fix subdir internal mount fix mount subdir in NodePublishVolume fix golint fix fix setKeyValueInMap
178 lines
4.3 KiB
Go
178 lines
4.3 KiB
Go
/*
|
|
Copyright 2020 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package nfs
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/container-storage-interface/spec/lib/go/csi"
|
|
"github.com/kubernetes-csi/csi-lib-utils/protosanitizer"
|
|
"golang.org/x/net/context"
|
|
"google.golang.org/grpc"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
|
|
"k8s.io/klog/v2"
|
|
netutil "k8s.io/utils/net"
|
|
)
|
|
|
|
func NewDefaultIdentityServer(d *Driver) *IdentityServer {
|
|
return &IdentityServer{
|
|
Driver: d,
|
|
}
|
|
}
|
|
|
|
func NewControllerServer(d *Driver) *ControllerServer {
|
|
return &ControllerServer{
|
|
Driver: d,
|
|
}
|
|
}
|
|
|
|
func NewControllerServiceCapability(cap csi.ControllerServiceCapability_RPC_Type) *csi.ControllerServiceCapability {
|
|
return &csi.ControllerServiceCapability{
|
|
Type: &csi.ControllerServiceCapability_Rpc{
|
|
Rpc: &csi.ControllerServiceCapability_RPC{
|
|
Type: cap,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func NewNodeServiceCapability(cap csi.NodeServiceCapability_RPC_Type) *csi.NodeServiceCapability {
|
|
return &csi.NodeServiceCapability{
|
|
Type: &csi.NodeServiceCapability_Rpc{
|
|
Rpc: &csi.NodeServiceCapability_RPC{
|
|
Type: cap,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func ParseEndpoint(ep string) (string, string, error) {
|
|
if strings.HasPrefix(strings.ToLower(ep), "unix://") || strings.HasPrefix(strings.ToLower(ep), "tcp://") {
|
|
s := strings.SplitN(ep, "://", 2)
|
|
if s[1] != "" {
|
|
return s[0], s[1], nil
|
|
}
|
|
}
|
|
return "", "", fmt.Errorf("Invalid endpoint: %v", ep)
|
|
}
|
|
|
|
func getLogLevel(method string) int32 {
|
|
if method == "/csi.v1.Identity/Probe" ||
|
|
method == "/csi.v1.Node/NodeGetCapabilities" ||
|
|
method == "/csi.v1.Node/NodeGetVolumeStats" {
|
|
return 8
|
|
}
|
|
return 2
|
|
}
|
|
|
|
func logGRPC(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {
|
|
level := klog.Level(getLogLevel(info.FullMethod))
|
|
klog.V(level).Infof("GRPC call: %s", info.FullMethod)
|
|
klog.V(level).Infof("GRPC request: %s", protosanitizer.StripSecrets(req))
|
|
|
|
resp, err := handler(ctx, req)
|
|
if err != nil {
|
|
klog.Errorf("GRPC error: %v", err)
|
|
} else {
|
|
klog.V(level).Infof("GRPC response: %s", protosanitizer.StripSecrets(resp))
|
|
}
|
|
return resp, err
|
|
}
|
|
|
|
type VolumeLocks struct {
|
|
locks sets.String
|
|
mux sync.Mutex
|
|
}
|
|
|
|
func NewVolumeLocks() *VolumeLocks {
|
|
return &VolumeLocks{
|
|
locks: sets.NewString(),
|
|
}
|
|
}
|
|
|
|
func (vl *VolumeLocks) TryAcquire(volumeID string) bool {
|
|
vl.mux.Lock()
|
|
defer vl.mux.Unlock()
|
|
if vl.locks.Has(volumeID) {
|
|
return false
|
|
}
|
|
vl.locks.Insert(volumeID)
|
|
return true
|
|
}
|
|
|
|
func (vl *VolumeLocks) Release(volumeID string) {
|
|
vl.mux.Lock()
|
|
defer vl.mux.Unlock()
|
|
vl.locks.Delete(volumeID)
|
|
}
|
|
|
|
// getMountOptions get mountOptions value from a map
|
|
func getMountOptions(context map[string]string) string {
|
|
for k, v := range context {
|
|
switch strings.ToLower(k) {
|
|
case mountOptionsField:
|
|
return v
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// chmodIfPermissionMismatch only perform chmod when permission mismatches
|
|
func chmodIfPermissionMismatch(targetPath string, mode os.FileMode) error {
|
|
info, err := os.Lstat(targetPath)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
perm := info.Mode() & os.ModePerm
|
|
if perm != mode {
|
|
klog.V(2).Infof("chmod targetPath(%s, mode:0%o) with permissions(0%o)", targetPath, info.Mode(), mode)
|
|
if err := os.Chmod(targetPath, mode); err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
klog.V(2).Infof("skip chmod on targetPath(%s) since mode is already 0%o)", targetPath, info.Mode())
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getServerFromSource if server is IPv6, return [IPv6]
|
|
func getServerFromSource(server string) string {
|
|
if netutil.IsIPv6String(server) {
|
|
return fmt.Sprintf("[%s]", server)
|
|
}
|
|
return server
|
|
}
|
|
|
|
// setKeyValueInMap set key/value pair in map
|
|
// key in the map is case insensitive, if key already exists, overwrite existing value
|
|
func setKeyValueInMap(m map[string]string, key, value string) {
|
|
if m == nil {
|
|
return
|
|
}
|
|
for k := range m {
|
|
if strings.EqualFold(k, key) {
|
|
m[k] = value
|
|
return
|
|
}
|
|
}
|
|
m[key] = value
|
|
}
|