mirror of https://github.com/k3s-io/k3s
590 lines
22 KiB
Go
590 lines
22 KiB
Go
/*
|
|
Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package master
|
|
|
|
import (
|
|
"bytes"
|
|
_ "expvar"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
rt "runtime"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/admission"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api/latest"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api/meta"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api/v1beta1"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api/v1beta2"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api/v1beta3"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/apiserver"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/auth/authenticator"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/auth/authorizer"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/auth/handlers"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/client"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/cloudprovider"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/master/ports"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/controller"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/endpoint"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/etcd"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/event"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/generic"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/limitrange"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/minion"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/namespace"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/pod"
|
|
podetcd "github.com/GoogleCloudPlatform/kubernetes/pkg/registry/pod/etcd"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/resourcequota"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/resourcequotausage"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/registry/service"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/runtime"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/tools"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/ui"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util"
|
|
|
|
"github.com/emicklei/go-restful"
|
|
"github.com/emicklei/go-restful/swagger"
|
|
"github.com/golang/glog"
|
|
)
|
|
|
|
// Config is a structure used to configure a Master.
|
|
type Config struct {
|
|
Client *client.Client
|
|
Cloud cloudprovider.Interface
|
|
EtcdHelper tools.EtcdHelper
|
|
EventTTL time.Duration
|
|
MinionRegexp string
|
|
KubeletClient client.KubeletClient
|
|
PortalNet *net.IPNet
|
|
EnableLogsSupport bool
|
|
EnableUISupport bool
|
|
// allow downstream consumers to disable swagger
|
|
EnableSwaggerSupport bool
|
|
// allow v1beta3 to be conditionally enabled
|
|
EnableV1Beta3 bool
|
|
// allow downstream consumers to disable the index route
|
|
EnableIndex bool
|
|
APIPrefix string
|
|
CorsAllowedOriginList util.StringList
|
|
Authenticator authenticator.Request
|
|
Authorizer authorizer.Authorizer
|
|
AdmissionControl admission.Interface
|
|
MasterServiceNamespace string
|
|
|
|
// Map requests to contexts. Exported so downstream consumers can provider their own mappers
|
|
RequestContextMapper api.RequestContextMapper
|
|
|
|
// If specified, all web services will be registered into this container
|
|
RestfulContainer *restful.Container
|
|
|
|
// Number of masters running; all masters must be started with the
|
|
// same value for this field. (Numbers > 1 currently untested.)
|
|
MasterCount int
|
|
|
|
// The port on PublicAddress where a read-only server will be installed.
|
|
// Defaults to 7080 if not set.
|
|
ReadOnlyPort int
|
|
// The port on PublicAddress where a read-write server will be installed.
|
|
// Defaults to 6443 if not set.
|
|
ReadWritePort int
|
|
|
|
// If nil, the first result from net.InterfaceAddrs will be used.
|
|
PublicAddress net.IP
|
|
|
|
// Control the interval that pod, node IP, and node heath status caches
|
|
// expire.
|
|
CacheTimeout time.Duration
|
|
}
|
|
|
|
// Master contains state for a Kubernetes cluster master/api server.
|
|
type Master struct {
|
|
// "Inputs", Copied from Config
|
|
client *client.Client
|
|
portalNet *net.IPNet
|
|
cacheTimeout time.Duration
|
|
|
|
mux apiserver.Mux
|
|
muxHelper *apiserver.MuxHelper
|
|
handlerContainer *restful.Container
|
|
rootWebService *restful.WebService
|
|
enableLogsSupport bool
|
|
enableUISupport bool
|
|
enableSwaggerSupport bool
|
|
apiPrefix string
|
|
corsAllowedOriginList util.StringList
|
|
authenticator authenticator.Request
|
|
authorizer authorizer.Authorizer
|
|
admissionControl admission.Interface
|
|
masterCount int
|
|
v1beta3 bool
|
|
requestContextMapper api.RequestContextMapper
|
|
|
|
publicIP net.IP
|
|
publicReadOnlyPort int
|
|
publicReadWritePort int
|
|
serviceReadOnlyIP net.IP
|
|
serviceReadOnlyPort int
|
|
serviceReadWriteIP net.IP
|
|
serviceReadWritePort int
|
|
masterServices *util.Runner
|
|
|
|
// storage contains the RESTful endpoints exposed by this master
|
|
storage map[string]apiserver.RESTStorage
|
|
|
|
// registries are internal client APIs for accessing the storage layer
|
|
// TODO: define the internal typed interface in a way that clients can
|
|
// also be replaced
|
|
nodeRegistry minion.Registry
|
|
namespaceRegistry generic.Registry
|
|
serviceRegistry service.Registry
|
|
endpointRegistry endpoint.Registry
|
|
|
|
// "Outputs"
|
|
Handler http.Handler
|
|
InsecureHandler http.Handler
|
|
}
|
|
|
|
// NewEtcdHelper returns an EtcdHelper for the provided arguments or an error if the version
|
|
// is incorrect.
|
|
func NewEtcdHelper(client tools.EtcdGetSet, version string) (helper tools.EtcdHelper, err error) {
|
|
if version == "" {
|
|
version = latest.Version
|
|
}
|
|
versionInterfaces, err := latest.InterfacesFor(version)
|
|
if err != nil {
|
|
return helper, err
|
|
}
|
|
return tools.EtcdHelper{client, versionInterfaces.Codec, tools.RuntimeVersionAdapter{versionInterfaces.MetadataAccessor}}, nil
|
|
}
|
|
|
|
// setDefaults fills in any fields not set that are required to have valid data.
|
|
func setDefaults(c *Config) {
|
|
if c.PortalNet == nil {
|
|
defaultNet := "10.0.0.0/24"
|
|
glog.Warningf("Portal net unspecified. Defaulting to %v.", defaultNet)
|
|
_, portalNet, err := net.ParseCIDR(defaultNet)
|
|
if err != nil {
|
|
glog.Fatalf("Unable to parse CIDR: %v", err)
|
|
}
|
|
c.PortalNet = portalNet
|
|
}
|
|
if c.MasterCount == 0 {
|
|
// Clearly, there will be at least one master.
|
|
c.MasterCount = 1
|
|
}
|
|
if c.ReadOnlyPort == 0 {
|
|
c.ReadOnlyPort = 7080
|
|
}
|
|
if c.ReadWritePort == 0 {
|
|
c.ReadWritePort = 6443
|
|
}
|
|
if c.CacheTimeout == 0 {
|
|
c.CacheTimeout = 5 * time.Second
|
|
}
|
|
for c.PublicAddress == nil {
|
|
// Find and use the first non-loopback address.
|
|
// TODO: potentially it'd be useful to skip the docker interface if it
|
|
// somehow is first in the list.
|
|
addrs, err := net.InterfaceAddrs()
|
|
if err != nil {
|
|
glog.Fatalf("Unable to get network interfaces: error='%v'", err)
|
|
}
|
|
found := false
|
|
for i := range addrs {
|
|
ip, _, err := net.ParseCIDR(addrs[i].String())
|
|
if err != nil {
|
|
glog.Errorf("Error parsing '%v': %v", addrs[i], err)
|
|
continue
|
|
}
|
|
if ip.IsLoopback() {
|
|
glog.Infof("'%v' (%v) is a loopback address, ignoring.", ip, addrs[i])
|
|
continue
|
|
}
|
|
found = true
|
|
c.PublicAddress = ip
|
|
glog.Infof("Will report %v as public IP address.", ip)
|
|
break
|
|
}
|
|
if !found {
|
|
glog.Errorf("Unable to find suitable network address in list: '%v'\n"+
|
|
"Will try again in 5 seconds. Set the public address directly to avoid this wait.", addrs)
|
|
time.Sleep(5 * time.Second)
|
|
}
|
|
}
|
|
if c.RequestContextMapper == nil {
|
|
c.RequestContextMapper = api.NewRequestContextMapper()
|
|
}
|
|
}
|
|
|
|
// New returns a new instance of Master from the given config.
|
|
// Certain config fields will be set to a default value if unset,
|
|
// including:
|
|
// PortalNet
|
|
// MasterCount
|
|
// ReadOnlyPort
|
|
// ReadWritePort
|
|
// PublicAddress
|
|
// Certain config fields must be specified, including:
|
|
// KubeletClient
|
|
// Public fields:
|
|
// Handler -- The returned master has a field TopHandler which is an
|
|
// http.Handler which handles all the endpoints provided by the master,
|
|
// including the API, the UI, and miscelaneous debugging endpoints. All
|
|
// these are subject to authorization and authentication.
|
|
// InsecureHandler -- an http.Handler which handles all the same
|
|
// endpoints as Handler, but no authorization and authentication is done.
|
|
// Public methods:
|
|
// HandleWithAuth -- Allows caller to add an http.Handler for an endpoint
|
|
// that uses the same authentication and authorization (if any is configured)
|
|
// as the master's built-in endpoints.
|
|
// If the caller wants to add additional endpoints not using the master's
|
|
// auth, then the caller should create a handler for those endpoints, which delegates the
|
|
// any unhandled paths to "Handler".
|
|
func New(c *Config) *Master {
|
|
setDefaults(c)
|
|
if c.KubeletClient == nil {
|
|
glog.Fatalf("master.New() called with config.KubeletClient == nil")
|
|
}
|
|
|
|
// Select the first two valid IPs from portalNet to use as the master service portalIPs
|
|
serviceReadOnlyIP, err := service.GetIndexedIP(c.PortalNet, 1)
|
|
if err != nil {
|
|
glog.Fatalf("Failed to generate service read-only IP for master service: %v", err)
|
|
}
|
|
serviceReadWriteIP, err := service.GetIndexedIP(c.PortalNet, 2)
|
|
if err != nil {
|
|
glog.Fatalf("Failed to generate service read-write IP for master service: %v", err)
|
|
}
|
|
glog.Infof("Setting master service IPs based on PortalNet subnet to %q (read-only) and %q (read-write).", serviceReadOnlyIP, serviceReadWriteIP)
|
|
|
|
m := &Master{
|
|
client: c.Client,
|
|
portalNet: c.PortalNet,
|
|
rootWebService: new(restful.WebService),
|
|
enableLogsSupport: c.EnableLogsSupport,
|
|
enableUISupport: c.EnableUISupport,
|
|
enableSwaggerSupport: c.EnableSwaggerSupport,
|
|
apiPrefix: c.APIPrefix,
|
|
corsAllowedOriginList: c.CorsAllowedOriginList,
|
|
authenticator: c.Authenticator,
|
|
authorizer: c.Authorizer,
|
|
admissionControl: c.AdmissionControl,
|
|
v1beta3: c.EnableV1Beta3,
|
|
requestContextMapper: c.RequestContextMapper,
|
|
|
|
cacheTimeout: c.CacheTimeout,
|
|
|
|
masterCount: c.MasterCount,
|
|
publicIP: c.PublicAddress,
|
|
publicReadOnlyPort: c.ReadOnlyPort,
|
|
publicReadWritePort: c.ReadWritePort,
|
|
serviceReadOnlyIP: serviceReadOnlyIP,
|
|
// TODO: serviceReadOnlyPort should be passed in as an argument, it may not always be 80
|
|
serviceReadOnlyPort: 80,
|
|
serviceReadWriteIP: serviceReadWriteIP,
|
|
// TODO: serviceReadWritePort should be passed in as an argument, it may not always be 443
|
|
serviceReadWritePort: 443,
|
|
}
|
|
|
|
if c.RestfulContainer != nil {
|
|
m.mux = c.RestfulContainer.ServeMux
|
|
m.handlerContainer = c.RestfulContainer
|
|
} else {
|
|
mux := http.NewServeMux()
|
|
m.mux = mux
|
|
m.handlerContainer = NewHandlerContainer(mux)
|
|
}
|
|
// Use CurlyRouter to be able to use regular expressions in paths. Regular expressions are required in paths for example for proxy (where the path is proxy/{kind}/{name}/{*})
|
|
m.handlerContainer.Router(restful.CurlyRouter{})
|
|
m.muxHelper = &apiserver.MuxHelper{m.mux, []string{}}
|
|
|
|
m.masterServices = util.NewRunner(m.serviceWriterLoop, m.roServiceWriterLoop)
|
|
m.init(c)
|
|
return m
|
|
}
|
|
|
|
// HandleWithAuth adds an http.Handler for pattern to an http.ServeMux
|
|
// Applies the same authentication and authorization (if any is configured)
|
|
// to the request is used for the master's built-in endpoints.
|
|
func (m *Master) HandleWithAuth(pattern string, handler http.Handler) {
|
|
// TODO: Add a way for plugged-in endpoints to translate their
|
|
// URLs into attributes that an Authorizer can understand, and have
|
|
// sensible policy defaults for plugged-in endpoints. This will be different
|
|
// for generic endpoints versus REST object endpoints.
|
|
// TODO: convert to go-restful
|
|
m.muxHelper.Handle(pattern, handler)
|
|
}
|
|
|
|
// HandleFuncWithAuth adds an http.Handler for pattern to an http.ServeMux
|
|
// Applies the same authentication and authorization (if any is configured)
|
|
// to the request is used for the master's built-in endpoints.
|
|
func (m *Master) HandleFuncWithAuth(pattern string, handler func(http.ResponseWriter, *http.Request)) {
|
|
// TODO: convert to go-restful
|
|
m.muxHelper.HandleFunc(pattern, handler)
|
|
}
|
|
|
|
func NewHandlerContainer(mux *http.ServeMux) *restful.Container {
|
|
container := restful.NewContainer()
|
|
container.ServeMux = mux
|
|
container.RecoverHandler(logStackOnRecover)
|
|
return container
|
|
}
|
|
|
|
//TODO: Unify with RecoverPanics?
|
|
func logStackOnRecover(panicReason interface{}, httpWriter http.ResponseWriter) {
|
|
var buffer bytes.Buffer
|
|
buffer.WriteString(fmt.Sprintf("recover from panic situation: - %v\r\n", panicReason))
|
|
for i := 2; ; i += 1 {
|
|
_, file, line, ok := rt.Caller(i)
|
|
if !ok {
|
|
break
|
|
}
|
|
buffer.WriteString(fmt.Sprintf(" %s:%d\r\n", file, line))
|
|
}
|
|
glog.Errorln(buffer.String())
|
|
}
|
|
|
|
// init initializes master.
|
|
func (m *Master) init(c *Config) {
|
|
|
|
boundPodFactory := &pod.BasicBoundPodFactory{}
|
|
podStorage, bindingStorage := podetcd.NewREST(c.EtcdHelper, boundPodFactory)
|
|
podRegistry := pod.NewRegistry(podStorage)
|
|
|
|
eventRegistry := event.NewEtcdRegistry(c.EtcdHelper, uint64(c.EventTTL.Seconds()))
|
|
limitRangeRegistry := limitrange.NewEtcdRegistry(c.EtcdHelper)
|
|
resourceQuotaRegistry := resourcequota.NewEtcdRegistry(c.EtcdHelper)
|
|
m.namespaceRegistry = namespace.NewEtcdRegistry(c.EtcdHelper)
|
|
|
|
// TODO: split me up into distinct storage registries
|
|
registry := etcd.NewRegistry(c.EtcdHelper, podRegistry)
|
|
|
|
m.serviceRegistry = registry
|
|
m.endpointRegistry = registry
|
|
m.nodeRegistry = registry
|
|
|
|
nodeStorage := minion.NewREST(m.nodeRegistry)
|
|
// TODO: unify the storage -> registry and storage -> client patterns
|
|
nodeStorageClient := RESTStorageToNodes(nodeStorage)
|
|
podCache := NewPodCache(
|
|
c.KubeletClient,
|
|
nodeStorageClient.Nodes(),
|
|
podRegistry,
|
|
)
|
|
go util.Forever(func() { podCache.UpdateAllContainers() }, m.cacheTimeout)
|
|
go util.Forever(func() { podCache.GarbageCollectPodStatus() }, time.Minute*30)
|
|
|
|
// TODO: refactor podCache to sit on top of podStorage via status calls
|
|
podStorage = podStorage.WithPodStatus(podCache)
|
|
|
|
// TODO: Factor out the core API registration
|
|
m.storage = map[string]apiserver.RESTStorage{
|
|
"pods": podStorage,
|
|
"bindings": bindingStorage,
|
|
|
|
"replicationControllers": controller.NewREST(registry, podRegistry),
|
|
"services": service.NewREST(m.serviceRegistry, c.Cloud, m.nodeRegistry, m.portalNet),
|
|
"endpoints": endpoint.NewREST(m.endpointRegistry),
|
|
"minions": nodeStorage,
|
|
"nodes": nodeStorage,
|
|
"events": event.NewREST(eventRegistry),
|
|
|
|
"limitRanges": limitrange.NewREST(limitRangeRegistry),
|
|
"resourceQuotas": resourcequota.NewREST(resourceQuotaRegistry),
|
|
"resourceQuotaUsages": resourcequotausage.NewREST(resourceQuotaRegistry),
|
|
"namespaces": namespace.NewREST(m.namespaceRegistry),
|
|
}
|
|
|
|
apiVersions := []string{"v1beta1", "v1beta2"}
|
|
if err := apiserver.NewAPIGroupVersion(m.api_v1beta1()).InstallREST(m.handlerContainer, c.APIPrefix, "v1beta1"); err != nil {
|
|
glog.Fatalf("Unable to setup API v1beta1: %v", err)
|
|
}
|
|
if err := apiserver.NewAPIGroupVersion(m.api_v1beta2()).InstallREST(m.handlerContainer, c.APIPrefix, "v1beta2"); err != nil {
|
|
glog.Fatalf("Unable to setup API v1beta2: %v", err)
|
|
}
|
|
if c.EnableV1Beta3 {
|
|
if err := apiserver.NewAPIGroupVersion(m.api_v1beta3()).InstallREST(m.handlerContainer, c.APIPrefix, "v1beta3"); err != nil {
|
|
glog.Fatalf("Unable to setup API v1beta3: %v", err)
|
|
}
|
|
apiVersions = []string{"v1beta1", "v1beta2", "v1beta3"}
|
|
}
|
|
|
|
apiserver.InstallSupport(m.muxHelper, m.rootWebService)
|
|
apiserver.AddApiWebService(m.handlerContainer, c.APIPrefix, apiVersions)
|
|
|
|
// Register root handler.
|
|
// We do not register this using restful Webservice since we do not want to surface this in api docs.
|
|
// Allow master to be embedded in contexts which already have something registered at the root
|
|
if c.EnableIndex {
|
|
m.mux.HandleFunc("/", apiserver.IndexHandler(m.handlerContainer, m.muxHelper))
|
|
}
|
|
|
|
// TODO: use go-restful
|
|
apiserver.InstallValidator(m.muxHelper, func() map[string]apiserver.Server { return m.getServersToValidate(c) })
|
|
if c.EnableLogsSupport {
|
|
apiserver.InstallLogsSupport(m.muxHelper)
|
|
}
|
|
if c.EnableUISupport {
|
|
ui.InstallSupport(m.muxHelper, m.enableSwaggerSupport)
|
|
}
|
|
|
|
// TODO: install runtime/pprof handler
|
|
// See github.com/emicklei/go-restful/blob/master/examples/restful-cpuprofiler-service.go
|
|
|
|
handler := http.Handler(m.mux.(*http.ServeMux))
|
|
|
|
// TODO: handle CORS and auth using go-restful
|
|
// See github.com/emicklei/go-restful/blob/master/examples/restful-CORS-filter.go, and
|
|
// github.com/emicklei/go-restful/blob/master/examples/restful-basic-authentication.go
|
|
|
|
if len(c.CorsAllowedOriginList) > 0 {
|
|
allowedOriginRegexps, err := util.CompileRegexps(c.CorsAllowedOriginList)
|
|
if err != nil {
|
|
glog.Fatalf("Invalid CORS allowed origin, --cors_allowed_origins flag was set to %v - %v", strings.Join(c.CorsAllowedOriginList, ","), err)
|
|
}
|
|
handler = apiserver.CORS(handler, allowedOriginRegexps, nil, nil, "true")
|
|
}
|
|
|
|
m.InsecureHandler = handler
|
|
|
|
attributeGetter := apiserver.NewRequestAttributeGetter(m.requestContextMapper, latest.RESTMapper, "api")
|
|
handler = apiserver.WithAuthorizationCheck(handler, attributeGetter, m.authorizer)
|
|
|
|
// Install Authenticator
|
|
if c.Authenticator != nil {
|
|
authenticatedHandler, err := handlers.NewRequestAuthenticator(m.requestContextMapper, c.Authenticator, handlers.Unauthorized, handler)
|
|
if err != nil {
|
|
glog.Fatalf("Could not initialize authenticator: %v", err)
|
|
}
|
|
handler = authenticatedHandler
|
|
}
|
|
|
|
// Install root web services
|
|
m.handlerContainer.Add(m.rootWebService)
|
|
|
|
// TODO: Make this optional? Consumers of master depend on this currently.
|
|
m.Handler = handler
|
|
|
|
if m.enableSwaggerSupport {
|
|
m.InstallSwaggerAPI()
|
|
}
|
|
|
|
// After all wrapping is done, put a context filter around both handlers
|
|
if handler, err := api.NewRequestContextFilter(m.requestContextMapper, m.Handler); err != nil {
|
|
glog.Fatalf("Could not initialize request context filter: %v", err)
|
|
} else {
|
|
m.Handler = handler
|
|
}
|
|
|
|
if handler, err := api.NewRequestContextFilter(m.requestContextMapper, m.InsecureHandler); err != nil {
|
|
glog.Fatalf("Could not initialize request context filter: %v", err)
|
|
} else {
|
|
m.InsecureHandler = handler
|
|
}
|
|
|
|
// TODO: Attempt clean shutdown?
|
|
m.masterServices.Start()
|
|
}
|
|
|
|
// InstallSwaggerAPI installs the /swaggerapi/ endpoint to allow schema discovery
|
|
// and traversal. It is optional to allow consumers of the Kubernetes master to
|
|
// register their own web services into the Kubernetes mux prior to initialization
|
|
// of swagger, so that other resource types show up in the documentation.
|
|
func (m *Master) InstallSwaggerAPI() {
|
|
// Enable swagger UI and discovery API
|
|
swaggerConfig := swagger.Config{
|
|
WebServicesUrl: net.JoinHostPort(m.publicIP.String(), strconv.Itoa(m.publicReadWritePort)),
|
|
WebServices: m.handlerContainer.RegisteredWebServices(),
|
|
// TODO: Parameterize the path?
|
|
ApiPath: "/swaggerapi/",
|
|
SwaggerPath: "/swaggerui/",
|
|
SwaggerFilePath: "/swagger-ui/",
|
|
}
|
|
swagger.RegisterSwaggerService(swaggerConfig, m.handlerContainer)
|
|
}
|
|
|
|
func (m *Master) getServersToValidate(c *Config) map[string]apiserver.Server {
|
|
serversToValidate := map[string]apiserver.Server{
|
|
"controller-manager": {Addr: "127.0.0.1", Port: ports.ControllerManagerPort, Path: "/healthz"},
|
|
"scheduler": {Addr: "127.0.0.1", Port: ports.SchedulerPort, Path: "/healthz"},
|
|
}
|
|
for ix, machine := range c.EtcdHelper.Client.GetCluster() {
|
|
etcdUrl, err := url.Parse(machine)
|
|
if err != nil {
|
|
glog.Errorf("Failed to parse etcd url for validation: %v", err)
|
|
continue
|
|
}
|
|
var port int
|
|
var addr string
|
|
if strings.Contains(etcdUrl.Host, ":") {
|
|
var portString string
|
|
addr, portString, err = net.SplitHostPort(etcdUrl.Host)
|
|
if err != nil {
|
|
glog.Errorf("Failed to split host/port: %s (%v)", etcdUrl.Host, err)
|
|
continue
|
|
}
|
|
port, _ = strconv.Atoi(portString)
|
|
} else {
|
|
addr = etcdUrl.Host
|
|
port = 4001
|
|
}
|
|
serversToValidate[fmt.Sprintf("etcd-%d", ix)] = apiserver.Server{Addr: addr, Port: port, Path: "/v2/keys/"}
|
|
}
|
|
nodes, err := m.nodeRegistry.ListMinions(api.NewDefaultContext())
|
|
if err != nil {
|
|
glog.Errorf("Failed to list minions: %v", err)
|
|
}
|
|
for ix, node := range nodes.Items {
|
|
serversToValidate[fmt.Sprintf("node-%d", ix)] = apiserver.Server{Addr: node.Name, Port: ports.KubeletPort, Path: "/healthz"}
|
|
}
|
|
return serversToValidate
|
|
}
|
|
|
|
// api_v1beta1 returns the resources and codec for API version v1beta1.
|
|
func (m *Master) api_v1beta1() (map[string]apiserver.RESTStorage, runtime.Codec, string, string, runtime.SelfLinker, admission.Interface, api.RequestContextMapper, meta.RESTMapper) {
|
|
storage := make(map[string]apiserver.RESTStorage)
|
|
for k, v := range m.storage {
|
|
storage[k] = v
|
|
}
|
|
return storage, v1beta1.Codec, "api", "/api/v1beta1", latest.SelfLinker, m.admissionControl, m.requestContextMapper, latest.RESTMapper
|
|
}
|
|
|
|
// api_v1beta2 returns the resources and codec for API version v1beta2.
|
|
func (m *Master) api_v1beta2() (map[string]apiserver.RESTStorage, runtime.Codec, string, string, runtime.SelfLinker, admission.Interface, api.RequestContextMapper, meta.RESTMapper) {
|
|
storage := make(map[string]apiserver.RESTStorage)
|
|
for k, v := range m.storage {
|
|
storage[k] = v
|
|
}
|
|
return storage, v1beta2.Codec, "api", "/api/v1beta2", latest.SelfLinker, m.admissionControl, m.requestContextMapper, latest.RESTMapper
|
|
}
|
|
|
|
// api_v1beta3 returns the resources and codec for API version v1beta3.
|
|
func (m *Master) api_v1beta3() (map[string]apiserver.RESTStorage, runtime.Codec, string, string, runtime.SelfLinker, admission.Interface, api.RequestContextMapper, meta.RESTMapper) {
|
|
storage := make(map[string]apiserver.RESTStorage)
|
|
for k, v := range m.storage {
|
|
if k == "minions" {
|
|
continue
|
|
}
|
|
storage[strings.ToLower(k)] = v
|
|
}
|
|
return storage, v1beta3.Codec, "api", "/api/v1beta3", latest.SelfLinker, m.admissionControl, m.requestContextMapper, latest.RESTMapper
|
|
}
|