mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-11-04 07:49:35 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			183 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// +build windows
 | 
						|
 | 
						|
/*
 | 
						|
Copyright 2014 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
// Package app does all of the work necessary to configure and run a
 | 
						|
// Kubernetes app process.
 | 
						|
package app
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
 | 
						|
	// Enable pprof HTTP handlers.
 | 
						|
	_ "net/http/pprof"
 | 
						|
 | 
						|
	"k8s.io/api/core/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/types"
 | 
						|
	utilnet "k8s.io/apimachinery/pkg/util/net"
 | 
						|
	"k8s.io/client-go/tools/record"
 | 
						|
	"k8s.io/component-base/metrics"
 | 
						|
	"k8s.io/kubernetes/pkg/proxy"
 | 
						|
	proxyconfigapi "k8s.io/kubernetes/pkg/proxy/apis/config"
 | 
						|
	proxyconfigscheme "k8s.io/kubernetes/pkg/proxy/apis/config/scheme"
 | 
						|
	"k8s.io/kubernetes/pkg/proxy/healthcheck"
 | 
						|
	"k8s.io/kubernetes/pkg/proxy/winkernel"
 | 
						|
	"k8s.io/kubernetes/pkg/proxy/winuserspace"
 | 
						|
	"k8s.io/kubernetes/pkg/util/configz"
 | 
						|
	utilnetsh "k8s.io/kubernetes/pkg/util/netsh"
 | 
						|
	utilnode "k8s.io/kubernetes/pkg/util/node"
 | 
						|
	"k8s.io/utils/exec"
 | 
						|
 | 
						|
	"k8s.io/klog"
 | 
						|
)
 | 
						|
 | 
						|
// NewProxyServer returns a new ProxyServer.
 | 
						|
func NewProxyServer(o *Options) (*ProxyServer, error) {
 | 
						|
	return newProxyServer(o.config, o.CleanupAndExit, o.master)
 | 
						|
}
 | 
						|
 | 
						|
func newProxyServer(config *proxyconfigapi.KubeProxyConfiguration, cleanupAndExit bool, master string) (*ProxyServer, error) {
 | 
						|
	if config == nil {
 | 
						|
		return nil, errors.New("config is required")
 | 
						|
	}
 | 
						|
 | 
						|
	if c, err := configz.New(proxyconfigapi.GroupName); err == nil {
 | 
						|
		c.Set(config)
 | 
						|
	} else {
 | 
						|
		return nil, fmt.Errorf("unable to register configz: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// We omit creation of pretty much everything if we run in cleanup mode
 | 
						|
	if cleanupAndExit {
 | 
						|
		return &ProxyServer{}, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if len(config.ShowHiddenMetricsForVersion) > 0 {
 | 
						|
		metrics.SetShowHidden()
 | 
						|
	}
 | 
						|
 | 
						|
	client, eventClient, err := createClients(config.ClientConnection, master)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Create event recorder
 | 
						|
	hostname, err := utilnode.GetHostname(config.HostnameOverride)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	recorder := eventBroadcaster.NewRecorder(proxyconfigscheme.Scheme, v1.EventSource{Component: "kube-proxy", Host: hostname})
 | 
						|
 | 
						|
	nodeRef := &v1.ObjectReference{
 | 
						|
		Kind:      "Node",
 | 
						|
		Name:      hostname,
 | 
						|
		UID:       types.UID(hostname),
 | 
						|
		Namespace: "",
 | 
						|
	}
 | 
						|
 | 
						|
	var healthzServer healthcheck.ProxierHealthUpdater
 | 
						|
	if len(config.HealthzBindAddress) > 0 {
 | 
						|
		healthzServer = healthcheck.NewProxierHealthServer(config.HealthzBindAddress, 2*config.IPTables.SyncPeriod.Duration, recorder, nodeRef)
 | 
						|
	}
 | 
						|
 | 
						|
	var proxier proxy.Provider
 | 
						|
 | 
						|
	proxyMode := getProxyMode(string(config.Mode), winkernel.WindowsKernelCompatTester{})
 | 
						|
	if proxyMode == proxyModeKernelspace {
 | 
						|
		klog.V(0).Info("Using Kernelspace Proxier.")
 | 
						|
		proxier, err = winkernel.NewProxier(
 | 
						|
			config.IPTables.SyncPeriod.Duration,
 | 
						|
			config.IPTables.MinSyncPeriod.Duration,
 | 
						|
			config.IPTables.MasqueradeAll,
 | 
						|
			int(*config.IPTables.MasqueradeBit),
 | 
						|
			config.ClusterCIDR,
 | 
						|
			hostname,
 | 
						|
			utilnode.GetNodeIP(client, hostname),
 | 
						|
			recorder,
 | 
						|
			healthzServer,
 | 
						|
			config.Winkernel,
 | 
						|
		)
 | 
						|
		if err != nil {
 | 
						|
			return nil, fmt.Errorf("unable to create proxier: %v", err)
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		klog.V(0).Info("Using userspace Proxier.")
 | 
						|
		execer := exec.New()
 | 
						|
		var netshInterface utilnetsh.Interface
 | 
						|
		netshInterface = utilnetsh.New(execer)
 | 
						|
 | 
						|
		proxier, err = winuserspace.NewProxier(
 | 
						|
			winuserspace.NewLoadBalancerRR(),
 | 
						|
			net.ParseIP(config.BindAddress),
 | 
						|
			netshInterface,
 | 
						|
			*utilnet.ParsePortRangeOrDie(config.PortRange),
 | 
						|
			// TODO @pires replace below with default values, if applicable
 | 
						|
			config.IPTables.SyncPeriod.Duration,
 | 
						|
			config.UDPIdleTimeout.Duration,
 | 
						|
		)
 | 
						|
		if err != nil {
 | 
						|
			return nil, fmt.Errorf("unable to create proxier: %v", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return &ProxyServer{
 | 
						|
		Client:             client,
 | 
						|
		EventClient:        eventClient,
 | 
						|
		Proxier:            proxier,
 | 
						|
		Broadcaster:        eventBroadcaster,
 | 
						|
		Recorder:           recorder,
 | 
						|
		ProxyMode:          proxyMode,
 | 
						|
		NodeRef:            nodeRef,
 | 
						|
		MetricsBindAddress: config.MetricsBindAddress,
 | 
						|
		EnableProfiling:    config.EnableProfiling,
 | 
						|
		OOMScoreAdj:        config.OOMScoreAdj,
 | 
						|
		ConfigSyncPeriod:   config.ConfigSyncPeriod.Duration,
 | 
						|
		HealthzServer:      healthzServer,
 | 
						|
		UseEndpointSlices:  false,
 | 
						|
	}, nil
 | 
						|
}
 | 
						|
 | 
						|
func getProxyMode(proxyMode string, kcompat winkernel.KernelCompatTester) string {
 | 
						|
	if proxyMode == proxyModeUserspace {
 | 
						|
		return proxyModeUserspace
 | 
						|
	} else if proxyMode == proxyModeKernelspace {
 | 
						|
		return tryWinKernelSpaceProxy(kcompat)
 | 
						|
	}
 | 
						|
	return proxyModeUserspace
 | 
						|
}
 | 
						|
 | 
						|
func tryWinKernelSpaceProxy(kcompat winkernel.KernelCompatTester) string {
 | 
						|
	// Check for Windows Kernel Version if we can support Kernel Space proxy
 | 
						|
	// Check for Windows Version
 | 
						|
 | 
						|
	// guaranteed false on error, error only necessary for debugging
 | 
						|
	useWinKernelProxy, err := winkernel.CanUseWinKernelProxier(kcompat)
 | 
						|
	if err != nil {
 | 
						|
		klog.Errorf("Can't determine whether to use windows kernel proxy, using userspace proxier: %v", err)
 | 
						|
		return proxyModeUserspace
 | 
						|
	}
 | 
						|
	if useWinKernelProxy {
 | 
						|
		return proxyModeKernelspace
 | 
						|
	}
 | 
						|
	// Fallback.
 | 
						|
	klog.V(1).Infof("Can't use winkernel proxy, using userspace proxier")
 | 
						|
	return proxyModeUserspace
 | 
						|
}
 |