Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(csi): add support for ReadWriteOncePod access mode #3236

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

shikanime
Copy link

Signed-off-by: William Phetsinorath [email protected]

@derekbit
Copy link
Member

@shikanime Awesome! Thanks for your contribution.
@james-munson Please help review the PR if you have time. Thank you.

Copy link

coderabbitai bot commented Oct 24, 2024

Walkthrough

The changes in this pull request enhance the volume management system by introducing new access modes for volumes and refining error handling across various methods. Key updates include the addition of a new access mode, AccessModeReadWriteOncePod, in multiple locations, enhanced logic for handling exclusive access in volume creation and publishing, and the introduction of a new function to determine exclusive access requirements. Additionally, the access mode validation logic has been updated to accommodate the new modes, ensuring robust handling of volume options.

Changes

File Change Summary
csi/controller_server.go Updated NewControllerServer, CreateVolume, and ControllerPublishVolume methods to incorporate new access modes and exclusive access logic.
csi/util.go Added exclusive parameter to getVolumeOptions and introduced requireExclusiveAccess function for exclusive access checks. Enhanced error handling for volume options.
datastore/kubernetes.go Modified NewPVCManifestForVolume to utilize a switch statement for handling multiple access modes, including AccessModeReadWriteOncePod.
k8s/pkg/apis/longhorn/v1beta1/volume.go Added new access mode constant AccessModeReadWriteOncePod.
k8s/pkg/apis/longhorn/v1beta2/volume.go Added new access mode constant AccessModeReadWriteOncePod and updated validation annotation for access modes.
types/types.go Updated ValidateAccessMode function to include AccessModeReadWriteOncePod as a valid access mode.

Sequence Diagram(s)

sequenceDiagram
    participant User
    participant ControllerServer
    participant VolumeManager
    participant PVCManager

    User->>ControllerServer: Create Volume Request
    ControllerServer->>VolumeManager: Validate Access Modes
    VolumeManager->>ControllerServer: Access Modes Validated
    ControllerServer->>VolumeManager: Create Volume
    VolumeManager->>ControllerServer: Volume Created
    ControllerServer->>User: Volume Creation Response

    User->>ControllerServer: Publish Volume Request
    ControllerServer->>VolumeManager: Check Exclusive Access
    VolumeManager->>ControllerServer: Exclusive Access Validated
    ControllerServer->>PVCManager: Update PVC Manifest
    PVCManager->>ControllerServer: PVC Manifest Updated
    ControllerServer->>User: Volume Published Response
Loading

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Outside diff range and nitpick comments (2)
k8s/pkg/apis/longhorn/v1beta1/volume.go (1)

62-64: LGTM! The new access mode aligns with Kubernetes standards.

The addition of AccessModeReadWriteOncePod follows the Kubernetes storage specification correctly. This mode provides stronger guarantees than ReadWriteOnce by ensuring exclusive access at the pod level rather than the node level.

Note that this access mode requires Kubernetes 1.22+ and provides better isolation for workloads requiring strict exclusive access, such as databases or stateful applications with strict consistency requirements.

types/types.go (1)

847-847: LGTM! Consider improving readability.

The addition of AccessModeReadWriteOncePod is correct and aligns with the PR objective.

Consider improving readability by formatting the condition across multiple lines:

-	if mode != longhorn.AccessModeReadWriteMany && mode != longhorn.AccessModeReadWriteOnce  && mode != longhorn.AccessModeReadWriteOncePod {
+	if mode != longhorn.AccessModeReadWriteMany &&
+		mode != longhorn.AccessModeReadWriteOnce &&
+		mode != longhorn.AccessModeReadWriteOncePod {
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Files that changed from the base of the PR and between e7db6e7 and b76fbc8.

📒 Files selected for processing (6)
  • csi/controller_server.go (3 hunks)
  • csi/util.go (2 hunks)
  • datastore/kubernetes.go (1 hunks)
  • k8s/pkg/apis/longhorn/v1beta1/volume.go (1 hunks)
  • k8s/pkg/apis/longhorn/v1beta2/volume.go (1 hunks)
  • types/types.go (1 hunks)
🧰 Additional context used
🪛 GitHub Check: CodeFactor
csi/util.go

[notice] 471-471: csi/util.go#L471
Redefinition of the built-in function cap. (redefines-builtin-id)

🔇 Additional comments (9)
k8s/pkg/apis/longhorn/v1beta2/volume.go (2)

60-62: LGTM! Constants follow Kubernetes conventions

The new AccessModeReadWriteOncePod constant follows proper naming conventions and uses the standard "rwop" abbreviation that aligns with Kubernetes CSI specifications.


56-62: Verify integration with Kubernetes CSI and existing volumes

While the implementation looks correct, please ensure:

  1. Existing volumes with other access modes continue to work
  2. CSI driver properly handles the new access mode
  3. Documentation is updated to reflect this new capability

Let's check for any existing volumes that might be affected:

datastore/kubernetes.go (1)

1018-1022: LGTM! Clean implementation of ReadWriteOncePod access mode support.

The switch statement implementation correctly maps the Longhorn access mode to the corresponding Kubernetes PVC access mode.

Let's verify the access mode constant is properly defined:

✅ Verification successful

AccessModeReadWriteOncePod constant is properly defined and consistent across API versions

The constant is correctly defined in both v1beta1 and v1beta2 API versions with the same value "rwop", ensuring backward compatibility and proper type safety. The implementation in the switch statement correctly uses this constant.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify AccessModeReadWriteOncePod is defined in the types
rg "AccessModeReadWriteOncePod.*=.*" -A 2

Length of output: 484

csi/controller_server.go (4)

72-73: LGTM: Access mode additions follow CSI spec

The new access modes SINGLE_NODE_SINGLE_WRITER and SINGLE_NODE_MULTI_WRITER enhance the granularity of volume access control and align with the CSI specification.


225-228: LGTM: Proper exclusive access handling in volume creation

The exclusive access check is properly implemented and follows the same pattern as the shared access check. The volumeParameters are correctly updated when exclusive access is required.


463-469: LGTM: Proper exclusive access handling in volume publishing

The exclusive access handling in ControllerPublishVolume is well-implemented:

  • Follows the same pattern as shared access handling
  • Properly updates volume access mode to ReadWriteOncePod when required
  • Maintains consistent error handling

463-469: Verify the requireExclusiveAccess implementation

Let's verify the implementation of the requireExclusiveAccess function to ensure proper handling of exclusive access modes.

✅ Verification successful

Based on the shell script results, I can now generate the final response as we have sufficient information about both the requireExclusiveAccess implementation and the access mode update mechanism.

Implementation verified - Access mode handling is properly implemented

The requireExclusiveAccess function in csi/util.go correctly handles exclusive access by:

  • Checking if the volume's current access mode is ReadWriteOncePod
  • Verifying if the requested capability is SINGLE_NODE_SINGLE_WRITER
  • Properly combining both conditions with logical OR

The access mode update flow is also well-implemented:

  • Changes are handled through a proper API client interface
  • Updates are processed via the volume manager with appropriate error handling
  • The operation is atomic at the API level
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for the requireExclusiveAccess function implementation
ast-grep --pattern 'func requireExclusiveAccess($_, $_) bool {
  $$$
}'

# Search for potential race conditions in access mode changes
rg -A 5 'UpdateAccessMode|ActionUpdateAccessMode'

Length of output: 12110

csi/util.go (2)

121-132: The 'exclusive' parameter is correctly handled and mutually exclusive with 'share'.

The logic implemented ensures that if 'exclusive' is set to true, it cannot be combined with 'share' set to true, preventing conflicting access modes. The assignment of ReadWriteOncePod to vol.AccessMode when 'exclusive' is true is appropriate.


134-136: Default access mode set to 'ReadWriteOnce' when unspecified.

The code correctly assigns ReadWriteOnce as the default vol.AccessMode when no access mode is specified, ensuring consistent behavior.

k8s/pkg/apis/longhorn/v1beta2/volume.go Outdated Show resolved Hide resolved
csi/util.go Show resolved Hide resolved
Copy link
Contributor

@james-munson james-munson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. I would ask that the PR get a corresponding Github issue, and that it have a note about how the feature was tested. Also, that will allow it to be tracked into internal QA feature test as well.

@derekbit
Copy link
Member

@james-munson Could you create Feature ticket in longhorn/longhorn for this PR and help follow up it? Thank you.

@james-munson
Copy link
Contributor

Associated tracking issue is longhorn/longhorn#9727

csi/controller_server.go Outdated Show resolved Hide resolved
@innobead
Copy link
Member

Thanks, @shikanime contribution. The commit message can start with feat: as this is a new feature.

For reviewers. besides reviewing, please help verify if this works as expected. The issue owner should be @james-munson .

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Outside diff range and nitpick comments (1)
csi/util.go (1)

121-132: Add documentation for exclusive access mode behavior.

Consider adding a comment explaining that exclusive access mode (ReadWriteOncePod) ensures the volume can only be used by a single pod at a time, which is more restrictive than ReadWriteOnce that allows multiple pods on the same node.

+	// Set exclusive access mode (ReadWriteOncePod) which ensures the volume
+	// can only be used by a single pod across all nodes
 	if exclusive, ok := volOptions["exclusive"]; ok {
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 7b00b88 and 1e95ce6.

📒 Files selected for processing (6)
  • csi/controller_server.go (3 hunks)
  • csi/util.go (2 hunks)
  • datastore/kubernetes.go (1 hunks)
  • k8s/pkg/apis/longhorn/v1beta1/volume.go (1 hunks)
  • k8s/pkg/apis/longhorn/v1beta2/volume.go (1 hunks)
  • types/types.go (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (3)
  • k8s/pkg/apis/longhorn/v1beta1/volume.go
  • k8s/pkg/apis/longhorn/v1beta2/volume.go
  • types/types.go
🧰 Additional context used
🪛 GitHub Check: CodeFactor
csi/util.go

[notice] 471-471: csi/util.go#L471
Redefinition of the built-in function cap. (redefines-builtin-id)

🔇 Additional comments (5)
csi/util.go (2)

471-483: Add function documentation and verify CSI capability constant.

The function implementation looks correct, but would benefit from documentation explaining its purpose and return value.

Add documentation:

+// requireExclusiveAccess determines if a volume requires exclusive access based on
+// its configured access mode (ReadWriteOncePod) or the requested CSI capability
+// (SINGLE_NODE_SINGLE_WRITER). Returns true if either condition is met.
 func requireExclusiveAccess(vol *longhornclient.Volume, cap *csi.VolumeCapability) bool {

Let's verify the CSI capability constant:

✅ Verification successful

The search results show that the CSI capability constant VolumeCapability_AccessMode_SINGLE_NODE_SINGLE_WRITER is properly defined in the CSI spec's generated protobuf code and is consistently used across the codebase. Let me verify one more aspect of the implementation by checking how this constant is used in the controller server.


Function implementation and constant usage verified

The implementation correctly uses the CSI capability constant SINGLE_NODE_SINGLE_WRITER. The constant is properly defined in the CSI spec's protobuf code and is consistently used across the codebase, including the controller server where it's listed as one of the supported access modes.

Add documentation as suggested:

+// requireExclusiveAccess determines if a volume requires exclusive access based on
+// its configured access mode (ReadWriteOncePod) or the requested CSI capability
+// (SINGLE_NODE_SINGLE_WRITER). Returns true if either condition is met.
 func requireExclusiveAccess(vol *longhornclient.Volume, cap *csi.VolumeCapability) bool {
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify CSI capability constant is properly defined
# Test: Search for VolumeCapability_AccessMode constants. Expect: Definition of SINGLE_NODE_SINGLE_WRITER

rg "VolumeCapability_AccessMode_SINGLE_NODE_SINGLE_WRITER"

Length of output: 411


Script:

#!/bin/bash
# Check the context of SINGLE_NODE_SINGLE_WRITER usage in controller_server.go
rg -B 2 -A 2 "VolumeCapability_AccessMode_SINGLE_NODE_SINGLE_WRITER" csi/controller_server.go

Length of output: 378

🧰 Tools
🪛 GitHub Check: CodeFactor

[notice] 471-471: csi/util.go#L471
Redefinition of the built-in function cap. (redefines-builtin-id)


134-136: Verify access mode constant usage.

The implementation looks correct. Let's verify that the access mode constants are properly defined and imported.

✅ Verification successful

Let me gather more information about the access mode constants.


Let me verify the import path in the CSI util file to ensure it's using the correct version of the constants.


Let me check the complete imports in the file to find the longhorn package import.


Access mode constant usage is correctly implemented

The code is using the proper import longhorn "github.com/longhorn/longhorn-manager/k8s/pkg/apis/longhorn/v1beta2" which contains the AccessMode constants (AccessModeReadWriteOnce = "rwo"). The default assignment in the code matches the imported constant definition.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify access mode constants are properly defined
# Test: Search for AccessMode constants. Expect: Definitions of ReadWriteOnce, ReadWriteOncePod

rg -A 2 "type AccessMode string|const.*AccessMode" 

Length of output: 359


Script:

#!/bin/bash
# Get the complete constant definitions for AccessMode
rg -A 10 "type AccessMode string" k8s/pkg/apis/longhorn/v1beta2/volume.go

Length of output: 361


Script:

#!/bin/bash
# Check imports in the CSI util file
rg -A 10 "^import" csi/util.go

Length of output: 143


Script:

#!/bin/bash
# Get all imports from the file
cat csi/util.go | awk '/^import/,/^)/'

Length of output: 535

datastore/kubernetes.go (1)

1018-1022: LGTM! Implementation looks correct.

The switch statement implementation for handling the new ReadWriteOncePod access mode is clean and follows the existing pattern. The mapping between Longhorn's access mode and Kubernetes core API's access mode is correct.

Let's verify the access mode constant is properly defined:

✅ Verification successful

AccessModeReadWriteOncePod constant is properly defined and validated

The verification confirms:

  • The constant AccessModeReadWriteOncePod is properly defined as "rwop" in both v1beta1 and v1beta2 API versions
  • The access mode is included in the validation logic in types/types.go, which ensures only valid access modes are accepted
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify AccessModeReadWriteOncePod constant definition

# Test: Search for AccessModeReadWriteOncePod constant definition
rg -A 2 "AccessModeReadWriteOncePod.*=.*"

# Test: Search for related validation logic
rg -A 5 "func.*ValidateAccessMode.*"

Length of output: 879

csi/controller_server.go (2)

225-228: LGTM: Exclusive access handling is correctly implemented.

The code properly sets the exclusive parameter in volume parameters when exclusive access is required, which is essential for ReadWriteOncePod support.


463-469: LGTM: Volume publishing changes for exclusive access are well implemented.

The code properly updates the volume access mode to ReadWriteOncePod during volume publishing when exclusive access is required. The implementation includes proper error handling and aligns with CSI specifications.

csi/controller_server.go Outdated Show resolved Hide resolved
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Outside diff range and nitpick comments (2)
csi/util.go (1)

121-137: LGTM! Consider enhancing the error message.

The implementation correctly handles exclusive access mode and prevents invalid combinations. The validation logic and default access mode setting are well-implemented.

Consider making the error message more descriptive:

-			return nil, errors.New("cannot set both share and exclusive to true")
+			return nil, errors.New("conflicting access modes: volume cannot be both shared (RWX) and exclusive (RWOP)")
csi/controller_server.go (1)

462-467: Consider adding a comment explaining the exclusive access mode update.

While the implementation is correct, adding a comment explaining why we update to ReadWriteOncePod when exclusive access is required would improve code maintainability.

Add a comment before the if block:

+	// Update volume access mode to ReadWriteOncePod if the volume requires exclusive access
+	// This ensures proper access control at the storage level
 	if requireExclusiveAccess(volume, volumeCapability) {
 		volume, err = cs.updateVolumeAccessMode(volume, longhorn.AccessModeReadWriteOncePod)
 		if err != nil {
 			return nil, err
 		}
 	}
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 1e95ce6 and 5eff77d.

📒 Files selected for processing (6)
  • csi/controller_server.go (3 hunks)
  • csi/util.go (2 hunks)
  • datastore/kubernetes.go (1 hunks)
  • k8s/pkg/apis/longhorn/v1beta1/volume.go (1 hunks)
  • k8s/pkg/apis/longhorn/v1beta2/volume.go (1 hunks)
  • types/types.go (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (3)
  • k8s/pkg/apis/longhorn/v1beta1/volume.go
  • k8s/pkg/apis/longhorn/v1beta2/volume.go
  • types/types.go
🧰 Additional context used
🪛 GitHub Check: CodeFactor
csi/util.go

[notice] 471-471: csi/util.go#L471
Redefinition of the built-in function cap. (redefines-builtin-id)

🔇 Additional comments (5)
csi/util.go (1)

471-483: Implementation looks good, but parameter shadowing needs to be addressed.

The function correctly determines exclusive access requirements by checking both the volume's access mode and CSI capability. However, as noted in the previous review, the parameter name cap shadows Go's built-in function.

Please refer to the previous review comment about renaming the cap parameter to volCap to avoid shadowing the built-in cap function.

🧰 Tools
🪛 GitHub Check: CodeFactor

[notice] 471-471: csi/util.go#L471
Redefinition of the built-in function cap. (redefines-builtin-id)

datastore/kubernetes.go (1)

1018-1022: LGTM! Consider adding Kubernetes version compatibility check.

The switch statement is a clean implementation for mapping access modes. The code correctly maps Longhorn's AccessModeReadWriteOncePod to Kubernetes' ReadWriteOncePod.

Since ReadWriteOncePod requires Kubernetes v1.22+, let's verify the minimum supported Kubernetes version:

✅ Verification successful

Let me gather more information about Kubernetes version compatibility by searching for version constraints in the codebase.


Let me check if there are any version constraints defined in the codebase that ensure compatibility with ReadWriteOncePod access mode.


Based on the search results, I can now provide a final response about the ReadWriteOncePod access mode support:

ReadWriteOncePod access mode is properly supported and validated

  • The access mode is defined in the API types and properly validated
  • The CSI driver correctly maps between Longhorn and Kubernetes access modes
  • The webhook validator enforces access mode validation
  • No explicit minimum Kubernetes version requirement is defined, but ReadWriteOncePod requires Kubernetes v1.22+

The implementation appears complete and correct, with proper validation and mapping between Longhorn's internal representation (rwop) and Kubernetes' ReadWriteOncePod access mode.

Let me know if you would like me to check anything else about the ReadWriteOncePod implementation.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check if there are any version constraints defined in the codebase
# that ensure compatibility with ReadWriteOncePod access mode.

# Test: Search for version-related constants or checks
rg -g '!vendor' -g '!*.sum' -g '!*.mod' -A 5 'MinimumKubernetesVersion|v1\.22|ReadWriteOncePod'

Length of output: 2337


Script:

#!/bin/bash
# Search for Kubernetes version related constants, checks, and documentation
rg -g '!vendor' -g '!*.sum' -g '!*.mod' -A 5 'MinimumKubernetesVersion|KubernetesMinVersion|KUBERNETES_MIN_VERSION|supported.*kubernetes|kubernetes.*version'

# Also check README and documentation
fd -g 'README*' -X cat {}

Length of output: 512197


Script:

#!/bin/bash
# Search for Kubernetes version constraints and ReadWriteOncePod related code
rg -g '!vendor' -g '!*.sum' -g '!*.mod' -A 5 'MinimumKubernetesVersion|ReadWriteOncePod|AccessMode|v1\.22'

Length of output: 43856

csi/controller_server.go (3)

72-72: LGTM: Appropriate addition of SINGLE_NODE_SINGLE_WRITER access mode.

The addition of SINGLE_NODE_SINGLE_WRITER access mode is correct for implementing ReadWriteOncePod support.


224-227: LGTM: Proper implementation of exclusive access check.

The implementation follows the same pattern as the shared access check and correctly sets the exclusive parameter for volumes requiring exclusive access.


224-227: Verify the requireExclusiveAccess implementation.

Let's verify the implementation of the requireExclusiveAccess function to ensure it correctly identifies volumes requiring exclusive access.

Also applies to: 462-467

✅ Verification successful

Implementation of requireExclusiveAccess is correct and properly handles access modes

The function correctly identifies volumes requiring exclusive access by checking:

  1. If the volume has AccessModeReadWriteOncePod mode set
  2. If the CSI capability requests SINGLE_NODE_SINGLE_WRITER mode

The implementation aligns with CSI spec requirements and properly handles the transition from older access modes to newer ones, as evidenced by the CSI spec comments in the codebase.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Find and verify the requireExclusiveAccess implementation
# Expected: Function should check for SINGLE_NODE_SINGLE_WRITER access mode

# Search for the requireExclusiveAccess function implementation
ast-grep --pattern 'func requireExclusiveAccess($_, $_) bool {
  $$$
}'

# Search for any tests covering this functionality
rg -l "TestRequireExclusiveAccess|requireExclusiveAccess.*test"

Length of output: 748


Script:

#!/bin/bash
# Let's verify the AccessMode constants and their usage
rg "AccessMode" csi/util.go -B 2 -A 2

# Check for any related test files
fd "test.*go" csi/

# Look for any other usage of AccessMode in the codebase
rg "AccessModeReadWriteOncePod|SINGLE_NODE_SINGLE_WRITER" -A 2 -B 2

Length of output: 8551

@shikanime shikanime changed the title chore: add support for ReadWriteOncePod access mode feat: add support for ReadWriteOncePod access mode Oct 31, 2024
@shikanime shikanime changed the title feat: add support for ReadWriteOncePod access mode feat(csi): add support for ReadWriteOncePod access mode Oct 31, 2024
shikanime added a commit to shikanime/longhorn-ui that referenced this pull request Oct 31, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants