-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor RBD volume #54302
Refactor RBD volume #54302
Conversation
/assign @rootfs |
/assign @liggitt |
please split the PR into 2 commits: one for generated files and one for the rest |
// Default is nil. | ||
// More info: https://releases.k8s.io/HEAD/examples/volumes/rbd/README.md#how-to-use-it | ||
// +optional | ||
SecretRef *SecretReference `json:"secretRef,omitempty" protobuf:"bytes,5,opt,name=secretRef"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
5->7
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks a lot. Changed.
pkg/api/v1/zz_generated.defaults.go
Outdated
@@ -136,9 +136,6 @@ func SetObjectDefaults_PersistentVolume(in *v1.PersistentVolume) { | |||
if in.Spec.PersistentVolumeSource.HostPath != nil { | |||
SetDefaults_HostPathVolumeSource(in.Spec.PersistentVolumeSource.HostPath) | |||
} | |||
if in.Spec.PersistentVolumeSource.RBD != nil { | |||
SetDefaults_RBDVolumeSource(in.Spec.PersistentVolumeSource.RBD) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
need to copy SetDefaults_RBDVolumeSource
to SetDefaults_RBDPersistentVolumeSource
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
which also means copying the registered fuzzing function in pkg/api/fuzzer/fuzzer.go for RBDVolumeSource for RBDPersistentVolumeSource
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done fuzzer, but could you clarify about the first part? Do you want me to manually edit generated file or there is another way to accomplish it without editiing zz file.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SetDefaults_RBDVolumeSource is not in a generated file. Duplicate it there for the new type and rerun generation scripts which will fix up this file
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done, I think at least, please check when you have a second.
pkg/volume/rbd/disk_manager.go
Outdated
@@ -40,6 +40,8 @@ type diskManager interface { | |||
DetachDisk(disk rbdUnmounter, mntPath string) error | |||
// Creates a rbd image | |||
CreateImage(provisioner *rbdVolumeProvisioner) (r *v1.RBDVolumeSource, volumeSizeGB int, err error) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I only see this called in a single place, from rbdVolumeProvisioner
, right? that should only deal with persistentvolumes... should just change the existing function
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
pkg/volume/rbd/rbd.go
Outdated
return nil, err | ||
} | ||
for name, data := range secrets.Data { | ||
secret = string(data) | ||
glog.V(4).Infof("found ceph secret info: %s", name) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
too verbose for inner loop, we weren't logging this before in parsePodSecret
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
pkg/volume/rbd/rbd.go
Outdated
@@ -486,16 +486,29 @@ func (c *rbdUnmounter) TearDownAt(dir string) error { | |||
return diskTearDown(c.manager, *c, dir, c.mounter) | |||
} | |||
|
|||
func getVolumeSource( | |||
spec *volume.Spec) (*v1.RBDVolumeSource, bool, error) { | |||
func getVolumeSource(spec *volume.Spec) ([]string, string, string, string, string, string, bool, error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this many return values of identical types is asking for trouble... individual accessors are simple and clear
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
pkg/volume/rbd/rbd_util.go
Outdated
@@ -407,6 +407,51 @@ func (util *RBDUtil) CreateImage(p *rbdVolumeProvisioner) (r *v1.RBDVolumeSource | |||
}, sz, nil | |||
} | |||
|
|||
func (util *RBDUtil) CreatePersistentVolumeImage(p *rbdVolumeProvisioner) (r *v1.RBDPersistentVolumeSource, size int, err error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should be able to change the existing CreateImage method instead of introducing this... there are no other callers
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
if err != nil { | ||
glog.Errorf("rbd: create volume failed, err: %v", err) | ||
return nil, err | ||
} | ||
glog.Infof("successfully created rbd image %q", image) | ||
pv := new(v1.PersistentVolume) | ||
metav1.SetMetaDataAnnotation(&pv.ObjectMeta, volumehelper.VolumeDynamicallyCreatedByKey, "rbd-dynamic-provisioner") | ||
rbd.SecretRef = new(v1.LocalObjectReference) | ||
rbd.SecretRef = new(v1.SecretReference) | ||
rbd.SecretRef.Name = secretName |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I expected to see rbd.SecretRef.Namespace = secretNamespace
set from a case "usersecretnamespace":
config param
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
/sig storage |
RBD: &api.RBDVolumeSource{ | ||
SecretRef: &api.LocalObjectReference{ | ||
RBD: &api.RBDPersistentVolumeSource{ | ||
SecretRef: &api.SecretReference{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add a second PV spec that specifies a name and namespace in the RBD secretref (suggest namespace of "rbdns") and update expected namespaced secrets below
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
pkg/volume/rbd/rbd.go
Outdated
@@ -349,6 +380,9 @@ func (r *rbdVolumeProvisioner) Provision() (*v1.PersistentVolume, error) { | |||
if secretName == "" { | |||
return nil, fmt.Errorf("missing user secret name") | |||
} | |||
if secretNamespace == "" { | |||
secretNamespace = adminSecretNamespace |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is incorrect. User secret namespace defaults to "", which uses the namespace of the pod/pvc
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
pkg/volume/rbd/rbd.go
Outdated
spec *volume.Spec) (*v1.RBDVolumeSource, bool, error) { | ||
func getVolumeSourceMonitors(spec *volume.Spec) ([]string, error) { | ||
if spec.Volume != nil && spec.Volume.RBD != nil { | ||
mon := spec.Volume.RBD.CephMonitors |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
for all the accessors, remove all the intermediate assignments and just return spec.Volume.RBD.CephMonitors, nil
directly, etc
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
pkg/volume/rbd/rbd.go
Outdated
return readOnly, nil | ||
} else if spec.PersistentVolume != nil && | ||
spec.PersistentVolume.Spec.RBD != nil { | ||
readOnly := spec.ReadOnly |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comment here that this is intentional would be good (also worth noting in the API doc for this field that it is ignored in favor of the PV readonly setting would be good)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
A few gofmt errors to fix:
lgtm orherwise |
/test pull-kubernetes-unit |
/lgtm |
/release-note |
@sbezverk: the
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/lgtm |
/assign @thockin @smarterclayton @pwittrock |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, rootfs, sbezverk, smarterclayton Associated issue: 54432 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
Automatic merge from submit-queue (batch tested with PRs 54229, 54380, 54302, 54454). If you want to cherry-pick this change to another branch, please follow the instructions here. |
"v1.RBDVolumeSource": { | ||
"id": "v1.RBDVolumeSource", | ||
"v1.RBDPersistentVolumeSource": { | ||
"id": "v1.RBDPersistentVolumeSource", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@rootfs is this a backward compatible change ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is wire compatible. The type name never appears in serialized proto and json, and the new struct contains identical fields, with the addition of a namespace field in the secret ref
@@ -21674,6 +21674,51 @@ | |||
} | |||
} | |||
}, | |||
"v1.RBDVolumeSource": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why do we have both RBDPersistentVolumeSource and this ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Because only the persistent volume version lets you reference a secret in a namespace other than the pod.
Refactor RBD Volume Persistent Volume Spec so RBD PV's SecretRef
allows referencing a secret from a persistent volume in any namespace.
This allows locating credentials for persistent volumes in namespaces
other than the one containing the PVC.
Closes #54432