Documentation ¶
Index ¶
Constants ¶
View Source
const ( EgressSelectorModeAgent = "agent" EgressSelectorModeCluster = "cluster" EgressSelectorModeDisabled = "disabled" EgressSelectorModePod = "pod" CertificateRenewDays = 90 StreamServerPort = "10010" )
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Agent ¶
type Agent struct { PodManifests string NodeName string NodeConfigPath string ClientKubeletCert string ClientKubeletKey string ServingKubeletCert string ServingKubeletKey string ServiceCIDR *net.IPNet ServiceCIDRs []*net.IPNet ServiceNodePortRange utilnet.PortRange ClusterCIDR *net.IPNet ClusterCIDRs []*net.IPNet ClusterDNS net.IP ClusterDNSs []net.IP ClusterDomain string ResolvConf string RootDir string KubeConfigKubelet string KubeConfigKubeProxy string KubeConfigK8eController string NodeIP string NodeIPs []net.IP NodeExternalIP string NodeExternalIPs []net.IP NodeInternalDNSs []string NodeExternalDNSs []string RuntimeSocket string ImageServiceSocket string ListenAddress string ClientCA string CNIBinDir string CNIConfDir string ExtraKubeletArgs []string ExtraKubeProxyArgs []string PauseImage string Snapshotter string Systemd bool CNIPlugin bool NodeTaints []string NodeLabels []string ImageCredProvBinDir string ImageCredProvConfig string IPSECPSK string Registry *registries.Registry SystemDefaultRegistry string AirgapExtraRegistry []string DisableCCM bool DisableNPC bool MinTLSVersion string CipherSuites []string Rootless bool ProtectKernelDefaults bool DisableServiceLB bool EnableIPv4 bool EnableIPv6 bool VLevel int VModule string LogFile string AlsoLogToStderr bool }
type CRIDockerd ¶
type Containerd ¶
type Control ¶
type Control struct { CriticalControlArgs AdvertisePort int AdvertiseIP string // The port which kubectl clients can access k8s HTTPSPort int // The port which custom k8e API runs on SupervisorPort int // The port which kube-apiserver runs on APIServerPort int APIServerBindAddress string AgentToken string `json:"-"` Token string `json:"-"` ServiceNodePortRange *utilnet.PortRange KubeConfigOutput string KubeConfigMode string KubeConfigGroup string HelmJobImage string DataDir string KineTLS bool Datastore endpoint.Config `json:"-"` Disables map[string]bool DisableAgent bool DisableAPIServer bool DisableControllerManager bool DisableETCD bool DisableScheduler bool Rootless bool ExtraAPIArgs []string ExtraControllerArgs []string ExtraCloudControllerArgs []string ExtraEtcdArgs []string ExtraSchedulerAPIArgs []string NoLeaderElect bool JoinURL string IPSECPSK string DefaultLocalStoragePath string Skips map[string]bool SystemDefaultRegistry string ClusterInit bool ClusterReset bool ClusterResetRestorePath string MinTLSVersion string CipherSuites []string TLSMinVersion uint16 `json:"-"` TLSCipherSuites []uint16 `json:"-"` EtcdSnapshotName string `json:"-"` EtcdDisableSnapshots bool `json:"-"` EtcdExposeMetrics bool `json:"-"` EtcdSnapshotDir string `json:"-"` EtcdSnapshotCron string `json:"-"` EtcdSnapshotRetention int `json:"-"` EtcdSnapshotCompress bool `json:"-"` EtcdListFormat string `json:"-"` EtcdS3 *EtcdS3 `json:"-"` ServerNodeName string VLevel int VModule string BindAddress string SANs []string SANSecurity bool PrivateIP string Runtime *ControlRuntime `json:"-"` }
func (*Control) BindAddressOrLoopback ¶
BindAddressOrLoopback returns an IPv4 or IPv6 address suitable for embedding in server URLs. If a bind address was configured, that is returned. If the chooseHostInterface parameter is true, and a suitable default interface can be found, that interface's address is returned. If neither of the previous were used, the loopback address is returned. If the urlSafe parameter is true, IPv6 addresses are enclosed in square brackets, as per RFC2732.
type ControlRuntime ¶
type ControlRuntime struct { ControlRuntimeBootstrap HTTPBootstrap bool APIServerReady <-chan struct{} ContainerRuntimeReady <-chan struct{} ETCDReady <-chan struct{} StartupHooksWg *sync.WaitGroup ClusterControllerStarts map[string]leader.Callback LeaderElectedClusterControllerStarts map[string]leader.Callback ClientKubeAPICert string ClientKubeAPIKey string NodePasswdFile string SigningClientCA string SigningServerCA string ServiceCurrentKey string KubeConfigAdmin string KubeConfigSupervisor string KubeConfigController string KubeConfigScheduler string KubeConfigAPIServer string KubeConfigCloudController string ServingKubeAPICert string ServingKubeAPIKey string ServingKubeletKey string ServerToken string AgentToken string APIServer http.Handler Handler http.Handler Tunnel http.Handler Authenticator authenticator.Request EgressSelectorConfig string CloudControllerConfig string ClientAuthProxyCert string ClientAuthProxyKey string ClientAdminCert string ClientAdminKey string ClientSupervisorCert string ClientSupervisorKey string ClientControllerCert string ClientControllerKey string ClientSchedulerCert string ClientSchedulerKey string ClientKubeProxyCert string ClientKubeProxyKey string ClientKubeletKey string ClientCloudControllerCert string ClientCloudControllerKey string ClientK8eControllerCert string ClientK8eControllerKey string ServerETCDCert string ServerETCDKey string PeerServerClientETCDCert string PeerServerClientETCDKey string ClientETCDCert string ClientETCDKey string K8e *k8e.Factory Core *core.Factory Event record.EventRecorder EtcdConfig endpoint.ETCDConfig }
func NewRuntime ¶
func NewRuntime(containerRuntimeReady <-chan struct{}) *ControlRuntime
type ControlRuntimeBootstrap ¶
type ControlRuntimeBootstrap struct { ETCDServerCA string `rotate:"true"` ETCDServerCAKey string `rotate:"true"` ETCDPeerCA string `rotate:"true"` ETCDPeerCAKey string `rotate:"true"` ServerCA string `rotate:"true"` ServerCAKey string `rotate:"true"` ClientCA string `rotate:"true"` ClientCAKey string `rotate:"true"` ServiceKey string `rotate:"true"` PasswdFile string RequestHeaderCA string `rotate:"true"` RequestHeaderCAKey string `rotate:"true"` IPSECKey string EncryptionConfig string EncryptionHash string }
type CriticalControlArgs ¶
type CriticalControlArgs struct { ClusterDNSs []net.IP `cli:"cluster-dns"` ClusterIPRanges []*net.IPNet `cli:"cluster-cidr"` ClusterDNS net.IP `cli:"cluster-dns"` ClusterDomain string `cli:"cluster-domain"` ClusterIPRange *net.IPNet `cli:"cluster-cidr"` DisableCCM bool `cli:"disable-cloud-controller"` DisableHelmController bool `cli:"disable-helm-controller"` EncryptSecrets bool `cli:"secrets-encryption"` EmbeddedRegistry bool `cli:"embedded-registry"` EgressSelectorMode string `cli:"egress-selector-mode"` ServiceIPRange *net.IPNet `cli:"service-cidr"` ServiceIPRanges []*net.IPNet `cli:"service-cidr"` SupervisorMetrics bool `cli:"supervisor-metrics"` }
CriticalControlArgs contains parameters that all control plane nodes in HA must share The cli tag is used to provide better error information to the user on mismatch
type EtcdS3 ¶
type EtcdS3 struct { AccessKey string `json:"accessKey,omitempty"` Bucket string `json:"bucket,omitempty"` ConfigSecret string `json:"configSecret,omitempty"` Endpoint string `json:"endpoint,omitempty"` EndpointCA string `json:"endpointCA,omitempty"` Folder string `json:"folder,omitempty"` Proxy string `json:"proxy,omitempty"` Region string `json:"region,omitempty"` SecretKey string `json:"secretKey,omitempty"` Insecure bool `json:"insecure,omitempty"` SkipSSLVerify bool `json:"skipSSLVerify,omitempty"` Timeout metav1.Duration `json:"timeout,omitempty"` }
type Node ¶
type Node struct { Docker bool ContainerRuntimeEndpoint string ImageServiceEndpoint string SELinux bool EnablePProf bool SupervisorMetrics bool EmbeddedRegistry bool EgressSelectorMode string Containerd Containerd CRIDockerd CRIDockerd Images string AgentConfig Agent Token string Certificate *tls.Certificate ServerHTTPSPort int SupervisorPort int DefaultRuntime string }
Click to show internal directories.
Click to hide internal directories.