mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-22 14:20:19 +00:00
cleanup: move k8s functions to the util/k8s package
By placing the NewK8sClient() function in its own package, the KMS API can be split from the "internal/util" package. Some of the KMS providers use the NewK8sClient() function, and this causes circular dependencies between "internal/utils" -> "internal/kms" -> "internal/utils", which are not alowed in Go. Updates: #852 Signed-off-by: Niels de Vos <ndevos@redhat.com>
This commit is contained in:
parent
2cc96dc539
commit
778b5e86de
@ -21,6 +21,7 @@ import (
|
|||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"github.com/ceph/ceph-csi/internal/util"
|
"github.com/ceph/ceph-csi/internal/util"
|
||||||
|
kubeclient "github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
"github.com/ceph/ceph-csi/internal/util/log"
|
"github.com/ceph/ceph-csi/internal/util/log"
|
||||||
|
|
||||||
"github.com/container-storage-interface/spec/lib/go/csi"
|
"github.com/container-storage-interface/spec/lib/go/csi"
|
||||||
@ -128,7 +129,7 @@ func callNodeStageVolume(ns *NodeServer, c *k8s.Clientset, pv *v1.PersistentVolu
|
|||||||
|
|
||||||
// runVolumeHealer heal the volumes attached on a node.
|
// runVolumeHealer heal the volumes attached on a node.
|
||||||
func runVolumeHealer(ns *NodeServer, conf *util.Config) error {
|
func runVolumeHealer(ns *NodeServer, conf *util.Config) error {
|
||||||
c := util.NewK8sClient()
|
c := kubeclient.NewK8sClient()
|
||||||
val, err := c.StorageV1().VolumeAttachments().List(context.TODO(), metav1.ListOptions{})
|
val, err := c.StorageV1().VolumeAttachments().List(context.TODO(), metav1.ListOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.ErrorLogMsg("list volumeAttachments failed, err: %v", err)
|
log.ErrorLogMsg("list volumeAttachments failed, err: %v", err)
|
||||||
|
@ -29,6 +29,7 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/ceph/ceph-csi/internal/util"
|
"github.com/ceph/ceph-csi/internal/util"
|
||||||
|
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
"github.com/ceph/ceph-csi/internal/util/log"
|
"github.com/ceph/ceph-csi/internal/util/log"
|
||||||
|
|
||||||
"github.com/ceph/go-ceph/rados"
|
"github.com/ceph/go-ceph/rados"
|
||||||
@ -1063,7 +1064,7 @@ func genVolFromVolID(
|
|||||||
// be the same in the PV.Spec.CSI.VolumeHandle. Check the PV annotation for
|
// be the same in the PV.Spec.CSI.VolumeHandle. Check the PV annotation for
|
||||||
// the new volumeHandle. If the new volumeHandle is found, generate the RBD
|
// the new volumeHandle. If the new volumeHandle is found, generate the RBD
|
||||||
// volume structure from the new volumeHandle.
|
// volume structure from the new volumeHandle.
|
||||||
c := util.NewK8sClient()
|
c := k8s.NewK8sClient()
|
||||||
listOpt := metav1.ListOptions{
|
listOpt := metav1.ListOptions{
|
||||||
LabelSelector: PVReplicatedLabelKey,
|
LabelSelector: PVReplicatedLabelKey,
|
||||||
}
|
}
|
||||||
|
@ -22,6 +22,8 @@ import (
|
|||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
|
|
||||||
"github.com/aws/aws-sdk-go/aws"
|
"github.com/aws/aws-sdk-go/aws"
|
||||||
awsCreds "github.com/aws/aws-sdk-go/aws/credentials"
|
awsCreds "github.com/aws/aws-sdk-go/aws/credentials"
|
||||||
awsSession "github.com/aws/aws-sdk-go/aws/session"
|
awsSession "github.com/aws/aws-sdk-go/aws/session"
|
||||||
@ -123,7 +125,7 @@ func initAWSMetadataKMS(args KMSInitializerArgs) (EncryptionKMS, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (kms *AWSMetadataKMS) getSecrets() (map[string]interface{}, error) {
|
func (kms *AWSMetadataKMS) getSecrets() (map[string]interface{}, error) {
|
||||||
c := NewK8sClient()
|
c := k8s.NewK8sClient()
|
||||||
secret, err := c.CoreV1().Secrets(kms.namespace).Get(context.TODO(),
|
secret, err := c.CoreV1().Secrets(kms.namespace).Get(context.TODO(),
|
||||||
kms.secretName, metav1.GetOptions{})
|
kms.secretName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -14,20 +14,20 @@ See the License for the specific language governing permissions and
|
|||||||
limitations under the License.
|
limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package util
|
package k8s
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
"github.com/ceph/ceph-csi/internal/util/log"
|
"github.com/ceph/ceph-csi/internal/util/log"
|
||||||
|
|
||||||
k8s "k8s.io/client-go/kubernetes"
|
"k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/rest"
|
"k8s.io/client-go/rest"
|
||||||
"k8s.io/client-go/tools/clientcmd"
|
"k8s.io/client-go/tools/clientcmd"
|
||||||
)
|
)
|
||||||
|
|
||||||
// NewK8sClient create kubernetes client.
|
// NewK8sClient create kubernetes client.
|
||||||
func NewK8sClient() *k8s.Clientset {
|
func NewK8sClient() *kubernetes.Clientset {
|
||||||
var cfg *rest.Config
|
var cfg *rest.Config
|
||||||
var err error
|
var err error
|
||||||
cPath := os.Getenv("KUBERNETES_CONFIG_PATH")
|
cPath := os.Getenv("KUBERNETES_CONFIG_PATH")
|
||||||
@ -42,7 +42,7 @@ func NewK8sClient() *k8s.Clientset {
|
|||||||
log.FatalLogMsg("Failed to get cluster config with error: %v\n", err)
|
log.FatalLogMsg("Failed to get cluster config with error: %v\n", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
client, err := k8s.NewForConfig(cfg)
|
client, err := kubernetes.NewForConfig(cfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.FatalLogMsg("Failed to create client with error: %v\n", err)
|
log.FatalLogMsg("Failed to create client with error: %v\n", err)
|
||||||
}
|
}
|
@ -23,6 +23,8 @@ import (
|
|||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -146,7 +148,7 @@ func getKMSConfigMap() (map[string]interface{}, error) {
|
|||||||
}
|
}
|
||||||
cmName := getKMSConfigMapName()
|
cmName := getKMSConfigMapName()
|
||||||
|
|
||||||
c := NewK8sClient()
|
c := k8s.NewK8sClient()
|
||||||
cm, err := c.CoreV1().ConfigMaps(ns).Get(context.Background(),
|
cm, err := c.CoreV1().ConfigMaps(ns).Get(context.Background(),
|
||||||
cmName, metav1.GetOptions{})
|
cmName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -26,6 +26,8 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
|
|
||||||
|
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
|
|
||||||
"golang.org/x/crypto/scrypt"
|
"golang.org/x/crypto/scrypt"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
@ -155,7 +157,7 @@ func (kms SecretsMetadataKMS) fetchEncryptionPassphrase(
|
|||||||
secretNamespace = defaultNamespace
|
secretNamespace = defaultNamespace
|
||||||
}
|
}
|
||||||
|
|
||||||
c := NewK8sClient()
|
c := k8s.NewK8sClient()
|
||||||
secret, err := c.CoreV1().Secrets(secretNamespace).Get(context.TODO(),
|
secret, err := c.CoreV1().Secrets(secretNamespace).Get(context.TODO(),
|
||||||
secretName, metav1.GetOptions{})
|
secretName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -22,6 +22,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
"github.com/ceph/ceph-csi/internal/util/log"
|
"github.com/ceph/ceph-csi/internal/util/log"
|
||||||
|
|
||||||
"github.com/container-storage-interface/spec/lib/go/csi"
|
"github.com/container-storage-interface/spec/lib/go/csi"
|
||||||
@ -34,7 +35,7 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func k8sGetNodeLabels(nodeName string) (map[string]string, error) {
|
func k8sGetNodeLabels(nodeName string) (map[string]string, error) {
|
||||||
client := NewK8sClient()
|
client := k8s.NewK8sClient()
|
||||||
node, err := client.CoreV1().Nodes().Get(context.TODO(), nodeName, metav1.GetOptions{})
|
node, err := client.CoreV1().Nodes().Get(context.TODO(), nodeName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to get node %q information: %w", nodeName, err)
|
return nil, fmt.Errorf("failed to get node %q information: %w", nodeName, err)
|
||||||
|
@ -24,6 +24,8 @@ import (
|
|||||||
"os"
|
"os"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
|
||||||
|
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||||
|
|
||||||
"github.com/hashicorp/vault/api"
|
"github.com/hashicorp/vault/api"
|
||||||
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
@ -438,7 +440,7 @@ func (vtc *vaultTenantConnection) initCertificates(config map[string]interface{}
|
|||||||
|
|
||||||
func (vtc *vaultTenantConnection) getK8sClient() *kubernetes.Clientset {
|
func (vtc *vaultTenantConnection) getK8sClient() *kubernetes.Clientset {
|
||||||
if vtc.client == nil {
|
if vtc.client == nil {
|
||||||
vtc.client = NewK8sClient()
|
vtc.client = k8s.NewK8sClient()
|
||||||
}
|
}
|
||||||
|
|
||||||
return vtc.client
|
return vtc.client
|
||||||
|
Loading…
Reference in New Issue
Block a user