274 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			274 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			Go
		
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"flag"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"regexp"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/golang/glog"
 | |
| 	v1 "k8s.io/api/core/v1"
 | |
| 
 | |
| 	storage "k8s.io/api/storage/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	"k8s.io/client-go/kubernetes"
 | |
| 	"k8s.io/client-go/rest"
 | |
| 	"k8s.io/kubernetes/pkg/apis/core/v1/helper"
 | |
| 	"k8s.io/client-go/tools/clientcmd"
 | |
| 	"sigs.k8s.io/sig-storage-lib-external-provisioner/controller"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	provisionerNameKey = "PROVISIONER_NAME"
 | |
| )
 | |
| 
 | |
| type nfsProvisioner struct {
 | |
| 	client kubernetes.Interface
 | |
| 	server string
 | |
| 	path   string
 | |
| }
 | |
| 
 | |
| type pvcMetadata struct {
 | |
| 	data        map[string]string
 | |
| 	labels      map[string]string
 | |
| 	annotations map[string]string
 | |
| }
 | |
| 
 | |
| var pattern = regexp.MustCompile(`\${\.PVC\.((labels|annotations)\.(.*?)|.*?)}`)
 | |
| 
 | |
| func (meta *pvcMetadata) stringParser(str string) string {
 | |
| 	result := pattern.FindAllStringSubmatch(str, -1)
 | |
| 	for _, r := range result {
 | |
| 		switch r[2] {
 | |
| 		case "labels":
 | |
| 			str = strings.Replace(str, r[0], meta.labels[r[3]], -1)
 | |
| 		case "annotations":
 | |
| 			str = strings.Replace(str, r[0], meta.annotations[r[3]], -1)
 | |
| 		default:
 | |
| 			str = strings.Replace(str, r[0], meta.data[r[1]], -1)
 | |
| 		}
 | |
| 	}
 | |
| 	return str
 | |
| }
 | |
| 
 | |
| const (
 | |
| 	mountPath = "/persistentvolumes"
 | |
| )
 | |
| 
 | |
| var _ controller.Provisioner = &nfsProvisioner{}
 | |
| 
 | |
| func (p *nfsProvisioner) Provision(options controller.ProvisionOptions) (*v1.PersistentVolume, error) {
 | |
| 	if options.PVC.Spec.Selector != nil {
 | |
| 		return nil, fmt.Errorf("claim Selector is not supported")
 | |
| 	}
 | |
| 	glog.V(4).Infof("nfs provisioner: VolumeOptions %v", options)
 | |
| 
 | |
| 	pvcNamespace := options.PVC.Namespace
 | |
| 	pvcName := options.PVC.Name
 | |
| 
 | |
| 	pvName := strings.Join([]string{pvcNamespace, pvcName, options.PVName}, "-")
 | |
| 
 | |
| 	metadata := &pvcMetadata{
 | |
| 		data: map[string]string{
 | |
| 			"name":      pvcName,
 | |
| 			"namespace": pvcNamespace,
 | |
| 		},
 | |
| 		labels:      options.PVC.Labels,
 | |
| 		annotations: options.PVC.Annotations,
 | |
| 	}
 | |
| 
 | |
| 	fullPath := filepath.Join(mountPath, pvName)
 | |
| 	path := filepath.Join(p.path, pvName)
 | |
| 
 | |
| 	pathPattern, exists := options.StorageClass.Parameters["pathPattern"]
 | |
| 	if exists {
 | |
| 		customPath := metadata.stringParser(pathPattern)
 | |
| 		path = filepath.Join(p.path, customPath)
 | |
| 		fullPath = filepath.Join(mountPath, customPath)
 | |
| 	}
 | |
| 
 | |
| 	glog.V(4).Infof("creating path %s", fullPath)
 | |
| 	if err := os.MkdirAll(fullPath, 0777); err != nil {
 | |
| 		return nil, errors.New("unable to create directory to provision new pv: " + err.Error())
 | |
| 	}
 | |
| 	os.Chmod(fullPath, 0777)
 | |
| 
 | |
| 	pv := &v1.PersistentVolume{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name: options.PVName,
 | |
| 		},
 | |
| 		Spec: v1.PersistentVolumeSpec{
 | |
| 			PersistentVolumeReclaimPolicy: *options.StorageClass.ReclaimPolicy,
 | |
| 			AccessModes:                   options.PVC.Spec.AccessModes,
 | |
| 			MountOptions:                  options.StorageClass.MountOptions,
 | |
| 			Capacity: v1.ResourceList{
 | |
| 				v1.ResourceName(v1.ResourceStorage): options.PVC.Spec.Resources.Requests[v1.ResourceName(v1.ResourceStorage)],
 | |
| 			},
 | |
| 			PersistentVolumeSource: v1.PersistentVolumeSource{
 | |
| 				NFS: &v1.NFSVolumeSource{
 | |
| 					Server:   p.server,
 | |
| 					Path:     path,
 | |
| 					ReadOnly: false,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	return pv, nil
 | |
| }
 | |
| 
 | |
| func (p *nfsProvisioner) Delete(volume *v1.PersistentVolume) error {
 | |
| 	path := volume.Spec.PersistentVolumeSource.NFS.Path
 | |
| 	relativePath := strings.Replace(path, p.path, "", 1)
 | |
| 	oldPath := filepath.Join(mountPath, relativePath)
 | |
| 
 | |
| 	if _, err := os.Stat(oldPath); os.IsNotExist(err) {
 | |
| 		glog.Warningf("path %s does not exist, deletion skipped", oldPath)
 | |
| 		return nil
 | |
| 	}
 | |
| 	// Get the storage class for this volume.
 | |
| 	storageClass, err := p.getClassForVolume(volume)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Determine if the "onDelete" parameter exists.
 | |
| 	// If it exists and has a delete value, delete the directory.
 | |
| 	// If it exists and has a retain value, safe the directory.
 | |
| 	onDelete := storageClass.Parameters["onDelete"]
 | |
| 	switch onDelete {
 | |
| 
 | |
| 	case "delete":
 | |
| 		return os.RemoveAll(oldPath)
 | |
| 
 | |
| 	case "retain":
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Determine if the "archiveOnDelete" parameter exists.
 | |
| 	// If it exists and has a false value, delete the directory.
 | |
| 	// Otherwise, archive it.
 | |
| 	archiveOnDelete, exists := storageClass.Parameters["archiveOnDelete"]
 | |
| 	if exists {
 | |
| 		archiveBool, err := strconv.ParseBool(archiveOnDelete)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		if !archiveBool {
 | |
| 			return os.RemoveAll(oldPath)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	archivePath := filepath.Join(mountPath, "archived-"+volume.Name)
 | |
| 	glog.V(4).Infof("archiving path %s to %s", oldPath, archivePath)
 | |
| 	return os.Rename(oldPath, archivePath)
 | |
| }
 | |
| 
 | |
| // getClassForVolume returns StorageClass
 | |
| func (p *nfsProvisioner) getClassForVolume(pv *v1.PersistentVolume) (*storage.StorageClass, error) {
 | |
| 	if p.client == nil {
 | |
| 		return nil, fmt.Errorf("Cannot get kube client")
 | |
| 	}
 | |
| 	className := helper.GetPersistentVolumeClass(pv)
 | |
| 	if className == "" {
 | |
| 		return nil, fmt.Errorf("Volume has no storage class")
 | |
| 	}
 | |
| 	class, err := p.client.StorageV1().StorageClasses().Get(className, metav1.GetOptions{})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return class, nil
 | |
| }
 | |
| 
 | |
| func main() {
 | |
| 	flag.Parse()
 | |
| 	flag.Set("logtostderr", "true")
 | |
| 
 | |
| 	server := os.Getenv("NFS_SERVER")
 | |
| 	if server == "" {
 | |
| 		glog.Fatal("NFS_SERVER not set")
 | |
| 	}
 | |
| 	path := os.Getenv("NFS_PATH")
 | |
| 	if path == "" {
 | |
| 		glog.Fatal("NFS_PATH not set")
 | |
| 	}
 | |
| 	provisionerName := os.Getenv(provisionerNameKey)
 | |
| 	if provisionerName == "" {
 | |
| 		glog.Fatalf("environment variable %s is not set! Please set it.", provisionerNameKey)
 | |
| 	}
 | |
| 	kubeconfig := os.Getenv("KUBECONFIG")
 | |
| 	var config *rest.Config
 | |
| 	if kubeconfig != "" {
 | |
| 		// Create an OutOfClusterConfig and use it to create a client for the controller
 | |
| 		// to use to communicate with Kubernetes
 | |
| 		var err error
 | |
| 		config, err = clientcmd.BuildConfigFromFlags("", kubeconfig)
 | |
| 		if err != nil {
 | |
| 			glog.Fatalf("Failed to create kubeconfig: %v", err)
 | |
| 		}
 | |
| 	} else {
 | |
| 		// Create an InClusterConfig and use it to create a client for the controller
 | |
| 		// to use to communicate with Kubernetes
 | |
| 		var err error
 | |
| 		config, err = rest.InClusterConfig()
 | |
| 		if err != nil {
 | |
| 			glog.Fatalf("Failed to create config: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 	clientset, err := kubernetes.NewForConfig(config)
 | |
| 	if err != nil {
 | |
| 		glog.Fatalf("Failed to create client: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// The controller needs to know what the server version is because out-of-tree
 | |
| 	// provisioners aren't officially supported until 1.5
 | |
| 	serverVersion, err := clientset.Discovery().ServerVersion()
 | |
| 	if err != nil {
 | |
| 		glog.Fatalf("Error getting server version: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	leaderElection := true
 | |
| 	leaderElectionEnv := os.Getenv("ENABLE_LEADER_ELECTION")
 | |
| 	if ( leaderElectionEnv != "" ) {
 | |
| 		leaderElection, err = strconv.ParseBool(leaderElectionEnv)
 | |
| 		if err != nil {
 | |
| 			glog.Fatalf("Unable to parse ENABLE_LEADER_ELECTION env var: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	clientNFSProvisioner := &nfsProvisioner{
 | |
| 		client: clientset,
 | |
| 		server: server,
 | |
| 		path:   path,
 | |
| 	}
 | |
| 	// Start the provision controller which will dynamically provision efs NFS
 | |
| 	// PVs
 | |
| 	pc := controller.NewProvisionController(clientset,
 | |
| 		provisionerName,
 | |
| 		clientNFSProvisioner,
 | |
| 		serverVersion.GitVersion,
 | |
| 		controller.LeaderElection(leaderElection),
 | |
| 	)
 | |
| 	pc.Run(wait.NeverStop)
 | |
| }
 |