Documentation ¶
Index ¶
Constants ¶
View Source
const ( // KubernetesDir is the directory kubernetes owns for storing various configuration files KubernetesDir = "/etc/kubernetes" CACertAndKeyBaseName = "ca" CACertName = "ca.crt" CAKeyName = "ca.key" APIServerCertAndKeyBaseName = "apiserver" APIServerCertName = "apiserver.crt" APIServerKeyName = "apiserver.key" APIServerKubeletClientCertAndKeyBaseName = "apiserver-kubelet-client" APIServerKubeletClientCertName = "apiserver-kubelet-client.crt" APIServerKubeletClientKeyName = "apiserver-kubelet-client.key" ServiceAccountKeyBaseName = "sa" ServiceAccountPublicKeyName = "sa.pub" ServiceAccountPrivateKeyName = "sa.key" FrontProxyCACertAndKeyBaseName = "front-proxy-ca" FrontProxyCACertName = "front-proxy-ca.crt" FrontProxyCAKeyName = "front-proxy-ca.key" FrontProxyClientCertAndKeyBaseName = "front-proxy-client" FrontProxyClientCertName = "front-proxy-client.crt" FrontProxyClientKeyName = "front-proxy-client.key" AdminKubeConfigFileName = "admin.conf" KubeletKubeConfigFileName = "kubelet.conf" ControllerManagerKubeConfigFileName = "controller-manager.conf" SchedulerKubeConfigFileName = "scheduler.conf" DefaultCertDir = "/etc/kubernetes/pki" // Important: a "v"-prefix shouldn't exist here; semver doesn't allow that MinimumControlPlaneVersion = "1.6.0-alpha.2" ControllerManagerUser = "system:kube-controller-manager" SchedulerUser = "system:kube-scheduler" MastersGroup = "system:masters" NodesGroup = "system:nodes" // Constants for what we name our ServiceAccounts with limited access to the cluster in case of RBAC KubeDNSServiceAccountName = "kube-dns" KubeProxyServiceAccountName = "kube-proxy" // APICallRetryInterval defines how long kubeadm should wait before retrying a failed API operation APICallRetryInterval = 500 * time.Millisecond // Minimum amount of nodes the Service subnet should allow. // We need at least ten, because the DNS service is always at the tenth cluster clusterIP MinimumAddressesInServiceSubnet = 10 // DefaultTokenDuration specifies the default amount of time that a bootstrap token will be valid // Default behaviour is "never expire" == 0 DefaultTokenDuration = 0 // LabelNodeRoleMaster specifies that a node is a master // It's copied over to kubeadm until it's merged in core: https://github.com/kubernetes/kubernetes/pull/39112 LabelNodeRoleMaster = "node-role.kubernetes.io/master" // CSVTokenBootstrapUser is currently the user the bootstrap token in the .csv file // TODO: This should change to something more official and supported // TODO: Prefix with kubeadm prefix CSVTokenBootstrapUser = "kubeadm-node-csr" // CSVTokenBootstrapGroup specifies the group the tokens in the .csv file will belong to CSVTokenBootstrapGroup = "kubeadm:kubelet-bootstrap" // The file name of the tokens file that can be used for bootstrapping CSVTokenFileName = "tokens.csv" // MinExternalEtcdVersion indicates minimum external etcd version which kubeadm supports MinExternalEtcdVersion = "3.0.14" // DefaultAdmissionControl specifies the default admission control options that will be used DefaultAdmissionControl = "" /* 126-byte string literal not displayed */ )
Variables ¶
View Source
var ( // MasterToleration is the toleration to apply on the PodSpec for being able to run that Pod on the master MasterToleration = v1.Toleration{ Key: LabelNodeRoleMaster, Effect: v1.TaintEffectNoSchedule, } AuthorizationPolicyPath = path.Join(KubernetesDir, "abac_policy.json") AuthorizationWebhookConfigPath = path.Join(KubernetesDir, "webhook_authz.conf") // DefaultTokenUsages specifies the default functions a token will get DefaultTokenUsages = []string{"signing", "authentication"} )
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.