-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathutils_linux.go
108 lines (93 loc) · 3.61 KB
/
utils_linux.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
//go:build !windows
/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package gceGCEDriver
import (
"fmt"
"os"
"strconv"
"strings"
"time"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
"k8s.io/mount-utils"
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/common"
)
func getDevicePath(ns *GCENodeServer, volumeID, partition string) (string, error) {
_, volumeKey, err := common.VolumeIDToKey(volumeID)
if err != nil {
return "", err
}
deviceName, err := common.GetDeviceName(volumeKey)
if err != nil {
return "", fmt.Errorf("error getting device name: %w", err)
}
devicePaths := ns.DeviceUtils.GetDiskByIdPaths(deviceName, partition)
devicePath, err := ns.DeviceUtils.VerifyDevicePath(devicePaths, deviceName)
if err != nil {
return "", status.Error(codes.Internal, fmt.Sprintf("error verifying GCE PD (%q) is attached: %v", deviceName, err.Error()))
}
if devicePath == "" {
return "", status.Error(codes.Internal, fmt.Sprintf("Unable to find device path out of attempted paths: %v", devicePaths))
}
return devicePath, nil
}
func (ns *GCENodeServer) formatAndMount(source, target, fstype string, options []string, m *mount.SafeFormatAndMount) error {
if ns.formatAndMountSemaphore != nil {
done := make(chan any)
defer close(done)
// Aquire the semaphore. This will block if another formatAndMount has put an item
// into the semaphore channel.
ns.formatAndMountSemaphore <- struct{}{}
go func() {
defer func() { <-ns.formatAndMountSemaphore }()
// Add a timeout where so the semaphore will be released even if
// formatAndMount is still working. This allows the node to make progress on
// volumes if some error causes one formatAndMount to get stuck. The
// motivation for this serialization is to reduce memory usage; if stuck
// processes cause OOMs then the containers will be killed and restarted,
// including the stuck threads and with any luck making progress.
timeout := time.NewTimer(ns.formatAndMountTimeout)
defer timeout.Stop()
select {
case <-done:
case <-timeout.C:
}
}()
}
return m.FormatAndMount(source, target, fstype, options)
}
func preparePublishPath(path string, m *mount.SafeFormatAndMount) error {
return os.MkdirAll(path, 0750)
}
func prepareStagePath(path string, m *mount.SafeFormatAndMount) error {
return os.MkdirAll(path, 0750)
}
func cleanupPublishPath(path string, m *mount.SafeFormatAndMount) error {
return mount.CleanupMountPoint(path, m, false /* bind mount */)
}
func cleanupStagePath(path string, m *mount.SafeFormatAndMount) error {
return cleanupPublishPath(path, m)
}
func getBlockSizeBytes(devicePath string, m *mount.SafeFormatAndMount) (int64, error) {
output, err := m.Exec.Command("blockdev", "--getsize64", devicePath).CombinedOutput()
if err != nil {
return -1, fmt.Errorf("error when getting size of block volume at path %s: output: %s, err: %w", devicePath, string(output), err)
}
strOut := strings.TrimSpace(string(output))
gotSizeBytes, err := strconv.ParseInt(strOut, 10, 64)
if err != nil {
return -1, fmt.Errorf("failed to parse %s into an int size", strOut)
}
return gotSizeBytes, nil
}