mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-18 02:50:30 +00:00
rbd: add support to expand encrypted volume
Previously in ControllerExpandVolume() we had a check for encrypted volumes and we use to fail for all expand requests on an encrypted volume. Also for Block VolumeMode PVCs NodeExpandVolume used to be ignored/skipped. With these changes, we add support for the expansion of encrypted volumes. Also for raw Block VolumeMode PVCs with Encryption we call NodeExpandVolume. That said, With LUKS1, cryptsetup utility doesn't prompt for a passphrase on resizing the crypto mapper device. This is because LUKS1 devices don't use kernel keyring for volume keys. Whereas, LUKS2 devices use kernel keyring for volume key by default, i.e. cryptsetup utility asks for a passphrase if it detects volume key was previously passed to dm-crypt via kernel keyring service, we are overriding the default by --disable-keyring option during cryptsetup open command. So that at the time of crypto mapper device resize we will not be prompted for any passphrase. Fixes: #1469 Signed-off-by: Prasanna Kumar Kalever <prasanna.kalever@redhat.com>
This commit is contained in:
parent
4fa05cb3a1
commit
526ff95f10
@ -1355,12 +1355,6 @@ func (cs *ControllerServer) ControllerExpandVolume(
|
|||||||
return nil, status.Error(codes.InvalidArgument, "capacityRange cannot be empty")
|
return nil, status.Error(codes.InvalidArgument, "capacityRange cannot be empty")
|
||||||
}
|
}
|
||||||
|
|
||||||
nodeExpansion := false
|
|
||||||
// Get the nodeexpansion flag set based on the volume mode
|
|
||||||
if req.GetVolumeCapability().GetBlock() == nil {
|
|
||||||
nodeExpansion = true
|
|
||||||
}
|
|
||||||
|
|
||||||
// lock out parallel requests against the same volume ID
|
// lock out parallel requests against the same volume ID
|
||||||
if acquired := cs.VolumeLocks.TryAcquire(volID); !acquired {
|
if acquired := cs.VolumeLocks.TryAcquire(volID); !acquired {
|
||||||
util.ErrorLog(ctx, util.VolumeOperationAlreadyExistsFmt, volID)
|
util.ErrorLog(ctx, util.VolumeOperationAlreadyExistsFmt, volID)
|
||||||
@ -1369,14 +1363,6 @@ func (cs *ControllerServer) ControllerExpandVolume(
|
|||||||
}
|
}
|
||||||
defer cs.VolumeLocks.Release(volID)
|
defer cs.VolumeLocks.Release(volID)
|
||||||
|
|
||||||
// lock out volumeID for clone and delete operation
|
|
||||||
if err := cs.OperationLocks.GetExpandLock(volID); err != nil {
|
|
||||||
util.ErrorLog(ctx, err.Error())
|
|
||||||
|
|
||||||
return nil, status.Error(codes.Aborted, err.Error())
|
|
||||||
}
|
|
||||||
defer cs.OperationLocks.ReleaseExpandLock(volID)
|
|
||||||
|
|
||||||
cr, err := util.NewUserCredentials(req.GetSecrets())
|
cr, err := util.NewUserCredentials(req.GetSecrets())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, status.Error(codes.Internal, err.Error())
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
@ -1399,11 +1385,23 @@ func (cs *ControllerServer) ControllerExpandVolume(
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if rbdVol.isEncrypted() {
|
// NodeExpansion is needed for PersistentVolumes with,
|
||||||
return nil, status.Errorf(codes.InvalidArgument, "encrypted volumes do not support resize (%s)",
|
// 1. Filesystem VolumeMode with & without Encryption and
|
||||||
rbdVol)
|
// 2. Block VolumeMode with Encryption
|
||||||
|
// Hence set nodeExpansion flag based on VolumeMode and Encryption status
|
||||||
|
nodeExpansion := true
|
||||||
|
if req.GetVolumeCapability().GetBlock() != nil && !rbdVol.isEncrypted() {
|
||||||
|
nodeExpansion = false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// lock out volumeID for clone and delete operation
|
||||||
|
if err = cs.OperationLocks.GetExpandLock(volID); err != nil {
|
||||||
|
util.ErrorLog(ctx, err.Error())
|
||||||
|
|
||||||
|
return nil, status.Error(codes.Aborted, err.Error())
|
||||||
|
}
|
||||||
|
defer cs.OperationLocks.ReleaseExpandLock(volID)
|
||||||
|
|
||||||
// always round up the request size in bytes to the nearest MiB/GiB
|
// always round up the request size in bytes to the nearest MiB/GiB
|
||||||
volSize := util.RoundOffBytes(req.GetCapacityRange().GetRequiredBytes())
|
volSize := util.RoundOffBytes(req.GetCapacityRange().GetRequiredBytes())
|
||||||
|
|
||||||
|
@ -875,38 +875,49 @@ func (ns *NodeServer) NodeExpandVolume(
|
|||||||
}
|
}
|
||||||
defer ns.VolumeLocks.Release(volumeID)
|
defer ns.VolumeLocks.Release(volumeID)
|
||||||
|
|
||||||
devicePath, err := getDevicePath(ctx, volumePath)
|
|
||||||
if err != nil {
|
|
||||||
return nil, status.Error(codes.Internal, err.Error())
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO check size and return success or error
|
|
||||||
volumePath += "/" + volumeID
|
|
||||||
resizer := mount.NewResizeFs(utilexec.New())
|
|
||||||
ok, err := resizer.Resize(devicePath, volumePath)
|
|
||||||
if !ok {
|
|
||||||
return nil, status.Errorf(codes.Internal, "rbd: resize failed on path %s, error: %v", req.GetVolumePath(), err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return &csi.NodeExpandVolumeResponse{}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDevicePath(ctx context.Context, volumePath string) (string, error) {
|
|
||||||
imgInfo, err := lookupRBDImageMetadataStash(volumePath)
|
imgInfo, err := lookupRBDImageMetadataStash(volumePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
util.ErrorLog(ctx, "failed to find image metadata: %v", err)
|
util.ErrorLog(ctx, "failed to find image metadata: %v", err)
|
||||||
}
|
}
|
||||||
device, found := findDeviceMappingImage(
|
devicePath, found := findDeviceMappingImage(
|
||||||
ctx,
|
ctx,
|
||||||
imgInfo.Pool,
|
imgInfo.Pool,
|
||||||
imgInfo.RadosNamespace,
|
imgInfo.RadosNamespace,
|
||||||
imgInfo.ImageName,
|
imgInfo.ImageName,
|
||||||
imgInfo.NbdAccess)
|
imgInfo.NbdAccess)
|
||||||
if found {
|
if !found {
|
||||||
return device, nil
|
return nil, status.Errorf(codes.Internal,
|
||||||
|
"failed to get device for stagingtarget path %v", volumePath)
|
||||||
}
|
}
|
||||||
|
|
||||||
return "", fmt.Errorf("failed to get device for stagingtarget path %v", volumePath)
|
mapperFile, mapperPath := util.VolumeMapper(volumeID)
|
||||||
|
if imgInfo.Encrypted {
|
||||||
|
// The volume is encrypted, resize an active mapping
|
||||||
|
err = util.ResizeEncryptedVolume(ctx, mapperFile)
|
||||||
|
if err != nil {
|
||||||
|
util.ErrorLog(ctx, "failed to resize device %s, mapper %s: %w",
|
||||||
|
devicePath, mapperFile, err)
|
||||||
|
|
||||||
|
return nil, status.Errorf(codes.Internal,
|
||||||
|
"failed to resize device %s, mapper %s: %v", devicePath, mapperFile, err)
|
||||||
|
}
|
||||||
|
// Use mapper device path for fs resize
|
||||||
|
devicePath = mapperPath
|
||||||
|
}
|
||||||
|
|
||||||
|
if req.GetVolumeCapability().GetBlock() == nil {
|
||||||
|
// TODO check size and return success or error
|
||||||
|
volumePath += "/" + volumeID
|
||||||
|
resizer := mount.NewResizeFs(utilexec.New())
|
||||||
|
var ok bool
|
||||||
|
ok, err = resizer.Resize(devicePath, volumePath)
|
||||||
|
if !ok {
|
||||||
|
return nil, status.Errorf(codes.Internal,
|
||||||
|
"rbd: resize failed on path %s, error: %v", req.GetVolumePath(), err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return &csi.NodeExpandVolumeResponse{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// NodeGetCapabilities returns the supported capabilities of the node server.
|
// NodeGetCapabilities returns the supported capabilities of the node server.
|
||||||
|
@ -40,7 +40,9 @@ func LuksFormat(devicePath, passphrase string) (stdout, stderr []byte, err error
|
|||||||
|
|
||||||
// LuksOpen opens LUKS encrypted partition and sets up a mapping.
|
// LuksOpen opens LUKS encrypted partition and sets up a mapping.
|
||||||
func LuksOpen(devicePath, mapperFile, passphrase string) (stdout, stderr []byte, err error) {
|
func LuksOpen(devicePath, mapperFile, passphrase string) (stdout, stderr []byte, err error) {
|
||||||
return execCryptsetupCommand(&passphrase, "luksOpen", devicePath, mapperFile, "-d", "/dev/stdin")
|
// cryptsetup option --disable-keyring (introduced with cryptsetup v2.0.0)
|
||||||
|
// will be ignored with luks1
|
||||||
|
return execCryptsetupCommand(&passphrase, "luksOpen", devicePath, mapperFile, "--disable-keyring", "-d", "/dev/stdin")
|
||||||
}
|
}
|
||||||
|
|
||||||
// LuksResize resizes LUKS encrypted partition.
|
// LuksResize resizes LUKS encrypted partition.
|
||||||
|
Loading…
Reference in New Issue
Block a user