-
Notifications
You must be signed in to change notification settings - Fork 365
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This PR adds external snapshot controller and main package under cmd.
- Loading branch information
Showing
6 changed files
with
1,845 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,139 @@ | ||
/* | ||
Copyright 2018 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package main | ||
|
||
import ( | ||
"reflect" | ||
"time" | ||
|
||
"github.com/golang/glog" | ||
crdv1 "github.com/kubernetes-csi/external-snapshotter/pkg/apis/volumesnapshot/v1alpha1" | ||
apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1" | ||
apiextensionsclient "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset" | ||
apierrors "k8s.io/apimachinery/pkg/api/errors" | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/apimachinery/pkg/runtime" | ||
"k8s.io/apimachinery/pkg/runtime/serializer" | ||
"k8s.io/apimachinery/pkg/util/wait" | ||
"k8s.io/client-go/rest" | ||
) | ||
|
||
const ( | ||
// SnapshotPVCAnnotation is "snapshot.alpha.kubernetes.io/snapshot" | ||
SnapshotPVCAnnotation = "volumesnapshot.csi.k8s.io/snapshot" | ||
) | ||
|
||
// NewClient creates a new RESTClient | ||
func NewClient(cfg *rest.Config) (*rest.RESTClient, *runtime.Scheme, error) { | ||
scheme := runtime.NewScheme() | ||
if err := crdv1.AddToScheme(scheme); err != nil { | ||
return nil, nil, err | ||
} | ||
|
||
config := *cfg | ||
config.GroupVersion = &crdv1.SchemeGroupVersion | ||
config.APIPath = "/apis" | ||
config.ContentType = runtime.ContentTypeJSON | ||
config.NegotiatedSerializer = serializer.DirectCodecFactory{CodecFactory: serializer.NewCodecFactory(scheme)} | ||
|
||
client, err := rest.RESTClientFor(&config) | ||
if err != nil { | ||
return nil, nil, err | ||
} | ||
|
||
return client, scheme, nil | ||
} | ||
|
||
// CreateCRD creates CustomResourceDefinition | ||
func CreateCRD(clientset apiextensionsclient.Interface) error { | ||
crd := &apiextensionsv1beta1.CustomResourceDefinition{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: crdv1.SnapshotClassResourcePlural + "." + crdv1.GroupName, | ||
}, | ||
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{ | ||
Group: crdv1.GroupName, | ||
Version: crdv1.SchemeGroupVersion.Version, | ||
Scope: apiextensionsv1beta1.ClusterScoped, | ||
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{ | ||
Plural: crdv1.SnapshotClassResourcePlural, | ||
Kind: reflect.TypeOf(crdv1.SnapshotClass{}).Name(), | ||
}, | ||
}, | ||
} | ||
res, err := clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd) | ||
|
||
if err != nil && !apierrors.IsAlreadyExists(err) { | ||
glog.Fatalf("failed to create VolumeSnapshotResource: %#v, err: %#v", | ||
res, err) | ||
} | ||
|
||
crd = &apiextensionsv1beta1.CustomResourceDefinition{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: crdv1.VolumeSnapshotDataResourcePlural + "." + crdv1.GroupName, | ||
}, | ||
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{ | ||
Group: crdv1.GroupName, | ||
Version: crdv1.SchemeGroupVersion.Version, | ||
Scope: apiextensionsv1beta1.ClusterScoped, | ||
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{ | ||
Plural: crdv1.VolumeSnapshotDataResourcePlural, | ||
Kind: reflect.TypeOf(crdv1.VolumeSnapshotData{}).Name(), | ||
}, | ||
}, | ||
} | ||
res, err = clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd) | ||
|
||
if err != nil && !apierrors.IsAlreadyExists(err) { | ||
glog.Fatalf("failed to create VolumeSnapshotDataResource: %#v, err: %#v", | ||
res, err) | ||
} | ||
|
||
crd = &apiextensionsv1beta1.CustomResourceDefinition{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: crdv1.VolumeSnapshotResourcePlural + "." + crdv1.GroupName, | ||
}, | ||
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{ | ||
Group: crdv1.GroupName, | ||
Version: crdv1.SchemeGroupVersion.Version, | ||
Scope: apiextensionsv1beta1.NamespaceScoped, | ||
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{ | ||
Plural: crdv1.VolumeSnapshotResourcePlural, | ||
Kind: reflect.TypeOf(crdv1.VolumeSnapshot{}).Name(), | ||
}, | ||
}, | ||
} | ||
res, err = clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd) | ||
|
||
if err != nil && !apierrors.IsAlreadyExists(err) { | ||
glog.Fatalf("failed to create VolumeSnapshotResource: %#v, err: %#v", | ||
res, err) | ||
} | ||
|
||
return nil | ||
} | ||
|
||
// WaitForSnapshotResource waits for the snapshot resource | ||
func WaitForSnapshotResource(snapshotClient *rest.RESTClient) error { | ||
return wait.Poll(100*time.Millisecond, 60*time.Second, func() (bool, error) { | ||
_, err := snapshotClient.Get(). | ||
Resource(crdv1.VolumeSnapshotDataResourcePlural).DoRaw() | ||
if err == nil { | ||
return true, nil | ||
} | ||
if apierrors.IsNotFound(err) { | ||
return false, nil | ||
} | ||
return false, err | ||
}) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,195 @@ | ||
/* | ||
Copyright 2018 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package main | ||
|
||
import "fmt" | ||
import ( | ||
"context" | ||
"flag" | ||
"fmt" | ||
"os" | ||
"os/signal" | ||
"time" | ||
|
||
"github.com/golang/glog" | ||
"k8s.io/client-go/kubernetes" | ||
"k8s.io/client-go/rest" | ||
"k8s.io/client-go/tools/clientcmd" | ||
|
||
"github.com/kubernetes-csi/external-snapshotter/pkg/connection" | ||
"github.com/kubernetes-csi/external-snapshotter/pkg/controller" | ||
|
||
clientset "github.com/kubernetes-csi/external-snapshotter/pkg/client/clientset/versioned" | ||
informers "github.com/kubernetes-csi/external-snapshotter/pkg/client/informers/externalversions" | ||
apiextensionsclient "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset" | ||
) | ||
|
||
const ( | ||
// Number of worker threads | ||
threads = 10 | ||
|
||
// Default timeout of short CSI calls like GetPluginInfo | ||
csiTimeout = time.Second | ||
) | ||
|
||
// Command line flags | ||
var ( | ||
snapshotter = flag.String("snapshotter", "", "Name of the snapshotter. The snapshotter will only create snapshot data for snapshot that request a StorageClass with a snapshotter field set equal to this name.") | ||
kubeconfig = flag.String("kubeconfig", "", "Absolute path to the kubeconfig file. Required only when running out of cluster.") | ||
resync = flag.Duration("resync", 10*time.Second, "Resync interval of the controller.") | ||
connectionTimeout = flag.Duration("connection-timeout", 1*time.Minute, "Timeout for waiting for CSI driver socket.") | ||
csiAddress = flag.String("csi-address", "/run/csi/socket", "Address of the CSI driver socket.") | ||
createSnapshotDataRetryCount = flag.Int("createSnapshotDataRetryCount", 5, "Number of retries when we create a snapshot data object for a snapshot.") | ||
createSnapshotDataInterval = flag.Duration("createSnapshotDataInterval", 10*time.Second, "Interval between retries when we create a snapshot data object for a snapshot.") | ||
resyncPeriod = flag.Duration("resyncPeriod", 60*time.Second, "The period that should be used to re-sync the snapshot.") | ||
) | ||
|
||
func main() { | ||
fmt.Println("vim-go") | ||
flag.Set("logtostderr", "true") | ||
flag.Parse() | ||
|
||
// Create the client config. Use kubeconfig if given, otherwise assume in-cluster. | ||
config, err := buildConfig(*kubeconfig) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
kubeClient, err := kubernetes.NewForConfig(config) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
snapClient, err := clientset.NewForConfig(config) | ||
if err != nil { | ||
glog.Errorf("Error building snapshot clientset: %s", err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
factory := informers.NewSharedInformerFactory(snapClient, *resync) | ||
|
||
// Create CRD resource | ||
aeclientset, err := apiextensionsclient.NewForConfig(config) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
// initialize CRD resource if it does not exist | ||
err = CreateCRD(aeclientset) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
// make a new config for our extension's API group, using the first config as a baseline | ||
crdClient, _, err := NewClient(config) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
// wait until CRD gets processed | ||
err = WaitForSnapshotResource(crdClient) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
// Connect to CSI. | ||
csiConn, err := connection.New(*csiAddress, *connectionTimeout) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
// Find driver name. | ||
ctx, cancel := context.WithTimeout(context.Background(), csiTimeout) | ||
defer cancel() | ||
|
||
// Check it's ready | ||
if err = waitForDriverReady(csiConn, *connectionTimeout); err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
|
||
// Find out if the driver supports create/delete snapshot. | ||
supportsCreateSnapshot, err := csiConn.SupportsControllerCreateSnapshot(ctx) | ||
if err != nil { | ||
glog.Error(err.Error()) | ||
os.Exit(1) | ||
} | ||
if !supportsCreateSnapshot { | ||
glog.Error("CSI driver does not support ControllerCreateSnapshot") | ||
os.Exit(1) | ||
} | ||
|
||
glog.V(2).Infof("Start NewCSISnapshotController with snapshotter %s", *snapshotter) | ||
|
||
ctrl := controller.NewCSISnapshotController( | ||
snapClient, | ||
kubeClient, | ||
*snapshotter, | ||
factory.Volumesnapshot().V1alpha1().VolumeSnapshots(), | ||
factory.Volumesnapshot().V1alpha1().VolumeSnapshotDatas(), | ||
*createSnapshotDataRetryCount, | ||
*createSnapshotDataInterval, | ||
csiConn, | ||
*connectionTimeout, | ||
*resyncPeriod, | ||
) | ||
|
||
// run... | ||
stopCh := make(chan struct{}) | ||
factory.Start(stopCh) | ||
go ctrl.Run(threads, stopCh) | ||
|
||
// ...until SIGINT | ||
c := make(chan os.Signal, 1) | ||
signal.Notify(c, os.Interrupt) | ||
<-c | ||
close(stopCh) | ||
} | ||
|
||
func buildConfig(kubeconfig string) (*rest.Config, error) { | ||
if kubeconfig != "" { | ||
return clientcmd.BuildConfigFromFlags("", kubeconfig) | ||
} | ||
return rest.InClusterConfig() | ||
} | ||
|
||
func waitForDriverReady(csiConn connection.CSIConnection, timeout time.Duration) error { | ||
now := time.Now() | ||
finish := now.Add(timeout) | ||
var err error | ||
for { | ||
ctx, cancel := context.WithTimeout(context.Background(), csiTimeout) | ||
defer cancel() | ||
err = csiConn.Probe(ctx) | ||
if err == nil { | ||
glog.V(2).Infof("Probe succeeded") | ||
return nil | ||
} | ||
glog.V(2).Infof("Probe failed with %s", err) | ||
|
||
now := time.Now() | ||
if now.After(finish) { | ||
return fmt.Errorf("failed to probe the controller: %s", err) | ||
} | ||
time.Sleep(time.Second) | ||
} | ||
} |
Oops, something went wrong.