mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 05:40:42 +00:00 
			
		
		
		
	kubelet: Remove the deprecated flag `--experimental-check-node-capabilities-before-mount`
		
			
				
	
	
		
			344 lines
		
	
	
		
			9.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			344 lines
		
	
	
		
			9.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2015 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package configmap
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 
 | |
| 	"k8s.io/klog/v2"
 | |
| 	"k8s.io/mount-utils"
 | |
| 	utilstrings "k8s.io/utils/strings"
 | |
| 
 | |
| 	v1 "k8s.io/api/core/v1"
 | |
| 	"k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/kubernetes/pkg/volume"
 | |
| 	volumeutil "k8s.io/kubernetes/pkg/volume/util"
 | |
| )
 | |
| 
 | |
| // ProbeVolumePlugins is the entry point for plugin detection in a package.
 | |
| func ProbeVolumePlugins() []volume.VolumePlugin {
 | |
| 	return []volume.VolumePlugin{&configMapPlugin{}}
 | |
| }
 | |
| 
 | |
| const (
 | |
| 	configMapPluginName = "kubernetes.io/configmap"
 | |
| )
 | |
| 
 | |
| // configMapPlugin implements the VolumePlugin interface.
 | |
| type configMapPlugin struct {
 | |
| 	host         volume.VolumeHost
 | |
| 	getConfigMap func(namespace, name string) (*v1.ConfigMap, error)
 | |
| }
 | |
| 
 | |
| var _ volume.VolumePlugin = &configMapPlugin{}
 | |
| 
 | |
| func getPath(uid types.UID, volName string, host volume.VolumeHost) string {
 | |
| 	return host.GetPodVolumeDir(uid, utilstrings.EscapeQualifiedName(configMapPluginName), volName)
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) Init(host volume.VolumeHost) error {
 | |
| 	plugin.host = host
 | |
| 	plugin.getConfigMap = host.GetConfigMapFunc()
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) GetPluginName() string {
 | |
| 	return configMapPluginName
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) GetVolumeName(spec *volume.Spec) (string, error) {
 | |
| 	volumeSource, _ := getVolumeSource(spec)
 | |
| 	if volumeSource == nil {
 | |
| 		return "", fmt.Errorf("Spec does not reference a ConfigMap volume type")
 | |
| 	}
 | |
| 
 | |
| 	return fmt.Sprintf(
 | |
| 		"%v/%v",
 | |
| 		spec.Name(),
 | |
| 		volumeSource.Name), nil
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) CanSupport(spec *volume.Spec) bool {
 | |
| 	return spec.Volume != nil && spec.Volume.ConfigMap != nil
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) RequiresRemount(spec *volume.Spec) bool {
 | |
| 	return true
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) SupportsMountOption() bool {
 | |
| 	return false
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) SupportsBulkVolumeVerification() bool {
 | |
| 	return false
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, opts volume.VolumeOptions) (volume.Mounter, error) {
 | |
| 	return &configMapVolumeMounter{
 | |
| 		configMapVolume: &configMapVolume{
 | |
| 			spec.Name(),
 | |
| 			pod.UID,
 | |
| 			plugin,
 | |
| 			plugin.host.GetMounter(plugin.GetPluginName()),
 | |
| 			volume.NewCachedMetrics(volume.NewMetricsDu(getPath(pod.UID, spec.Name(), plugin.host))),
 | |
| 		},
 | |
| 		source:       *spec.Volume.ConfigMap,
 | |
| 		pod:          *pod,
 | |
| 		opts:         &opts,
 | |
| 		getConfigMap: plugin.getConfigMap,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) {
 | |
| 	return &configMapVolumeUnmounter{
 | |
| 		&configMapVolume{
 | |
| 			volName,
 | |
| 			podUID,
 | |
| 			plugin,
 | |
| 			plugin.host.GetMounter(plugin.GetPluginName()),
 | |
| 			volume.NewCachedMetrics(volume.NewMetricsDu(getPath(podUID, volName, plugin.host))),
 | |
| 		},
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (plugin *configMapPlugin) ConstructVolumeSpec(volumeName, mountPath string) (*volume.Spec, error) {
 | |
| 	configMapVolume := &v1.Volume{
 | |
| 		Name: volumeName,
 | |
| 		VolumeSource: v1.VolumeSource{
 | |
| 			ConfigMap: &v1.ConfigMapVolumeSource{},
 | |
| 		},
 | |
| 	}
 | |
| 	return volume.NewSpecFromVolume(configMapVolume), nil
 | |
| }
 | |
| 
 | |
| type configMapVolume struct {
 | |
| 	volName string
 | |
| 	podUID  types.UID
 | |
| 	plugin  *configMapPlugin
 | |
| 	mounter mount.Interface
 | |
| 	volume.MetricsProvider
 | |
| }
 | |
| 
 | |
| var _ volume.Volume = &configMapVolume{}
 | |
| 
 | |
| func (sv *configMapVolume) GetPath() string {
 | |
| 	return sv.plugin.host.GetPodVolumeDir(sv.podUID, utilstrings.EscapeQualifiedName(configMapPluginName), sv.volName)
 | |
| }
 | |
| 
 | |
| // configMapVolumeMounter handles retrieving secrets from the API server
 | |
| // and placing them into the volume on the host.
 | |
| type configMapVolumeMounter struct {
 | |
| 	*configMapVolume
 | |
| 
 | |
| 	source       v1.ConfigMapVolumeSource
 | |
| 	pod          v1.Pod
 | |
| 	opts         *volume.VolumeOptions
 | |
| 	getConfigMap func(namespace, name string) (*v1.ConfigMap, error)
 | |
| }
 | |
| 
 | |
| var _ volume.Mounter = &configMapVolumeMounter{}
 | |
| 
 | |
| func (sv *configMapVolume) GetAttributes() volume.Attributes {
 | |
| 	return volume.Attributes{
 | |
| 		ReadOnly:       true,
 | |
| 		Managed:        true,
 | |
| 		SELinuxRelabel: true,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func wrappedVolumeSpec() volume.Spec {
 | |
| 	// This is the spec for the volume that this plugin wraps.
 | |
| 	return volume.Spec{
 | |
| 		// This should be on a tmpfs instead of the local disk; the problem is
 | |
| 		// charging the memory for the tmpfs to the right cgroup.  We should make
 | |
| 		// this a tmpfs when we can do the accounting correctly.
 | |
| 		Volume: &v1.Volume{VolumeSource: v1.VolumeSource{EmptyDir: &v1.EmptyDirVolumeSource{}}},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (b *configMapVolumeMounter) SetUp(mounterArgs volume.MounterArgs) error {
 | |
| 	return b.SetUpAt(b.GetPath(), mounterArgs)
 | |
| }
 | |
| 
 | |
| func (b *configMapVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
 | |
| 	klog.V(3).Infof("Setting up volume %v for pod %v at %v", b.volName, b.pod.UID, dir)
 | |
| 
 | |
| 	// Wrap EmptyDir, let it do the setup.
 | |
| 	wrapped, err := b.plugin.host.NewWrapperMounter(b.volName, wrappedVolumeSpec(), &b.pod, *b.opts)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	optional := b.source.Optional != nil && *b.source.Optional
 | |
| 	configMap, err := b.getConfigMap(b.pod.Namespace, b.source.Name)
 | |
| 	if err != nil {
 | |
| 		if !(errors.IsNotFound(err) && optional) {
 | |
| 			klog.Errorf("Couldn't get configMap %v/%v: %v", b.pod.Namespace, b.source.Name, err)
 | |
| 			return err
 | |
| 		}
 | |
| 		configMap = &v1.ConfigMap{
 | |
| 			ObjectMeta: metav1.ObjectMeta{
 | |
| 				Namespace: b.pod.Namespace,
 | |
| 				Name:      b.source.Name,
 | |
| 			},
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	totalBytes := totalBytes(configMap)
 | |
| 	klog.V(3).Infof("Received configMap %v/%v containing (%v) pieces of data, %v total bytes",
 | |
| 		b.pod.Namespace,
 | |
| 		b.source.Name,
 | |
| 		len(configMap.Data)+len(configMap.BinaryData),
 | |
| 		totalBytes)
 | |
| 
 | |
| 	payload, err := MakePayload(b.source.Items, configMap, b.source.DefaultMode, optional)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	setupSuccess := false
 | |
| 	if err := wrapped.SetUpAt(dir, mounterArgs); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := volumeutil.MakeNestedMountpoints(b.volName, dir, b.pod); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		// Clean up directories if setup fails
 | |
| 		if !setupSuccess {
 | |
| 			unmounter, unmountCreateErr := b.plugin.NewUnmounter(b.volName, b.podUID)
 | |
| 			if unmountCreateErr != nil {
 | |
| 				klog.Errorf("error cleaning up mount %s after failure. Create unmounter failed with %v", b.volName, unmountCreateErr)
 | |
| 				return
 | |
| 			}
 | |
| 			tearDownErr := unmounter.TearDown()
 | |
| 			if tearDownErr != nil {
 | |
| 				klog.Errorf("Error tearing down volume %s with : %v", b.volName, tearDownErr)
 | |
| 			}
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	writerContext := fmt.Sprintf("pod %v/%v volume %v", b.pod.Namespace, b.pod.Name, b.volName)
 | |
| 	writer, err := volumeutil.NewAtomicWriter(dir, writerContext)
 | |
| 	if err != nil {
 | |
| 		klog.Errorf("Error creating atomic writer: %v", err)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	err = writer.Write(payload)
 | |
| 	if err != nil {
 | |
| 		klog.Errorf("Error writing payload to dir: %v", err)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/, volumeutil.FSGroupCompleteHook(b.plugin, nil))
 | |
| 	if err != nil {
 | |
| 		klog.Errorf("Error applying volume ownership settings for group: %v", mounterArgs.FsGroup)
 | |
| 		return err
 | |
| 	}
 | |
| 	setupSuccess = true
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // MakePayload function is exported so that it can be called from the projection volume driver
 | |
| func MakePayload(mappings []v1.KeyToPath, configMap *v1.ConfigMap, defaultMode *int32, optional bool) (map[string]volumeutil.FileProjection, error) {
 | |
| 	if defaultMode == nil {
 | |
| 		return nil, fmt.Errorf("no defaultMode used, not even the default value for it")
 | |
| 	}
 | |
| 
 | |
| 	payload := make(map[string]volumeutil.FileProjection, (len(configMap.Data) + len(configMap.BinaryData)))
 | |
| 	var fileProjection volumeutil.FileProjection
 | |
| 
 | |
| 	if len(mappings) == 0 {
 | |
| 		for name, data := range configMap.Data {
 | |
| 			fileProjection.Data = []byte(data)
 | |
| 			fileProjection.Mode = *defaultMode
 | |
| 			payload[name] = fileProjection
 | |
| 		}
 | |
| 		for name, data := range configMap.BinaryData {
 | |
| 			fileProjection.Data = data
 | |
| 			fileProjection.Mode = *defaultMode
 | |
| 			payload[name] = fileProjection
 | |
| 		}
 | |
| 	} else {
 | |
| 		for _, ktp := range mappings {
 | |
| 			if stringData, ok := configMap.Data[ktp.Key]; ok {
 | |
| 				fileProjection.Data = []byte(stringData)
 | |
| 			} else if binaryData, ok := configMap.BinaryData[ktp.Key]; ok {
 | |
| 				fileProjection.Data = binaryData
 | |
| 			} else {
 | |
| 				if optional {
 | |
| 					continue
 | |
| 				}
 | |
| 				return nil, fmt.Errorf("configmap references non-existent config key: %s", ktp.Key)
 | |
| 			}
 | |
| 
 | |
| 			if ktp.Mode != nil {
 | |
| 				fileProjection.Mode = *ktp.Mode
 | |
| 			} else {
 | |
| 				fileProjection.Mode = *defaultMode
 | |
| 			}
 | |
| 			payload[ktp.Path] = fileProjection
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return payload, nil
 | |
| }
 | |
| 
 | |
| func totalBytes(configMap *v1.ConfigMap) int {
 | |
| 	totalSize := 0
 | |
| 	for _, value := range configMap.Data {
 | |
| 		totalSize += len(value)
 | |
| 	}
 | |
| 	for _, value := range configMap.BinaryData {
 | |
| 		totalSize += len(value)
 | |
| 	}
 | |
| 
 | |
| 	return totalSize
 | |
| }
 | |
| 
 | |
| // configMapVolumeUnmounter handles cleaning up configMap volumes.
 | |
| type configMapVolumeUnmounter struct {
 | |
| 	*configMapVolume
 | |
| }
 | |
| 
 | |
| var _ volume.Unmounter = &configMapVolumeUnmounter{}
 | |
| 
 | |
| func (c *configMapVolumeUnmounter) TearDown() error {
 | |
| 	return c.TearDownAt(c.GetPath())
 | |
| }
 | |
| 
 | |
| func (c *configMapVolumeUnmounter) TearDownAt(dir string) error {
 | |
| 	return volumeutil.UnmountViaEmptyDir(dir, c.plugin.host, c.volName, wrappedVolumeSpec(), c.podUID)
 | |
| }
 | |
| 
 | |
| func getVolumeSource(spec *volume.Spec) (*v1.ConfigMapVolumeSource, bool) {
 | |
| 	var readOnly bool
 | |
| 	var volumeSource *v1.ConfigMapVolumeSource
 | |
| 
 | |
| 	if spec.Volume != nil && spec.Volume.ConfigMap != nil {
 | |
| 		volumeSource = spec.Volume.ConfigMap
 | |
| 		readOnly = spec.ReadOnly
 | |
| 	}
 | |
| 
 | |
| 	return volumeSource, readOnly
 | |
| }
 |