Skip to content

Commit 42d07ba

Browse files
sajanjswlwlan0
authored andcommitted
add sample driver
1 parent c36b85b commit 42d07ba

File tree

2 files changed

+269
-0
lines changed

2 files changed

+269
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,142 @@
1+
/*
2+
Copyright 2020 The Kubernetes Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package main
18+
19+
import (
20+
"fmt"
21+
22+
"github.com/minio/minio-go"
23+
"github.com/minio/minio/pkg/auth"
24+
"github.com/minio/minio/pkg/bucket/policy"
25+
"github.com/minio/minio/pkg/bucket/policy/condition"
26+
iampolicy "github.com/minio/minio/pkg/iam/policy"
27+
"github.com/minio/minio/pkg/madmin"
28+
29+
"golang.org/x/net/context"
30+
"google.golang.org/grpc/codes"
31+
"google.golang.org/grpc/status"
32+
"k8s.io/klog"
33+
34+
cosi "github.com/kubernetes-sigs/container-object-storage-interface-spec"
35+
)
36+
37+
var (
38+
PROVISIONER_NAME = "sample-provisioner.objectstorage.k8s.io"
39+
VERSION = "dev"
40+
)
41+
42+
type DriverServer struct {
43+
Name, Version string
44+
S3Client *minio.Client
45+
S3AdminClient *madmin.AdminClient
46+
}
47+
48+
func (ds *DriverServer) ProvisionerGetInfo(context.Context, *cosi.ProvisionerGetInfoRequest) (*cosi.ProvisionerGetInfoResponse, error) {
49+
rsp := &cosi.ProvisionerGetInfoResponse{}
50+
rsp.Name = fmt.Sprintf("%s-%s", ds.Name, ds.Version)
51+
return rsp, nil
52+
}
53+
54+
func (ds DriverServer) ProvisionerCreateBucket(ctx context.Context, req *cosi.ProvisionerCreateBucketRequest) (*cosi.ProvisionerCreateBucketResponse, error) {
55+
klog.Infof("Using minio to create Backend Bucket")
56+
57+
if ds.Name == "" {
58+
return nil, status.Error(codes.Unavailable, "Driver name not configured")
59+
}
60+
61+
if ds.Version == "" {
62+
return nil, status.Error(codes.Unavailable, "Driver is missing version")
63+
}
64+
65+
err := ds.S3Client.MakeBucket(req.BucketName, "")
66+
if err != nil {
67+
// Check to see if the bucket already exists
68+
exists, errBucketExists := ds.S3Client.BucketExists(req.BucketName)
69+
if errBucketExists == nil && exists {
70+
klog.Info("Backend Bucket already exists", req.BucketName)
71+
return &cosi.ProvisionerCreateBucketResponse{}, nil
72+
} else {
73+
klog.Error(err)
74+
return &cosi.ProvisionerCreateBucketResponse{}, err
75+
}
76+
}
77+
klog.Info("Successfully created Backend Bucket", req.BucketName)
78+
79+
return &cosi.ProvisionerCreateBucketResponse{}, nil
80+
}
81+
82+
func (ds *DriverServer) ProvisionerDeleteBucket(ctx context.Context, req *cosi.ProvisionerDeleteBucketRequest) (*cosi.ProvisionerDeleteBucketResponse, error) {
83+
84+
if err := ds.S3Client.RemoveBucket(req.BucketName); err != nil {
85+
klog.Info("failed to delete bucket", req.BucketName)
86+
return nil, err
87+
88+
}
89+
return &cosi.ProvisionerDeleteBucketResponse{}, nil
90+
}
91+
92+
func (ds *DriverServer) ProvisionerGrantBucketAccess(ctx context.Context, req *cosi.ProvisionerGrantBucketAccessRequest) (*cosi.ProvisionerGrantBucketAccessResponse, error) {
93+
94+
creds, err := auth.GetNewCredentials()
95+
if err != nil {
96+
klog.Error("failed to generate new credentails")
97+
return nil, err
98+
}
99+
100+
if err := ds.S3AdminClient.AddUser(context.Background(), creds.AccessKey, creds.SecretKey); err != nil {
101+
klog.Error("failed to create user", err)
102+
return nil, err
103+
}
104+
105+
// Create policy
106+
p := iampolicy.Policy{
107+
Version: iampolicy.DefaultVersion,
108+
Statements: []iampolicy.Statement{
109+
iampolicy.NewStatement(
110+
policy.Allow,
111+
iampolicy.NewActionSet("s3:*"),
112+
iampolicy.NewResourceSet(iampolicy.NewResource(req.GetBucketName()+"/*", "")),
113+
condition.NewFunctions(),
114+
)},
115+
}
116+
117+
if err := ds.S3AdminClient.AddCannedPolicy(context.Background(), "s3:*", &p); err != nil {
118+
klog.Error("failed to add canned policy", err)
119+
return nil, err
120+
}
121+
122+
if err := ds.S3AdminClient.SetPolicy(context.Background(), "s3:*", creds.AccessKey, false); err != nil {
123+
klog.Error("failed to set policy", err)
124+
return nil, err
125+
}
126+
127+
return &cosi.ProvisionerGrantBucketAccessResponse{
128+
Principal: req.Principal,
129+
CredentialsFileContents: fmt.Sprintf("[default]\naws_access_key %s\naws_secret_key %s", creds.AccessKey, creds.SecretKey),
130+
CredentialsFilePath: ".aws/credentials",
131+
}, nil
132+
}
133+
134+
func (ds *DriverServer) ProvisionerRevokeBucketAccess(ctx context.Context, req *cosi.ProvisionerRevokeBucketAccessRequest) (*cosi.ProvisionerRevokeBucketAccessResponse, error) {
135+
136+
// revokes user access to bucket
137+
if err := ds.S3AdminClient.RemoveUser(ctx, req.GetPrincipal()); err != nil {
138+
klog.Error("falied to Revoke Bucket Access")
139+
return nil, err
140+
}
141+
return &cosi.ProvisionerRevokeBucketAccessResponse{}, nil
142+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
/*
2+
Copyright 2020 The Kubernetes Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package main
18+
19+
import (
20+
"context"
21+
"flag"
22+
"fmt"
23+
"os"
24+
"os/signal"
25+
"strings"
26+
"syscall"
27+
28+
"github.com/minio/minio-go"
29+
"github.com/minio/minio/pkg/madmin"
30+
"github.com/spf13/cobra"
31+
"github.com/spf13/viper"
32+
"k8s.io/klog"
33+
34+
"sigs.k8s.io/container-object-storage-interface-provisioner-sidecar/pkg/grpcserver"
35+
36+
)
37+
38+
var (
39+
cosiAddress = "tcp://0.0.0.0:9000"
40+
s3Endpoint = "tcp://0.0.0.0:9000"
41+
accessKey = "AKIAIOSFODNN7EXAMPLE"
42+
secretKey = "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
43+
ctx context.Context
44+
)
45+
46+
var cmd = &cobra.Command{
47+
Use: os.Args[0],
48+
Short: "sample provisoner for provisioning bucket instance to the backend bucket",
49+
SilenceErrors: true,
50+
SilenceUsage: true,
51+
RunE: func(c *cobra.Command, args []string) error {
52+
return run(args, cosiAddress)
53+
},
54+
DisableFlagsInUseLine: true,
55+
Version: VERSION,
56+
}
57+
58+
func init() {
59+
viper.AutomaticEnv()
60+
61+
cmd.PersistentFlags().AddGoFlagSet(flag.CommandLine)
62+
flag.Set("logtostderr", "true")
63+
64+
strFlag := func(c *cobra.Command, ptr *string, name string, short string, dfault string, desc string) {
65+
c.PersistentFlags().
66+
StringVarP(ptr, name, short, dfault, desc)
67+
}
68+
strFlag(cmd, &cosiAddress, "listen-address", "", cosiAddress, "The address for the driver to listen on")
69+
strFlag(cmd, &s3Endpoint, "s3-endpoint", "", "", "S3-endpont")
70+
strFlag(cmd, &accessKey, "access-key", "", "", "S3-AccessKey")
71+
strFlag(cmd, &secretKey, "secret-key", "", "", "S3-SecretKey")
72+
hideFlag := func(name string) {
73+
cmd.PersistentFlags().MarkHidden(name)
74+
}
75+
hideFlag("alsologtostderr")
76+
hideFlag("log_backtrace_at")
77+
hideFlag("log_dir")
78+
hideFlag("logtostderr")
79+
hideFlag("master")
80+
hideFlag("stderrthreshold")
81+
hideFlag("vmodule")
82+
83+
// Substitute _ for -
84+
replacer := strings.NewReplacer("-", "_")
85+
viper.SetEnvKeyReplacer(replacer)
86+
87+
// suppress the incorrect prefix in glog output
88+
flag.CommandLine.Parse([]string{})
89+
viper.BindPFlags(cmd.PersistentFlags())
90+
91+
var cancel context.CancelFunc
92+
93+
ctx, cancel = context.WithCancel(context.Background())
94+
sigs := make(chan os.Signal, 1)
95+
signal.Notify(sigs, syscall.SIGINT, syscall.SIGTERM, syscall.SIGSEGV)
96+
97+
go func() {
98+
s := <-sigs
99+
cancel()
100+
klog.Error(fmt.Sprintf("%s %s", s.String(), "Signal received. Exiting"))
101+
}()
102+
103+
}
104+
105+
func main() {
106+
if err := cmd.Execute(); err != nil {
107+
klog.Fatal(err.Error())
108+
109+
}
110+
}
111+
112+
func run(args []string, endpoint string) error {
113+
// Initialize minio client object.
114+
minioClient, err := minio.New(s3Endpoint, accessKey, secretKey, false)
115+
if err != nil {
116+
klog.Fatalln(err)
117+
}
118+
minioAdminClient, err := madmin.New(s3Endpoint, accessKey, secretKey, false)
119+
if err != nil {
120+
klog.Fatalln(err)
121+
}
122+
cds := DriverServer{Name: PROVISIONER_NAME, Version: VERSION, S3Client: minioClient, S3AdminClient: minioAdminClient}
123+
s := grpcserver.NewNonBlockingGRPCServer()
124+
s.Start(endpoint, &cds)
125+
s.Wait()
126+
return nil
127+
}

0 commit comments

Comments
 (0)