/* Copyright 2019 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package nodeup import ( "strings" "k8s.io/kops/pkg/apis/kops" "k8s.io/kops/pkg/nodelabels" "k8s.io/kops/upup/pkg/fi" "k8s.io/kops/util/pkg/architectures" "k8s.io/kops/util/pkg/reflectutils" ) // Config is the configuration for the nodeup binary type Config struct { // Assets are locations where we can find files to be installed // TODO: Remove once everything is in containers? Assets map[architectures.Architecture][]string `json:",omitempty"` // Images are a list of images we should preload Images map[architectures.Architecture][]*Image `json:"images,omitempty"` // ConfigBase is the base VFS path for config objects ConfigBase *string `json:",omitempty"` // ClusterLocation is the VFS path to the cluster spec (deprecated: prefer ConfigBase) ClusterLocation *string `json:",omitempty"` // InstanceGroupName is the name of the instance group InstanceGroupName string `json:",omitempty"` // InstanceGroupRole is the instance group role. InstanceGroupRole kops.InstanceGroupRole // ClusterName is the name of the cluster ClusterName string `json:",omitempty"` // ProtokubeImage is the docker image to load for protokube (bootstrapping) ProtokubeImage map[architectures.Architecture]*Image `json:"protokubeImage,omitempty"` // Channels is a list of channels that we should apply Channels []string `json:"channels,omitempty"` // ApiserverAdditionalIPs are additional IP address to put in the apiserver server cert. ApiserverAdditionalIPs []string `json:",omitempty"` // Manifests for running etcd EtcdManifests []string `json:"etcdManifests,omitempty"` // DefaultMachineType is the first-listed instance machine type, used if querying instance metadata fails. DefaultMachineType *string `json:",omitempty"` // StaticManifests describes generic static manifests // Using this allows us to keep complex logic out of nodeup StaticManifests []*StaticManifest `json:"staticManifests,omitempty"` // KubeletConfig defines the kubelet configuration. KubeletConfig kops.KubeletConfigSpec // SysctlParameters will configure kernel parameters using sysctl(8). When // specified, each parameter must follow the form variable=value, the way // it would appear in sysctl.conf. SysctlParameters []string `json:",omitempty"` // VolumeMounts are a collection of volume mounts. VolumeMounts []*kops.VolumeMountSpec `json:",omitempty"` } // Image is a docker image we should pre-load type Image struct { // This is the name we would pass to "docker run", whereas source could be a URL from which we would download an image. Name string `json:"name,omitempty"` // Sources is a list of URLs from which we should download the image Sources []string `json:"sources,omitempty"` // Hash is the hash of the file, to verify image integrity (even over http) Hash string `json:"hash,omitempty"` } // StaticManifest is a generic static manifest type StaticManifest struct { // Key identifies the static manifest Key string `json:"key,omitempty"` // Path is the path to the manifest Path string `json:"path,omitempty"` } func NewConfig(cluster *kops.Cluster, instanceGroup *kops.InstanceGroup) *Config { role := instanceGroup.Spec.Role isMaster := role == kops.InstanceGroupRoleMaster config := Config{ InstanceGroupRole: role, SysctlParameters: instanceGroup.Spec.SysctlParameters, VolumeMounts: instanceGroup.Spec.VolumeMounts, } if isMaster { reflectutils.JSONMergeStruct(&config.KubeletConfig, cluster.Spec.MasterKubelet) // A few settings in Kubelet override those in MasterKubelet. I'm not sure why. if cluster.Spec.Kubelet != nil && cluster.Spec.Kubelet.AnonymousAuth != nil && !*cluster.Spec.Kubelet.AnonymousAuth { config.KubeletConfig.AnonymousAuth = fi.Bool(false) } } else { reflectutils.JSONMergeStruct(&config.KubeletConfig, cluster.Spec.Kubelet) } if instanceGroup.Spec.Kubelet != nil { useSecureKubelet := config.KubeletConfig.AnonymousAuth != nil && !*config.KubeletConfig.AnonymousAuth reflectutils.JSONMergeStruct(&config.KubeletConfig, instanceGroup.Spec.Kubelet) if useSecureKubelet { config.KubeletConfig.AnonymousAuth = fi.Bool(false) } } // We include the NodeLabels in the userdata even for Kubernetes 1.16 and later so that // rolling update will still replace nodes when they change. config.KubeletConfig.NodeLabels = nodelabels.BuildNodeLabels(cluster, instanceGroup) config.KubeletConfig.Taints = append(config.KubeletConfig.Taints, instanceGroup.Spec.Taints...) if cluster.Spec.Networking != nil && cluster.Spec.Networking.AmazonVPC != nil { config.DefaultMachineType = fi.String(strings.Split(instanceGroup.Spec.MachineType, ",")[0]) } return &config }