin *cinderPlugin) getCloudProvider() (BlockStorageProvider, error) {
2018-01-09 18:57:14 +00:00
cloud := plugin.host.GetCloudProvider()
if cloud == nil {
2018-03-06 22:33:18 +00:00
if _, err := os.Stat(DefaultCloudConfigPath); err == nil {
var config *os.File
config, err = os.Open(DefaultCloudConfigPath)
if err != nil {
return nil, fmt.Errorf("unable to load OpenStack configuration from default path : %v", err)
}
defer config.Close()
cloud, err = cloudprovider.GetCloudProvider(openstack.ProviderName, config)
if err != nil {
return nil, fmt.Errorf("unable to create OpenStack cloud provider from default path : %v", err)
}
} else {
return nil, fmt.Errorf("OpenStack cloud provider was not initialized properly : %v", err)
}
2018-01-09 18:57:14 +00:00
}
switch cloud := cloud.(type) {
case *openstack.OpenStack:
return cloud, nil
default:
2018-03-06 22:33:18 +00:00
return nil, errors.New("invalid cloud provider: expected OpenStack")
2018-01-09 18:57:14 +00:00
}
}
func (plugin *cinderPlugin) ConstructVolumeSpec(volumeName, mountPath string) (*volume.Spec, error) {
mounter := plugin.host.GetMounter(plugin.GetPluginName())
pluginDir := plugin.host.GetPluginDir(plugin.GetPluginName())
sourceName, err := mounter.GetDeviceNameFromMount(mountPath, pluginDir)
if err != nil {
return nil, err
}
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Found volume %s mounted to %s", sourceName, mountPath)
2018-01-09 18:57:14 +00:00
cinderVolume := &v1.Volume{
Name: volumeName,
VolumeSource: v1.VolumeSource{
Cinder: &v1.CinderVolumeSource{
VolumeID: sourceName,
},
},
}
return volume.NewSpecFromVolume(cinderVolume), nil
}
var _ volume.ExpandableVolumePlugin = &cinderPlugin{}
func (plugin *cinderPlugin) ExpandVolumeDevice(spec *volume.Spec, newSize resource.Quantity, oldSize resource.Quantity) (resource.Quantity, error) {
2018-07-18 14:47:22 +00:00
volumeID, _, _, err := getVolumeInfo(spec)
2018-01-09 18:57:14 +00:00
if err != nil {
return oldSize, err
}
cloud, err := plugin.getCloudProvider()
if err != nil {
return oldSize, err
}
2018-07-18 14:47:22 +00:00
expandedSize, err := cloud.ExpandVolume(volumeID, oldSize, newSize)
2018-01-09 18:57:14 +00:00
if err != nil {
return oldSize, err
}
2018-11-26 18:23:56 +00:00
klog.V(2).Infof("volume %s expanded to new size %d successfully", volumeID, int(newSize.Value()))
2018-01-09 18:57:14 +00:00
return expandedSize, nil
}
2018-11-26 18:23:56 +00:00
func (plugin *cinderPlugin) ExpandFS(spec *volume.Spec, devicePath, deviceMountPath string, _, _ resource.Quantity) error {
_, err := util.GenericResizeFS(plugin.host, plugin.GetPluginName(), devicePath, deviceMountPath)
return err
}
var _ volume.FSResizableVolumePlugin = &cinderPlugin{}
2018-01-09 18:57:14 +00:00
func (plugin *cinderPlugin) RequiresFSResize() bool {
return true
}
// Abstract interface to PD operations.
type cdManager interface {
// Attaches the disk to the kubelet's host machine.
AttachDisk(mounter *cinderVolumeMounter, globalPDPath string) error
// Detaches the disk from the kubelet's host machine.
DetachDisk(unmounter *cinderVolumeUnmounter) error
// Creates a volume
2018-11-26 18:23:56 +00:00
CreateVolume(provisioner *cinderVolumeProvisioner, node *v1.Node, allowedTopologies []v1.TopologySelectorTerm) (volumeID string, volumeSizeGB int, labels map[string]string, fstype string, err error)
2018-01-09 18:57:14 +00:00
// Deletes a volume
DeleteVolume(deleter *cinderVolumeDeleter) error
}
var _ volume.Mounter = &cinderVolumeMounter{}
type cinderVolumeMounter struct {
*cinderVolume
fsType string
readOnly bool
blockDeviceMounter *mount.SafeFormatAndMount
2018-11-26 18:23:56 +00:00
mountOptions []string
2018-01-09 18:57:14 +00:00
}
// cinderPersistentDisk volumes are disk resources provided by C3
// that are attached to the kubelet's host machine and exposed to the pod.
type cinderVolume struct {
volName string
podUID types.UID
// Unique identifier of the volume, used to find the disk resource in the provider.
pdName string
// Filesystem type, optional.
fsType string
// Specifies whether the disk will be attached as read-only.
readOnly bool
// Utility interface that provides API calls to the provider to attach/detach disks.
manager cdManager
// Mounter interface that provides system calls to mount the global path to the pod local path.
mounter mount.Interface
// diskMounter provides the interface that is used to mount the actual block device.
blockDeviceMounter mount.Interface
plugin *cinderPlugin
2018-07-18 14:47:22 +00:00
volume.MetricsProvider
2018-01-09 18:57:14 +00:00
}
func (b *cinderVolumeMounter) GetAttributes() volume.Attributes {
return volume.Attributes{
ReadOnly: b.readOnly,
Managed: !b.readOnly,
SupportsSELinux: true,
}
}
// Checks prior to mount operations to verify that the required components (binaries, etc.)
// to mount the volume are available on the underlying node.
// If not, it returns an error
func (b *cinderVolumeMounter) CanMount() error {
return nil
}
func (b *cinderVolumeMounter) SetUp(fsGroup *int64) error {
return b.SetUpAt(b.GetPath(), fsGroup)
}
// SetUp bind mounts to the volume path.
func (b *cinderVolumeMounter) SetUpAt(dir string, fsGroup *int64) error {
2018-11-26 18:23:56 +00:00
klog.V(5).Infof("Cinder SetUp %s to %s", b.pdName, dir)
2018-01-09 18:57:14 +00:00
b.plugin.volumeLocks.LockKey(b.pdName)
defer b.plugin.volumeLocks.UnlockKey(b.pdName)
notmnt, err := b.mounter.IsLikelyNotMountPoint(dir)
if err != nil && !os.IsNotExist(err) {
2018-11-26 18:23:56 +00:00
klog.Errorf("Cannot validate mount point: %s %v", dir, err)
2018-01-09 18:57:14 +00:00
return err
}
if !notmnt {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Something is already mounted to target %s", dir)
2018-01-09 18:57:14 +00:00
return nil
}
globalPDPath := makeGlobalPDName(b.plugin.host, b.pdName)
options := []string{"bind"}
if b.readOnly {
options = append(options, "ro")
}
if err := os.MkdirAll(dir, 0750); err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Could not create directory %s: %v", dir, err)
2018-01-09 18:57:14 +00:00
return err
}
2018-11-26 18:23:56 +00:00
mountOptions := util.JoinMountOptions(options, b.mountOptions)
2018-01-09 18:57:14 +00:00
// Perform a bind mount to the full path to allow duplicate mounts of the same PD.
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Attempting to mount cinder volume %s to %s with options %v", b.pdName, dir, mountOptions)
2018-01-09 18:57:14 +00:00
err = b.mounter.Mount(globalPDPath, dir, "", options)
if err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Mount failed: %v", err)
2018-01-09 18:57:14 +00:00
notmnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
if mntErr != nil {
2018-11-26 18:23:56 +00:00
klog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
2018-01-09 18:57:14 +00:00
return err
}
if !notmnt {
if mntErr = b.mounter.Unmount(dir); mntErr != nil {
2018-11-26 18:23:56 +00:00
klog.Errorf("Failed to unmount: %v", mntErr)
2018-01-09 18:57:14 +00:00
return err
}
notmnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
if mntErr != nil {
2018-11-26 18:23:56 +00:00
klog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
2018-01-09 18:57:14 +00:00
return err
}
if !notmnt {
// This is very odd, we don't expect it. We'll try again next sync loop.
2018-11-26 18:23:56 +00:00
klog.Errorf("%s is still mounted, despite call to unmount(). Will try again next sync loop.", b.GetPath())
2018-01-09 18:57:14 +00:00
return err
}
}
os.Remove(dir)
2018-11-26 18:23:56 +00:00
klog.Errorf("Failed to mount %s: %v", dir, err)
2018-01-09 18:57:14 +00:00
return err
}
if !b.readOnly {
volume.SetVolumeOwnership(b, fsGroup)
}
2018-11-26 18:23:56 +00:00
klog.V(3).Infof("Cinder volume %s mounted to %s", b.pdName, dir)
2018-01-09 18:57:14 +00:00
return nil
}
func makeGlobalPDName(host volume.VolumeHost, devName string) string {
return path.Join(host.GetPluginDir(cinderVolumePluginName), mount.MountsInGlobalPDPath, devName)
}
func (cd *cinderVolume) GetPath() string {
2018-07-18 14:47:22 +00:00
return getPath(cd.podUID, cd.volName, cd.plugin.host)
2018-01-09 18:57:14 +00:00
}
type cinderVolumeUnmounter struct {
*cinderVolume
}
var _ volume.Unmounter = &cinderVolumeUnmounter{}
func (c *cinderVolumeUnmounter) TearDown() error {
return c.TearDownAt(c.GetPath())
}
// Unmounts the bind mount, and detaches the disk only if the PD
// resource was the last reference to that disk on the kubelet.
func (c *cinderVolumeUnmounter) TearDownAt(dir string) error {
if pathExists, pathErr := util.PathExists(dir); pathErr != nil {
return fmt.Errorf("Error checking if path exists: %v", pathErr)
} else if !pathExists {
2018-11-26 18:23:56 +00:00
klog.Warningf("Warning: Unmount skipped because path does not exist: %v", dir)
2018-01-09 18:57:14 +00:00
return nil
}
2018-11-26 18:23:56 +00:00
klog.V(5).Infof("Cinder TearDown of %s", dir)
2018-01-09 18:57:14 +00:00
notmnt, err := c.mounter.IsLikelyNotMountPoint(dir)
if err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("IsLikelyNotMountPoint check failed: %v", err)
2018-01-09 18:57:14 +00:00
return err
}
if notmnt {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Nothing is mounted to %s, ignoring", dir)
2018-01-09 18:57:14 +00:00
return os.Remove(dir)
}
// Find Cinder volumeID to lock the right volume
// TODO: refactor VolumePlugin.NewUnmounter to get full volume.Spec just like
// NewMounter. We could then find volumeID there without probing MountRefs.
2018-11-26 18:23:56 +00:00
refs, err := c.mounter.GetMountRefs(dir)
2018-01-09 18:57:14 +00:00
if err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("GetMountRefs failed: %v", err)
2018-01-09 18:57:14 +00:00
return err
}
if len(refs) == 0 {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Directory %s is not mounted", dir)
2018-01-09 18:57:14 +00:00
return fmt.Errorf("directory %s is not mounted", dir)
}
c.pdName = path.Base(refs[0])
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Found volume %s mounted to %s", c.pdName, dir)
2018-01-09 18:57:14 +00:00
// lock the volume (and thus wait for any concurrrent SetUpAt to finish)
c.plugin.volumeLocks.LockKey(c.pdName)
defer c.plugin.volumeLocks.UnlockKey(c.pdName)
// Reload list of references, there might be SetUpAt finished in the meantime
2018-11-26 18:23:56 +00:00
refs, err = c.mounter.GetMountRefs(dir)
2018-01-09 18:57:14 +00:00
if err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("GetMountRefs failed: %v", err)
2018-01-09 18:57:14 +00:00
return err
}
if err := c.mounter.Unmount(dir); err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Unmount failed: %v", err)
2018-01-09 18:57:14 +00:00
return err
}
2018-11-26 18:23:56 +00:00
klog.V(3).Infof("Successfully unmounted: %s\n", dir)
2018-01-09 18:57:14 +00:00
notmnt, mntErr := c.mounter.IsLikelyNotMountPoint(dir)
if mntErr != nil {
2018-11-26 18:23:56 +00:00
klog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
2018-01-09 18:57:14 +00:00
return err
}
if notmnt {
if err := os.Remove(dir); err != nil {
2018-11-26 18:23:56 +00:00
klog.V(4).Infof("Failed to remove directory after unmount: %v", err)
2018-01-09 18:57:14 +00:00
return err
}
}
return nil
}
type cinderVolumeDeleter struct {
*cinderVolume
}
var _ volume.Deleter = &cinderVolumeDeleter{}
func (r *cinderVolumeDeleter) GetPath() string {
2018-07-18 14:47:22 +00:00
return getPath(r.podUID, r.volName, r.plugin.host)
2018-01-09 18:57:14 +00:00
}
func (r *cinderVolumeDeleter) Delete() error {
return r.manager.DeleteVolume(r)
}
type cinderVolumeProvisioner struct {
*cinderVolume
options volume.VolumeOptions
}
var _ volume.Provisioner = &cinderVolumeProvisioner{}
2018-07-18 14:47:22 +00:00
func (c *cinderVolumeProvisioner) Provision(selectedNode *v1.Node, allowedTopologies []v1.TopologySelectorTerm) (*v1.PersistentVolume, error) {
2018-03-06 22:33:18 +00:00
if !util.AccessModesContainedInAll(c.plugin.GetAccessModes(), c.options.PVC.Spec.AccessModes) {
2018-01-09 18:57:14 +00:00
return nil, fmt.Errorf("invalid AccessModes %v: only AccessModes %v are supported", c.options.PVC.Spec.AccessModes, c.plugin.GetAccessModes())
}
2018-11-26 18:23:56 +00:00
volumeID, sizeGB, labels, fstype, err := c.manager.CreateVolume(c, selectedNode, allowedTopologies)
2018-01-09 18:57:14 +00:00
if err != nil {
return nil, err
}
2018-11-26 18:23:56 +00:00
var volumeMode *v1.PersistentVolumeMode
if utilfeature.DefaultFeatureGate.Enabled(features.BlockVolume) {
volumeMode = c.options.PVC.Spec.VolumeMode
if volumeMode != nil && *volumeMode == v1.PersistentVolumeBlock {
// Block volumes should not have any FSType
fstype = ""
}
}
2018-01-09 18:57:14 +00:00
pv := &v1.PersistentVolume{
ObjectMeta: metav1.ObjectMeta{
Name: c.options.PVName,
Labels: labels,
Annotations: map[string]string{
2018-03-06 22:33:18 +00:00
util.VolumeDynamicallyCreatedByKey: "cinder-dynamic-provisioner",
2018-01-09 18:57:14 +00:00
},
},
Spec: v1.PersistentVolumeSpec{
PersistentVolumeReclaimPolicy: c.options.PersistentVolumeReclaimPolicy,
AccessModes: c.options.PVC.Spec.AccessModes,
Capacity: v1.ResourceList{
v1.ResourceName(v1.ResourceStorage): resource.MustParse(fmt.Sprintf("%dGi", sizeGB)),
},
2018-11-26 18:23:56 +00:00
VolumeMode: volumeMode,
2018-01-09 18:57:14 +00:00
PersistentVolumeSource: v1.PersistentVolumeSource{
2018-07-18 14:47:22 +00:00
Cinder: &v1.CinderPersistentVolumeSource{
2018-01-09 18:57:14 +00:00
VolumeID: volumeID,
FSType: fstype,
ReadOnly: false,
},
},
MountOptions: c.options.MountOptions,
},
}
if len(c.options.PVC.Spec.AccessModes) == 0 {
pv.Spec.AccessModes = c.plugin.GetAccessModes()
}
2018-11-26 18:23:56 +00:00
if utilfeature.DefaultFeatureGate.Enabled(features.VolumeScheduling) {
requirements := make([]v1.NodeSelectorRequirement, 0)
for k, v := range labels {
if v != "" {
requirements = append(requirements, v1.NodeSelectorRequirement{Key: k, Operator: v1.NodeSelectorOpIn, Values: []string{v}})
}
}
if len(requirements) > 0 {
pv.Spec.NodeAffinity = new(v1.VolumeNodeAffinity)
pv.Spec.NodeAffinity.Required = new(v1.NodeSelector)
pv.Spec.NodeAffinity.Required.NodeSelectorTerms = make([]v1.NodeSelectorTerm, 1)
pv.Spec.NodeAffinity.Required.NodeSelectorTerms[0].MatchExpressions = requirements
}
}
2018-01-09 18:57:14 +00:00
return pv, nil
}
2018-07-18 14:47:22 +00:00
func getVolumeInfo(spec *volume.Spec) (string, string, bool, error) {
2018-01-09 18:57:14 +00:00
if spec.Volume != nil && spec.Volume.Cinder != nil {
2018-07-18 14:47:22 +00:00
return spec.Volume.Cinder.VolumeID, spec.Volume.Cinder.FSType, spec.Volume.Cinder.ReadOnly, nil
2018-01-09 18:57:14 +00:00
} else if spec.PersistentVolume != nil &&
spec.PersistentVolume.Spec.Cinder != nil {
2018-07-18 14:47:22 +00:00
return spec.PersistentVolume.Spec.Cinder.VolumeID, spec.PersistentVolume.Spec.Cinder.FSType, spec.ReadOnly, nil
2018-01-09 18:57:14 +00:00
}
2018-07-18 14:47:22 +00:00
return "", "", false, fmt.Errorf("Spec does not reference a Cinder volume type")
2018-01-09 18:57:14 +00:00
}