mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-10-21 22:49:31 +00:00
- move most unrelated to phases output to klog.V(1) - rename some prefixes for consistency - e.g. [kubelet] -> [kubelet-start] - control-plane-prepare: print details for each generated CP component manifest. - uppercase the info text for all "[reset].." lines - modify the text for one line in reset
129 lines
4.4 KiB
Go
129 lines
4.4 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package uploadconfig
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"k8s.io/api/core/v1"
|
|
rbac "k8s.io/api/rbac/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
|
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/util/apiclient"
|
|
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
|
rbachelper "k8s.io/kubernetes/pkg/apis/rbac/v1"
|
|
)
|
|
|
|
const (
|
|
// NodesKubeadmConfigClusterRoleName sets the name for the ClusterRole that allows
|
|
// the bootstrap tokens to access the kubeadm-config ConfigMap during the node bootstrap/discovery
|
|
// or during upgrade nodes
|
|
NodesKubeadmConfigClusterRoleName = "kubeadm:nodes-kubeadm-config"
|
|
)
|
|
|
|
// UploadConfiguration saves the InitConfiguration used for later reference (when upgrading for instance)
|
|
func UploadConfiguration(cfg *kubeadmapi.InitConfiguration, client clientset.Interface) error {
|
|
fmt.Printf("[upload-config] storing the configuration used in ConfigMap %q in the %q Namespace\n", kubeadmconstants.KubeadmConfigConfigMap, metav1.NamespaceSystem)
|
|
|
|
// Prepare the ClusterConfiguration for upload
|
|
// The components store their config in their own ConfigMaps, then reset the .ComponentConfig struct;
|
|
// We don't want to mutate the cfg itself, so create a copy of it using .DeepCopy of it first
|
|
clusterConfigurationToUpload := cfg.ClusterConfiguration.DeepCopy()
|
|
clusterConfigurationToUpload.ComponentConfigs = kubeadmapi.ComponentConfigs{}
|
|
|
|
// Marshal the ClusterConfiguration into YAML
|
|
clusterConfigurationYaml, err := configutil.MarshalKubeadmConfigObject(clusterConfigurationToUpload)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Prepare the ClusterStatus for upload
|
|
// Gets the current cluster status
|
|
// TODO: use configmap locks on this object on the get before the update.
|
|
clusterStatus, err := configutil.GetClusterStatus(client)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Updates the ClusterStatus with the current control plane instance
|
|
if clusterStatus.APIEndpoints == nil {
|
|
clusterStatus.APIEndpoints = map[string]kubeadmapi.APIEndpoint{}
|
|
}
|
|
clusterStatus.APIEndpoints[cfg.NodeRegistration.Name] = cfg.LocalAPIEndpoint
|
|
|
|
// Marshal the ClusterStatus back into YAML
|
|
clusterStatusYaml, err := configutil.MarshalKubeadmConfigObject(clusterStatus)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = apiclient.CreateOrUpdateConfigMap(client, &v1.ConfigMap{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: kubeadmconstants.KubeadmConfigConfigMap,
|
|
Namespace: metav1.NamespaceSystem,
|
|
},
|
|
Data: map[string]string{
|
|
kubeadmconstants.ClusterConfigurationConfigMapKey: string(clusterConfigurationYaml),
|
|
kubeadmconstants.ClusterStatusConfigMapKey: string(clusterStatusYaml),
|
|
},
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Ensure that the NodesKubeadmConfigClusterRoleName exists
|
|
err = apiclient.CreateOrUpdateRole(client, &rbac.Role{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: NodesKubeadmConfigClusterRoleName,
|
|
Namespace: metav1.NamespaceSystem,
|
|
},
|
|
Rules: []rbac.PolicyRule{
|
|
rbachelper.NewRule("get").Groups("").Resources("configmaps").Names(kubeadmconstants.KubeadmConfigConfigMap).RuleOrDie(),
|
|
},
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Binds the NodesKubeadmConfigClusterRoleName to all the bootstrap tokens
|
|
// that are members of the system:bootstrappers:kubeadm:default-node-token group
|
|
// and to all nodes
|
|
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: NodesKubeadmConfigClusterRoleName,
|
|
Namespace: metav1.NamespaceSystem,
|
|
},
|
|
RoleRef: rbac.RoleRef{
|
|
APIGroup: rbac.GroupName,
|
|
Kind: "Role",
|
|
Name: NodesKubeadmConfigClusterRoleName,
|
|
},
|
|
Subjects: []rbac.Subject{
|
|
{
|
|
Kind: rbac.GroupKind,
|
|
Name: kubeadmconstants.NodeBootstrapTokenAuthGroup,
|
|
},
|
|
{
|
|
Kind: rbac.GroupKind,
|
|
Name: kubeadmconstants.NodesGroup,
|
|
},
|
|
},
|
|
})
|
|
}
|