| Tim Windelschmidt | 6d33a43 | 2025-02-04 14:34:25 +0100 | [diff] [blame^] | 1 | // Copyright The Monogon Project Authors. |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 2 | // SPDX-License-Identifier: Apache-2.0 |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 3 | |
| 4 | package kubernetes |
| 5 | |
| 6 | import ( |
| 7 | "context" |
| Tim Windelschmidt | d5f851b | 2024-04-23 14:59:37 +0200 | [diff] [blame] | 8 | "errors" |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 9 | "fmt" |
| 10 | "net" |
| 11 | "os" |
| 12 | "path/filepath" |
| 13 | "regexp" |
| 14 | |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 15 | "github.com/container-storage-interface/spec/lib/go/csi" |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 16 | "golang.org/x/sys/unix" |
| 17 | "google.golang.org/grpc" |
| 18 | "google.golang.org/grpc/codes" |
| 19 | "google.golang.org/grpc/status" |
| Lorenz Brun | 6570219 | 2023-08-31 16:27:38 +0200 | [diff] [blame] | 20 | "google.golang.org/protobuf/types/known/wrapperspb" |
| Lorenz Brun | 6211e4d | 2023-11-14 19:09:40 +0100 | [diff] [blame] | 21 | pluginregistration "k8s.io/kubelet/pkg/apis/pluginregistration/v1" |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 22 | |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 23 | "source.monogon.dev/go/logging" |
| Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 24 | "source.monogon.dev/metropolis/node/core/localstorage" |
| Tim Windelschmidt | 9f21f53 | 2024-05-07 15:14:20 +0200 | [diff] [blame] | 25 | "source.monogon.dev/osbase/fsquota" |
| Tim Windelschmidt | 9f21f53 | 2024-05-07 15:14:20 +0200 | [diff] [blame] | 26 | "source.monogon.dev/osbase/loop" |
| 27 | "source.monogon.dev/osbase/supervisor" |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 28 | ) |
| 29 | |
| Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 30 | // Derived from K8s spec for acceptable names, but shortened to 130 characters |
| 31 | // to avoid issues with maximum path length. We don't provision longer names so |
| 32 | // this applies only if you manually create a volume with a name of more than |
| 33 | // 130 characters. |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 34 | var acceptableNames = regexp.MustCompile("^[a-z][a-z0-9-.]{0,128}[a-z0-9]$") |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 35 | |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 36 | type csiPluginServer struct { |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 37 | *csi.UnimplementedNodeServer |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 38 | KubeletDirectory *localstorage.DataKubernetesKubeletDirectory |
| 39 | VolumesDirectory *localstorage.DataVolumesDirectory |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 40 | |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 41 | logger logging.Leveled |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 42 | } |
| 43 | |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 44 | func (s *csiPluginServer) Run(ctx context.Context) error { |
| 45 | s.logger = supervisor.Logger(ctx) |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 46 | |
| Lorenz Brun | 4599aa2 | 2023-06-28 13:09:32 +0200 | [diff] [blame] | 47 | // Try to remove socket if an unclean shutdown happened. |
| 48 | os.Remove(s.KubeletDirectory.Plugins.VFS.FullPath()) |
| 49 | |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 50 | pluginListener, err := net.ListenUnix("unix", &net.UnixAddr{Name: s.KubeletDirectory.Plugins.VFS.FullPath(), Net: "unix"}) |
| 51 | if err != nil { |
| 52 | return fmt.Errorf("failed to listen on CSI socket: %w", err) |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 53 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 54 | |
| 55 | pluginServer := grpc.NewServer() |
| 56 | csi.RegisterIdentityServer(pluginServer, s) |
| 57 | csi.RegisterNodeServer(pluginServer, s) |
| Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 58 | // Enable graceful shutdown since we don't have long-running RPCs and most |
| 59 | // of them shouldn't and can't be cancelled anyways. |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 60 | if err := supervisor.Run(ctx, "csi-node", supervisor.GRPCServer(pluginServer, pluginListener, true)); err != nil { |
| 61 | return err |
| 62 | } |
| 63 | |
| Lorenz Brun | 1dd0c65 | 2024-02-20 18:45:06 +0100 | [diff] [blame] | 64 | r := pluginRegistrationServer{ |
| 65 | regErr: make(chan error, 1), |
| 66 | KubeletDirectory: s.KubeletDirectory, |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 67 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 68 | |
| Lorenz Brun | 1dd0c65 | 2024-02-20 18:45:06 +0100 | [diff] [blame] | 69 | if err := supervisor.Run(ctx, "registration", r.Run); err != nil { |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 70 | return err |
| 71 | } |
| 72 | supervisor.Signal(ctx, supervisor.SignalHealthy) |
| 73 | supervisor.Signal(ctx, supervisor.SignalDone) |
| 74 | return nil |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 75 | } |
| 76 | |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 77 | func (s *csiPluginServer) NodePublishVolume(ctx context.Context, req *csi.NodePublishVolumeRequest) (*csi.NodePublishVolumeResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 78 | if !acceptableNames.MatchString(req.VolumeId) { |
| 79 | return nil, status.Error(codes.InvalidArgument, "invalid characters in volume id") |
| 80 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 81 | |
| 82 | // TODO(q3k): move this logic to localstorage? |
| 83 | volumePath := filepath.Join(s.VolumesDirectory.FullPath(), req.VolumeId) |
| 84 | |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 85 | switch req.VolumeCapability.AccessMode.Mode { |
| 86 | case csi.VolumeCapability_AccessMode_SINGLE_NODE_WRITER: |
| 87 | case csi.VolumeCapability_AccessMode_SINGLE_NODE_READER_ONLY: |
| 88 | default: |
| 89 | return nil, status.Error(codes.InvalidArgument, "unsupported access mode") |
| 90 | } |
| 91 | switch req.VolumeCapability.AccessType.(type) { |
| 92 | case *csi.VolumeCapability_Mount: |
| Jan Schär | be70c92 | 2024-11-21 11:16:03 +0100 | [diff] [blame] | 93 | if err := os.MkdirAll(req.TargetPath, 0700); err != nil { |
| 94 | return nil, status.Errorf(codes.Internal, "unable to create requested target path: %v", err) |
| 95 | } |
| 96 | |
| Jan Schär | 73beb69 | 2024-11-27 17:47:09 +0100 | [diff] [blame] | 97 | err := unix.Mount(volumePath, req.TargetPath, "", unix.MS_BIND, "") |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 98 | switch { |
| Tim Windelschmidt | d5f851b | 2024-04-23 14:59:37 +0200 | [diff] [blame] | 99 | case errors.Is(err, unix.ENOENT): |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 100 | return nil, status.Error(codes.NotFound, "volume not found") |
| 101 | case err != nil: |
| 102 | return nil, status.Errorf(codes.Unavailable, "failed to bind-mount volume: %v", err) |
| 103 | } |
| 104 | |
| Jan Schär | ff7452b | 2024-11-28 13:08:55 +0100 | [diff] [blame] | 105 | var flags uintptr = unix.MS_REMOUNT | unix.MS_BIND | unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV |
| Jan Schär | 73beb69 | 2024-11-27 17:47:09 +0100 | [diff] [blame] | 106 | if req.Readonly { |
| 107 | flags |= unix.MS_RDONLY |
| Tim Windelschmidt | a8938da | 2024-09-13 22:34:01 +0200 | [diff] [blame] | 108 | } |
| Jan Schär | 73beb69 | 2024-11-27 17:47:09 +0100 | [diff] [blame] | 109 | if err := unix.Mount("", req.TargetPath, "", flags, ""); err != nil { |
| Tim Windelschmidt | a8938da | 2024-09-13 22:34:01 +0200 | [diff] [blame] | 110 | _ = unix.Unmount(req.TargetPath, 0) // Best-effort |
| Jan Schär | 73beb69 | 2024-11-27 17:47:09 +0100 | [diff] [blame] | 111 | return nil, status.Errorf(codes.Internal, "unable to set mount-point flags: %v", err) |
| Tim Windelschmidt | a8938da | 2024-09-13 22:34:01 +0200 | [diff] [blame] | 112 | } |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 113 | case *csi.VolumeCapability_Block: |
| 114 | f, err := os.OpenFile(volumePath, os.O_RDWR, 0) |
| 115 | if err != nil { |
| 116 | return nil, status.Errorf(codes.Unavailable, "failed to open block volume: %v", err) |
| 117 | } |
| 118 | defer f.Close() |
| 119 | var flags uint32 = loop.FlagDirectIO |
| 120 | if req.Readonly { |
| 121 | flags |= loop.FlagReadOnly |
| 122 | } |
| 123 | loopdev, err := loop.Create(f, loop.Config{Flags: flags}) |
| 124 | if err != nil { |
| 125 | return nil, status.Errorf(codes.Unavailable, "failed to create loop device: %v", err) |
| 126 | } |
| 127 | loopdevNum, err := loopdev.Dev() |
| 128 | if err != nil { |
| 129 | loopdev.Remove() |
| 130 | return nil, status.Errorf(codes.Internal, "device number not available: %v", err) |
| 131 | } |
| 132 | if err := unix.Mknod(req.TargetPath, unix.S_IFBLK|0640, int(loopdevNum)); err != nil { |
| 133 | loopdev.Remove() |
| 134 | return nil, status.Errorf(codes.Unavailable, "failed to create device node at target path: %v", err) |
| 135 | } |
| 136 | loopdev.Close() |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 137 | default: |
| 138 | return nil, status.Error(codes.InvalidArgument, "unsupported access type") |
| 139 | } |
| 140 | |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 141 | return &csi.NodePublishVolumeResponse{}, nil |
| 142 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 143 | |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 144 | func (s *csiPluginServer) NodeUnpublishVolume(ctx context.Context, req *csi.NodeUnpublishVolumeRequest) (*csi.NodeUnpublishVolumeResponse, error) { |
| 145 | loopdev, err := loop.Open(req.TargetPath) |
| 146 | if err == nil { |
| 147 | defer loopdev.Close() |
| 148 | // We have a block device |
| 149 | if err := loopdev.Remove(); err != nil { |
| 150 | return nil, status.Errorf(codes.Unavailable, "failed to remove loop device: %v", err) |
| 151 | } |
| 152 | if err := os.Remove(req.TargetPath); err != nil && !os.IsNotExist(err) { |
| 153 | return nil, status.Errorf(codes.Unavailable, "failed to remove device inode: %v", err) |
| 154 | } |
| 155 | return &csi.NodeUnpublishVolumeResponse{}, nil |
| 156 | } |
| 157 | // Otherwise try a normal unmount |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 158 | if err := unix.Unmount(req.TargetPath, 0); err != nil { |
| 159 | return nil, status.Errorf(codes.Unavailable, "failed to unmount volume: %v", err) |
| 160 | } |
| 161 | return &csi.NodeUnpublishVolumeResponse{}, nil |
| 162 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 163 | |
| 164 | func (*csiPluginServer) NodeGetVolumeStats(ctx context.Context, req *csi.NodeGetVolumeStatsRequest) (*csi.NodeGetVolumeStatsResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 165 | quota, err := fsquota.GetQuota(req.VolumePath) |
| 166 | if os.IsNotExist(err) { |
| 167 | return nil, status.Error(codes.NotFound, "volume does not exist at this path") |
| 168 | } else if err != nil { |
| 169 | return nil, status.Errorf(codes.Unavailable, "failed to get quota: %v", err) |
| 170 | } |
| 171 | |
| 172 | return &csi.NodeGetVolumeStatsResponse{ |
| 173 | Usage: []*csi.VolumeUsage{ |
| 174 | { |
| 175 | Total: int64(quota.Bytes), |
| 176 | Unit: csi.VolumeUsage_BYTES, |
| 177 | Used: int64(quota.BytesUsed), |
| 178 | Available: int64(quota.Bytes - quota.BytesUsed), |
| 179 | }, |
| 180 | { |
| 181 | Total: int64(quota.Inodes), |
| 182 | Unit: csi.VolumeUsage_INODES, |
| 183 | Used: int64(quota.InodesUsed), |
| 184 | Available: int64(quota.Inodes - quota.InodesUsed), |
| 185 | }, |
| 186 | }, |
| 187 | }, nil |
| 188 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 189 | |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 190 | func (s *csiPluginServer) NodeExpandVolume(ctx context.Context, req *csi.NodeExpandVolumeRequest) (*csi.NodeExpandVolumeResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 191 | if req.CapacityRange.LimitBytes <= 0 { |
| 192 | return nil, status.Error(codes.InvalidArgument, "invalid expanded volume size: at or below zero bytes") |
| 193 | } |
| Lorenz Brun | 3705012 | 2021-03-30 14:00:27 +0200 | [diff] [blame] | 194 | loopdev, err := loop.Open(req.VolumePath) |
| 195 | if err == nil { |
| 196 | defer loopdev.Close() |
| 197 | volumePath := filepath.Join(s.VolumesDirectory.FullPath(), req.VolumeId) |
| 198 | imageFile, err := os.OpenFile(volumePath, os.O_RDWR, 0) |
| 199 | if err != nil { |
| 200 | return nil, status.Errorf(codes.Unavailable, "failed to open block volume backing file: %v", err) |
| 201 | } |
| 202 | defer imageFile.Close() |
| 203 | if err := unix.Fallocate(int(imageFile.Fd()), 0, 0, req.CapacityRange.LimitBytes); err != nil { |
| 204 | return nil, status.Errorf(codes.Unavailable, "failed to expand volume using fallocate: %v", err) |
| 205 | } |
| 206 | if err := loopdev.RefreshSize(); err != nil { |
| 207 | return nil, status.Errorf(codes.Unavailable, "failed to refresh loop device size: %v", err) |
| 208 | } |
| 209 | return &csi.NodeExpandVolumeResponse{CapacityBytes: req.CapacityRange.LimitBytes}, nil |
| 210 | } |
| Lorenz Brun | 397f7ea | 2024-08-20 21:26:06 +0200 | [diff] [blame] | 211 | if err := fsquota.SetQuota(req.VolumePath, uint64(req.CapacityRange.LimitBytes), uint64(req.CapacityRange.LimitBytes)/inodeCapacityRatio); err != nil { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 212 | return nil, status.Errorf(codes.Unavailable, "failed to update quota: %v", err) |
| 213 | } |
| 214 | return &csi.NodeExpandVolumeResponse{CapacityBytes: req.CapacityRange.LimitBytes}, nil |
| 215 | } |
| 216 | |
| 217 | func rpcCapability(cap csi.NodeServiceCapability_RPC_Type) *csi.NodeServiceCapability { |
| 218 | return &csi.NodeServiceCapability{ |
| 219 | Type: &csi.NodeServiceCapability_Rpc{ |
| 220 | Rpc: &csi.NodeServiceCapability_RPC{Type: cap}, |
| 221 | }, |
| 222 | } |
| 223 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 224 | |
| 225 | func (*csiPluginServer) NodeGetCapabilities(ctx context.Context, req *csi.NodeGetCapabilitiesRequest) (*csi.NodeGetCapabilitiesResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 226 | return &csi.NodeGetCapabilitiesResponse{ |
| 227 | Capabilities: []*csi.NodeServiceCapability{ |
| 228 | rpcCapability(csi.NodeServiceCapability_RPC_EXPAND_VOLUME), |
| 229 | rpcCapability(csi.NodeServiceCapability_RPC_GET_VOLUME_STATS), |
| 230 | }, |
| 231 | }, nil |
| 232 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 233 | |
| 234 | func (*csiPluginServer) NodeGetInfo(ctx context.Context, req *csi.NodeGetInfoRequest) (*csi.NodeGetInfoResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 235 | hostname, err := os.Hostname() |
| 236 | if err != nil { |
| 237 | return nil, status.Errorf(codes.Unavailable, "failed to get node identity: %v", err) |
| 238 | } |
| 239 | return &csi.NodeGetInfoResponse{ |
| 240 | NodeId: hostname, |
| 241 | }, nil |
| 242 | } |
| 243 | |
| 244 | // CSI Identity endpoints |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 245 | func (*csiPluginServer) GetPluginInfo(ctx context.Context, req *csi.GetPluginInfoRequest) (*csi.GetPluginInfoResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 246 | return &csi.GetPluginInfoResponse{ |
| Serge Bazanski | 662b5b3 | 2020-12-21 13:49:00 +0100 | [diff] [blame] | 247 | Name: "dev.monogon.metropolis.vfs", |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 248 | VendorVersion: "0.0.1", // TODO(lorenz): Maybe stamp? |
| 249 | }, nil |
| 250 | } |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 251 | |
| 252 | func (*csiPluginServer) GetPluginCapabilities(ctx context.Context, req *csi.GetPluginCapabilitiesRequest) (*csi.GetPluginCapabilitiesResponse, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 253 | return &csi.GetPluginCapabilitiesResponse{ |
| 254 | Capabilities: []*csi.PluginCapability{ |
| 255 | { |
| 256 | Type: &csi.PluginCapability_VolumeExpansion_{ |
| 257 | VolumeExpansion: &csi.PluginCapability_VolumeExpansion{ |
| 258 | Type: csi.PluginCapability_VolumeExpansion_ONLINE, |
| 259 | }, |
| 260 | }, |
| 261 | }, |
| 262 | }, |
| 263 | }, nil |
| 264 | } |
| 265 | |
| Serge Bazanski | c2c7ad9 | 2020-07-13 17:20:09 +0200 | [diff] [blame] | 266 | func (s *csiPluginServer) Probe(ctx context.Context, req *csi.ProbeRequest) (*csi.ProbeResponse, error) { |
| Lorenz Brun | 6570219 | 2023-08-31 16:27:38 +0200 | [diff] [blame] | 267 | return &csi.ProbeResponse{Ready: &wrapperspb.BoolValue{Value: true}}, nil |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 268 | } |
| 269 | |
| Lorenz Brun | 1dd0c65 | 2024-02-20 18:45:06 +0100 | [diff] [blame] | 270 | // pluginRegistrationServer implements the pluginregistration.Registration |
| 271 | // service. It has a special restart mechanic to accomodate a design issue |
| 272 | // in Kubelet which requires it to remove and recreate its gRPC socket for |
| 273 | // every new registration attempt. |
| 274 | type pluginRegistrationServer struct { |
| 275 | // regErr has a buffer of 1, so that at least one error can always be |
| 276 | // sent into it in a non-blocking way. There is a race if |
| 277 | // NotifyRegistrationStatus is called twice with an error as the buffered |
| 278 | // item might have been received but not fully processed yet. |
| 279 | // As distinguishing between calls on different socket iterations is |
| 280 | // hard, doing it this way errs on the side of caution, i.e. |
| 281 | // generating too many restarts. This way is better as if we miss one |
| 282 | // such error the registration will not be available until the node |
| 283 | // gets restarted. |
| 284 | regErr chan error |
| 285 | |
| 286 | KubeletDirectory *localstorage.DataKubernetesKubeletDirectory |
| 287 | } |
| 288 | |
| 289 | func (r *pluginRegistrationServer) Run(ctx context.Context) error { |
| 290 | // Remove registration socket if it exists |
| 291 | os.Remove(r.KubeletDirectory.PluginsRegistry.VFSReg.FullPath()) |
| 292 | |
| 293 | registrationListener, err := net.ListenUnix("unix", &net.UnixAddr{Name: r.KubeletDirectory.PluginsRegistry.VFSReg.FullPath(), Net: "unix"}) |
| 294 | if err != nil { |
| 295 | return fmt.Errorf("failed to listen on CSI registration socket: %w", err) |
| 296 | } |
| 297 | defer registrationListener.Close() |
| 298 | |
| 299 | grpcS := grpc.NewServer() |
| 300 | pluginregistration.RegisterRegistrationServer(grpcS, r) |
| 301 | |
| 302 | supervisor.Run(ctx, "rpc", supervisor.GRPCServer(grpcS, registrationListener, true)) |
| 303 | supervisor.Signal(ctx, supervisor.SignalHealthy) |
| 304 | select { |
| 305 | case <-ctx.Done(): |
| 306 | return ctx.Err() |
| 307 | case err = <-r.regErr: |
| 308 | return err |
| 309 | } |
| 310 | } |
| 311 | |
| 312 | func (r *pluginRegistrationServer) GetInfo(ctx context.Context, req *pluginregistration.InfoRequest) (*pluginregistration.PluginInfo, error) { |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 313 | return &pluginregistration.PluginInfo{ |
| Lorenz Brun | 4e09035 | 2021-03-17 17:44:41 +0100 | [diff] [blame] | 314 | Type: pluginregistration.CSIPlugin, |
| Serge Bazanski | 662b5b3 | 2020-12-21 13:49:00 +0100 | [diff] [blame] | 315 | Name: "dev.monogon.metropolis.vfs", |
| Lorenz Brun | 1dd0c65 | 2024-02-20 18:45:06 +0100 | [diff] [blame] | 316 | Endpoint: r.KubeletDirectory.Plugins.VFS.FullPath(), |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 317 | SupportedVersions: []string{"1.2"}, // Keep in sync with container-storage-interface/spec package version |
| 318 | }, nil |
| 319 | } |
| 320 | |
| Lorenz Brun | 1dd0c65 | 2024-02-20 18:45:06 +0100 | [diff] [blame] | 321 | func (r *pluginRegistrationServer) NotifyRegistrationStatus(ctx context.Context, req *pluginregistration.RegistrationStatus) (*pluginregistration.RegistrationStatusResponse, error) { |
| 322 | if !req.PluginRegistered { |
| 323 | select { |
| 324 | case r.regErr <- fmt.Errorf("registration failed: %v", req.Error): |
| 325 | default: |
| 326 | } |
| Lorenz Brun | 0db90ba | 2020-04-06 14:04:52 +0200 | [diff] [blame] | 327 | } |
| 328 | return &pluginregistration.RegistrationStatusResponse{}, nil |
| 329 | } |