mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-10 00:10:20 +00:00
commit
af008471ab
@ -24,6 +24,9 @@ rules:
|
|||||||
- apiGroups: [""]
|
- apiGroups: [""]
|
||||||
resources: ["events"]
|
resources: ["events"]
|
||||||
verbs: ["list", "watch", "create", "update", "patch"]
|
verbs: ["list", "watch", "create", "update", "patch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["endpoints"]
|
||||||
|
verbs: ["get", "create", "update"]
|
||||||
|
|
||||||
---
|
---
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
|
@ -27,9 +27,8 @@ spec:
|
|||||||
serviceAccount: csi-provisioner
|
serviceAccount: csi-provisioner
|
||||||
containers:
|
containers:
|
||||||
- name: csi-provisioner
|
- name: csi-provisioner
|
||||||
image: quay.io/k8scsi/csi-provisioner:v1.0.0
|
image: quay.io/k8scsi/csi-provisioner:canary
|
||||||
args:
|
args:
|
||||||
- "--provisioner=csi-rbdplugin"
|
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
env:
|
env:
|
||||||
|
@ -72,6 +72,9 @@ spec:
|
|||||||
- name: pods-mount-dir
|
- name: pods-mount-dir
|
||||||
mountPath: /var/lib/kubelet/pods
|
mountPath: /var/lib/kubelet/pods
|
||||||
mountPropagation: "Bidirectional"
|
mountPropagation: "Bidirectional"
|
||||||
|
- name: plugin-mount-dir
|
||||||
|
mountPath: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices/
|
||||||
|
mountPropagation: "Bidirectional"
|
||||||
- mountPath: /dev
|
- mountPath: /dev
|
||||||
name: host-dev
|
name: host-dev
|
||||||
- mountPath: /rootfs
|
- mountPath: /rootfs
|
||||||
@ -86,6 +89,10 @@ spec:
|
|||||||
hostPath:
|
hostPath:
|
||||||
path: /var/lib/kubelet/plugins_registry/csi-rbdplugin
|
path: /var/lib/kubelet/plugins_registry/csi-rbdplugin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
- name: plugin-mount-dir
|
||||||
|
hostPath:
|
||||||
|
path: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices/
|
||||||
|
type: DirectoryOrCreate
|
||||||
- name: registration-dir
|
- name: registration-dir
|
||||||
hostPath:
|
hostPath:
|
||||||
path: /var/lib/kubelet/plugins_registry/
|
path: /var/lib/kubelet/plugins_registry/
|
||||||
|
@ -77,11 +77,6 @@ func (cs *controllerServer) CreateVolume(ctx context.Context, req *csi.CreateVol
|
|||||||
if req.VolumeCapabilities == nil {
|
if req.VolumeCapabilities == nil {
|
||||||
return nil, status.Error(codes.InvalidArgument, "Volume Capabilities cannot be empty")
|
return nil, status.Error(codes.InvalidArgument, "Volume Capabilities cannot be empty")
|
||||||
}
|
}
|
||||||
for _, cap := range req.VolumeCapabilities {
|
|
||||||
if cap.GetBlock() != nil {
|
|
||||||
return nil, status.Error(codes.Unimplemented, "Block Volume not supported")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
volumeNameMutex.LockKey(req.GetName())
|
volumeNameMutex.LockKey(req.GetName())
|
||||||
defer volumeNameMutex.UnlockKey(req.GetName())
|
defer volumeNameMutex.UnlockKey(req.GetName())
|
||||||
|
@ -19,6 +19,8 @@ package rbd
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
@ -40,21 +42,45 @@ type nodeServer struct {
|
|||||||
|
|
||||||
func (ns *nodeServer) NodePublishVolume(ctx context.Context, req *csi.NodePublishVolumeRequest) (*csi.NodePublishVolumeResponse, error) {
|
func (ns *nodeServer) NodePublishVolume(ctx context.Context, req *csi.NodePublishVolumeRequest) (*csi.NodePublishVolumeResponse, error) {
|
||||||
targetPath := req.GetTargetPath()
|
targetPath := req.GetTargetPath()
|
||||||
|
|
||||||
if !strings.HasSuffix(targetPath, "/mount") {
|
|
||||||
return nil, fmt.Errorf("rnd: malformed the value of target path: %s", targetPath)
|
|
||||||
}
|
|
||||||
s := strings.Split(strings.TrimSuffix(targetPath, "/mount"), "/")
|
|
||||||
volName := s[len(s)-1]
|
|
||||||
|
|
||||||
targetPathMutex.LockKey(targetPath)
|
targetPathMutex.LockKey(targetPath)
|
||||||
defer targetPathMutex.UnlockKey(targetPath)
|
defer targetPathMutex.UnlockKey(targetPath)
|
||||||
|
|
||||||
notMnt, err := ns.mounter.IsLikelyNotMountPoint(targetPath)
|
var volName string
|
||||||
|
isBlock := req.GetVolumeCapability().GetBlock() != nil
|
||||||
|
|
||||||
|
if isBlock {
|
||||||
|
// Get volName from targetPath
|
||||||
|
s := strings.Split(targetPath, "/")
|
||||||
|
volName = s[len(s)-1]
|
||||||
|
} else {
|
||||||
|
// Get volName from targetPath
|
||||||
|
if !strings.HasSuffix(targetPath, "/mount") {
|
||||||
|
return nil, fmt.Errorf("rbd: malformed the value of target path: %s", targetPath)
|
||||||
|
}
|
||||||
|
s := strings.Split(strings.TrimSuffix(targetPath, "/mount"), "/")
|
||||||
|
volName = s[len(s)-1]
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if that target path exists properly
|
||||||
|
notMnt, err := ns.mounter.IsNotMountPoint(targetPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if os.IsNotExist(err) {
|
if os.IsNotExist(err) {
|
||||||
if err = os.MkdirAll(targetPath, 0750); err != nil {
|
if isBlock {
|
||||||
return nil, status.Error(codes.Internal, err.Error())
|
// create an empty file
|
||||||
|
targetPathFile, err := os.OpenFile(targetPath, os.O_CREATE|os.O_RDWR, 0750)
|
||||||
|
if err != nil {
|
||||||
|
glog.V(4).Infof("Failed to create targetPath:%s with error: %v", targetPath, err)
|
||||||
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
|
}
|
||||||
|
if err := targetPathFile.Close(); err != nil {
|
||||||
|
glog.V(4).Infof("Failed to close targetPath:%s with error: %v", targetPath, err)
|
||||||
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Create a directory
|
||||||
|
if err = os.MkdirAll(targetPath, 0750); err != nil {
|
||||||
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
|
}
|
||||||
}
|
}
|
||||||
notMnt = true
|
notMnt = true
|
||||||
} else {
|
} else {
|
||||||
@ -76,23 +102,31 @@ func (ns *nodeServer) NodePublishVolume(ctx context.Context, req *csi.NodePublis
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
glog.V(4).Infof("rbd image: %s/%s was successfully mapped at %s\n", req.GetVolumeId(), volOptions.Pool, devicePath)
|
glog.V(4).Infof("rbd image: %s/%s was successfully mapped at %s\n", req.GetVolumeId(), volOptions.Pool, devicePath)
|
||||||
fsType := req.GetVolumeCapability().GetMount().GetFsType()
|
|
||||||
|
|
||||||
|
// Publish Path
|
||||||
|
fsType := req.GetVolumeCapability().GetMount().GetFsType()
|
||||||
readOnly := req.GetReadonly()
|
readOnly := req.GetReadonly()
|
||||||
attrib := req.GetVolumeContext()
|
attrib := req.GetVolumeContext()
|
||||||
mountFlags := req.GetVolumeCapability().GetMount().GetMountFlags()
|
mountFlags := req.GetVolumeCapability().GetMount().GetMountFlags()
|
||||||
|
|
||||||
glog.V(4).Infof("target %v\nfstype %v\ndevice %v\nreadonly %v\nattributes %v\n mountflags %v\n",
|
glog.V(4).Infof("target %v\nisBlock %v\nfstype %v\ndevice %v\nreadonly %v\nattributes %v\n mountflags %v\n",
|
||||||
targetPath, fsType, devicePath, readOnly, attrib, mountFlags)
|
targetPath, isBlock, fsType, devicePath, readOnly, attrib, mountFlags)
|
||||||
|
|
||||||
options := []string{}
|
|
||||||
if readOnly {
|
|
||||||
options = append(options, "ro")
|
|
||||||
}
|
|
||||||
|
|
||||||
diskMounter := &mount.SafeFormatAndMount{Interface: ns.mounter, Exec: mount.NewOsExec()}
|
diskMounter := &mount.SafeFormatAndMount{Interface: ns.mounter, Exec: mount.NewOsExec()}
|
||||||
if err := diskMounter.FormatAndMount(devicePath, targetPath, fsType, options); err != nil {
|
if isBlock {
|
||||||
return nil, err
|
options := []string{"bind"}
|
||||||
|
if err := diskMounter.Mount(devicePath, targetPath, fsType, options); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
options := []string{}
|
||||||
|
if readOnly {
|
||||||
|
options = append(options, "ro")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := diskMounter.FormatAndMount(devicePath, targetPath, fsType, options); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return &csi.NodePublishVolumeResponse{}, nil
|
return &csi.NodePublishVolumeResponse{}, nil
|
||||||
@ -103,11 +137,18 @@ func (ns *nodeServer) NodeUnpublishVolume(ctx context.Context, req *csi.NodeUnpu
|
|||||||
targetPathMutex.LockKey(targetPath)
|
targetPathMutex.LockKey(targetPath)
|
||||||
defer targetPathMutex.UnlockKey(targetPath)
|
defer targetPathMutex.UnlockKey(targetPath)
|
||||||
|
|
||||||
notMnt, err := ns.mounter.IsLikelyNotMountPoint(targetPath)
|
notMnt, err := ns.mounter.IsNotMountPoint(targetPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, status.Error(codes.Internal, err.Error())
|
if os.IsNotExist(err) {
|
||||||
|
// targetPath has already been deleted
|
||||||
|
glog.V(4).Infof("targetPath: %s has already been deleted", targetPath)
|
||||||
|
return &csi.NodeUnpublishVolumeResponse{}, nil
|
||||||
|
}
|
||||||
|
return nil, status.Error(codes.NotFound, err.Error())
|
||||||
}
|
}
|
||||||
if notMnt {
|
if notMnt {
|
||||||
|
// TODO should consider deleting path instead of returning error,
|
||||||
|
// once all codes become ready for csi 1.0.
|
||||||
return nil, status.Error(codes.NotFound, "Volume not mounted")
|
return nil, status.Error(codes.NotFound, "Volume not mounted")
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -116,14 +157,33 @@ func (ns *nodeServer) NodeUnpublishVolume(ctx context.Context, req *csi.NodeUnpu
|
|||||||
return nil, status.Error(codes.Internal, err.Error())
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Bind mounted device needs to be resolved by using resolveBindMountedBlockDevice
|
||||||
|
if devicePath == "devtmpfs" {
|
||||||
|
var err error
|
||||||
|
devicePath, err = resolveBindMountedBlockDevice(targetPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
|
}
|
||||||
|
glog.V(4).Infof("NodeUnpublishVolume: devicePath: %s, (original)cnt: %d\n", devicePath, cnt)
|
||||||
|
// cnt for GetDeviceNameFromMount is broken for bind mouted device,
|
||||||
|
// it counts total number of mounted "devtmpfs", instead of counting this device.
|
||||||
|
// So, forcibly setting cnt to 1 here.
|
||||||
|
// TODO : fix this properly
|
||||||
|
cnt = 1
|
||||||
|
}
|
||||||
|
|
||||||
|
glog.V(4).Infof("NodeUnpublishVolume: targetPath: %s, devicePath: %s\n", targetPath, devicePath)
|
||||||
|
|
||||||
// Unmounting the image
|
// Unmounting the image
|
||||||
err = ns.mounter.Unmount(targetPath)
|
err = ns.mounter.Unmount(targetPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
glog.V(3).Infof("failed to unmount targetPath: %s with error: %v", targetPath, err)
|
||||||
return nil, status.Error(codes.Internal, err.Error())
|
return nil, status.Error(codes.Internal, err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
cnt--
|
cnt--
|
||||||
if cnt != 0 {
|
if cnt != 0 {
|
||||||
|
// TODO should this be fixed not to success, so that driver can retry unmounting?
|
||||||
return &csi.NodeUnpublishVolumeResponse{}, nil
|
return &csi.NodeUnpublishVolumeResponse{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -133,6 +193,12 @@ func (ns *nodeServer) NodeUnpublishVolume(ctx context.Context, req *csi.NodeUnpu
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Remove targetPath
|
||||||
|
if err := os.RemoveAll(targetPath); err != nil {
|
||||||
|
glog.V(3).Infof("failed to remove targetPath: %s with error: %v", targetPath, err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
return &csi.NodeUnpublishVolumeResponse{}, nil
|
return &csi.NodeUnpublishVolumeResponse{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -151,3 +217,30 @@ func (ns *nodeServer) NodeUnstageVolume(
|
|||||||
|
|
||||||
return nil, status.Error(codes.Unimplemented, "")
|
return nil, status.Error(codes.Unimplemented, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func resolveBindMountedBlockDevice(mountPath string) (string, error) {
|
||||||
|
cmd := exec.Command("findmnt", "-n", "-o", "SOURCE", "--first-only", "--target", mountPath)
|
||||||
|
out, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
glog.V(2).Infof("Failed findmnt command for path %s: %s %v", mountPath, out, err)
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return parseFindMntResolveSource(string(out))
|
||||||
|
}
|
||||||
|
|
||||||
|
// parse output of "findmnt -o SOURCE --first-only --target" and return just the SOURCE
|
||||||
|
func parseFindMntResolveSource(out string) (string, error) {
|
||||||
|
// cut trailing newline
|
||||||
|
out = strings.TrimSuffix(out, "\n")
|
||||||
|
// Check if out is a mounted device
|
||||||
|
reMnt := regexp.MustCompile("^(/[^/]+(?:/[^/]*)*)$")
|
||||||
|
if match := reMnt.FindStringSubmatch(out); match != nil {
|
||||||
|
return match[1], nil
|
||||||
|
}
|
||||||
|
// Check if out is a block device
|
||||||
|
reBlk := regexp.MustCompile("^devtmpfs\\[(/[^/]+(?:/[^/]*)*)\\]$")
|
||||||
|
if match := reBlk.FindStringSubmatch(out); match != nil {
|
||||||
|
return fmt.Sprintf("/dev%s", match[1]), nil
|
||||||
|
}
|
||||||
|
return "", fmt.Errorf("parseFindMntResolveSource: %s doesn't match to any expected findMnt output", out)
|
||||||
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user