2019-05-28 19:03:18 +00:00
|
|
|
/*
|
|
|
|
Copyright 2019 The Ceph-CSI Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package cephfs
|
|
|
|
|
|
|
|
import (
|
2019-08-22 17:19:06 +00:00
|
|
|
"context"
|
2020-06-25 08:35:19 +00:00
|
|
|
"errors"
|
2020-08-07 07:07:36 +00:00
|
|
|
"fmt"
|
2019-08-22 17:19:06 +00:00
|
|
|
|
2020-04-17 09:23:49 +00:00
|
|
|
"github.com/ceph/ceph-csi/internal/util"
|
2020-08-07 07:07:36 +00:00
|
|
|
|
|
|
|
"github.com/golang/protobuf/ptypes/timestamp"
|
2019-05-28 19:03:18 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// volumeIdentifier structure contains an association between the CSI VolumeID to its subvolume
|
2020-07-19 12:21:03 +00:00
|
|
|
// name on the backing CephFS instance.
|
2019-05-28 19:03:18 +00:00
|
|
|
type volumeIdentifier struct {
|
|
|
|
FsSubvolName string
|
|
|
|
VolumeID string
|
|
|
|
}
|
|
|
|
|
2020-08-07 07:07:36 +00:00
|
|
|
type snapshotIdentifier struct {
|
|
|
|
FsSnapshotName string
|
|
|
|
SnapshotID string
|
|
|
|
RequestName string
|
|
|
|
CreationTime *timestamp.Timestamp
|
|
|
|
FsSubvolName string
|
|
|
|
}
|
|
|
|
|
2019-05-28 19:03:18 +00:00
|
|
|
/*
|
|
|
|
checkVolExists checks to determine if passed in RequestName in volOptions exists on the backend.
|
|
|
|
|
|
|
|
**NOTE:** These functions manipulate the rados omaps that hold information regarding
|
|
|
|
volume names as requested by the CSI drivers. Hence, these need to be invoked only when the
|
|
|
|
respective CSI driver generated volume name based locks are held, as otherwise racy
|
|
|
|
access to these omaps may end up leaving them in an inconsistent state.
|
|
|
|
|
|
|
|
These functions also cleanup omap reservations that are stale. I.e when omap entries exist and
|
|
|
|
backing subvolumes are missing, or one of the omaps exist and the next is missing. This is
|
|
|
|
because, the order of omap creation and deletion are inverse of each other, and protected by the
|
|
|
|
request name lock, and hence any stale omaps are leftovers from incomplete transactions and are
|
|
|
|
hence safe to garbage collect.
|
|
|
|
*/
|
2020-08-07 07:07:36 +00:00
|
|
|
// nolint:gocognit:gocyclo // TODO: reduce complexity
|
|
|
|
func checkVolExists(ctx context.Context,
|
|
|
|
volOptions,
|
|
|
|
parentVolOpt *volumeOptions,
|
|
|
|
|
|
|
|
pvID *volumeIdentifier,
|
|
|
|
sID *snapshotIdentifier,
|
|
|
|
cr *util.Credentials) (*volumeIdentifier, error) {
|
2020-01-24 16:26:56 +00:00
|
|
|
var vid volumeIdentifier
|
2020-06-01 13:57:51 +00:00
|
|
|
// Connect to cephfs' default radosNamespace (csi)
|
|
|
|
j, err := volJournal.Connect(volOptions.Monitors, radosNamespace, cr)
|
2020-05-12 21:05:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer j.Destroy()
|
|
|
|
|
|
|
|
imageData, err := j.CheckReservation(
|
|
|
|
ctx, volOptions.MetadataPool, volOptions.RequestName, volOptions.NamePrefix, "", "")
|
2019-05-28 19:03:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-01-24 16:26:56 +00:00
|
|
|
if imageData == nil {
|
2019-05-28 19:03:18 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
2020-01-24 16:26:56 +00:00
|
|
|
imageUUID := imageData.ImageUUID
|
|
|
|
vid.FsSubvolName = imageData.ImageAttributes.ImageName
|
2019-05-28 19:03:18 +00:00
|
|
|
|
2020-08-07 07:07:36 +00:00
|
|
|
if sID != nil || pvID != nil {
|
2020-11-04 10:28:06 +00:00
|
|
|
cloneState, cloneStateErr := volOptions.getCloneState(ctx, volumeID(vid.FsSubvolName))
|
2020-11-04 08:10:39 +00:00
|
|
|
if cloneStateErr != nil {
|
|
|
|
if errors.Is(cloneStateErr, ErrVolumeNotFound) {
|
2020-08-07 07:07:36 +00:00
|
|
|
if pvID != nil {
|
|
|
|
err = cleanupCloneFromSubvolumeSnapshot(
|
|
|
|
ctx, volumeID(pvID.FsSubvolName),
|
|
|
|
volumeID(vid.FsSubvolName),
|
|
|
|
parentVolOpt,
|
|
|
|
cr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
|
|
|
volOptions.MetadataPool, vid.FsSubvolName, volOptions.RequestName)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-10-28 14:20:41 +00:00
|
|
|
if cloneState == cephFSCloneInprogress {
|
2020-08-07 07:07:36 +00:00
|
|
|
return nil, ErrCloneInProgress
|
|
|
|
}
|
2020-10-28 14:20:41 +00:00
|
|
|
if cloneState == cephFSClonePending {
|
2020-11-09 06:00:18 +00:00
|
|
|
return nil, ErrClonePending
|
|
|
|
}
|
2020-10-28 14:20:41 +00:00
|
|
|
if cloneState == cephFSCloneFailed {
|
2020-08-07 07:07:36 +00:00
|
|
|
err = purgeVolume(ctx, volumeID(vid.FsSubvolName), cr, volOptions, true)
|
|
|
|
if err != nil {
|
2020-08-11 12:07:45 +00:00
|
|
|
util.ErrorLog(ctx, "failed to delete volume %s: %v", vid.FsSubvolName, err)
|
2020-08-07 07:07:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if pvID != nil {
|
|
|
|
err = cleanupCloneFromSubvolumeSnapshot(
|
|
|
|
ctx, volumeID(pvID.FsSubvolName),
|
|
|
|
volumeID(vid.FsSubvolName),
|
|
|
|
parentVolOpt,
|
|
|
|
cr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2020-05-12 21:05:55 +00:00
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
2020-01-24 16:26:56 +00:00
|
|
|
volOptions.MetadataPool, vid.FsSubvolName, volOptions.RequestName)
|
2020-02-24 05:29:08 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2020-10-28 14:20:41 +00:00
|
|
|
if cloneState != cephFSCloneComplete {
|
2020-08-07 07:07:36 +00:00
|
|
|
return nil, fmt.Errorf("clone is not in complete state for %s", vid.FsSubvolName)
|
|
|
|
}
|
|
|
|
} else {
|
2020-11-30 09:30:01 +00:00
|
|
|
_, err = volOptions.getVolumeRootPathCeph(ctx, volumeID(vid.FsSubvolName))
|
2020-08-07 07:07:36 +00:00
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, ErrVolumeNotFound) {
|
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
|
|
|
volOptions.MetadataPool, vid.FsSubvolName, volOptions.RequestName)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-02-24 05:29:08 +00:00
|
|
|
}
|
2020-01-24 16:26:56 +00:00
|
|
|
|
|
|
|
// check if topology constraints match what is found
|
|
|
|
// TODO: we need an API to fetch subvolume attributes (size/datapool and others), based
|
|
|
|
// on which we can evaluate which topology this belongs to.
|
|
|
|
// TODO: CephFS topology support is postponed till we get the same
|
2019-05-28 19:03:18 +00:00
|
|
|
// TODO: size checks
|
|
|
|
|
|
|
|
// found a volume already available, process and return it!
|
2020-01-24 16:26:56 +00:00
|
|
|
vid.VolumeID, err = util.GenerateVolID(ctx, volOptions.Monitors, cr, volOptions.FscID,
|
|
|
|
"", volOptions.ClusterID, imageUUID, volIDVersion)
|
2019-05-28 19:03:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-07-09 14:48:24 +00:00
|
|
|
util.DebugLog(ctx, "Found existing volume (%s) with subvolume name (%s) for request (%s)",
|
2019-05-28 19:03:18 +00:00
|
|
|
vid.VolumeID, vid.FsSubvolName, volOptions.RequestName)
|
|
|
|
|
2020-08-07 07:07:36 +00:00
|
|
|
if parentVolOpt != nil && pvID != nil {
|
|
|
|
err = cleanupCloneFromSubvolumeSnapshot(ctx, volumeID(pvID.FsSubvolName), volumeID(vid.FsSubvolName), parentVolOpt, cr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-28 19:03:18 +00:00
|
|
|
return &vid, nil
|
|
|
|
}
|
|
|
|
|
2020-07-19 12:21:03 +00:00
|
|
|
// undoVolReservation is a helper routine to undo a name reservation for a CSI VolumeName.
|
2019-08-22 17:19:06 +00:00
|
|
|
func undoVolReservation(ctx context.Context, volOptions *volumeOptions, vid volumeIdentifier, secret map[string]string) error {
|
2019-06-25 19:29:17 +00:00
|
|
|
cr, err := util.NewAdminCredentials(secret)
|
2019-05-28 19:03:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-06-25 19:29:17 +00:00
|
|
|
defer cr.DeleteCredentials()
|
2019-05-28 19:03:18 +00:00
|
|
|
|
2020-06-01 13:57:51 +00:00
|
|
|
// Connect to cephfs' default radosNamespace (csi)
|
|
|
|
j, err := volJournal.Connect(volOptions.Monitors, radosNamespace, cr)
|
2020-05-12 21:05:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer j.Destroy()
|
|
|
|
|
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
2020-01-24 16:26:56 +00:00
|
|
|
volOptions.MetadataPool, vid.FsSubvolName, volOptions.RequestName)
|
2019-05-28 19:03:18 +00:00
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-01-24 16:26:56 +00:00
|
|
|
func updateTopologyConstraints(volOpts *volumeOptions) error {
|
|
|
|
// update request based on topology constrained parameters (if present)
|
2020-04-06 20:19:13 +00:00
|
|
|
poolName, _, topology, err := util.FindPoolAndTopology(volOpts.TopologyPools, volOpts.TopologyRequirement)
|
2020-01-24 16:26:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if poolName != "" {
|
|
|
|
volOpts.Pool = poolName
|
|
|
|
volOpts.Topology = topology
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-28 19:03:18 +00:00
|
|
|
// reserveVol is a helper routine to request a UUID reservation for the CSI VolumeName and,
|
2020-07-19 12:21:03 +00:00
|
|
|
// to generate the volume identifier for the reserved UUID.
|
2019-08-22 17:19:06 +00:00
|
|
|
func reserveVol(ctx context.Context, volOptions *volumeOptions, secret map[string]string) (*volumeIdentifier, error) {
|
2019-05-28 19:03:18 +00:00
|
|
|
var (
|
2020-02-24 13:19:42 +00:00
|
|
|
vid volumeIdentifier
|
|
|
|
imageUUID string
|
|
|
|
err error
|
2019-05-28 19:03:18 +00:00
|
|
|
)
|
|
|
|
|
2019-06-25 19:29:17 +00:00
|
|
|
cr, err := util.NewAdminCredentials(secret)
|
2019-05-28 19:03:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-06-25 19:29:17 +00:00
|
|
|
defer cr.DeleteCredentials()
|
2019-05-28 19:03:18 +00:00
|
|
|
|
2020-01-24 16:26:56 +00:00
|
|
|
err = updateTopologyConstraints(volOptions)
|
2019-05-28 19:03:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-06-01 13:57:51 +00:00
|
|
|
// Connect to cephfs' default radosNamespace (csi)
|
|
|
|
j, err := volJournal.Connect(volOptions.Monitors, radosNamespace, cr)
|
2020-05-12 21:05:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer j.Destroy()
|
|
|
|
|
|
|
|
imageUUID, vid.FsSubvolName, err = j.ReserveName(
|
|
|
|
ctx, volOptions.MetadataPool, util.InvalidPoolID,
|
|
|
|
volOptions.MetadataPool, util.InvalidPoolID, volOptions.RequestName,
|
2020-10-09 11:38:59 +00:00
|
|
|
volOptions.NamePrefix, "", "", volOptions.ReservedID)
|
2020-01-24 16:26:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2019-05-28 19:03:18 +00:00
|
|
|
}
|
2020-01-24 16:26:56 +00:00
|
|
|
|
|
|
|
// generate the volume ID to return to the CO system
|
|
|
|
vid.VolumeID, err = util.GenerateVolID(ctx, volOptions.Monitors, cr, volOptions.FscID,
|
|
|
|
"", volOptions.ClusterID, imageUUID, volIDVersion)
|
2019-05-28 19:03:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-07-09 14:48:24 +00:00
|
|
|
util.DebugLog(ctx, "Generated Volume ID (%s) and subvolume name (%s) for request name (%s)",
|
2019-05-28 19:03:18 +00:00
|
|
|
vid.VolumeID, vid.FsSubvolName, volOptions.RequestName)
|
|
|
|
|
|
|
|
return &vid, nil
|
|
|
|
}
|
2020-08-04 04:14:56 +00:00
|
|
|
|
|
|
|
// reserveSnap is a helper routine to request a UUID reservation for the CSI SnapName and,
|
|
|
|
// to generate the snapshot identifier for the reserved UUID.
|
|
|
|
func reserveSnap(ctx context.Context, volOptions *volumeOptions, parentSubVolName string, snap *cephfsSnapshot, cr *util.Credentials) (*snapshotIdentifier, error) {
|
|
|
|
var (
|
|
|
|
vid snapshotIdentifier
|
|
|
|
imageUUID string
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
2020-06-01 13:57:51 +00:00
|
|
|
// Connect to cephfs' default radosNamespace (csi)
|
|
|
|
j, err := snapJournal.Connect(volOptions.Monitors, radosNamespace, cr)
|
2020-08-04 04:14:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer j.Destroy()
|
|
|
|
|
|
|
|
imageUUID, vid.FsSnapshotName, err = j.ReserveName(
|
|
|
|
ctx, volOptions.MetadataPool, util.InvalidPoolID,
|
|
|
|
volOptions.MetadataPool, util.InvalidPoolID, snap.RequestName,
|
2020-10-09 11:38:59 +00:00
|
|
|
snap.NamePrefix, parentSubVolName, "", snap.ReservedID)
|
2020-08-04 04:14:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// generate the snapshot ID to return to the CO system
|
|
|
|
vid.SnapshotID, err = util.GenerateVolID(ctx, volOptions.Monitors, cr, volOptions.FscID,
|
|
|
|
"", volOptions.ClusterID, imageUUID, volIDVersion)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
util.DebugLog(ctx, "Generated Snapshot ID (%s) for request name (%s)",
|
|
|
|
vid.SnapshotID, snap.RequestName)
|
|
|
|
|
|
|
|
return &vid, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// undoSnapReservation is a helper routine to undo a name reservation for a CSI SnapshotName.
|
|
|
|
func undoSnapReservation(ctx context.Context, volOptions *volumeOptions, vid snapshotIdentifier, snapName string, cr *util.Credentials) error {
|
2020-06-01 13:57:51 +00:00
|
|
|
// Connect to cephfs' default radosNamespace (csi)
|
|
|
|
j, err := snapJournal.Connect(volOptions.Monitors, radosNamespace, cr)
|
2020-08-04 04:14:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer j.Destroy()
|
|
|
|
|
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
|
|
|
volOptions.MetadataPool, vid.FsSnapshotName, snapName)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
checkSnapExists checks to determine if passed in RequestName in volOptions exists on the backend.
|
|
|
|
|
|
|
|
**NOTE:** These functions manipulate the rados omaps that hold information regarding
|
|
|
|
volume names as requested by the CSI drivers. Hence, these need to be invoked only when the
|
|
|
|
respective CSI driver generated volume name based locks are held, as otherwise racy
|
|
|
|
access to these omaps may end up leaving them in an inconsistent state.
|
|
|
|
|
|
|
|
These functions also cleanup omap reservations that are stale. I.e when omap entries exist and
|
|
|
|
backing subvolumes are missing, or one of the omaps exist and the next is missing. This is
|
|
|
|
because, the order of omap creation and deletion are inverse of each other, and protected by the
|
|
|
|
request name lock, and hence any stale omaps are leftovers from incomplete transactions and are
|
|
|
|
hence safe to garbage collect.
|
|
|
|
*/
|
|
|
|
func checkSnapExists(
|
|
|
|
ctx context.Context,
|
|
|
|
volOptions *volumeOptions,
|
|
|
|
parentSubVolName string,
|
|
|
|
snap *cephfsSnapshot,
|
|
|
|
cr *util.Credentials) (*snapshotIdentifier, *snapshotInfo, error) {
|
2020-06-01 13:57:51 +00:00
|
|
|
// Connect to cephfs' default radosNamespace (csi)
|
|
|
|
j, err := snapJournal.Connect(volOptions.Monitors, radosNamespace, cr)
|
2020-08-04 04:14:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
defer j.Destroy()
|
|
|
|
|
|
|
|
snapData, err := j.CheckReservation(
|
|
|
|
ctx, volOptions.MetadataPool, snap.RequestName, snap.NamePrefix, parentSubVolName, "")
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
if snapData == nil {
|
|
|
|
return nil, nil, nil
|
|
|
|
}
|
|
|
|
sid := &snapshotIdentifier{}
|
|
|
|
snapUUID := snapData.ImageUUID
|
|
|
|
snapID := snapData.ImageAttributes.ImageName
|
|
|
|
sid.FsSnapshotName = snapData.ImageAttributes.ImageName
|
|
|
|
snapInfo, err := getSnapshotInfo(ctx, volOptions, cr, volumeID(snapID), volumeID(parentSubVolName))
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, ErrSnapNotFound) {
|
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
|
|
|
volOptions.MetadataPool, snapID, snap.RequestName)
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
err = deleteSnapshot(ctx, volOptions, cr, volumeID(snapID), volumeID(parentSubVolName))
|
|
|
|
if err != nil {
|
2020-08-11 12:09:10 +00:00
|
|
|
util.ErrorLog(ctx, "failed to delete snapshot %s: %v", snapID, err)
|
2020-08-04 04:14:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
err = j.UndoReservation(ctx, volOptions.MetadataPool,
|
|
|
|
volOptions.MetadataPool, snapID, snap.RequestName)
|
|
|
|
if err != nil {
|
2020-08-11 12:09:10 +00:00
|
|
|
util.ErrorLog(ctx, "removing reservation failed for snapshot %s: %v", snapID, err)
|
2020-08-04 04:14:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
tm, err := parseTime(ctx, snapInfo.CreatedAt)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sid.CreationTime = tm
|
|
|
|
// found a snapshot already available, process and return it!
|
|
|
|
sid.SnapshotID, err = util.GenerateVolID(ctx, volOptions.Monitors, cr, volOptions.FscID,
|
|
|
|
"", volOptions.ClusterID, snapUUID, volIDVersion)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
util.DebugLog(ctx, "Found existing snapshot (%s) with subvolume name (%s) for request (%s)",
|
|
|
|
snapData.ImageAttributes.RequestName, parentSubVolName, sid.FsSnapshotName)
|
|
|
|
|
|
|
|
return sid, &snapInfo, nil
|
|
|
|
}
|