mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-03 01:06:27 +00:00
Merge pull request #84660 from mkimuram/refactor-block-lock
Refactor block volume's descriptor lock logic
This commit is contained in:
commit
e03d6e2311
@ -29,7 +29,6 @@ import (
|
|||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
"k8s.io/kubernetes/pkg/util/mount"
|
"k8s.io/kubernetes/pkg/util/mount"
|
||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
"k8s.io/kubernetes/pkg/volume/util"
|
|
||||||
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
||||||
"k8s.io/legacy-cloud-providers/aws"
|
"k8s.io/legacy-cloud-providers/aws"
|
||||||
utilstrings "k8s.io/utils/strings"
|
utilstrings "k8s.io/utils/strings"
|
||||||
@ -148,7 +147,7 @@ func (b *awsElasticBlockStoreMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (b *awsElasticBlockStoreMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (b *awsElasticBlockStoreMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetGlobalMapPath returns global map path and error
|
// GetGlobalMapPath returns global map path and error
|
||||||
|
@ -28,7 +28,6 @@ import (
|
|||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
"k8s.io/kubernetes/pkg/util/mount"
|
"k8s.io/kubernetes/pkg/util/mount"
|
||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
"k8s.io/kubernetes/pkg/volume/util"
|
|
||||||
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
||||||
utilstrings "k8s.io/utils/strings"
|
utilstrings "k8s.io/utils/strings"
|
||||||
)
|
)
|
||||||
@ -141,7 +140,7 @@ func (b *azureDataDiskMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (b *azureDataDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (b *azureDataDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetGlobalMapPath returns global map path and error
|
// GetGlobalMapPath returns global map path and error
|
||||||
|
@ -28,7 +28,6 @@ import (
|
|||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
"k8s.io/kubernetes/pkg/util/mount"
|
"k8s.io/kubernetes/pkg/util/mount"
|
||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
"k8s.io/kubernetes/pkg/volume/util"
|
|
||||||
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
||||||
utilstrings "k8s.io/utils/strings"
|
utilstrings "k8s.io/utils/strings"
|
||||||
)
|
)
|
||||||
@ -151,7 +150,7 @@ func (b *cinderVolumeMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (b *cinderVolumeMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (b *cinderVolumeMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetGlobalMapPath returns global map path and error
|
// GetGlobalMapPath returns global map path and error
|
||||||
|
@ -31,7 +31,6 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/types"
|
"k8s.io/apimachinery/pkg/types"
|
||||||
"k8s.io/client-go/kubernetes"
|
"k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
ioutil "k8s.io/kubernetes/pkg/volume/util"
|
|
||||||
utilstrings "k8s.io/utils/strings"
|
utilstrings "k8s.io/utils/strings"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -267,7 +266,7 @@ func (m *csiBlockMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (m *csiBlockMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (m *csiBlockMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return ioutil.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ volume.BlockVolumeUnmapper = &csiBlockMapper{}
|
var _ volume.BlockVolumeUnmapper = &csiBlockMapper{}
|
||||||
|
@ -315,44 +315,12 @@ func TestBlockMapperMapDevice(t *testing.T) {
|
|||||||
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Actual SetupDevice should create a symlink to or a bind mout of device in devicePath.
|
|
||||||
// Create dummy file there before calling MapDevice to test it properly.
|
|
||||||
fd, err := os.Create(devicePath)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("mapper failed to create dummy file in devicePath: %v", err)
|
|
||||||
}
|
|
||||||
if err := fd.Close(); err != nil {
|
|
||||||
t.Fatalf("mapper failed to close dummy file in devicePath: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Map device to global and pod device map path
|
// Map device to global and pod device map path
|
||||||
volumeMapPath, volName := csiMapper.GetPodDeviceMapPath()
|
volumeMapPath, volName := csiMapper.GetPodDeviceMapPath()
|
||||||
err = csiMapper.MapDevice(devicePath, globalMapPath, volumeMapPath, volName, csiMapper.podUID)
|
err = csiMapper.MapDevice(devicePath, globalMapPath, volumeMapPath, volName, csiMapper.podUID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if symlink {globalMapPath}/{podUID} exists
|
|
||||||
globalMapFilePath := filepath.Join(globalMapPath, string(csiMapper.podUID))
|
|
||||||
if _, err := os.Stat(globalMapFilePath); err != nil {
|
|
||||||
if os.IsNotExist(err) {
|
|
||||||
t.Errorf("mapper.MapDevice failed, symlink in globalMapPath not created: %v", err)
|
|
||||||
t.Errorf("mapper.MapDevice devicePath:%v, globalMapPath: %v, globalMapFilePath: %v",
|
|
||||||
devicePath, globalMapPath, globalMapFilePath)
|
|
||||||
} else {
|
|
||||||
t.Errorf("mapper.MapDevice failed: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if symlink {volumeMapPath}/{volName} exists
|
|
||||||
volumeMapFilePath := filepath.Join(volumeMapPath, volName)
|
|
||||||
if _, err := os.Stat(volumeMapFilePath); err != nil {
|
|
||||||
if os.IsNotExist(err) {
|
|
||||||
t.Errorf("mapper.MapDevice failed, symlink in volumeMapPath not created: %v", err)
|
|
||||||
} else {
|
|
||||||
t.Errorf("mapper.MapDevice failed: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestBlockMapperMapDeviceNotSupportAttach(t *testing.T) {
|
func TestBlockMapperMapDeviceNotSupportAttach(t *testing.T) {
|
||||||
@ -402,44 +370,12 @@ func TestBlockMapperMapDeviceNotSupportAttach(t *testing.T) {
|
|||||||
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Actual SetupDevice should create a symlink to or a bind mout of device in devicePath.
|
|
||||||
// Create dummy file there before calling MapDevice to test it properly.
|
|
||||||
fd, err := os.Create(devicePath)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("mapper failed to create dummy file in devicePath: %v", err)
|
|
||||||
}
|
|
||||||
if err := fd.Close(); err != nil {
|
|
||||||
t.Fatalf("mapper failed to close dummy file in devicePath: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Map device to global and pod device map path
|
// Map device to global and pod device map path
|
||||||
volumeMapPath, volName := csiMapper.GetPodDeviceMapPath()
|
volumeMapPath, volName := csiMapper.GetPodDeviceMapPath()
|
||||||
err = csiMapper.MapDevice(devicePath, globalMapPath, volumeMapPath, volName, csiMapper.podUID)
|
err = csiMapper.MapDevice(devicePath, globalMapPath, volumeMapPath, volName, csiMapper.podUID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
t.Fatalf("mapper failed to GetGlobalMapPath: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if symlink {globalMapPath}/{podUID} exists
|
|
||||||
globalMapFilePath := filepath.Join(globalMapPath, string(csiMapper.podUID))
|
|
||||||
if _, err := os.Stat(globalMapFilePath); err != nil {
|
|
||||||
if os.IsNotExist(err) {
|
|
||||||
t.Errorf("mapper.MapDevice failed, symlink in globalMapPath not created: %v", err)
|
|
||||||
t.Errorf("mapper.MapDevice devicePath:%v, globalMapPath: %v, globalMapFilePath: %v",
|
|
||||||
devicePath, globalMapPath, globalMapFilePath)
|
|
||||||
} else {
|
|
||||||
t.Errorf("mapper.MapDevice failed: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if symlink {volumeMapPath}/{volName} exists
|
|
||||||
volumeMapFilePath := filepath.Join(volumeMapPath, volName)
|
|
||||||
if _, err := os.Stat(volumeMapFilePath); err != nil {
|
|
||||||
if os.IsNotExist(err) {
|
|
||||||
t.Errorf("mapper.MapDevice failed, symlink in volumeMapPath not created: %v", err)
|
|
||||||
} else {
|
|
||||||
t.Errorf("mapper.MapDevice failed: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestBlockMapperTearDownDevice(t *testing.T) {
|
func TestBlockMapperTearDownDevice(t *testing.T) {
|
||||||
|
@ -419,7 +419,7 @@ func (b *fcDiskMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (b *fcDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (b *fcDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type fcDiskUnmapper struct {
|
type fcDiskUnmapper struct {
|
||||||
|
@ -29,7 +29,6 @@ import (
|
|||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
"k8s.io/kubernetes/pkg/util/mount"
|
"k8s.io/kubernetes/pkg/util/mount"
|
||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
"k8s.io/kubernetes/pkg/volume/util"
|
|
||||||
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
||||||
utilstrings "k8s.io/utils/strings"
|
utilstrings "k8s.io/utils/strings"
|
||||||
)
|
)
|
||||||
@ -158,7 +157,7 @@ func (b *gcePersistentDiskMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (b *gcePersistentDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (b *gcePersistentDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetGlobalMapPath returns global map path and error
|
// GetGlobalMapPath returns global map path and error
|
||||||
|
@ -389,7 +389,7 @@ func (b *iscsiDiskMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (b *iscsiDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (b *iscsiDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return ioutil.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type iscsiDiskUnmapper struct {
|
type iscsiDiskUnmapper struct {
|
||||||
|
@ -621,7 +621,7 @@ func (m *localVolumeMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (m *localVolumeMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (m *localVolumeMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// localVolumeUnmapper implements the BlockVolumeUnmapper interface for local volumes.
|
// localVolumeUnmapper implements the BlockVolumeUnmapper interface for local volumes.
|
||||||
|
@ -917,7 +917,7 @@ func (rbd *rbdDiskMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (rbd *rbdDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (rbd *rbdDiskMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return volutil.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (rbd *rbd) rbdGlobalMapPath(spec *volume.Spec) (string, error) {
|
func (rbd *rbd) rbdGlobalMapPath(spec *volume.Spec) (string, error) {
|
||||||
|
@ -1138,12 +1138,12 @@ type FakeVolumePathHandler struct {
|
|||||||
sync.RWMutex
|
sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
func (fv *FakeVolumePathHandler) MapDevice(devicePath string, mapDir string, linkName string) error {
|
func (fv *FakeVolumePathHandler) MapDevice(devicePath string, mapDir string, linkName string, bindMount bool) error {
|
||||||
// nil is success, else error
|
// nil is success, else error
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (fv *FakeVolumePathHandler) UnmapDevice(mapDir string, linkName string) error {
|
func (fv *FakeVolumePathHandler) UnmapDevice(mapDir string, linkName string, bindMount bool) error {
|
||||||
// nil is success, else error
|
// nil is success, else error
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -1158,7 +1158,12 @@ func (fv *FakeVolumePathHandler) IsSymlinkExist(mapPath string) (bool, error) {
|
|||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (fv *FakeVolumePathHandler) GetDeviceSymlinkRefs(devPath string, mapPath string) ([]string, error) {
|
func (fv *FakeVolumePathHandler) IsDeviceBindMountExist(mapPath string) (bool, error) {
|
||||||
|
// nil is success, else error
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fv *FakeVolumePathHandler) GetDeviceBindMountRefs(devPath string, mapPath string) ([]string, error) {
|
||||||
// nil is success, else error
|
// nil is success, else error
|
||||||
return []string{}, nil
|
return []string{}, nil
|
||||||
}
|
}
|
||||||
@ -1173,16 +1178,16 @@ func (fv *FakeVolumePathHandler) AttachFileDevice(path string) (string, error) {
|
|||||||
return "", nil
|
return "", nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (fv *FakeVolumePathHandler) DetachFileDevice(path string) error {
|
||||||
|
// nil is success, else error
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func (fv *FakeVolumePathHandler) GetLoopDevice(path string) (string, error) {
|
func (fv *FakeVolumePathHandler) GetLoopDevice(path string) (string, error) {
|
||||||
// nil is success, else error
|
// nil is success, else error
|
||||||
return "/dev/loop1", nil
|
return "/dev/loop1", nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (fv *FakeVolumePathHandler) RemoveLoopDevice(device string) error {
|
|
||||||
// nil is success, else error
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// FindEmptyDirectoryUsageOnTmpfs finds the expected usage of an empty directory existing on
|
// FindEmptyDirectoryUsageOnTmpfs finds the expected usage of an empty directory existing on
|
||||||
// a tmpfs filesystem on this system.
|
// a tmpfs filesystem on this system.
|
||||||
func FindEmptyDirectoryUsageOnTmpfs() (*resource.Quantity, error) {
|
func FindEmptyDirectoryUsageOnTmpfs() (*resource.Quantity, error) {
|
||||||
|
@ -39,6 +39,7 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
"k8s.io/kubernetes/pkg/volume/csi"
|
"k8s.io/kubernetes/pkg/volume/csi"
|
||||||
"k8s.io/kubernetes/pkg/volume/util"
|
"k8s.io/kubernetes/pkg/volume/util"
|
||||||
|
ioutil "k8s.io/kubernetes/pkg/volume/util"
|
||||||
"k8s.io/kubernetes/pkg/volume/util/hostutil"
|
"k8s.io/kubernetes/pkg/volume/util/hostutil"
|
||||||
volumetypes "k8s.io/kubernetes/pkg/volume/util/types"
|
volumetypes "k8s.io/kubernetes/pkg/volume/util/types"
|
||||||
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
||||||
@ -1038,7 +1039,7 @@ func (og *operationGenerator) GenerateMapVolumeFunc(
|
|||||||
blockVolumeMapper.GetGlobalMapPath(volumeToMount.VolumeSpec)
|
blockVolumeMapper.GetGlobalMapPath(volumeToMount.VolumeSpec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// On failure, return error. Caller will log and retry.
|
// On failure, return error. Caller will log and retry.
|
||||||
return volumeToMount.GenerateError("MapVolume.GetDeviceMountPath failed", err)
|
return volumeToMount.GenerateError("MapVolume.GetGlobalMapPath failed", err)
|
||||||
}
|
}
|
||||||
if volumeAttacher != nil {
|
if volumeAttacher != nil {
|
||||||
// Wait for attachable volumes to finish attaching
|
// Wait for attachable volumes to finish attaching
|
||||||
@ -1058,7 +1059,7 @@ func (og *operationGenerator) GenerateMapVolumeFunc(
|
|||||||
pluginDevicePath, mapErr := blockVolumeMapper.SetUpDevice()
|
pluginDevicePath, mapErr := blockVolumeMapper.SetUpDevice()
|
||||||
if mapErr != nil {
|
if mapErr != nil {
|
||||||
// On failure, return error. Caller will log and retry.
|
// On failure, return error. Caller will log and retry.
|
||||||
return volumeToMount.GenerateError("MapVolume.SetUp failed", mapErr)
|
return volumeToMount.GenerateError("MapVolume.SetUpDevice failed", mapErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// if pluginDevicePath is provided, assume attacher may not provide device
|
// if pluginDevicePath is provided, assume attacher may not provide device
|
||||||
@ -1084,7 +1085,7 @@ func (og *operationGenerator) GenerateMapVolumeFunc(
|
|||||||
return volumeToMount.GenerateError("MapVolume.EvalHostSymlinks failed", err)
|
return volumeToMount.GenerateError("MapVolume.EvalHostSymlinks failed", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Map device to global and pod device map path
|
// Execute driver specific map
|
||||||
volumeMapPath, volName := blockVolumeMapper.GetPodDeviceMapPath()
|
volumeMapPath, volName := blockVolumeMapper.GetPodDeviceMapPath()
|
||||||
mapErr = blockVolumeMapper.MapDevice(devicePath, globalMapPath, volumeMapPath, volName, volumeToMount.Pod.UID)
|
mapErr = blockVolumeMapper.MapDevice(devicePath, globalMapPath, volumeMapPath, volName, volumeToMount.Pod.UID)
|
||||||
if mapErr != nil {
|
if mapErr != nil {
|
||||||
@ -1092,13 +1093,11 @@ func (og *operationGenerator) GenerateMapVolumeFunc(
|
|||||||
return volumeToMount.GenerateError("MapVolume.MapDevice failed", mapErr)
|
return volumeToMount.GenerateError("MapVolume.MapDevice failed", mapErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Take filedescriptor lock to keep a block device opened. Otherwise, there is a case
|
// Execute common map
|
||||||
// that the block device is silently removed and attached another device with same name.
|
mapErr = ioutil.MapBlockVolume(og.blkUtil, devicePath, globalMapPath, volumeMapPath, volName, volumeToMount.Pod.UID)
|
||||||
// Container runtime can't handler this problem. To avoid unexpected condition fd lock
|
if mapErr != nil {
|
||||||
// for the block device is required.
|
// On failure, return error. Caller will log and retry.
|
||||||
_, err = og.blkUtil.AttachFileDevice(devicePath)
|
return volumeToMount.GenerateError("MapVolume.MapBlockVolume failed", mapErr)
|
||||||
if err != nil {
|
|
||||||
return volumeToMount.GenerateError("MapVolume.AttachFileDevice failed", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Update actual state of world to reflect volume is globally mounted
|
// Update actual state of world to reflect volume is globally mounted
|
||||||
@ -1207,21 +1206,16 @@ func (og *operationGenerator) GenerateUnmapVolumeFunc(
|
|||||||
}
|
}
|
||||||
|
|
||||||
unmapVolumeFunc := func() (error, error) {
|
unmapVolumeFunc := func() (error, error) {
|
||||||
// Try to unmap volumeName symlink under pod device map path dir
|
|
||||||
// pods/{podUid}/volumeDevices/{escapeQualifiedPluginName}/{volumeName}
|
// pods/{podUid}/volumeDevices/{escapeQualifiedPluginName}/{volumeName}
|
||||||
podDeviceUnmapPath, volName := blockVolumeUnmapper.GetPodDeviceMapPath()
|
podDeviceUnmapPath, volName := blockVolumeUnmapper.GetPodDeviceMapPath()
|
||||||
unmapDeviceErr := og.blkUtil.UnmapDevice(podDeviceUnmapPath, volName)
|
|
||||||
if unmapDeviceErr != nil {
|
|
||||||
// On failure, return error. Caller will log and retry.
|
|
||||||
return volumeToUnmount.GenerateError("UnmapVolume.UnmapDevice on pod device map path failed", unmapDeviceErr)
|
|
||||||
}
|
|
||||||
// Try to unmap podUID symlink under global map path dir
|
|
||||||
// plugins/kubernetes.io/{PluginName}/volumeDevices/{volumePluginDependentPath}/{podUID}
|
// plugins/kubernetes.io/{PluginName}/volumeDevices/{volumePluginDependentPath}/{podUID}
|
||||||
globalUnmapPath := volumeToUnmount.DeviceMountPath
|
globalUnmapPath := volumeToUnmount.DeviceMountPath
|
||||||
unmapDeviceErr = og.blkUtil.UnmapDevice(globalUnmapPath, string(volumeToUnmount.PodUID))
|
|
||||||
if unmapDeviceErr != nil {
|
// Execute common unmap
|
||||||
|
unmapErr := ioutil.UnmapBlockVolume(og.blkUtil, globalUnmapPath, podDeviceUnmapPath, volName, volumeToUnmount.PodUID)
|
||||||
|
if unmapErr != nil {
|
||||||
// On failure, return error. Caller will log and retry.
|
// On failure, return error. Caller will log and retry.
|
||||||
return volumeToUnmount.GenerateError("UnmapVolume.UnmapDevice on global map path failed", unmapDeviceErr)
|
return volumeToUnmount.GenerateError("UnmapVolume.UnmapBlockVolume failed", unmapErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
klog.Infof(
|
klog.Infof(
|
||||||
@ -1306,36 +1300,15 @@ func (og *operationGenerator) GenerateUnmapDeviceFunc(
|
|||||||
// Search under globalMapPath dir if all symbolic links from pods have been removed already.
|
// Search under globalMapPath dir if all symbolic links from pods have been removed already.
|
||||||
// If symbolic links are there, pods may still refer the volume.
|
// If symbolic links are there, pods may still refer the volume.
|
||||||
globalMapPath := deviceToDetach.DeviceMountPath
|
globalMapPath := deviceToDetach.DeviceMountPath
|
||||||
refs, err := og.blkUtil.GetDeviceSymlinkRefs(deviceToDetach.DevicePath, globalMapPath)
|
refs, err := og.blkUtil.GetDeviceBindMountRefs(deviceToDetach.DevicePath, globalMapPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return deviceToDetach.GenerateError("UnmapDevice.GetDeviceSymlinkRefs check failed", err)
|
return deviceToDetach.GenerateError("UnmapDevice.GetDeviceBindMountRefs check failed", err)
|
||||||
}
|
}
|
||||||
if len(refs) > 0 {
|
if len(refs) > 0 {
|
||||||
err = fmt.Errorf("The device %q is still referenced from other Pods %v", globalMapPath, refs)
|
err = fmt.Errorf("The device %q is still referenced from other Pods %v", globalMapPath, refs)
|
||||||
return deviceToDetach.GenerateError("UnmapDevice failed", err)
|
return deviceToDetach.GenerateError("UnmapDevice failed", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// The block volume is not referenced from Pods. Release file descriptor lock.
|
|
||||||
// This should be done before calling TearDownDevice, because some plugins that do local detach
|
|
||||||
// in TearDownDevice will fail in detaching device due to the refcnt on the loopback device.
|
|
||||||
klog.V(4).Infof("UnmapDevice: deviceToDetach.DevicePath: %v", deviceToDetach.DevicePath)
|
|
||||||
loopPath, err := og.blkUtil.GetLoopDevice(deviceToDetach.DevicePath)
|
|
||||||
if err != nil {
|
|
||||||
if err.Error() == volumepathhandler.ErrDeviceNotFound {
|
|
||||||
klog.Warningf(deviceToDetach.GenerateMsgDetailed("UnmapDevice: Couldn't find loopback device which takes file descriptor lock", fmt.Sprintf("device path: %q", deviceToDetach.DevicePath)))
|
|
||||||
} else {
|
|
||||||
errInfo := "UnmapDevice.GetLoopDevice failed to get loopback device, " + fmt.Sprintf("device path: %q", deviceToDetach.DevicePath)
|
|
||||||
return deviceToDetach.GenerateError(errInfo, err)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if len(loopPath) != 0 {
|
|
||||||
err = og.blkUtil.RemoveLoopDevice(loopPath)
|
|
||||||
if err != nil {
|
|
||||||
return deviceToDetach.GenerateError("UnmapDevice.RemoveLoopDevice failed", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Execute tear down device
|
// Execute tear down device
|
||||||
unmapErr := blockVolumeUnmapper.TearDownDevice(globalMapPath, deviceToDetach.DevicePath)
|
unmapErr := blockVolumeUnmapper.TearDownDevice(globalMapPath, deviceToDetach.DevicePath)
|
||||||
if unmapErr != nil {
|
if unmapErr != nil {
|
||||||
|
@ -503,30 +503,74 @@ func MakeAbsolutePath(goos, path string) string {
|
|||||||
return "c:\\" + path
|
return "c:\\" + path
|
||||||
}
|
}
|
||||||
|
|
||||||
// MapBlockVolume is a utility function to provide a common way of mounting
|
// MapBlockVolume is a utility function to provide a common way of mapping
|
||||||
// block device path for a specified volume and pod. This function should be
|
// block device path for a specified volume and pod. This function should be
|
||||||
// called by volume plugins that implements volume.BlockVolumeMapper.Map() method.
|
// called by volume plugins that implements volume.BlockVolumeMapper.Map() method.
|
||||||
func MapBlockVolume(
|
func MapBlockVolume(
|
||||||
|
blkUtil volumepathhandler.BlockVolumePathHandler,
|
||||||
devicePath,
|
devicePath,
|
||||||
globalMapPath,
|
globalMapPath,
|
||||||
podVolumeMapPath,
|
podVolumeMapPath,
|
||||||
volumeMapName string,
|
volumeMapName string,
|
||||||
podUID utypes.UID,
|
podUID utypes.UID,
|
||||||
) error {
|
) error {
|
||||||
blkUtil := volumepathhandler.NewBlockVolumePathHandler()
|
// map devicePath to global node path as bind mount
|
||||||
|
mapErr := blkUtil.MapDevice(devicePath, globalMapPath, string(podUID), true /* bindMount */)
|
||||||
// map devicePath to global node path
|
|
||||||
mapErr := blkUtil.MapDevice(devicePath, globalMapPath, string(podUID))
|
|
||||||
if mapErr != nil {
|
if mapErr != nil {
|
||||||
return mapErr
|
return fmt.Errorf("blkUtil.MapDevice failed. devicePath: %s, globalMapPath:%s, podUID: %s, bindMount: %v: %v",
|
||||||
|
devicePath, globalMapPath, string(podUID), true, mapErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// map devicePath to pod volume path
|
// map devicePath to pod volume path
|
||||||
mapErr = blkUtil.MapDevice(devicePath, podVolumeMapPath, volumeMapName)
|
mapErr = blkUtil.MapDevice(devicePath, podVolumeMapPath, volumeMapName, false /* bindMount */)
|
||||||
if mapErr != nil {
|
if mapErr != nil {
|
||||||
return mapErr
|
return fmt.Errorf("blkUtil.MapDevice failed. devicePath: %s, podVolumeMapPath:%s, volumeMapName: %s, bindMount: %v: %v",
|
||||||
|
devicePath, podVolumeMapPath, volumeMapName, false, mapErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Take file descriptor lock to keep a block device opened. Otherwise, there is a case
|
||||||
|
// that the block device is silently removed and attached another device with the same name.
|
||||||
|
// Container runtime can't handle this problem. To avoid unexpected condition fd lock
|
||||||
|
// for the block device is required.
|
||||||
|
_, mapErr = blkUtil.AttachFileDevice(filepath.Join(globalMapPath, string(podUID)))
|
||||||
|
if mapErr != nil {
|
||||||
|
return fmt.Errorf("blkUtil.AttachFileDevice failed. globalMapPath:%s, podUID: %s: %v",
|
||||||
|
globalMapPath, string(podUID), mapErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmapBlockVolume is a utility function to provide a common way of unmapping
|
||||||
|
// block device path for a specified volume and pod. This function should be
|
||||||
|
// called by volume plugins that implements volume.BlockVolumeMapper.Map() method.
|
||||||
|
func UnmapBlockVolume(
|
||||||
|
blkUtil volumepathhandler.BlockVolumePathHandler,
|
||||||
|
globalUnmapPath,
|
||||||
|
podDeviceUnmapPath,
|
||||||
|
volumeMapName string,
|
||||||
|
podUID utypes.UID,
|
||||||
|
) error {
|
||||||
|
// Release file descriptor lock.
|
||||||
|
err := blkUtil.DetachFileDevice(filepath.Join(globalUnmapPath, string(podUID)))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("blkUtil.DetachFileDevice failed. globalUnmapPath:%s, podUID: %s: %v",
|
||||||
|
globalUnmapPath, string(podUID), err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// unmap devicePath from pod volume path
|
||||||
|
unmapDeviceErr := blkUtil.UnmapDevice(podDeviceUnmapPath, volumeMapName, false /* bindMount */)
|
||||||
|
if unmapDeviceErr != nil {
|
||||||
|
return fmt.Errorf("blkUtil.DetachFileDevice failed. podDeviceUnmapPath:%s, volumeMapName: %s, bindMount: %v: %v",
|
||||||
|
podDeviceUnmapPath, volumeMapName, false, unmapDeviceErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
// unmap devicePath from global node path
|
||||||
|
unmapDeviceErr = blkUtil.UnmapDevice(globalUnmapPath, string(podUID), true /* bindMount */)
|
||||||
|
if unmapDeviceErr != nil {
|
||||||
|
return fmt.Errorf("blkUtil.DetachFileDevice failed. globalUnmapPath:%s, podUID: %s, bindMount: %v: %v",
|
||||||
|
globalUnmapPath, string(podUID), true, unmapDeviceErr)
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -10,9 +10,19 @@ go_library(
|
|||||||
importpath = "k8s.io/kubernetes/pkg/volume/util/volumepathhandler",
|
importpath = "k8s.io/kubernetes/pkg/volume/util/volumepathhandler",
|
||||||
visibility = ["//visibility:public"],
|
visibility = ["//visibility:public"],
|
||||||
deps = [
|
deps = [
|
||||||
|
"//pkg/util/mount:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/types:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/types:go_default_library",
|
||||||
"//vendor/k8s.io/klog:go_default_library",
|
"//vendor/k8s.io/klog:go_default_library",
|
||||||
],
|
"//vendor/k8s.io/utils/exec:go_default_library",
|
||||||
|
] + select({
|
||||||
|
"@io_bazel_rules_go//go/platform:android": [
|
||||||
|
"//vendor/golang.org/x/sys/unix:go_default_library",
|
||||||
|
],
|
||||||
|
"@io_bazel_rules_go//go/platform:linux": [
|
||||||
|
"//vendor/golang.org/x/sys/unix:go_default_library",
|
||||||
|
],
|
||||||
|
"//conditions:default": [],
|
||||||
|
}),
|
||||||
)
|
)
|
||||||
|
|
||||||
filegroup(
|
filegroup(
|
||||||
|
@ -23,12 +23,15 @@ import (
|
|||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
|
||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
|
"k8s.io/kubernetes/pkg/util/mount"
|
||||||
|
utilexec "k8s.io/utils/exec"
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/types"
|
"k8s.io/apimachinery/pkg/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
losetupPath = "losetup"
|
losetupPath = "losetup"
|
||||||
|
statPath = "stat"
|
||||||
ErrDeviceNotFound = "device not found"
|
ErrDeviceNotFound = "device not found"
|
||||||
ErrDeviceNotSupported = "device not supported"
|
ErrDeviceNotSupported = "device not supported"
|
||||||
)
|
)
|
||||||
@ -36,25 +39,28 @@ const (
|
|||||||
// BlockVolumePathHandler defines a set of operations for handling block volume-related operations
|
// BlockVolumePathHandler defines a set of operations for handling block volume-related operations
|
||||||
type BlockVolumePathHandler interface {
|
type BlockVolumePathHandler interface {
|
||||||
// MapDevice creates a symbolic link to block device under specified map path
|
// MapDevice creates a symbolic link to block device under specified map path
|
||||||
MapDevice(devicePath string, mapPath string, linkName string) error
|
MapDevice(devicePath string, mapPath string, linkName string, bindMount bool) error
|
||||||
// UnmapDevice removes a symbolic link to block device under specified map path
|
// UnmapDevice removes a symbolic link to block device under specified map path
|
||||||
UnmapDevice(mapPath string, linkName string) error
|
UnmapDevice(mapPath string, linkName string, bindMount bool) error
|
||||||
// RemovePath removes a file or directory on specified map path
|
// RemovePath removes a file or directory on specified map path
|
||||||
RemoveMapPath(mapPath string) error
|
RemoveMapPath(mapPath string) error
|
||||||
// IsSymlinkExist retruns true if specified symbolic link exists
|
// IsSymlinkExist retruns true if specified symbolic link exists
|
||||||
IsSymlinkExist(mapPath string) (bool, error)
|
IsSymlinkExist(mapPath string) (bool, error)
|
||||||
// GetDeviceSymlinkRefs searches symbolic links under global map path
|
// IsDeviceBindMountExist retruns true if specified bind mount exists
|
||||||
GetDeviceSymlinkRefs(devPath string, mapPath string) ([]string, error)
|
IsDeviceBindMountExist(mapPath string) (bool, error)
|
||||||
|
// GetDeviceBindMountRefs searches bind mounts under global map path
|
||||||
|
GetDeviceBindMountRefs(devPath string, mapPath string) ([]string, error)
|
||||||
// FindGlobalMapPathUUIDFromPod finds {pod uuid} symbolic link under globalMapPath
|
// FindGlobalMapPathUUIDFromPod finds {pod uuid} symbolic link under globalMapPath
|
||||||
// corresponding to map path symlink, and then return global map path with pod uuid.
|
// corresponding to map path symlink, and then return global map path with pod uuid.
|
||||||
FindGlobalMapPathUUIDFromPod(pluginDir, mapPath string, podUID types.UID) (string, error)
|
FindGlobalMapPathUUIDFromPod(pluginDir, mapPath string, podUID types.UID) (string, error)
|
||||||
// AttachFileDevice takes a path to a regular file and makes it available as an
|
// AttachFileDevice takes a path to a regular file and makes it available as an
|
||||||
// attached block device.
|
// attached block device.
|
||||||
AttachFileDevice(path string) (string, error)
|
AttachFileDevice(path string) (string, error)
|
||||||
|
// DetachFileDevice takes a path to the attached block device and
|
||||||
|
// detach it from block device.
|
||||||
|
DetachFileDevice(path string) error
|
||||||
// GetLoopDevice returns the full path to the loop device associated with the given path.
|
// GetLoopDevice returns the full path to the loop device associated with the given path.
|
||||||
GetLoopDevice(path string) (string, error)
|
GetLoopDevice(path string) (string, error)
|
||||||
// RemoveLoopDevice removes specified loopback device
|
|
||||||
RemoveLoopDevice(device string) error
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewBlockVolumePathHandler returns a new instance of BlockVolumeHandler.
|
// NewBlockVolumePathHandler returns a new instance of BlockVolumeHandler.
|
||||||
@ -68,7 +74,7 @@ type VolumePathHandler struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// MapDevice creates a symbolic link to block device under specified map path
|
// MapDevice creates a symbolic link to block device under specified map path
|
||||||
func (v VolumePathHandler) MapDevice(devicePath string, mapPath string, linkName string) error {
|
func (v VolumePathHandler) MapDevice(devicePath string, mapPath string, linkName string, bindMount bool) error {
|
||||||
// Example of global map path:
|
// Example of global map path:
|
||||||
// globalMapPath/linkName: plugins/kubernetes.io/{PluginName}/{DefaultKubeletVolumeDevicesDirName}/{volumePluginDependentPath}/{podUid}
|
// globalMapPath/linkName: plugins/kubernetes.io/{PluginName}/{DefaultKubeletVolumeDevicesDirName}/{volumePluginDependentPath}/{podUid}
|
||||||
// linkName: {podUid}
|
// linkName: {podUid}
|
||||||
@ -77,13 +83,13 @@ func (v VolumePathHandler) MapDevice(devicePath string, mapPath string, linkName
|
|||||||
// podDeviceMapPath/linkName: pods/{podUid}/{DefaultKubeletVolumeDevicesDirName}/{escapeQualifiedPluginName}/{volumeName}
|
// podDeviceMapPath/linkName: pods/{podUid}/{DefaultKubeletVolumeDevicesDirName}/{escapeQualifiedPluginName}/{volumeName}
|
||||||
// linkName: {volumeName}
|
// linkName: {volumeName}
|
||||||
if len(devicePath) == 0 {
|
if len(devicePath) == 0 {
|
||||||
return fmt.Errorf("Failed to map device to map path. devicePath is empty")
|
return fmt.Errorf("failed to map device to map path. devicePath is empty")
|
||||||
}
|
}
|
||||||
if len(mapPath) == 0 {
|
if len(mapPath) == 0 {
|
||||||
return fmt.Errorf("Failed to map device to map path. mapPath is empty")
|
return fmt.Errorf("failed to map device to map path. mapPath is empty")
|
||||||
}
|
}
|
||||||
if !filepath.IsAbs(mapPath) {
|
if !filepath.IsAbs(mapPath) {
|
||||||
return fmt.Errorf("The map path should be absolute: map path: %s", mapPath)
|
return fmt.Errorf("the map path should be absolute: map path: %s", mapPath)
|
||||||
}
|
}
|
||||||
klog.V(5).Infof("MapDevice: devicePath %s", devicePath)
|
klog.V(5).Infof("MapDevice: devicePath %s", devicePath)
|
||||||
klog.V(5).Infof("MapDevice: mapPath %s", mapPath)
|
klog.V(5).Infof("MapDevice: mapPath %s", mapPath)
|
||||||
@ -92,31 +98,119 @@ func (v VolumePathHandler) MapDevice(devicePath string, mapPath string, linkName
|
|||||||
// Check and create mapPath
|
// Check and create mapPath
|
||||||
_, err := os.Stat(mapPath)
|
_, err := os.Stat(mapPath)
|
||||||
if err != nil && !os.IsNotExist(err) {
|
if err != nil && !os.IsNotExist(err) {
|
||||||
klog.Errorf("cannot validate map path: %s", mapPath)
|
return fmt.Errorf("cannot validate map path: %s: %v", mapPath, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
if err = os.MkdirAll(mapPath, 0750); err != nil {
|
if err = os.MkdirAll(mapPath, 0750); err != nil {
|
||||||
return fmt.Errorf("Failed to mkdir %s, error %v", mapPath, err)
|
return fmt.Errorf("failed to mkdir %s: %v", mapPath, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if bindMount {
|
||||||
|
return mapBindMountDevice(v, devicePath, mapPath, linkName)
|
||||||
|
}
|
||||||
|
return mapSymlinkDevice(v, devicePath, mapPath, linkName)
|
||||||
|
}
|
||||||
|
|
||||||
|
func mapBindMountDevice(v VolumePathHandler, devicePath string, mapPath string, linkName string) error {
|
||||||
|
// Check bind mount exists
|
||||||
|
linkPath := filepath.Join(mapPath, string(linkName))
|
||||||
|
|
||||||
|
file, err := os.Stat(linkPath)
|
||||||
|
if err != nil {
|
||||||
|
if !os.IsNotExist(err) {
|
||||||
|
return fmt.Errorf("failed to stat file %s: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create file
|
||||||
|
newFile, err := os.OpenFile(linkPath, os.O_CREATE|os.O_RDWR, 0750)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open file %s: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
if err := newFile.Close(); err != nil {
|
||||||
|
return fmt.Errorf("failed to close file %s: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Check if device file
|
||||||
|
// TODO: Need to check if this device file is actually the expected bind mount
|
||||||
|
if file.Mode()&os.ModeDevice == os.ModeDevice {
|
||||||
|
klog.Warningf("Warning: Map skipped because bind mount already exist on the path: %v", linkPath)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
klog.Warningf("Warning: file %s is already exist but not mounted, skip creating file", linkPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Bind mount file
|
||||||
|
mounter := &mount.SafeFormatAndMount{Interface: mount.New(""), Exec: utilexec.New()}
|
||||||
|
if err := mounter.Mount(devicePath, linkPath, "" /* fsType */, []string{"bind"}); err != nil {
|
||||||
|
return fmt.Errorf("failed to bind mount devicePath: %s to linkPath %s: %v", devicePath, linkPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func mapSymlinkDevice(v VolumePathHandler, devicePath string, mapPath string, linkName string) error {
|
||||||
// Remove old symbolic link(or file) then create new one.
|
// Remove old symbolic link(or file) then create new one.
|
||||||
// This should be done because current symbolic link is
|
// This should be done because current symbolic link is
|
||||||
// stale across node reboot.
|
// stale across node reboot.
|
||||||
linkPath := filepath.Join(mapPath, string(linkName))
|
linkPath := filepath.Join(mapPath, string(linkName))
|
||||||
if err = os.Remove(linkPath); err != nil && !os.IsNotExist(err) {
|
if err := os.Remove(linkPath); err != nil && !os.IsNotExist(err) {
|
||||||
return err
|
return fmt.Errorf("failed to remove file %s: %v", linkPath, err)
|
||||||
}
|
}
|
||||||
err = os.Symlink(devicePath, linkPath)
|
return os.Symlink(devicePath, linkPath)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// UnmapDevice removes a symbolic link associated to block device under specified map path
|
// UnmapDevice removes a symbolic link associated to block device under specified map path
|
||||||
func (v VolumePathHandler) UnmapDevice(mapPath string, linkName string) error {
|
func (v VolumePathHandler) UnmapDevice(mapPath string, linkName string, bindMount bool) error {
|
||||||
if len(mapPath) == 0 {
|
if len(mapPath) == 0 {
|
||||||
return fmt.Errorf("Failed to unmap device from map path. mapPath is empty")
|
return fmt.Errorf("failed to unmap device from map path. mapPath is empty")
|
||||||
}
|
}
|
||||||
klog.V(5).Infof("UnmapDevice: mapPath %s", mapPath)
|
klog.V(5).Infof("UnmapDevice: mapPath %s", mapPath)
|
||||||
klog.V(5).Infof("UnmapDevice: linkName %s", linkName)
|
klog.V(5).Infof("UnmapDevice: linkName %s", linkName)
|
||||||
|
|
||||||
|
if bindMount {
|
||||||
|
return unmapBindMountDevice(v, mapPath, linkName)
|
||||||
|
}
|
||||||
|
return unmapSymlinkDevice(v, mapPath, linkName)
|
||||||
|
}
|
||||||
|
|
||||||
|
func unmapBindMountDevice(v VolumePathHandler, mapPath string, linkName string) error {
|
||||||
|
// Check bind mount exists
|
||||||
|
linkPath := filepath.Join(mapPath, string(linkName))
|
||||||
|
if isMountExist, checkErr := v.IsDeviceBindMountExist(linkPath); checkErr != nil {
|
||||||
|
return checkErr
|
||||||
|
} else if !isMountExist {
|
||||||
|
klog.Warningf("Warning: Unmap skipped because bind mount does not exist on the path: %v", linkPath)
|
||||||
|
|
||||||
|
// Check if linkPath still exists
|
||||||
|
if _, err := os.Stat(linkPath); err != nil {
|
||||||
|
if !os.IsNotExist(err) {
|
||||||
|
return fmt.Errorf("failed to check if path %s exists: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
// linkPath has already been removed
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Remove file
|
||||||
|
if err := os.Remove(linkPath); err != nil && !os.IsNotExist(err) {
|
||||||
|
return fmt.Errorf("failed to remove file %s: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unmount file
|
||||||
|
mounter := &mount.SafeFormatAndMount{Interface: mount.New(""), Exec: utilexec.New()}
|
||||||
|
if err := mounter.Unmount(linkPath); err != nil {
|
||||||
|
return fmt.Errorf("failed to unmount linkPath %s: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Remove file
|
||||||
|
if err := os.Remove(linkPath); err != nil && !os.IsNotExist(err) {
|
||||||
|
return fmt.Errorf("failed to remove file %s: %v", linkPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func unmapSymlinkDevice(v VolumePathHandler, mapPath string, linkName string) error {
|
||||||
// Check symbolic link exists
|
// Check symbolic link exists
|
||||||
linkPath := filepath.Join(mapPath, string(linkName))
|
linkPath := filepath.Join(mapPath, string(linkName))
|
||||||
if islinkExist, checkErr := v.IsSymlinkExist(linkPath); checkErr != nil {
|
if islinkExist, checkErr := v.IsSymlinkExist(linkPath); checkErr != nil {
|
||||||
@ -125,19 +219,18 @@ func (v VolumePathHandler) UnmapDevice(mapPath string, linkName string) error {
|
|||||||
klog.Warningf("Warning: Unmap skipped because symlink does not exist on the path: %v", linkPath)
|
klog.Warningf("Warning: Unmap skipped because symlink does not exist on the path: %v", linkPath)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
err := os.Remove(linkPath)
|
return os.Remove(linkPath)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoveMapPath removes a file or directory on specified map path
|
// RemoveMapPath removes a file or directory on specified map path
|
||||||
func (v VolumePathHandler) RemoveMapPath(mapPath string) error {
|
func (v VolumePathHandler) RemoveMapPath(mapPath string) error {
|
||||||
if len(mapPath) == 0 {
|
if len(mapPath) == 0 {
|
||||||
return fmt.Errorf("Failed to remove map path. mapPath is empty")
|
return fmt.Errorf("failed to remove map path. mapPath is empty")
|
||||||
}
|
}
|
||||||
klog.V(5).Infof("RemoveMapPath: mapPath %s", mapPath)
|
klog.V(5).Infof("RemoveMapPath: mapPath %s", mapPath)
|
||||||
err := os.RemoveAll(mapPath)
|
err := os.RemoveAll(mapPath)
|
||||||
if err != nil && !os.IsNotExist(err) {
|
if err != nil && !os.IsNotExist(err) {
|
||||||
return err
|
return fmt.Errorf("failed to remove directory %s: %v", mapPath, err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -147,86 +240,59 @@ func (v VolumePathHandler) RemoveMapPath(mapPath string) error {
|
|||||||
// On other cases, return false with error from Lstat().
|
// On other cases, return false with error from Lstat().
|
||||||
func (v VolumePathHandler) IsSymlinkExist(mapPath string) (bool, error) {
|
func (v VolumePathHandler) IsSymlinkExist(mapPath string) (bool, error) {
|
||||||
fi, err := os.Lstat(mapPath)
|
fi, err := os.Lstat(mapPath)
|
||||||
if err == nil {
|
if err != nil {
|
||||||
// If file exits and it's symbolic link, return true and no error
|
// If file doesn't exist, return false and no error
|
||||||
if fi.Mode()&os.ModeSymlink == os.ModeSymlink {
|
if os.IsNotExist(err) {
|
||||||
return true, nil
|
return false, nil
|
||||||
}
|
}
|
||||||
// If file exits but it's not symbolic link, return fale and no error
|
// Return error from Lstat()
|
||||||
return false, nil
|
return false, fmt.Errorf("failed to Lstat file %s: %v", mapPath, err)
|
||||||
}
|
}
|
||||||
// If file doesn't exist, return false and no error
|
// If file exits and it's symbolic link, return true and no error
|
||||||
if os.IsNotExist(err) {
|
if fi.Mode()&os.ModeSymlink == os.ModeSymlink {
|
||||||
return false, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
// Return error from Lstat()
|
// If file exits but it's not symbolic link, return fale and no error
|
||||||
return false, err
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetDeviceSymlinkRefs searches symbolic links under global map path
|
// IsDeviceBindMountExist returns true if specified file exists and the type is device.
|
||||||
func (v VolumePathHandler) GetDeviceSymlinkRefs(devPath string, mapPath string) ([]string, error) {
|
// If file doesn't exist, or file exists but not device, return false with no error.
|
||||||
|
// On other cases, return false with error from Lstat().
|
||||||
|
func (v VolumePathHandler) IsDeviceBindMountExist(mapPath string) (bool, error) {
|
||||||
|
fi, err := os.Lstat(mapPath)
|
||||||
|
if err != nil {
|
||||||
|
// If file doesn't exist, return false and no error
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return error from Lstat()
|
||||||
|
return false, fmt.Errorf("failed to Lstat file %s: %v", mapPath, err)
|
||||||
|
}
|
||||||
|
// If file exits and it's device, return true and no error
|
||||||
|
if fi.Mode()&os.ModeDevice == os.ModeDevice {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
// If file exits but it's not device, return fale and no error
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetDeviceBindMountRefs searches bind mounts under global map path
|
||||||
|
func (v VolumePathHandler) GetDeviceBindMountRefs(devPath string, mapPath string) ([]string, error) {
|
||||||
var refs []string
|
var refs []string
|
||||||
files, err := ioutil.ReadDir(mapPath)
|
files, err := ioutil.ReadDir(mapPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("Directory cannot read %v", err)
|
return nil, fmt.Errorf("directory cannot read %v", err)
|
||||||
}
|
}
|
||||||
for _, file := range files {
|
for _, file := range files {
|
||||||
if file.Mode()&os.ModeSymlink != os.ModeSymlink {
|
if file.Mode()&os.ModeDevice != os.ModeDevice {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
filename := file.Name()
|
filename := file.Name()
|
||||||
fp, err := os.Readlink(filepath.Join(mapPath, filename))
|
// TODO: Might need to check if the file is actually linked to devPath
|
||||||
if err != nil {
|
refs = append(refs, filepath.Join(mapPath, filename))
|
||||||
return nil, fmt.Errorf("Symbolic link cannot be retrieved %v", err)
|
|
||||||
}
|
|
||||||
klog.V(5).Infof("GetDeviceSymlinkRefs: filepath: %v, devPath: %v", fp, devPath)
|
|
||||||
if fp == devPath {
|
|
||||||
refs = append(refs, filepath.Join(mapPath, filename))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
klog.V(5).Infof("GetDeviceSymlinkRefs: refs %v", refs)
|
klog.V(5).Infof("GetDeviceBindMountRefs: refs %v", refs)
|
||||||
return refs, nil
|
return refs, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// FindGlobalMapPathUUIDFromPod finds {pod uuid} symbolic link under globalMapPath
|
|
||||||
// corresponding to map path symlink, and then return global map path with pod uuid.
|
|
||||||
// ex. mapPath symlink: pods/{podUid}}/{DefaultKubeletVolumeDevicesDirName}/{escapeQualifiedPluginName}/{volumeName} -> /dev/sdX
|
|
||||||
// globalMapPath/{pod uuid}: plugins/kubernetes.io/{PluginName}/{DefaultKubeletVolumeDevicesDirName}/{volumePluginDependentPath}/{pod uuid} -> /dev/sdX
|
|
||||||
func (v VolumePathHandler) FindGlobalMapPathUUIDFromPod(pluginDir, mapPath string, podUID types.UID) (string, error) {
|
|
||||||
var globalMapPathUUID string
|
|
||||||
// Find symbolic link named pod uuid under plugin dir
|
|
||||||
err := filepath.Walk(pluginDir, func(path string, fi os.FileInfo, err error) error {
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if (fi.Mode()&os.ModeSymlink == os.ModeSymlink) && (fi.Name() == string(podUID)) {
|
|
||||||
klog.V(5).Infof("FindGlobalMapPathFromPod: path %s, mapPath %s", path, mapPath)
|
|
||||||
if res, err := compareSymlinks(path, mapPath); err == nil && res {
|
|
||||||
globalMapPathUUID = path
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
klog.V(5).Infof("FindGlobalMapPathFromPod: globalMapPathUUID %s", globalMapPathUUID)
|
|
||||||
// Return path contains global map path + {pod uuid}
|
|
||||||
return globalMapPathUUID, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func compareSymlinks(global, pod string) (bool, error) {
|
|
||||||
devGlobal, err := os.Readlink(global)
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
devPod, err := os.Readlink(pod)
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
klog.V(5).Infof("CompareSymlinks: devGloBal %s, devPod %s", devGlobal, devPod)
|
|
||||||
if devGlobal == devPod {
|
|
||||||
return true, nil
|
|
||||||
}
|
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
@ -19,12 +19,17 @@ limitations under the License.
|
|||||||
package volumepathhandler
|
package volumepathhandler
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bufio"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -33,7 +38,7 @@ import (
|
|||||||
func (v VolumePathHandler) AttachFileDevice(path string) (string, error) {
|
func (v VolumePathHandler) AttachFileDevice(path string) (string, error) {
|
||||||
blockDevicePath, err := v.GetLoopDevice(path)
|
blockDevicePath, err := v.GetLoopDevice(path)
|
||||||
if err != nil && err.Error() != ErrDeviceNotFound {
|
if err != nil && err.Error() != ErrDeviceNotFound {
|
||||||
return "", err
|
return "", fmt.Errorf("GetLoopDevice failed for path %s: %v", path, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// If no existing loop device for the path, create one
|
// If no existing loop device for the path, create one
|
||||||
@ -41,12 +46,33 @@ func (v VolumePathHandler) AttachFileDevice(path string) (string, error) {
|
|||||||
klog.V(4).Infof("Creating device for path: %s", path)
|
klog.V(4).Infof("Creating device for path: %s", path)
|
||||||
blockDevicePath, err = makeLoopDevice(path)
|
blockDevicePath, err = makeLoopDevice(path)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", fmt.Errorf("makeLoopDevice failed for path %s: %v", path, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return blockDevicePath, nil
|
return blockDevicePath, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// DetachFileDevice takes a path to the attached block device and
|
||||||
|
// detach it from block device.
|
||||||
|
func (v VolumePathHandler) DetachFileDevice(path string) error {
|
||||||
|
loopPath, err := v.GetLoopDevice(path)
|
||||||
|
if err != nil {
|
||||||
|
if err.Error() == ErrDeviceNotFound {
|
||||||
|
klog.Warningf("couldn't find loopback device which takes file descriptor lock. Skip detaching device. device path: %q", path)
|
||||||
|
} else {
|
||||||
|
return fmt.Errorf("GetLoopDevice failed for path %s: %v", path, err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if len(loopPath) != 0 {
|
||||||
|
err = removeLoopDevice(loopPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("removeLoopDevice failed for path %s: %v", path, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// GetLoopDevice returns the full path to the loop device associated with the given path.
|
// GetLoopDevice returns the full path to the loop device associated with the given path.
|
||||||
func (v VolumePathHandler) GetLoopDevice(path string) (string, error) {
|
func (v VolumePathHandler) GetLoopDevice(path string) (string, error) {
|
||||||
_, err := os.Stat(path)
|
_, err := os.Stat(path)
|
||||||
@ -62,9 +88,9 @@ func (v VolumePathHandler) GetLoopDevice(path string) (string, error) {
|
|||||||
out, err := cmd.CombinedOutput()
|
out, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
klog.V(2).Infof("Failed device discover command for path %s: %v %s", path, err, out)
|
klog.V(2).Infof("Failed device discover command for path %s: %v %s", path, err, out)
|
||||||
return "", err
|
return "", fmt.Errorf("losetup -j %s failed: %v", path, err)
|
||||||
}
|
}
|
||||||
return parseLosetupOutputForDevice(out)
|
return parseLosetupOutputForDevice(out, path)
|
||||||
}
|
}
|
||||||
|
|
||||||
func makeLoopDevice(path string) (string, error) {
|
func makeLoopDevice(path string) (string, error) {
|
||||||
@ -73,13 +99,20 @@ func makeLoopDevice(path string) (string, error) {
|
|||||||
out, err := cmd.CombinedOutput()
|
out, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
klog.V(2).Infof("Failed device create command for path: %s %v %s ", path, err, out)
|
klog.V(2).Infof("Failed device create command for path: %s %v %s ", path, err, out)
|
||||||
return "", err
|
return "", fmt.Errorf("losetup -f --show %s failed: %v", path, err)
|
||||||
}
|
}
|
||||||
return parseLosetupOutputForDevice(out)
|
|
||||||
|
// losetup -f --show {path} returns device in the format:
|
||||||
|
// /dev/loop1
|
||||||
|
if len(out) == 0 {
|
||||||
|
return "", errors.New(ErrDeviceNotFound)
|
||||||
|
}
|
||||||
|
|
||||||
|
return strings.TrimSpace(string(out)), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoveLoopDevice removes specified loopback device
|
// removeLoopDevice removes specified loopback device
|
||||||
func (v VolumePathHandler) RemoveLoopDevice(device string) error {
|
func removeLoopDevice(device string) error {
|
||||||
args := []string{"-d", device}
|
args := []string{"-d", device}
|
||||||
cmd := exec.Command(losetupPath, args...)
|
cmd := exec.Command(losetupPath, args...)
|
||||||
out, err := cmd.CombinedOutput()
|
out, err := cmd.CombinedOutput()
|
||||||
@ -88,21 +121,121 @@ func (v VolumePathHandler) RemoveLoopDevice(device string) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
klog.V(2).Infof("Failed to remove loopback device: %s: %v %s", device, err, out)
|
klog.V(2).Infof("Failed to remove loopback device: %s: %v %s", device, err, out)
|
||||||
return err
|
return fmt.Errorf("losetup -d %s failed: %v", device, err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseLosetupOutputForDevice(output []byte) (string, error) {
|
func parseLosetupOutputForDevice(output []byte, path string) (string, error) {
|
||||||
if len(output) == 0 {
|
if len(output) == 0 {
|
||||||
return "", errors.New(ErrDeviceNotFound)
|
return "", errors.New(ErrDeviceNotFound)
|
||||||
}
|
}
|
||||||
|
|
||||||
// losetup returns device in the format:
|
// losetup -j {path} returns device in the format:
|
||||||
// /dev/loop1: [0073]:148662 (/dev/sda)
|
// /dev/loop1: [0073]:148662 ({path})
|
||||||
device := strings.TrimSpace(strings.SplitN(string(output), ":", 2)[0])
|
// /dev/loop2: [0073]:148662 (/dev/sdX)
|
||||||
|
//
|
||||||
|
// losetup -j shows all the loop device for the same device that has the same
|
||||||
|
// major/minor number, by resolving symlink and matching major/minor number.
|
||||||
|
// Therefore, there will be other path than {path} in output, as shown in above output.
|
||||||
|
s := string(output)
|
||||||
|
// Find the line that exact matches to the path, or "({path})"
|
||||||
|
var matched string
|
||||||
|
scanner := bufio.NewScanner(strings.NewReader(s))
|
||||||
|
for scanner.Scan() {
|
||||||
|
if strings.HasSuffix(scanner.Text(), "("+path+")") {
|
||||||
|
matched = scanner.Text()
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(matched) == 0 {
|
||||||
|
return "", errors.New(ErrDeviceNotFound)
|
||||||
|
}
|
||||||
|
s = matched
|
||||||
|
|
||||||
|
// Get device name, or the 0th field of the output separated with ":".
|
||||||
|
// We don't need 1st field or later to be splitted, so passing 2 to SplitN.
|
||||||
|
device := strings.TrimSpace(strings.SplitN(s, ":", 2)[0])
|
||||||
if len(device) == 0 {
|
if len(device) == 0 {
|
||||||
return "", errors.New(ErrDeviceNotFound)
|
return "", errors.New(ErrDeviceNotFound)
|
||||||
}
|
}
|
||||||
return device, nil
|
return device, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// FindGlobalMapPathUUIDFromPod finds {pod uuid} bind mount under globalMapPath
|
||||||
|
// corresponding to map path symlink, and then return global map path with pod uuid.
|
||||||
|
// (See pkg/volume/volume.go for details on a global map path and a pod device map path.)
|
||||||
|
// ex. mapPath symlink: pods/{podUid}}/{DefaultKubeletVolumeDevicesDirName}/{escapeQualifiedPluginName}/{volumeName} -> /dev/sdX
|
||||||
|
// globalMapPath/{pod uuid} bind mount: plugins/kubernetes.io/{PluginName}/{DefaultKubeletVolumeDevicesDirName}/{volumePluginDependentPath}/{pod uuid} -> /dev/sdX
|
||||||
|
func (v VolumePathHandler) FindGlobalMapPathUUIDFromPod(pluginDir, mapPath string, podUID types.UID) (string, error) {
|
||||||
|
var globalMapPathUUID string
|
||||||
|
// Find symbolic link named pod uuid under plugin dir
|
||||||
|
err := filepath.Walk(pluginDir, func(path string, fi os.FileInfo, err error) error {
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if (fi.Mode()&os.ModeDevice == os.ModeDevice) && (fi.Name() == string(podUID)) {
|
||||||
|
klog.V(5).Infof("FindGlobalMapPathFromPod: path %s, mapPath %s", path, mapPath)
|
||||||
|
if res, err := compareBindMountAndSymlinks(path, mapPath); err == nil && res {
|
||||||
|
globalMapPathUUID = path
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("FindGlobalMapPathUUIDFromPod failed: %v", err)
|
||||||
|
}
|
||||||
|
klog.V(5).Infof("FindGlobalMapPathFromPod: globalMapPathUUID %s", globalMapPathUUID)
|
||||||
|
// Return path contains global map path + {pod uuid}
|
||||||
|
return globalMapPathUUID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// compareBindMountAndSymlinks returns if global path (bind mount) and
|
||||||
|
// pod path (symlink) are pointing to the same device.
|
||||||
|
// If there is an error in checking it returns error.
|
||||||
|
func compareBindMountAndSymlinks(global, pod string) (bool, error) {
|
||||||
|
// To check if bind mount and symlink are pointing to the same device,
|
||||||
|
// we need to check if they are pointing to the devices that have same major/minor number.
|
||||||
|
|
||||||
|
// Get the major/minor number for global path
|
||||||
|
devNumGlobal, err := getDeviceMajorMinor(global)
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("getDeviceMajorMinor failed for path %s: %v", global, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the symlinked device from the pod path
|
||||||
|
devPod, err := os.Readlink(pod)
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("failed to readlink path %s: %v", pod, err)
|
||||||
|
}
|
||||||
|
// Get the major/minor number for the symlinked device from the pod path
|
||||||
|
devNumPod, err := getDeviceMajorMinor(devPod)
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("getDeviceMajorMinor failed for path %s: %v", devPod, err)
|
||||||
|
}
|
||||||
|
klog.V(5).Infof("CompareBindMountAndSymlinks: devNumGlobal %s, devNumPod %s", devNumGlobal, devNumPod)
|
||||||
|
|
||||||
|
// Check if the major/minor number are the same
|
||||||
|
if devNumGlobal == devNumPod {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getDeviceMajorMinor returns major/minor number for the path with below format:
|
||||||
|
// major:minor (in hex)
|
||||||
|
// ex)
|
||||||
|
// fc:10
|
||||||
|
func getDeviceMajorMinor(path string) (string, error) {
|
||||||
|
var stat unix.Stat_t
|
||||||
|
|
||||||
|
if err := unix.Stat(path, &stat); err != nil {
|
||||||
|
return "", fmt.Errorf("failed to stat path %s: %v", path, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
devNumber := uint64(stat.Rdev)
|
||||||
|
major := unix.Major(devNumber)
|
||||||
|
minor := unix.Minor(devNumber)
|
||||||
|
|
||||||
|
return fmt.Sprintf("%x:%x", major, minor), nil
|
||||||
|
}
|
||||||
|
@ -20,6 +20,8 @@ package volumepathhandler
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
// AttachFileDevice takes a path to a regular file and makes it available as an
|
// AttachFileDevice takes a path to a regular file and makes it available as an
|
||||||
@ -28,12 +30,19 @@ func (v VolumePathHandler) AttachFileDevice(path string) (string, error) {
|
|||||||
return "", fmt.Errorf("AttachFileDevice not supported for this build.")
|
return "", fmt.Errorf("AttachFileDevice not supported for this build.")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// DetachFileDevice takes a path to the attached block device and
|
||||||
|
// detach it from block device.
|
||||||
|
func (v VolumePathHandler) DetachFileDevice(path string) error {
|
||||||
|
return fmt.Errorf("DetachFileDevice not supported for this build.")
|
||||||
|
}
|
||||||
|
|
||||||
// GetLoopDevice returns the full path to the loop device associated with the given path.
|
// GetLoopDevice returns the full path to the loop device associated with the given path.
|
||||||
func (v VolumePathHandler) GetLoopDevice(path string) (string, error) {
|
func (v VolumePathHandler) GetLoopDevice(path string) (string, error) {
|
||||||
return "", fmt.Errorf("GetLoopDevice not supported for this build.")
|
return "", fmt.Errorf("GetLoopDevice not supported for this build.")
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoveLoopDevice removes specified loopback device
|
// FindGlobalMapPathUUIDFromPod finds {pod uuid} bind mount under globalMapPath
|
||||||
func (v VolumePathHandler) RemoveLoopDevice(device string) error {
|
// corresponding to map path symlink, and then return global map path with pod uuid.
|
||||||
return fmt.Errorf("RemoveLoopDevice not supported for this build.")
|
func (v VolumePathHandler) FindGlobalMapPathUUIDFromPod(pluginDir, mapPath string, podUID types.UID) (string, error) {
|
||||||
|
return "", fmt.Errorf("FindGlobalMapPathUUIDFromPod not supported for this build.")
|
||||||
}
|
}
|
||||||
|
@ -41,12 +41,12 @@ type Volume interface {
|
|||||||
// and pod device map path.
|
// and pod device map path.
|
||||||
type BlockVolume interface {
|
type BlockVolume interface {
|
||||||
// GetGlobalMapPath returns a global map path which contains
|
// GetGlobalMapPath returns a global map path which contains
|
||||||
// symbolic links associated to a block device.
|
// bind mount associated to a block device.
|
||||||
// ex. plugins/kubernetes.io/{PluginName}/{DefaultKubeletVolumeDevicesDirName}/{volumePluginDependentPath}/{pod uuid}
|
// ex. plugins/kubernetes.io/{PluginName}/{DefaultKubeletVolumeDevicesDirName}/{volumePluginDependentPath}/{pod uuid}
|
||||||
GetGlobalMapPath(spec *Spec) (string, error)
|
GetGlobalMapPath(spec *Spec) (string, error)
|
||||||
// GetPodDeviceMapPath returns a pod device map path
|
// GetPodDeviceMapPath returns a pod device map path
|
||||||
// and name of a symbolic link associated to a block device.
|
// and name of a symbolic link associated to a block device.
|
||||||
// ex. pods/{podUid}}/{DefaultKubeletVolumeDevicesDirName}/{escapeQualifiedPluginName}/{volumeName}
|
// ex. pods/{podUid}/{DefaultKubeletVolumeDevicesDirName}/{escapeQualifiedPluginName}/, {volumeName}
|
||||||
GetPodDeviceMapPath() (string, string)
|
GetPodDeviceMapPath() (string, string)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -29,7 +29,6 @@ import (
|
|||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
"k8s.io/kubernetes/pkg/util/mount"
|
"k8s.io/kubernetes/pkg/util/mount"
|
||||||
"k8s.io/kubernetes/pkg/volume"
|
"k8s.io/kubernetes/pkg/volume"
|
||||||
"k8s.io/kubernetes/pkg/volume/util"
|
|
||||||
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
"k8s.io/kubernetes/pkg/volume/util/volumepathhandler"
|
||||||
utilstrings "k8s.io/utils/strings"
|
utilstrings "k8s.io/utils/strings"
|
||||||
)
|
)
|
||||||
@ -138,7 +137,7 @@ func (v vsphereBlockVolumeMapper) SetUpDevice() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (v vsphereBlockVolumeMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
func (v vsphereBlockVolumeMapper) MapDevice(devicePath, globalMapPath, volumeMapPath, volumeMapName string, podUID types.UID) error {
|
||||||
return util.MapBlockVolume(devicePath, globalMapPath, volumeMapPath, volumeMapName, podUID)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ volume.BlockVolumeUnmapper = &vsphereBlockVolumeUnmapper{}
|
var _ volume.BlockVolumeUnmapper = &vsphereBlockVolumeUnmapper{}
|
||||||
|
Loading…
Reference in New Issue
Block a user