2024-07-09 15:27:08 +00:00
|
|
|
/*
|
|
|
|
Copyright 2024 The Ceph-CSI Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package rbd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
2024-07-22 15:51:17 +00:00
|
|
|
"fmt"
|
2024-07-09 15:27:08 +00:00
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
"github.com/ceph/ceph-csi/internal/journal"
|
2024-07-19 18:22:53 +00:00
|
|
|
rbd_group "github.com/ceph/ceph-csi/internal/rbd/group"
|
2024-07-09 15:27:08 +00:00
|
|
|
"github.com/ceph/ceph-csi/internal/rbd/types"
|
|
|
|
"github.com/ceph/ceph-csi/internal/util"
|
2024-07-22 15:51:17 +00:00
|
|
|
"github.com/ceph/ceph-csi/internal/util/log"
|
2024-07-09 15:27:08 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ types.Manager = &rbdManager{}
|
|
|
|
|
|
|
|
type rbdManager struct {
|
2024-07-22 15:51:17 +00:00
|
|
|
// csiID is the instance id of the CSI-driver (driver name).
|
|
|
|
csiID string
|
|
|
|
// parameters can contain the parameters of a create request.
|
2024-07-09 15:27:08 +00:00
|
|
|
parameters map[string]string
|
2024-07-22 15:51:17 +00:00
|
|
|
// secrets contain the credentials to connect to the Ceph cluster.
|
|
|
|
secrets map[string]string
|
2024-07-09 15:27:08 +00:00
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
// creds are the cached credentials, will be freed on Destroy()
|
2024-07-09 15:27:08 +00:00
|
|
|
creds *util.Credentials
|
2024-07-22 15:51:17 +00:00
|
|
|
// vgJournal is the journal that is used during opetations, it will be freed on Destroy().
|
|
|
|
vgJournal journal.VolumeGroupJournal
|
2024-07-09 15:27:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewManager returns a new manager for handling Volume and Volume Group
|
|
|
|
// operations, combining the requests for RBD and the journalling in RADOS.
|
2024-07-22 15:51:17 +00:00
|
|
|
func NewManager(csiID string, parameters, secrets map[string]string) types.Manager {
|
2024-07-09 15:27:08 +00:00
|
|
|
return &rbdManager{
|
2024-07-22 15:51:17 +00:00
|
|
|
csiID: csiID,
|
2024-07-09 15:27:08 +00:00
|
|
|
parameters: parameters,
|
|
|
|
secrets: secrets,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mgr *rbdManager) Destroy(ctx context.Context) {
|
|
|
|
if mgr.creds != nil {
|
|
|
|
mgr.creds.DeleteCredentials()
|
|
|
|
mgr.creds = nil
|
|
|
|
}
|
2024-07-22 15:51:17 +00:00
|
|
|
|
|
|
|
if mgr.vgJournal != nil {
|
|
|
|
mgr.vgJournal.Destroy()
|
|
|
|
mgr.vgJournal = nil
|
|
|
|
}
|
2024-07-09 15:27:08 +00:00
|
|
|
}
|
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
// getCredentials sets up credentials and connects to the journal.
|
|
|
|
func (mgr *rbdManager) getCredentials() (*util.Credentials, error) {
|
|
|
|
if mgr.creds != nil {
|
|
|
|
return mgr.creds, nil
|
|
|
|
}
|
2024-07-09 15:27:08 +00:00
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
creds, err := util.NewUserCredentials(mgr.secrets)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to get credentials: %w", err)
|
2024-07-09 15:27:08 +00:00
|
|
|
}
|
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
mgr.creds = creds
|
|
|
|
|
|
|
|
return creds, nil
|
2024-07-09 15:27:08 +00:00
|
|
|
}
|
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
func (mgr *rbdManager) getVolumeGroupJournal(clusterID string) (journal.VolumeGroupJournal, error) {
|
|
|
|
if mgr.vgJournal != nil {
|
|
|
|
return mgr.vgJournal, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
creds, err := mgr.getCredentials()
|
|
|
|
if err != nil {
|
2024-07-09 15:27:08 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
monitors, err := util.Mons(util.CsiConfigFile, clusterID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to find MONs for cluster %q: %w", clusterID, err)
|
|
|
|
}
|
|
|
|
|
2024-06-05 05:34:58 +00:00
|
|
|
ns, err := util.GetRBDRadosNamespace(util.CsiConfigFile, clusterID)
|
2024-07-22 15:51:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to find the RADOS namespace for cluster %q: %w", clusterID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
vgJournalConfig := journal.NewCSIVolumeGroupJournalWithNamespace(mgr.csiID, ns)
|
|
|
|
|
|
|
|
vgJournal, err := vgJournalConfig.Connect(monitors, ns, creds)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to connect to journal: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
mgr.vgJournal = vgJournal
|
|
|
|
|
|
|
|
return vgJournal, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mgr *rbdManager) GetVolumeByID(ctx context.Context, id string) (types.Volume, error) {
|
|
|
|
creds, err := mgr.getCredentials()
|
2024-07-09 15:27:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-07-22 15:51:17 +00:00
|
|
|
volume, err := GenVolFromVolID(ctx, id, creds, mgr.secrets)
|
|
|
|
if err != nil {
|
2024-07-29 10:51:32 +00:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, ErrImageNotFound):
|
|
|
|
err = fmt.Errorf("volume %s not found: %w", id, err)
|
|
|
|
|
|
|
|
return nil, err
|
|
|
|
case errors.Is(err, util.ErrPoolNotFound):
|
|
|
|
err = fmt.Errorf("pool %s not found for %s: %w", volume.Pool, id, err)
|
|
|
|
|
|
|
|
return nil, err
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("failed to get volume from id %q: %w", id, err)
|
|
|
|
}
|
2024-07-22 15:51:17 +00:00
|
|
|
}
|
|
|
|
|
2024-07-09 15:27:08 +00:00
|
|
|
return volume, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mgr *rbdManager) GetVolumeGroupByID(ctx context.Context, id string) (types.VolumeGroup, error) {
|
2024-07-22 15:51:17 +00:00
|
|
|
creds, err := mgr.getCredentials()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-10-01 07:35:50 +00:00
|
|
|
vg, err := rbd_group.GetVolumeGroup(ctx, id, mgr.csiID, creds, mgr)
|
2024-07-22 15:51:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to get volume group with id %q: %w", id, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return vg, nil
|
2024-07-09 15:27:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (mgr *rbdManager) CreateVolumeGroup(ctx context.Context, name string) (types.VolumeGroup, error) {
|
2024-07-22 15:51:17 +00:00
|
|
|
creds, err := mgr.getCredentials()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
clusterID, err := util.GetClusterID(mgr.parameters)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to get cluster-id: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
vgJournal, err := mgr.getVolumeGroupJournal(clusterID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// pool is a required parameter
|
|
|
|
pool, ok := mgr.parameters["pool"]
|
|
|
|
if !ok || pool == "" {
|
|
|
|
return nil, errors.New("required 'pool' option missing in volume group parameters")
|
|
|
|
}
|
|
|
|
|
|
|
|
// journalPool is an optional parameter, use pool if it is not set
|
|
|
|
journalPool, ok := mgr.parameters["journalPool"]
|
|
|
|
if !ok || journalPool == "" {
|
|
|
|
journalPool = pool
|
|
|
|
}
|
|
|
|
|
|
|
|
// volumeNamePrefix is an optional parameter, can be an empty string
|
|
|
|
prefix := mgr.parameters["volumeNamePrefix"]
|
|
|
|
|
|
|
|
// check if the journal contains a generated name for the group already
|
|
|
|
vgData, err := vgJournal.CheckReservation(ctx, journalPool, name, prefix)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to reserve volume group for name %q: %w", name, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var uuid string
|
2024-07-25 09:02:48 +00:00
|
|
|
if vgData != nil && vgData.GroupUUID != "" {
|
2024-07-22 15:51:17 +00:00
|
|
|
uuid = vgData.GroupUUID
|
|
|
|
} else {
|
|
|
|
log.DebugLog(ctx, "the journal does not contain a reservation for a volume group with name %q yet", name)
|
|
|
|
|
|
|
|
var vgName string
|
|
|
|
uuid, vgName, err = vgJournal.ReserveName(ctx, journalPool, name, prefix)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to reserve volume group for name %q: %w", name, err)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
err = vgJournal.UndoReservation(ctx, pool, vgName, name)
|
|
|
|
if err != nil {
|
|
|
|
log.ErrorLog(ctx, "failed to undo the reservation for volume group %q: %w", name, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
monitors, err := util.Mons(util.CsiConfigFile, clusterID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to find MONs for cluster %q: %w", clusterID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_ /*journalPoolID*/, poolID, err := util.GetPoolIDs(ctx, monitors, journalPool, pool, creds)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to generate a unique CSI volume group with uuid for %q: %w", uuid, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
csiID, err := util.GenerateVolID(ctx, monitors, creds, poolID, pool, clusterID, uuid)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to generate a unique CSI volume group with uuid for %q: %w", uuid, err)
|
|
|
|
}
|
|
|
|
|
2024-10-01 07:35:50 +00:00
|
|
|
vg, err := rbd_group.GetVolumeGroup(ctx, csiID, mgr.csiID, creds, mgr)
|
2024-07-22 15:51:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to get volume group %q at cluster %q: %w", name, clusterID, err)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
vg.Destroy(ctx)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2024-07-22 14:59:07 +00:00
|
|
|
err = vg.Create(ctx)
|
2024-07-22 15:51:17 +00:00
|
|
|
if err != nil {
|
2024-07-22 14:59:07 +00:00
|
|
|
return nil, fmt.Errorf("failed to create volume group %q: %w", name, err)
|
2024-07-22 15:51:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return vg, nil
|
2024-07-09 15:27:08 +00:00
|
|
|
}
|