mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-06 02:34:03 +00:00
add possibility to ignore volume label in dynamic provisioning
ignorelabel -> addlabel FIX tests small fix to test fixes according what was asked fix test fix test
This commit is contained in:
parent
c1703a4998
commit
e45457b0d8
@ -94,6 +94,7 @@ type LoadBalancerOpts struct {
|
|||||||
type BlockStorageOpts struct {
|
type BlockStorageOpts struct {
|
||||||
BSVersion string `gcfg:"bs-version"` // overrides autodetection. v1 or v2. Defaults to auto
|
BSVersion string `gcfg:"bs-version"` // overrides autodetection. v1 or v2. Defaults to auto
|
||||||
TrustDevicePath bool `gcfg:"trust-device-path"` // See Issue #33128
|
TrustDevicePath bool `gcfg:"trust-device-path"` // See Issue #33128
|
||||||
|
IgnoreVolumeAZ bool `gcfg:"ignore-volume-az"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type RouterOpts struct {
|
type RouterOpts struct {
|
||||||
@ -187,6 +188,7 @@ func readConfig(config io.Reader) (Config, error) {
|
|||||||
// Set default values for config params
|
// Set default values for config params
|
||||||
cfg.BlockStorage.BSVersion = "auto"
|
cfg.BlockStorage.BSVersion = "auto"
|
||||||
cfg.BlockStorage.TrustDevicePath = false
|
cfg.BlockStorage.TrustDevicePath = false
|
||||||
|
cfg.BlockStorage.IgnoreVolumeAZ = false
|
||||||
cfg.Metadata.SearchOrder = fmt.Sprintf("%s,%s", configDriveID, metadataID)
|
cfg.Metadata.SearchOrder = fmt.Sprintf("%s,%s", configDriveID, metadataID)
|
||||||
|
|
||||||
err := gcfg.ReadInto(&cfg, config)
|
err := gcfg.ReadInto(&cfg, config)
|
||||||
|
@ -101,6 +101,7 @@ func TestReadConfig(t *testing.T) {
|
|||||||
[BlockStorage]
|
[BlockStorage]
|
||||||
bs-version = auto
|
bs-version = auto
|
||||||
trust-device-path = yes
|
trust-device-path = yes
|
||||||
|
ignore-volume-az = yes
|
||||||
[Metadata]
|
[Metadata]
|
||||||
search-order = configDrive, metadataService
|
search-order = configDrive, metadataService
|
||||||
`))
|
`))
|
||||||
@ -129,6 +130,9 @@ func TestReadConfig(t *testing.T) {
|
|||||||
if cfg.BlockStorage.BSVersion != "auto" {
|
if cfg.BlockStorage.BSVersion != "auto" {
|
||||||
t.Errorf("incorrect bs.bs-version: %v", cfg.BlockStorage.BSVersion)
|
t.Errorf("incorrect bs.bs-version: %v", cfg.BlockStorage.BSVersion)
|
||||||
}
|
}
|
||||||
|
if cfg.BlockStorage.IgnoreVolumeAZ != true {
|
||||||
|
t.Errorf("incorrect bs.IgnoreVolumeAZ: %v", cfg.BlockStorage.IgnoreVolumeAZ)
|
||||||
|
}
|
||||||
if cfg.Metadata.SearchOrder != "configDrive, metadataService" {
|
if cfg.Metadata.SearchOrder != "configDrive, metadataService" {
|
||||||
t.Errorf("incorrect md.search-order: %v", cfg.Metadata.SearchOrder)
|
t.Errorf("incorrect md.search-order: %v", cfg.Metadata.SearchOrder)
|
||||||
}
|
}
|
||||||
@ -514,7 +518,7 @@ func TestVolumes(t *testing.T) {
|
|||||||
tags := map[string]string{
|
tags := map[string]string{
|
||||||
"test": "value",
|
"test": "value",
|
||||||
}
|
}
|
||||||
vol, _, err := os.CreateVolume("kubernetes-test-volume-"+rand.String(10), 1, "", "", &tags)
|
vol, _, _, err := os.CreateVolume("kubernetes-test-volume-"+rand.String(10), 1, "", "", &tags)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Cannot create a new Cinder volume: %v", err)
|
t.Fatalf("Cannot create a new Cinder volume: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -299,11 +299,11 @@ func (os *OpenStack) getVolume(volumeID string) (Volume, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// CreateVolume creates a volume of given size (in GiB)
|
// CreateVolume creates a volume of given size (in GiB)
|
||||||
func (os *OpenStack) CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, error) {
|
func (os *OpenStack) CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, bool, error) {
|
||||||
volumes, err := os.volumeService("")
|
volumes, err := os.volumeService("")
|
||||||
if err != nil || volumes == nil {
|
if err != nil || volumes == nil {
|
||||||
glog.Errorf("Unable to initialize cinder client for region: %s", os.region)
|
glog.Errorf("Unable to initialize cinder client for region: %s", os.region)
|
||||||
return "", "", err
|
return "", "", os.bsOpts.IgnoreVolumeAZ, err
|
||||||
}
|
}
|
||||||
|
|
||||||
opts := VolumeCreateOpts{
|
opts := VolumeCreateOpts{
|
||||||
@ -320,11 +320,11 @@ func (os *OpenStack) CreateVolume(name string, size int, vtype, availability str
|
|||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Errorf("Failed to create a %d GB volume: %v", size, err)
|
glog.Errorf("Failed to create a %d GB volume: %v", size, err)
|
||||||
return "", "", err
|
return "", "", os.bsOpts.IgnoreVolumeAZ, err
|
||||||
}
|
}
|
||||||
|
|
||||||
glog.Infof("Created volume %v in Availability Zone: %v", volumeID, volumeAZ)
|
glog.Infof("Created volume %v in Availability Zone: %v Ignore volume AZ: %v", volumeID, volumeAZ, os.bsOpts.IgnoreVolumeAZ)
|
||||||
return volumeID, volumeAZ, nil
|
return volumeID, volumeAZ, os.bsOpts.IgnoreVolumeAZ, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetDevicePath returns the path of an attached block storage volume, specified by its id.
|
// GetDevicePath returns the path of an attached block storage volume, specified by its id.
|
||||||
|
@ -571,8 +571,8 @@ func (testcase *testcase) ShouldTrustDevicePath() bool {
|
|||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
func (testcase *testcase) CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, error) {
|
func (testcase *testcase) CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, bool, error) {
|
||||||
return "", "", errors.New("Not implemented")
|
return "", "", false, errors.New("Not implemented")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (testcase *testcase) GetDevicePath(volumeID string) string {
|
func (testcase *testcase) GetDevicePath(volumeID string) string {
|
||||||
|
@ -46,7 +46,7 @@ type CinderProvider interface {
|
|||||||
AttachDisk(instanceID, volumeID string) (string, error)
|
AttachDisk(instanceID, volumeID string) (string, error)
|
||||||
DetachDisk(instanceID, volumeID string) error
|
DetachDisk(instanceID, volumeID string) error
|
||||||
DeleteVolume(volumeID string) error
|
DeleteVolume(volumeID string) error
|
||||||
CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, error)
|
CreateVolume(name string, size int, vtype, availability string, tags *map[string]string) (string, string, bool, error)
|
||||||
GetDevicePath(volumeID string) string
|
GetDevicePath(volumeID string) string
|
||||||
InstanceID() (string, error)
|
InstanceID() (string, error)
|
||||||
GetAttachmentDiskPath(instanceID, volumeID string) (string, error)
|
GetAttachmentDiskPath(instanceID, volumeID string) (string, error)
|
||||||
|
@ -204,7 +204,7 @@ func (util *CinderDiskUtil) CreateVolume(c *cinderVolumeProvisioner) (volumeID s
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
volumeID, volumeAZ, errr := cloud.CreateVolume(name, volSizeGB, vtype, availability, c.options.CloudTags)
|
volumeID, volumeAZ, IgnoreVolumeAZ, errr := cloud.CreateVolume(name, volSizeGB, vtype, availability, c.options.CloudTags)
|
||||||
if errr != nil {
|
if errr != nil {
|
||||||
glog.V(2).Infof("Error creating cinder volume: %v", errr)
|
glog.V(2).Infof("Error creating cinder volume: %v", errr)
|
||||||
return "", 0, nil, "", errr
|
return "", 0, nil, "", errr
|
||||||
@ -213,8 +213,9 @@ func (util *CinderDiskUtil) CreateVolume(c *cinderVolumeProvisioner) (volumeID s
|
|||||||
|
|
||||||
// these are needed that pod is spawning to same AZ
|
// these are needed that pod is spawning to same AZ
|
||||||
volumeLabels = make(map[string]string)
|
volumeLabels = make(map[string]string)
|
||||||
|
if IgnoreVolumeAZ == false {
|
||||||
volumeLabels[kubeletapis.LabelZoneFailureDomain] = volumeAZ
|
volumeLabels[kubeletapis.LabelZoneFailureDomain] = volumeAZ
|
||||||
|
}
|
||||||
return volumeID, volSizeGB, volumeLabels, fstype, nil
|
return volumeID, volSizeGB, volumeLabels, fstype, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user