mirror of
https://github.com/rancher/rke.git
synced 2025-09-05 00:40:10 +00:00
add comments and other minor improvements
This commit is contained in:
@@ -412,15 +412,15 @@ func parseEventRateLimit(clusterFile string, rkeConfig *v3.RancherKubernetesEngi
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
logrus.Debugf("event rate limit is found in cluster.yml")
|
logrus.Debugf("event rate limit is found in cluster.yml")
|
||||||
var r map[string]interface{}
|
var parsedClusterFile map[string]interface{}
|
||||||
err := ghodssyaml.Unmarshal([]byte(clusterFile), &r)
|
err := ghodssyaml.Unmarshal([]byte(clusterFile), &parsedClusterFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("error unmarshalling: %v", err)
|
return fmt.Errorf("error unmarshalling: %v", err)
|
||||||
}
|
}
|
||||||
if r["services"] == nil {
|
if parsedClusterFile["services"] == nil {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
cfg, found, err := unstructured.NestedMap(r, "services", "kube-api", "event_rate_limit", "configuration")
|
cfg, found, err := unstructured.NestedMap(parsedClusterFile, "services", "kube-api", "event_rate_limit", "configuration")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@@ -282,15 +282,16 @@ func (c *Cluster) SetUpHosts(ctx context.Context, flags ExternalFlags) error {
|
|||||||
|
|
||||||
if _, ok := c.Services.KubeAPI.ExtraArgs[KubeAPIArgAdmissionControlConfigFile]; !ok {
|
if _, ok := c.Services.KubeAPI.ExtraArgs[KubeAPIArgAdmissionControlConfigFile]; !ok {
|
||||||
controlPlaneHosts := hosts.GetUniqueHostList(nil, c.ControlPlaneHosts, nil)
|
controlPlaneHosts := hosts.GetUniqueHostList(nil, c.ControlPlaneHosts, nil)
|
||||||
ac, err := c.getConsolidatedAdmissionConfiguration()
|
admissionConfig, err := c.getConsolidatedAdmissionConfiguration()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("error getting consolidated admission configuration: %v", err)
|
return fmt.Errorf("error getting consolidated admission configuration: %v", err)
|
||||||
}
|
}
|
||||||
bytes, err := yaml.Marshal(ac)
|
bytes, err := yaml.Marshal(admissionConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := deployFile(ctx, controlPlaneHosts, c.SystemImages.Alpine, c.PrivateRegistriesMap, DefaultKubeAPIArgAdmissionControlConfigFileValue, string(bytes), c.Version); err != nil {
|
err = deployFile(ctx, controlPlaneHosts, c.SystemImages.Alpine, c.PrivateRegistriesMap, DefaultKubeAPIArgAdmissionControlConfigFileValue, string(bytes), c.Version)
|
||||||
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
log.Infof(ctx, "[%s] Successfully deployed admission control config to Cluster control nodes", DefaultKubeAPIArgAdmissionControlConfigFileValue)
|
log.Infof(ctx, "[%s] Successfully deployed admission control config to Cluster control nodes", DefaultKubeAPIArgAdmissionControlConfigFileValue)
|
||||||
|
@@ -490,7 +490,7 @@ func getTaintValue(taint v3.RKETaint) string {
|
|||||||
return fmt.Sprintf("%s=%s:%s", taint.Key, taint.Value, taint.Effect)
|
return fmt.Sprintf("%s=%s:%s", taint.Key, taint.Value, taint.Effect)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RestartKubeAPIServerWhenConfigChanges restarts the kube-apiserver container on the control plan nodes
|
// RestartKubeAPIServerWhenConfigChanges restarts the kube-apiserver container on the control plane nodes
|
||||||
// when changes are detected on the to-be-applied kube-api configuration. This is needed to handle the case
|
// when changes are detected on the to-be-applied kube-api configuration. This is needed to handle the case
|
||||||
// where changes happen on the generated admission-control-config-file but not on the kube-apiserver container
|
// where changes happen on the generated admission-control-config-file but not on the kube-apiserver container
|
||||||
func RestartKubeAPIServerWhenConfigChanges(ctx context.Context, kubeCluster, currentCluster *Cluster) error {
|
func RestartKubeAPIServerWhenConfigChanges(ctx context.Context, kubeCluster, currentCluster *Cluster) error {
|
||||||
|
@@ -684,6 +684,10 @@ func validatePodSecurity(c *Cluster) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
logrus.Debugf("Checking PodSecurity for cluster version [%s]", c.Version)
|
logrus.Debugf("Checking PodSecurity for cluster version [%s]", c.Version)
|
||||||
|
// The following requirements must be met to set the default Pod Security Admission Config:
|
||||||
|
// - RBAC is enabled on the cluster
|
||||||
|
// - Cluster version is at least 1.23
|
||||||
|
// - valid values are privileged and restricted
|
||||||
level := c.Services.KubeAPI.PodSecurityConfiguration
|
level := c.Services.KubeAPI.PodSecurityConfiguration
|
||||||
if len(level) != 0 {
|
if len(level) != 0 {
|
||||||
if c.Authorization.Mode != services.RBACAuthorizationMode {
|
if c.Authorization.Mode != services.RBACAuthorizationMode {
|
||||||
|
Reference in New Issue
Block a user