mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-08 03:33:56 +00:00
cmd/kubelet: fix overriding default KubeletConfig fields in drop-in configs if not set
This commit resolves an issue where certain KubeletConfig fields, specifically: - FileCheckFrequency - VolumeStatsAggPeriod - EvictionPressureTransitionPeriod - Authorization.Mode - EvictionHard were inadvertently overridden when not explicitly set in drop-in configs. To retain the original values if they were absent in the drop-in configs, mergeKubeletConfigurations uses a JSON patch merge strategy to selectively merge configurations. It prevents essential configuration settings from being overridden, ensuring a more predictable behavior for users. Signed-off-by: Sohan Kunkerkar <sohank2602@gmail.com> Co-authored-by: Peter Hunt <pehunt@redhat.com>
This commit is contained in:
parent
3240e2b28e
commit
ee5578be52
@ -20,6 +20,7 @@ package app
|
||||
import (
|
||||
"context"
|
||||
"crypto/tls"
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
@ -34,7 +35,7 @@ import (
|
||||
"time"
|
||||
|
||||
"github.com/coreos/go-systemd/v22/daemon"
|
||||
"github.com/imdario/mergo"
|
||||
jsonpatch "github.com/evanphx/json-patch"
|
||||
"github.com/spf13/cobra"
|
||||
"github.com/spf13/pflag"
|
||||
"google.golang.org/grpc/codes"
|
||||
@ -312,30 +313,34 @@ is checked every 20 seconds (also configurable with a flag).`,
|
||||
// potentially overriding the previous values.
|
||||
func mergeKubeletConfigurations(kubeletConfig *kubeletconfiginternal.KubeletConfiguration, kubeletDropInConfigDir string) error {
|
||||
const dropinFileExtension = ".conf"
|
||||
|
||||
baseKubeletConfigJSON, err := json.Marshal(kubeletConfig)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to marshal base config: %w", err)
|
||||
}
|
||||
// Walk through the drop-in directory and update the configuration for each file
|
||||
err := filepath.WalkDir(kubeletDropInConfigDir, func(path string, info fs.DirEntry, err error) error {
|
||||
if err := filepath.WalkDir(kubeletDropInConfigDir, func(path string, info fs.DirEntry, err error) error {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if !info.IsDir() && filepath.Ext(info.Name()) == dropinFileExtension {
|
||||
dropinConfig, err := loadConfigFile(path)
|
||||
dropinConfigJSON, err := loadDropinConfigFileIntoJSON(path)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to load kubelet dropin file, path: %s, error: %w", path, err)
|
||||
}
|
||||
|
||||
// Merge dropinConfig with kubeletConfig
|
||||
if err := mergo.Merge(kubeletConfig, dropinConfig, mergo.WithOverride); err != nil {
|
||||
return fmt.Errorf("failed to merge kubelet drop-in config, path: %s, error: %w", path, err)
|
||||
mergedConfigJSON, err := jsonpatch.MergePatch(baseKubeletConfigJSON, dropinConfigJSON)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to merge drop-in and current config: %w", err)
|
||||
}
|
||||
baseKubeletConfigJSON = mergedConfigJSON
|
||||
}
|
||||
return nil
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
}); err != nil {
|
||||
return fmt.Errorf("failed to walk through kubelet dropin directory %q: %w", kubeletDropInConfigDir, err)
|
||||
}
|
||||
|
||||
if err := json.Unmarshal(baseKubeletConfigJSON, kubeletConfig); err != nil {
|
||||
return fmt.Errorf("failed to unmarshal merged JSON into kubelet configuration: %w", err)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
@ -415,6 +420,20 @@ func loadConfigFile(name string) (*kubeletconfiginternal.KubeletConfiguration, e
|
||||
return kc, err
|
||||
}
|
||||
|
||||
func loadDropinConfigFileIntoJSON(name string) ([]byte, error) {
|
||||
const errFmt = "failed to load drop-in kubelet config file %s, error %v"
|
||||
// compute absolute path based on current working dir
|
||||
kubeletConfigFile, err := filepath.Abs(name)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf(errFmt, name, err)
|
||||
}
|
||||
loader, err := configfiles.NewFsLoader(&utilfs.DefaultFs{}, kubeletConfigFile)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf(errFmt, name, err)
|
||||
}
|
||||
return loader.LoadIntoJSON()
|
||||
}
|
||||
|
||||
// UnsecuredDependencies returns a Dependencies suitable for being run, or an error if the server setup
|
||||
// is not valid. It will not start any background processes, and does not include authentication/authorization
|
||||
func UnsecuredDependencies(s *options.KubeletServer, featureGate featuregate.FeatureGate) (*kubelet.Dependencies, error) {
|
||||
|
@ -21,8 +21,11 @@ import (
|
||||
"path/filepath"
|
||||
"reflect"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/stretchr/testify/require"
|
||||
"gopkg.in/yaml.v2"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/kubernetes/cmd/kubelet/app/options"
|
||||
kubeletconfiginternal "k8s.io/kubernetes/pkg/kubelet/apis/config"
|
||||
)
|
||||
@ -71,7 +74,7 @@ func TestValueOfAllocatableResources(t *testing.T) {
|
||||
|
||||
func TestMergeKubeletConfigurations(t *testing.T) {
|
||||
testCases := []struct {
|
||||
kubeletConfig string
|
||||
kubeletConfig *kubeletconfiginternal.KubeletConfiguration
|
||||
dropin1 string
|
||||
dropin2 string
|
||||
overwrittenConfigFields map[string]interface{}
|
||||
@ -79,12 +82,14 @@ func TestMergeKubeletConfigurations(t *testing.T) {
|
||||
name string
|
||||
}{
|
||||
{
|
||||
kubeletConfig: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
port: 9080
|
||||
readOnlyPort: 10257
|
||||
`,
|
||||
kubeletConfig: &kubeletconfiginternal.KubeletConfiguration{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: "KubeletConfiguration",
|
||||
APIVersion: "kubelet.config.k8s.io/v1beta1",
|
||||
},
|
||||
Port: int32(9090),
|
||||
ReadOnlyPort: int32(10257),
|
||||
},
|
||||
dropin1: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
@ -103,13 +108,15 @@ readOnlyPort: 10255
|
||||
name: "kubelet.conf.d overrides kubelet.conf",
|
||||
},
|
||||
{
|
||||
kubeletConfig: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
readOnlyPort: 10256
|
||||
kubeReserved:
|
||||
memory: 70Mi
|
||||
`,
|
||||
kubeletConfig: &kubeletconfiginternal.KubeletConfiguration{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: "KubeletConfiguration",
|
||||
APIVersion: "kubelet.config.k8s.io/v1beta1",
|
||||
},
|
||||
ReadOnlyPort: int32(10256),
|
||||
KubeReserved: map[string]string{"memory": "100Mi"},
|
||||
SyncFrequency: metav1.Duration{Duration: 5 * time.Minute},
|
||||
},
|
||||
dropin1: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
@ -131,18 +138,19 @@ kubeReserved:
|
||||
"cpu": "200m",
|
||||
"memory": "100Mi",
|
||||
},
|
||||
"SyncFrequency": metav1.Duration{Duration: 5 * time.Minute},
|
||||
},
|
||||
name: "kubelet.conf.d overrides kubelet.conf with subfield override",
|
||||
},
|
||||
{
|
||||
kubeletConfig: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
port: 9090
|
||||
clusterDNS:
|
||||
- 192.168.1.3
|
||||
- 192.168.1.4
|
||||
`,
|
||||
kubeletConfig: &kubeletconfiginternal.KubeletConfiguration{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: "KubeletConfiguration",
|
||||
APIVersion: "kubelet.config.k8s.io/v1beta1",
|
||||
},
|
||||
Port: int32(9090),
|
||||
ClusterDNS: []string{"192.168.1.3", "192.168.1.4"},
|
||||
},
|
||||
dropin1: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
@ -173,6 +181,7 @@ clusterDNS:
|
||||
name: "kubelet.conf.d overrides kubelet.conf with slices/lists",
|
||||
},
|
||||
{
|
||||
kubeletConfig: nil,
|
||||
dropin1: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
@ -195,13 +204,14 @@ readOnlyPort: 10255
|
||||
name: "cli args override kubelet.conf.d",
|
||||
},
|
||||
{
|
||||
kubeletConfig: `
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
kind: KubeletConfiguration
|
||||
port: 9090
|
||||
clusterDNS:
|
||||
- 192.168.1.3
|
||||
`,
|
||||
kubeletConfig: &kubeletconfiginternal.KubeletConfiguration{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: "KubeletConfiguration",
|
||||
APIVersion: "kubelet.config.k8s.io/v1beta1",
|
||||
},
|
||||
Port: int32(9090),
|
||||
ClusterDNS: []string{"192.168.1.3"},
|
||||
},
|
||||
overwrittenConfigFields: map[string]interface{}{
|
||||
"Port": int32(9090),
|
||||
"ClusterDNS": []string{"192.168.1.2"},
|
||||
@ -222,12 +232,15 @@ clusterDNS:
|
||||
kubeletConfig := &kubeletconfiginternal.KubeletConfiguration{}
|
||||
kubeletFlags := &options.KubeletFlags{}
|
||||
|
||||
if len(test.kubeletConfig) > 0 {
|
||||
if test.kubeletConfig != nil {
|
||||
// Create the Kubeletconfig
|
||||
kubeletConfFile := filepath.Join(tempDir, "kubelet.conf")
|
||||
err := os.WriteFile(kubeletConfFile, []byte(test.kubeletConfig), 0644)
|
||||
require.NoError(t, err, "failed to create config from a yaml file")
|
||||
yamlData, err := yaml.Marshal(test.kubeletConfig) // Convert struct to YAML
|
||||
require.NoError(t, err, "failed to convert kubelet config to YAML")
|
||||
err = os.WriteFile(kubeletConfFile, yamlData, 0644)
|
||||
require.NoError(t, err, "failed to create config from YAML data")
|
||||
kubeletFlags.KubeletConfigFile = kubeletConfFile
|
||||
kubeletConfig = test.kubeletConfig
|
||||
}
|
||||
if len(test.dropin1) > 0 || len(test.dropin2) > 0 {
|
||||
// Create kubelet.conf.d directory and drop-in configuration files
|
||||
|
2
go.mod
2
go.mod
@ -45,7 +45,6 @@ require (
|
||||
github.com/google/go-cmp v0.6.0
|
||||
github.com/google/gofuzz v1.2.0
|
||||
github.com/google/uuid v1.3.0
|
||||
github.com/imdario/mergo v0.3.6
|
||||
github.com/ishidawataru/sctp v0.0.0-20230406120618-7ff4192f6ff2
|
||||
github.com/libopenstorage/openstorage v1.0.0
|
||||
github.com/lithammer/dedent v1.1.0
|
||||
@ -186,6 +185,7 @@ require (
|
||||
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 // indirect
|
||||
github.com/grpc-ecosystem/grpc-gateway v1.16.0 // indirect
|
||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 // indirect
|
||||
github.com/imdario/mergo v0.3.6 // indirect
|
||||
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||
github.com/jonboulle/clockwork v0.2.2 // indirect
|
||||
github.com/josharian/intern v1.0.0 // indirect
|
||||
|
@ -31,6 +31,9 @@ import (
|
||||
type Loader interface {
|
||||
// Load loads and returns the KubeletConfiguration from the storage layer, or an error if a configuration could not be loaded
|
||||
Load() (*kubeletconfig.KubeletConfiguration, error)
|
||||
// LoadIntoJSON loads and returns the KubeletConfiguration from the storage layer, or an error if a configuration could not be
|
||||
// loaded. It returns the configuration as a JSON byte slice
|
||||
LoadIntoJSON() ([]byte, error)
|
||||
}
|
||||
|
||||
// fsLoader loads configuration from `configDir`
|
||||
@ -78,6 +81,20 @@ func (loader *fsLoader) Load() (*kubeletconfig.KubeletConfiguration, error) {
|
||||
return kc, nil
|
||||
}
|
||||
|
||||
func (loader *fsLoader) LoadIntoJSON() ([]byte, error) {
|
||||
data, err := loader.fs.ReadFile(loader.kubeletFile)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to read drop-in kubelet config file %q, error: %v", loader.kubeletFile, err)
|
||||
}
|
||||
|
||||
// no configuration is an error, some parameters are required
|
||||
if len(data) == 0 {
|
||||
return nil, fmt.Errorf("kubelet config file %q was empty", loader.kubeletFile)
|
||||
}
|
||||
|
||||
return utilcodec.DecodeKubeletConfigurationIntoJSON(loader.kubeletCodecs, data)
|
||||
}
|
||||
|
||||
// resolveRelativePaths makes relative paths absolute by resolving them against `root`
|
||||
func resolveRelativePaths(paths []*string, root string) {
|
||||
for _, path := range paths {
|
||||
|
@ -17,6 +17,7 @@ limitations under the License.
|
||||
package codec
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
|
||||
"k8s.io/klog/v2"
|
||||
@ -24,6 +25,7 @@ import (
|
||||
// ensure the core apis are installed
|
||||
_ "k8s.io/kubernetes/pkg/apis/core/install"
|
||||
|
||||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"k8s.io/apimachinery/pkg/runtime/serializer"
|
||||
@ -105,3 +107,16 @@ func DecodeKubeletConfiguration(kubeletCodecs *serializer.CodecFactory, data []b
|
||||
|
||||
return internalKC, nil
|
||||
}
|
||||
|
||||
// DecodeKubeletConfigurationIntoJSON decodes a serialized KubeletConfiguration to the internal type.
|
||||
func DecodeKubeletConfigurationIntoJSON(kubeletCodecs *serializer.CodecFactory, data []byte) ([]byte, error) {
|
||||
// The UniversalDecoder runs defaulting and returns the internal type by default.
|
||||
obj, _, err := kubeletCodecs.UniversalDecoder().Decode(data, nil, &unstructured.Unstructured{})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
objT := obj.(*unstructured.Unstructured)
|
||||
|
||||
return json.Marshal(objT.Object)
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user