Documentation ¶
Index ¶
Constants ¶
View Source
const ( EgressSelectorModeAgent = "agent" EgressSelectorModeCluster = "cluster" EgressSelectorModeDisabled = "disabled" EgressSelectorModePod = "pod" CertificateRenewDays = 90 StreamServerPort = "10010" )
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Agent ¶
type Agent struct { PodManifests string NodeName string NodeConfigPath string ClientKubeletCert string ClientKubeletKey string ServingKubeletCert string ServingKubeletKey string ServiceCIDR *net.IPNet ServiceCIDRs []*net.IPNet ServiceNodePortRange utilnet.PortRange ClusterCIDR *net.IPNet ClusterCIDRs []*net.IPNet ClusterDNS net.IP ClusterDNSs []net.IP ClusterDomain string ResolvConf string RootDir string KubeConfigKubelet string KubeConfigK8eController string NodeIP string NodeIPs []net.IP NodeExternalIP string NodeExternalIPs []net.IP RuntimeSocket string ImageServiceSocket string ListenAddress string ClientCA string CNIBinDir string CNIConfDir string ExtraKubeletArgs []string PauseImage string Snapshotter string Systemd bool CNIPlugin bool NodeTaints []string NodeLabels []string ImageCredProvBinDir string ImageCredProvConfig string IPSECPSK string PrivateRegistry string SystemDefaultRegistry string AirgapExtraRegistry []string DisableCCM bool Rootless bool ProtectKernelDefaults bool EnableIPv4 bool EnableIPv6 bool }
type CRIDockerd ¶
type Containerd ¶
type Control ¶
type Control struct { CriticalControlArgs AdvertisePort int AdvertiseIP string // The port which kubectl clients can access k8s HTTPSPort int // The port which custom k8e API runs on SupervisorPort int // The port which kube-apiserver runs on APIServerPort int APIServerBindAddress string AgentToken string `json:"-"` Token string `json:"-"` ServiceNodePortRange *utilnet.PortRange KubeConfigOutput string KubeConfigMode string HelmJobImage string DataDir string Datastore endpoint.Config `json:"-"` Disables map[string]bool DisableAPIServer bool DisableControllerManager bool DisableETCD bool DisableScheduler bool Rootless bool EnablePProf bool ExtraAPIArgs []string ExtraControllerArgs []string ExtraCloudControllerArgs []string ExtraEtcdArgs []string ExtraSchedulerAPIArgs []string NoLeaderElect bool JoinURL string IPSECPSK string DefaultLocalStoragePath string Skips map[string]bool SystemDefaultRegistry string ClusterInit bool ClusterReset bool ClusterResetRestorePath string EncryptForce bool EncryptSkip bool TLSMinVersion uint16 TLSCipherSuites []uint16 EtcdSnapshotName string `json:"-"` EtcdDisableSnapshots bool `json:"-"` EtcdExposeMetrics bool `json:"-"` EtcdSnapshotDir string `json:"-"` EtcdSnapshotCron string `json:"-"` EtcdSnapshotRetention int `json:"-"` EtcdSnapshotCompress bool `json:"-"` EtcdListFormat string `json:"-"` EtcdS3 bool `json:"-"` EtcdS3Endpoint string `json:"-"` EtcdS3EndpointCA string `json:"-"` EtcdS3SkipSSLVerify bool `json:"-"` EtcdS3AccessKey string `json:"-"` EtcdS3SecretKey string `json:"-"` EtcdS3BucketName string `json:"-"` EtcdS3Region string `json:"-"` EtcdS3Folder string `json:"-"` EtcdS3Timeout time.Duration `json:"-"` EtcdS3Insecure bool `json:"-"` ServerNodeName string BindAddress string SANs []string SANSecurity bool PrivateIP string Runtime *ControlRuntime `json:"-"` }
func (*Control) BindAddressOrLoopback ¶
BindAddressOrLoopback returns an IPv4 or IPv6 address suitable for embedding in server URLs. If a bind address was configured, that is returned. If the chooseHostInterface parameter is true, and a suitable default interface can be found, that interface's address is returned. If neither of the previous were used, the loopback address is returned. If the urlSafe parameter is true, IPv6 addresses are enclosed in square brackets, as per RFC2732.
type ControlRuntime ¶
type ControlRuntime struct { ControlRuntimeBootstrap HTTPBootstrap bool APIServerReady <-chan struct{} AgentReady <-chan struct{} ETCDReady <-chan struct{} StartupHooksWg *sync.WaitGroup ClusterControllerStarts map[string]leader.Callback LeaderElectedClusterControllerStarts map[string]leader.Callback ClientKubeAPICert string ClientKubeAPIKey string NodePasswdFile string SigningClientCA string SigningServerCA string ServiceCurrentKey string KubeConfigAdmin string KubeConfigSupervisor string KubeConfigController string KubeConfigScheduler string KubeConfigAPIServer string KubeConfigCloudController string ServingKubeAPICert string ServingKubeAPIKey string ServingKubeletKey string ServerToken string AgentToken string APIServer http.Handler Handler http.Handler Tunnel http.Handler Authenticator authenticator.Request EgressSelectorConfig string CloudControllerConfig string ClientAuthProxyCert string ClientAuthProxyKey string ClientAdminCert string ClientAdminKey string ClientSupervisorCert string ClientSupervisorKey string ClientControllerCert string ClientControllerKey string ClientSchedulerCert string ClientSchedulerKey string ClientKubeletKey string ClientCloudControllerCert string ClientCloudControllerKey string ClientK8eControllerCert string ClientK8eControllerKey string ServerETCDCert string ServerETCDKey string PeerServerClientETCDCert string PeerServerClientETCDKey string ClientETCDCert string ClientETCDKey string K8e *k8e.Factory Core *core.Factory Event record.EventRecorder EtcdConfig endpoint.ETCDConfig }
func NewRuntime ¶
func NewRuntime(agentReady <-chan struct{}) *ControlRuntime
type ControlRuntimeBootstrap ¶
type ControlRuntimeBootstrap struct { ETCDServerCA string ETCDServerCAKey string ETCDPeerCA string ETCDPeerCAKey string ServerCA string ServerCAKey string ClientCA string ClientCAKey string ServiceKey string PasswdFile string RequestHeaderCA string RequestHeaderCAKey string IPSECKey string EncryptionConfig string EncryptionHash string }
type CriticalControlArgs ¶
type CriticalControlArgs struct { ClusterDNSs []net.IP `cli:"cluster-dns"` ClusterIPRanges []*net.IPNet `cli:"cluster-cidr"` ClusterDNS net.IP `cli:"cluster-dns"` ClusterDomain string `cli:"cluster-domain"` ClusterIPRange *net.IPNet `cli:"cluster-cidr"` DisableCCM bool `cli:"disable-cloud-controller"` DisableHelmController bool `cli:"disable-helm-controller"` DisableNPC bool `cli:"disable-network-policy"` EncryptSecrets bool `cli:"secrets-encryption"` EgressSelectorMode string `cli:"egress-selector-mode"` ServiceIPRange *net.IPNet `cli:"service-cidr"` ServiceIPRanges []*net.IPNet `cli:"service-cidr"` }
CriticalControlArgs contains parameters that all control plane nodes in HA must share
type Node ¶
type Node struct { Docker bool ContainerRuntimeEndpoint string ImageServiceEndpoint string SELinux bool EgressSelectorMode string Containerd Containerd CRIDockerd CRIDockerd Images string AgentConfig Agent Token string Certificate *tls.Certificate ServerHTTPSPort int DefaultRuntime string }
Click to show internal directories.
Click to hide internal directories.