Skip to content

Commit 1150df0

Browse files
committed
Remove querying of node labels
we will rely solely on the binary flag to decide when to apply the labels
1 parent 5b52c11 commit 1150df0

File tree

7 files changed

+8
-270
lines changed

7 files changed

+8
-270
lines changed

cmd/gce-pd-csi-driver/main.go

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ import (
3939
driver "sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/gce-pd-csi-driver"
4040
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/metrics"
4141
mountmanager "sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/mount-manager"
42-
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/nodelabels"
4342
)
4443

4544
var (
@@ -242,20 +241,6 @@ func handle() {
242241
EnableDiskTopology: *diskTopology,
243242
}
244243

245-
if *diskTopology {
246-
klog.V(2).Infof("Setting up kubeClient")
247-
kubeClient, err := instantiateKubeClient()
248-
if err != nil {
249-
klog.Fatalf("Failed to instantiate Kubernetes client: %v", err)
250-
}
251-
klog.V(2).Infof("Setting up node lister with informer")
252-
labelVerifier, err := nodelabels.NewVerifier(ctx, kubeClient)
253-
if err != nil {
254-
klog.Fatalf("Failed to create node label verifier: %v", err)
255-
}
256-
args.LabelVerifier = labelVerifier
257-
}
258-
259244
controllerServer = driver.NewControllerServer(gceDriver, cloudProvider, initialBackoffDuration, maxBackoffDuration, fallbackRequisiteZones, *enableStoragePoolsFlag, *enableDataCacheFlag, multiZoneVolumeHandleConfig, listVolumesConfig, provisionableDisksConfig, *enableHdHAFlag, args)
260245
} else if *cloudConfigFilePath != "" {
261246
klog.Warningf("controller service is disabled but cloud config given - it has no effect")

pkg/gce-pd-csi-driver/controller.go

Lines changed: 7 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,6 @@ import (
4040
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/common"
4141
gce "sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/gce-cloud-provider/compute"
4242
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/metrics"
43-
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/nodelabels"
4443
)
4544

4645
type GCEControllerServer struct {
@@ -123,12 +122,10 @@ type GCEControllerServer struct {
123122
csi.UnimplementedControllerServer
124123

125124
EnableDiskTopology bool
126-
LabelVerifier *nodelabels.Verifier
127125
}
128126

129127
type GCEControllerServerArgs struct {
130128
EnableDiskTopology bool
131-
LabelVerifier *nodelabels.Verifier
132129
}
133130

134131
type MultiZoneVolumeHandleConfig struct {
@@ -2431,14 +2428,7 @@ func (gceCS *GCEControllerServer) generateCreateVolumeResponseWithVolumeId(disk
24312428
}
24322429

24332430
if gceCS.EnableDiskTopology {
2434-
klog.V(4).Infof("Verifying disk support labels on cluster nodes before adding disk support topology")
2435-
addDiskSupportTopology, err := gceCS.allNodesHaveDiskSupportLabel()
2436-
if err != nil {
2437-
return nil, fmt.Errorf("failed to check if all nodes have disk support label: %w", err)
2438-
}
2439-
if addDiskSupportTopology {
2440-
top.Segments[common.TopologyLabelKey(params.DiskType)] = "true"
2441-
}
2431+
top.Segments[common.TopologyLabelKey(params.DiskType)] = "true"
24422432
}
24432433

24442434
tops = append(tops, top)
@@ -2498,21 +2488,13 @@ func (gceCS *GCEControllerServer) generateCreateVolumeResponseWithVolumeId(disk
24982488
return createResp, nil
24992489
}
25002490

2501-
func (gceCS *GCEControllerServer) allNodesHaveDiskSupportLabel() (bool, error) {
2502-
allNodesHaveDiskSupportLabel, err := gceCS.LabelVerifier.AllNodesHaveDiskSupportLabel()
2503-
if err != nil {
2504-
return false, fmt.Errorf("failed to check if all nodes have disk support label: %w", err)
2505-
}
2506-
return allNodesHaveDiskSupportLabel, nil
2507-
}
2508-
25092491
func getResourceId(resourceLink string) (string, error) {
25102492
url, err := neturl.Parse(resourceLink)
25112493
if err != nil {
2512-
return "", fmt.Errorf("Could not parse resource %s: %w", resourceLink, err)
2494+
return "", fmt.Errorf("could not parse resource %s: %w", resourceLink, err)
25132495
}
25142496
if url.Scheme != resourceApiScheme {
2515-
return "", fmt.Errorf("Unexpected API scheme for resource %s", resourceLink)
2497+
return "", fmt.Errorf("unexpected API scheme for resource %s", resourceLink)
25162498
}
25172499

25182500
// Note that the resource host can basically be anything, if we are running in
@@ -2521,16 +2503,16 @@ func getResourceId(resourceLink string) (string, error) {
25212503
// The path should be /compute/VERSION/project/....
25222504
elts := strings.Split(url.Path, "/")
25232505
if len(elts) < 4 {
2524-
return "", fmt.Errorf("Short resource path %s", resourceLink)
2506+
return "", fmt.Errorf("short resource path %s", resourceLink)
25252507
}
25262508
if elts[1] != resourceApiService {
2527-
return "", fmt.Errorf("Bad resource service %s in %s", elts[1], resourceLink)
2509+
return "", fmt.Errorf("bad resource service %s in %s", elts[1], resourceLink)
25282510
}
25292511
if _, ok := validResourceApiVersions[elts[2]]; !ok {
2530-
return "", fmt.Errorf("Bad version %s in %s", elts[2], resourceLink)
2512+
return "", fmt.Errorf("bad version %s in %s", elts[2], resourceLink)
25312513
}
25322514
if elts[3] != resourceProject {
2533-
return "", fmt.Errorf("Expected %v to start with %s in resource %s", elts[3:], resourceProject, resourceLink)
2515+
return "", fmt.Errorf("expected %v to start with %s in resource %s", elts[3:], resourceProject, resourceLink)
25342516
}
25352517
return strings.Join(elts[3:], "/"), nil
25362518
}

pkg/gce-pd-csi-driver/controller_test.go

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,6 @@ import (
3737
"google.golang.org/api/googleapi"
3838
"google.golang.org/grpc/codes"
3939
"google.golang.org/grpc/status"
40-
corev1 "k8s.io/api/core/v1"
41-
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
4240
"k8s.io/apimachinery/pkg/util/sets"
4341
"k8s.io/client-go/util/flowcontrol"
4442
"k8s.io/klog/v2"
@@ -49,7 +47,6 @@ import (
4947
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/common"
5048
gce "sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/gce-cloud-provider/compute"
5149
gcecloudprovider "sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/gce-cloud-provider/compute"
52-
"sigs.k8s.io/gcp-compute-persistent-disk-csi-driver/pkg/nodelabels"
5350
)
5451

5552
const (
@@ -1383,19 +1380,7 @@ func TestCreateVolumeArguments(t *testing.T) {
13831380
t.Logf("test case: %s", tc.name)
13841381

13851382
// Setup new driver each time so no interference
1386-
args := &GCEControllerServerArgs{
1387-
EnableDiskTopology: tc.enableDiskTopology,
1388-
LabelVerifier: nodelabels.NewFakeVerifier(t, []*corev1.Node{
1389-
{
1390-
ObjectMeta: metav1.ObjectMeta{
1391-
Name: "node-with-disk-support-label",
1392-
Labels: map[string]string{
1393-
common.TopologyLabelKey(stdDiskType): "true",
1394-
},
1395-
},
1396-
},
1397-
}),
1398-
}
1383+
args := &GCEControllerServerArgs{EnableDiskTopology: tc.enableDiskTopology}
13991384
gceDriver := initGCEDriver(t, nil, args)
14001385
gceDriver.cs.enableStoragePools = tc.enableStoragePools
14011386

pkg/gce-pd-csi-driver/gce-pd-driver.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,6 @@ func NewControllerServer(gceDriver *GCEDriver, cloudProvider gce.GCECompute, err
175175
provisionableDisksConfig: provisionableDisksConfig,
176176
enableHdHA: enableHdHA,
177177
EnableDiskTopology: args.EnableDiskTopology,
178-
LabelVerifier: args.LabelVerifier,
179178
}
180179
}
181180

pkg/nodelabels/fake.go

Lines changed: 0 additions & 36 deletions
This file was deleted.

pkg/nodelabels/verifier.go

Lines changed: 0 additions & 89 deletions
This file was deleted.

pkg/nodelabels/verifier_test.go

Lines changed: 0 additions & 88 deletions
This file was deleted.

0 commit comments

Comments
 (0)