
add initial work for mount azure file on windows fix review comments full implementation for attach azure file on windows node working azure file mount remove useless functions add a workable implementation about mounting azure file on windows node fix review comments and make the pod creating successful even azure file mount failed fix according to review comments add mount_windows_test add implementation for IsLikelyNotMountPoint func remove mount_windows_test.go temporaly add back unit test for mount_windows.go add normalizeWindowsPath func fix normalizeWindowsPath func issue implment azure disk on windows update bazel BUILD revert validation.go change as it's another PR fix merge issue and compiling issue fix windows compiling issue fix according to review comments fix according to review comments fix cross-build failure fix according to review comments fix test build failure temporalily fix darwin build failure fix azure windows test failure add empty implementation of MakeRShared on windows fix gofmt errors
332 lines
10 KiB
Go
332 lines
10 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package azure_file
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"runtime"
|
|
|
|
"k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/kubernetes/pkg/util/mount"
|
|
kstrings "k8s.io/kubernetes/pkg/util/strings"
|
|
"k8s.io/kubernetes/pkg/volume"
|
|
|
|
"github.com/golang/glog"
|
|
"k8s.io/kubernetes/pkg/cloudprovider"
|
|
"k8s.io/kubernetes/pkg/cloudprovider/providers/azure"
|
|
"k8s.io/kubernetes/pkg/volume/util"
|
|
)
|
|
|
|
// ProbeVolumePlugins is the primary endpoint for volume plugins
|
|
func ProbeVolumePlugins() []volume.VolumePlugin {
|
|
return []volume.VolumePlugin{&azureFilePlugin{nil}}
|
|
}
|
|
|
|
type azureFilePlugin struct {
|
|
host volume.VolumeHost
|
|
}
|
|
|
|
var _ volume.VolumePlugin = &azureFilePlugin{}
|
|
var _ volume.PersistentVolumePlugin = &azureFilePlugin{}
|
|
|
|
const (
|
|
azureFilePluginName = "kubernetes.io/azure-file"
|
|
)
|
|
|
|
func getPath(uid types.UID, volName string, host volume.VolumeHost) string {
|
|
return host.GetPodVolumeDir(uid, kstrings.EscapeQualifiedNameForDisk(azureFilePluginName), volName)
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) Init(host volume.VolumeHost) error {
|
|
plugin.host = host
|
|
return nil
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) GetPluginName() string {
|
|
return azureFilePluginName
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) GetVolumeName(spec *volume.Spec) (string, error) {
|
|
share, _, err := getVolumeSource(spec)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return share, nil
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) CanSupport(spec *volume.Spec) bool {
|
|
//TODO: check if mount.cifs is there
|
|
return (spec.PersistentVolume != nil && spec.PersistentVolume.Spec.AzureFile != nil) ||
|
|
(spec.Volume != nil && spec.Volume.AzureFile != nil)
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) RequiresRemount() bool {
|
|
return false
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) SupportsMountOption() bool {
|
|
return true
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) SupportsBulkVolumeVerification() bool {
|
|
return false
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) GetAccessModes() []v1.PersistentVolumeAccessMode {
|
|
return []v1.PersistentVolumeAccessMode{
|
|
v1.ReadWriteOnce,
|
|
v1.ReadOnlyMany,
|
|
v1.ReadWriteMany,
|
|
}
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, _ volume.VolumeOptions) (volume.Mounter, error) {
|
|
return plugin.newMounterInternal(spec, pod, &azureSvc{}, plugin.host.GetMounter(plugin.GetPluginName()))
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) newMounterInternal(spec *volume.Spec, pod *v1.Pod, util azureUtil, mounter mount.Interface) (volume.Mounter, error) {
|
|
share, readOnly, err := getVolumeSource(spec)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
secretName, secretNamespace, err := getSecretNameAndNamespace(spec, pod.Namespace)
|
|
return &azureFileMounter{
|
|
azureFile: &azureFile{
|
|
volName: spec.Name(),
|
|
mounter: mounter,
|
|
pod: pod,
|
|
plugin: plugin,
|
|
MetricsProvider: volume.NewMetricsStatFS(getPath(pod.UID, spec.Name(), plugin.host)),
|
|
},
|
|
util: util,
|
|
secretNamespace: secretNamespace,
|
|
secretName: secretName,
|
|
shareName: share,
|
|
readOnly: readOnly,
|
|
mountOptions: volume.MountOptionFromSpec(spec),
|
|
}, nil
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) {
|
|
return plugin.newUnmounterInternal(volName, podUID, plugin.host.GetMounter(plugin.GetPluginName()))
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) newUnmounterInternal(volName string, podUID types.UID, mounter mount.Interface) (volume.Unmounter, error) {
|
|
return &azureFileUnmounter{&azureFile{
|
|
volName: volName,
|
|
mounter: mounter,
|
|
pod: &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: podUID}},
|
|
plugin: plugin,
|
|
MetricsProvider: volume.NewMetricsStatFS(getPath(podUID, volName, plugin.host)),
|
|
}}, nil
|
|
}
|
|
|
|
func (plugin *azureFilePlugin) ConstructVolumeSpec(volName, mountPath string) (*volume.Spec, error) {
|
|
azureVolume := &v1.Volume{
|
|
Name: volName,
|
|
VolumeSource: v1.VolumeSource{
|
|
AzureFile: &v1.AzureFileVolumeSource{
|
|
SecretName: volName,
|
|
ShareName: volName,
|
|
},
|
|
},
|
|
}
|
|
return volume.NewSpecFromVolume(azureVolume), nil
|
|
}
|
|
|
|
// azureFile volumes represent mount of an AzureFile share.
|
|
type azureFile struct {
|
|
volName string
|
|
podUID types.UID
|
|
pod *v1.Pod
|
|
mounter mount.Interface
|
|
plugin *azureFilePlugin
|
|
volume.MetricsProvider
|
|
}
|
|
|
|
func (azureFileVolume *azureFile) GetPath() string {
|
|
return getPath(azureFileVolume.pod.UID, azureFileVolume.volName, azureFileVolume.plugin.host)
|
|
}
|
|
|
|
type azureFileMounter struct {
|
|
*azureFile
|
|
util azureUtil
|
|
secretName string
|
|
secretNamespace string
|
|
shareName string
|
|
readOnly bool
|
|
mountOptions []string
|
|
}
|
|
|
|
var _ volume.Mounter = &azureFileMounter{}
|
|
|
|
func (b *azureFileMounter) GetAttributes() volume.Attributes {
|
|
return volume.Attributes{
|
|
ReadOnly: b.readOnly,
|
|
Managed: !b.readOnly,
|
|
SupportsSELinux: false,
|
|
}
|
|
}
|
|
|
|
// Checks prior to mount operations to verify that the required components (binaries, etc.)
|
|
// to mount the volume are available on the underlying node.
|
|
// If not, it returns an error
|
|
func (b *azureFileMounter) CanMount() error {
|
|
return nil
|
|
}
|
|
|
|
// SetUp attaches the disk and bind mounts to the volume path.
|
|
func (b *azureFileMounter) SetUp(fsGroup *int64) error {
|
|
return b.SetUpAt(b.GetPath(), fsGroup)
|
|
}
|
|
|
|
func (b *azureFileMounter) SetUpAt(dir string, fsGroup *int64) error {
|
|
notMnt, err := b.mounter.IsLikelyNotMountPoint(dir)
|
|
glog.V(4).Infof("AzureFile mount set up: %s %v %v", dir, !notMnt, err)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return err
|
|
}
|
|
if !notMnt {
|
|
return nil
|
|
}
|
|
var accountKey, accountName string
|
|
if accountName, accountKey, err = b.util.GetAzureCredentials(b.plugin.host, b.secretNamespace, b.secretName); err != nil {
|
|
return err
|
|
}
|
|
|
|
mountOptions := []string{}
|
|
source := ""
|
|
osSeparator := string(os.PathSeparator)
|
|
source = fmt.Sprintf("%s%s%s.file.%s%s%s", osSeparator, osSeparator, accountName, getStorageEndpointSuffix(b.plugin.host.GetCloudProvider()), osSeparator, b.shareName)
|
|
|
|
if runtime.GOOS == "windows" {
|
|
mountOptions = []string{accountName, accountKey}
|
|
} else {
|
|
os.MkdirAll(dir, 0700)
|
|
// parameters suggested by https://azure.microsoft.com/en-us/documentation/articles/storage-how-to-use-files-linux/
|
|
options := []string{fmt.Sprintf("vers=3.0,username=%s,password=%s,dir_mode=0700,file_mode=0700", accountName, accountKey)}
|
|
if b.readOnly {
|
|
options = append(options, "ro")
|
|
}
|
|
mountOptions = volume.JoinMountOptions(b.mountOptions, options)
|
|
}
|
|
|
|
err = b.mounter.Mount(source, dir, "cifs", mountOptions)
|
|
if err != nil {
|
|
notMnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
|
|
if mntErr != nil {
|
|
glog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
|
|
return err
|
|
}
|
|
if !notMnt {
|
|
if mntErr = b.mounter.Unmount(dir); mntErr != nil {
|
|
glog.Errorf("Failed to unmount: %v", mntErr)
|
|
return err
|
|
}
|
|
notMnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
|
|
if mntErr != nil {
|
|
glog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
|
|
return err
|
|
}
|
|
if !notMnt {
|
|
// This is very odd, we don't expect it. We'll try again next sync loop.
|
|
glog.Errorf("%s is still mounted, despite call to unmount(). Will try again next sync loop.", dir)
|
|
return err
|
|
}
|
|
}
|
|
os.Remove(dir)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
var _ volume.Unmounter = &azureFileUnmounter{}
|
|
|
|
type azureFileUnmounter struct {
|
|
*azureFile
|
|
}
|
|
|
|
func (c *azureFileUnmounter) TearDown() error {
|
|
return c.TearDownAt(c.GetPath())
|
|
}
|
|
|
|
func (c *azureFileUnmounter) TearDownAt(dir string) error {
|
|
return util.UnmountPath(dir, c.mounter)
|
|
}
|
|
|
|
func getVolumeSource(spec *volume.Spec) (string, bool, error) {
|
|
if spec.Volume != nil && spec.Volume.AzureFile != nil {
|
|
share := spec.Volume.AzureFile.ShareName
|
|
readOnly := spec.Volume.AzureFile.ReadOnly
|
|
return share, readOnly, nil
|
|
} else if spec.PersistentVolume != nil &&
|
|
spec.PersistentVolume.Spec.AzureFile != nil {
|
|
share := spec.PersistentVolume.Spec.AzureFile.ShareName
|
|
readOnly := spec.ReadOnly
|
|
return share, readOnly, nil
|
|
}
|
|
return "", false, fmt.Errorf("Spec does not reference an AzureFile volume type")
|
|
}
|
|
|
|
func getSecretNameAndNamespace(spec *volume.Spec, defaultNamespace string) (string, string, error) {
|
|
secretName := ""
|
|
secretNamespace := ""
|
|
if spec.Volume != nil && spec.Volume.AzureFile != nil {
|
|
secretName = spec.Volume.AzureFile.SecretName
|
|
secretNamespace = defaultNamespace
|
|
|
|
} else if spec.PersistentVolume != nil &&
|
|
spec.PersistentVolume.Spec.AzureFile != nil {
|
|
secretNamespace = defaultNamespace
|
|
if spec.PersistentVolume.Spec.AzureFile.SecretNamespace != nil {
|
|
secretNamespace = *spec.PersistentVolume.Spec.AzureFile.SecretNamespace
|
|
}
|
|
secretName = spec.PersistentVolume.Spec.AzureFile.SecretName
|
|
} else {
|
|
return "", "", fmt.Errorf("Spec does not reference an AzureFile volume type")
|
|
}
|
|
|
|
if len(secretNamespace) == 0 {
|
|
return "", "", fmt.Errorf("invalid Azure volume: nil namespace")
|
|
}
|
|
return secretName, secretNamespace, nil
|
|
|
|
}
|
|
|
|
func getAzureCloud(cloudProvider cloudprovider.Interface) (*azure.Cloud, error) {
|
|
azure, ok := cloudProvider.(*azure.Cloud)
|
|
if !ok || azure == nil {
|
|
return nil, fmt.Errorf("Failed to get Azure Cloud Provider. GetCloudProvider returned %v instead", cloudProvider)
|
|
}
|
|
|
|
return azure, nil
|
|
}
|
|
|
|
func getStorageEndpointSuffix(cloudprovider cloudprovider.Interface) string {
|
|
const publicCloudStorageEndpointSuffix = "core.windows.net"
|
|
azure, err := getAzureCloud(cloudprovider)
|
|
if err != nil {
|
|
glog.Warningf("No Azure cloud provider found. Using the Azure public cloud endpoint: %s", publicCloudStorageEndpointSuffix)
|
|
return publicCloudStorageEndpointSuffix
|
|
}
|
|
return azure.Environment.StorageEndpointSuffix
|
|
}
|