Files
kubernetes/cmd/kubeadm/app/util/apiclient/dryrun.go

683 lines
23 KiB
Go

/*
Copyright 2024 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
// Package apiclient contains wrapping logic for Kubernetes API clients.
package apiclient
import (
"context"
"encoding/json"
"fmt"
"io"
"strings"
"github.com/lithammer/dedent"
"github.com/pkg/errors"
batchv1 "k8s.io/api/batch/v1"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/dynamic"
clientset "k8s.io/client-go/kubernetes"
"k8s.io/client-go/kubernetes/fake"
clientsetscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/rest"
"k8s.io/client-go/testing"
"k8s.io/client-go/tools/clientcmd"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
bootstrapapi "k8s.io/cluster-bootstrap/token/api"
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util"
)
// DryRun is responsible for performing verbose dry-run operations with a set of different
// API clients. Any REST action that reaches the FakeClient() of a DryRun will be processed
// as follows by the fake client reactor chain:
// - Log the action.
// - If the action is not GET or LIST just use the fake client store to write it, unless
// a user reactor was added with PrependReactor() or AppendReactor().
// - Attempt to GET or LIST using the real dynamic client.
// - If the above fails try to GET or LIST the object from the fake client store, unless
// a user reactor was added with PrependReactor() or AppendReactor().
type DryRun struct {
fakeClient *fake.Clientset
client clientset.Interface
dynamicClient dynamic.Interface
writer io.Writer
marshalFunc func(runtime.Object, schema.GroupVersion) ([]byte, error)
}
// NewDryRun creates a new DryRun object that only has a fake client.
func NewDryRun() *DryRun {
d := &DryRun{}
d.fakeClient = fake.NewSimpleClientset()
d.addReactors()
return d
}
// WithKubeConfigFile takes a file path and creates real clientset and dynamic clients.
func (d *DryRun) WithKubeConfigFile(file string) error {
config, err := clientcmd.LoadFromFile(file)
if err != nil {
return errors.Wrap(err, "failed to load kubeconfig")
}
return d.WithKubeConfig(config)
}
// WithKubeConfig takes a Config (kubeconfig) and creates real clientset and dynamic client.
func (d *DryRun) WithKubeConfig(config *clientcmdapi.Config) error {
restConfig, err := clientcmd.NewDefaultClientConfig(*config, &clientcmd.ConfigOverrides{}).ClientConfig()
if err != nil {
return errors.Wrap(err, "failed to create API client configuration from kubeconfig")
}
return d.WithRestConfig(restConfig)
}
// WithRestConfig takes a rest Config and creates real clientset and dynamic clients.
func (d *DryRun) WithRestConfig(config *rest.Config) error {
var err error
d.client, err = clientset.NewForConfig(config)
if err != nil {
return err
}
d.dynamicClient, err = dynamic.NewForConfig(config)
if err != nil {
return err
}
return nil
}
// WithWriter sets the io.Writer used for printing by the DryRun.
func (d *DryRun) WithWriter(w io.Writer) *DryRun {
d.writer = w
return d
}
// WithMarshalFunction sets the DryRun marshal function.
func (d *DryRun) WithMarshalFunction(f func(runtime.Object, schema.GroupVersion) ([]byte, error)) *DryRun {
d.marshalFunc = f
return d
}
// WithDefaultMarshalFunction sets the DryRun marshal function to the default one.
func (d *DryRun) WithDefaultMarshalFunction() *DryRun {
d.WithMarshalFunction(kubeadmutil.MarshalToYaml)
return d
}
// PrependReactor prepends a new reactor in the fake client ReactorChain at position 1.
// Keeps position 0 for the log reactor:
// [ log, r, ... rest of the chain, default fake client reactor ]
func (d *DryRun) PrependReactor(r *testing.SimpleReactor) *DryRun {
log := d.fakeClient.Fake.ReactionChain[0]
chain := make([]testing.Reactor, len(d.fakeClient.Fake.ReactionChain)+1)
chain[0] = log
chain[1] = r
copy(chain[2:], d.fakeClient.Fake.ReactionChain[1:])
d.fakeClient.Fake.ReactionChain = chain
return d
}
// AppendReactor appends a new reactor in the fake client ReactorChain at position len-2.
// Keeps position len-1 for the default fake client reactor.
// [ log, rest of the chain... , r, default fake client reactor ]
func (d *DryRun) AppendReactor(r *testing.SimpleReactor) *DryRun {
sz := len(d.fakeClient.Fake.ReactionChain)
def := d.fakeClient.Fake.ReactionChain[sz-1]
d.fakeClient.Fake.ReactionChain[sz-1] = r
d.fakeClient.Fake.ReactionChain = append(d.fakeClient.Fake.ReactionChain, def)
return d
}
// Client returns the clientset for this DryRun.
func (d *DryRun) Client() clientset.Interface {
return d.client
}
// DynamicClient returns the dynamic client for this DryRun.
func (d *DryRun) DynamicClient() dynamic.Interface {
return d.dynamicClient
}
// FakeClient returns the fake client for this DryRun.
func (d *DryRun) FakeClient() clientset.Interface {
return d.fakeClient
}
// addRectors is by default called by NewDryRun after creating the fake client.
// It prepends a set of reactors before the default fake client reactor.
func (d *DryRun) addReactors() {
reactors := []testing.Reactor{
// Add a reactor for logging all requests that reach the fake client.
&testing.SimpleReactor{
Verb: "*",
Resource: "*",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
d.LogAction(action)
return false, nil, nil
},
},
// Add a reactor for all GET requests that reach the fake client.
// This reactor calls the real dynamic client, but if it cannot process the object
// the reactor chain is continued.
&testing.SimpleReactor{
Verb: "get",
Resource: "*",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
getAction, ok := action.(testing.GetAction)
if !ok {
return true, nil, errors.New("cannot cast reactor action to GetAction")
}
handled, obj, err := d.handleGetAction(getAction)
if err != nil {
fmt.Fprintln(d.writer, "[dryrun] Real object does not exist. "+
"Attempting to GET from followup reactors or from the fake client tracker")
return false, nil, nil
}
d.LogObject(obj, action.GetResource().GroupVersion())
return handled, obj, err
},
},
// Add a reactor for all LIST requests that reach the fake client.
// This reactor calls the real dynamic client, but if it cannot process the object
// the reactor chain is continued.
&testing.SimpleReactor{
Verb: "list",
Resource: "*",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
listAction, ok := action.(testing.ListAction)
if !ok {
return true, nil, errors.New("cannot cast reactor action to ListAction")
}
handled, obj, err := d.handleListAction(listAction)
if err != nil {
fmt.Fprintln(d.writer, "[dryrun] Real object does not exist. "+
"Attempting to LIST from followup reactors or from the fake client tracker")
return false, nil, nil
}
d.LogObject(obj, action.GetResource().GroupVersion())
return handled, obj, err
},
},
}
d.fakeClient.Fake.ReactionChain = append(reactors, d.fakeClient.Fake.ReactionChain...)
}
// handleGetAction tries to handle all GET actions with the dynamic client.
func (d *DryRun) handleGetAction(action testing.GetAction) (bool, runtime.Object, error) {
if d.dynamicClient == nil {
return false, nil, errors.New("dynamicClient is nil")
}
unstructuredObj, err := d.dynamicClient.
Resource(action.GetResource()).
Namespace(action.GetNamespace()).
Get(context.Background(), action.GetName(), metav1.GetOptions{})
if err != nil {
return true, nil, err
}
newObj, err := d.decodeUnstructuredIntoAPIObject(action, unstructuredObj)
if err != nil {
return true, nil, err
}
return true, newObj, err
}
// handleListAction tries to handle all LIST actions with the dynamic client.
func (d *DryRun) handleListAction(action testing.ListAction) (bool, runtime.Object, error) {
if d.dynamicClient == nil {
return false, nil, errors.New("dynamicClient is nil")
}
listOpts := metav1.ListOptions{
LabelSelector: action.GetListRestrictions().Labels.String(),
FieldSelector: action.GetListRestrictions().Fields.String(),
}
unstructuredObj, err := d.dynamicClient.
Resource(action.GetResource()).
Namespace(action.GetNamespace()).
List(context.Background(), listOpts)
if err != nil {
return true, nil, err
}
newObj, err := d.decodeUnstructuredIntoAPIObject(action, unstructuredObj)
if err != nil {
return true, nil, err
}
return true, newObj, err
}
// decodeUnstructuredIntoAPIObject decodes an unstructured object into an API object.
func (d *DryRun) decodeUnstructuredIntoAPIObject(action testing.Action, obj runtime.Unstructured) (runtime.Object, error) {
objBytes, err := json.Marshal(obj)
if err != nil {
return nil, err
}
newObj, err := runtime.Decode(clientsetscheme.Codecs.UniversalDecoder(action.GetResource().GroupVersion()), objBytes)
if err != nil {
return nil, err
}
return newObj, nil
}
// LogAction logs details about an action, such as name, object and resource.
func (d *DryRun) LogAction(action testing.Action) {
// actionWithName is the generic interface for an action that has a name associated with it.
type actionWithNameAndNamespace interface {
testing.Action
GetName() string
GetNamespace() string
}
// actionWithObject is the generic interface for an action that has an object associated with it.
type actionWithObject interface {
testing.Action
GetObject() runtime.Object
}
group := action.GetResource().Group
if len(group) == 0 {
group = "core"
}
fmt.Fprintf(d.writer, "[dryrun] Would perform action %s on resource %q in API group \"%s/%s\"\n",
strings.ToUpper(action.GetVerb()), action.GetResource().Resource, group, action.GetResource().Version)
namedAction, ok := action.(actionWithNameAndNamespace)
if ok {
fmt.Fprintf(d.writer, "[dryrun] Resource name %q, namespace %q\n",
namedAction.GetName(), namedAction.GetNamespace())
}
objAction, ok := action.(actionWithObject)
if ok && objAction.GetObject() != nil {
d.LogObject(objAction.GetObject(), objAction.GetResource().GroupVersion())
}
}
// LogObject marshals the object and then prints it to the io.Writer of this DryRun.
func (d *DryRun) LogObject(obj runtime.Object, gv schema.GroupVersion) {
objBytes, err := d.marshalFunc(obj, gv)
if err == nil {
fmt.Fprintln(d.writer, "[dryrun] Attached object:")
fmt.Fprintln(d.writer, string(objBytes))
}
}
// HealthCheckJobReactor returns a reactor that handles the GET action for the Job
// object used for the "CreateJob" upgrade preflight check.
func (d *DryRun) HealthCheckJobReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "jobs",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
if !strings.HasPrefix(a.GetName(), "upgrade-health-check") || a.GetNamespace() != metav1.NamespaceSystem {
return false, nil, nil
}
obj := getJob(a.GetName(), a.GetNamespace())
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// PatchNodeReactor returns a reactor that handles the generic PATCH action on Node objects.
func (d *DryRun) PatchNodeReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "patch",
Resource: "nodes",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.PatchAction)
obj := getNode(a.GetName())
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// GetNodeReactor returns a reactor that handles the generic GET action of Node objects.
func (d *DryRun) GetNodeReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "nodes",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
obj := getNode(a.GetName())
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// GetClusterInfoReactor returns a reactor that handles the GET action of the "cluster-info"
// ConfigMap used during node bootstrap.
func (d *DryRun) GetClusterInfoReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "configmaps",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
if a.GetName() != bootstrapapi.ConfigMapClusterInfo || a.GetNamespace() != metav1.NamespacePublic {
return false, nil, nil
}
obj := getClusterInfoConfigMap()
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// GetKubeadmConfigReactor returns a reactor that handles the GET action of the "kubeadm-config"
// ConfigMap.
func (d *DryRun) GetKubeadmConfigReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "configmaps",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
if a.GetName() != constants.KubeadmConfigConfigMap || a.GetNamespace() != metav1.NamespaceSystem {
return false, nil, nil
}
obj := getKubeadmConfigMap()
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// GetKubeadmCertsReactor returns a reactor that handles the GET action of the "kubeadm-certs" Secret.
func (d *DryRun) GetKubeadmCertsReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "secrets",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
if a.GetName() != constants.KubeadmCertsSecret || a.GetNamespace() != metav1.NamespaceSystem {
return false, nil, nil
}
obj := getKubeadmCertsSecret()
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// GetKubeletConfigReactor returns a reactor that handles the GET action of the "kubelet-config"
// ConfigMap.
func (d *DryRun) GetKubeletConfigReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "configmaps",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
if a.GetName() != constants.KubeletBaseConfigurationConfigMap || a.GetNamespace() != metav1.NamespaceSystem {
return false, nil, nil
}
obj := getKubeletConfigMap()
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// GetKubeProxyConfigReactor returns a reactor that handles the GET action of the "kube-proxy"
// ConfigMap.
func (d *DryRun) GetKubeProxyConfigReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "get",
Resource: "configmaps",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.GetAction)
if a.GetName() != constants.KubeProxyConfigMap || a.GetNamespace() != metav1.NamespaceSystem {
return false, nil, nil
}
obj := getKubeProxyConfigMap()
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// DeleteBootstrapTokenReactor returns a reactor that handles the DELETE action
// of bootstrap token Secret.
func (d *DryRun) DeleteBootstrapTokenReactor() *testing.SimpleReactor {
return &testing.SimpleReactor{
Verb: "delete",
Resource: "secrets",
Reaction: func(action testing.Action) (bool, runtime.Object, error) {
a := action.(testing.DeleteAction)
if !strings.HasPrefix(a.GetName(), bootstrapapi.BootstrapTokenSecretPrefix) || a.GetNamespace() != metav1.NamespaceSystem {
return false, nil, nil
}
obj := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: a.GetName(),
Namespace: a.GetNamespace(),
},
}
d.LogObject(obj, action.GetResource().GroupVersion())
return true, obj, nil
},
}
}
// getJob returns a fake Job object.
func getJob(namespace, name string) *batchv1.Job {
return &batchv1.Job{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
},
Status: batchv1.JobStatus{
Conditions: []batchv1.JobCondition{
{Type: batchv1.JobComplete},
},
},
}
}
// getNode returns a fake Node object.
func getNode(name string) *corev1.Node {
return &corev1.Node{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Labels: map[string]string{
"kubernetes.io/hostname": name,
},
Annotations: map[string]string{},
},
}
}
// getConfigMap returns a fake ConfigMap object.
func getConfigMap(namespace, name string, data map[string]string) *corev1.ConfigMap {
return &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
},
Data: data,
}
}
// getSecret returns a fake Secret object.
func getSecret(namespace, name string, data map[string][]byte) *corev1.Secret {
return &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
},
Data: data,
}
}
// getClusterInfoConfigMap returns a fake "cluster-info" ConfigMap.
func getClusterInfoConfigMap() *corev1.ConfigMap {
kubeconfig := dedent.Dedent(`apiVersion: v1
clusters:
- cluster:
certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCVENDQWUyZ0F3SUJBZ0lJTkpmdGFCK09Xd0F3RFFZSktvWklodmNOQVFFTEJRQXdGVEVUTUJFR0ExVUUKQXhNS2EzVmlaWEp1WlhSbGN6QWVGdzB5TkRBM01EZ3hNalF3TURSYUZ3MHpOREEzTURZeE1qUTFNRFJhTUJVeApFekFSQmdOVkJBTVRDbXQxWW1WeWJtVjBaWE13Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLCkFvSUJBUURhUURkaWdPeVdpbTZXLzQ4bjNQSG9WZVZCU2lkNldjbmRFV3VVcTVnQldYZGx0OTk2aCtWbkl0bHQKOHpDaGwvb1I1V2ZSYVJDODA1WitvTW4vWThJR1ZRM3QxaG55SW1ZbjR3M3Z6UlhvdUdlQmVpdTJTU1ZqZ0J3agpYanliYk1DbXJBZEljYkllWm1INjZldjV6KzVZS21aUlVZYzNoRGFIcFhkMEVFblp5SlY1d2FaczBYTVFVSE03CmVxT1pBWko5L21PM05VQnBsdnJQbnBPTUs3a1NFUFBnNzVjVTdXSG9KSEZrZVlXNTkzZ3NnQ3MyQnRVdTY0Y3EKYlZYOWJpZ3JZZGRwWmtvRUtLeFU4SEl3SHNJNVY4Um9uM21LRkdsckUxN2IybC84Q3FtQXVPdnl6TEllaVFHWAplZ0lhUi9uUkhISUQ5QVRpNnRYOEVhRERwZXYvQWdNQkFBR2pXVEJYTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQCkJnTlZIUk1CQWY4RUJUQURBUUgvTUIwR0ExVWREZ1FXQkJRWWFDRGU2eXVWcVNhV1Y3M3pMaldtR2hpYVR6QVYKQmdOVkhSRUVEakFNZ2dwcmRXSmxjbTVsZEdWek1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQ2NlTW5uaVBhcQpHUkVqR3A2WFJTN1FFWW1RcmJFZCtUVjVKUTE4byttVzZvR3BaOENBM0pBSFFETk5QRW1QYzB5dVhEeE85QkZYCmJnMlhSSCtLTkozVzJKZlExVEgzVFhKRWF4Zkh1WDRtQjU5UkNsQzExNGtsV2RIeDFqN0FtRWt1eTZ0ZGpuYWkKZmh0U0dueEEwM2JwN2I4Z28zSWpXNE5wV1JOMVdHNTl2YTBKOEJIRmg3Q0RpZUxuK0RNdUk2M0Jna1kveTJzMApML2RtOVBmcWdVSzFBMy8wZGhDVjZiRUNqekEzSkJld21kSC8rVUJPeVkybUMwNVlQMzNkMHA5eXlrYmtkWE5xCkRONXlBc3ZNUC9PV0NuQjFlQlFUb2pNODJMU3F3dHZtbU1SNHRXYXVoOXVkVktHY2s0eEJaV3Vkcm5LRFVVWEkKUURNUFJnSkMvTng0Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K
server: https://192.168.0.101:6443
name: ""
contexts: null
current-context: ""
kind: Config
preferences: {}
users: null
`)
data := map[string]string{
bootstrapapi.JWSSignatureKeyPrefix + "abcdef": "eyJhbGciOiJIUzI1NiIsImtpZCI6ImFiY2RlZiJ9..wUZ0q9o0VK1RWFptmSBOEem2bXHWrHyxrposHg0mb1w",
bootstrapapi.KubeConfigKey: kubeconfig,
}
return getConfigMap(metav1.NamespacePublic, bootstrapapi.ConfigMapClusterInfo, data)
}
// getKubeadmConfigMap returns a fake "kubeadm-config" ConfigMap.
func getKubeadmConfigMap() *corev1.ConfigMap {
ccData := fmt.Sprintf(`apiServer: {}
apiVersion: kubeadm.k8s.io/v1beta4
caCertificateValidityPeriod: 87600h0m0s
certificateValidityPeriod: 100h0m0s
certificatesDir: /etc/kubernetes/pki
clusterName: kubernetes
controllerManager:
extraArgs:
- name: cluster-signing-duration
value: 24h
controlPlaneEndpoint: 192.168.0.101:6443
dns: {}
encryptionAlgorithm: RSA-2048
etcd:
local:
dataDir: /var/lib/etcd
imageRepository: registry.k8s.io
kind: ClusterConfiguration
kubernetesVersion: %s
networking:
dnsDomain: cluster.local
podSubnet: 192.168.0.0/16
serviceSubnet: 10.96.0.0/12
proxy: {}
scheduler: {}
`, constants.MinimumControlPlaneVersion)
data := map[string]string{
constants.ClusterConfigurationKind: ccData,
}
return getConfigMap(metav1.NamespaceSystem, constants.KubeadmConfigConfigMap, data)
}
// getKubeadmCertsSecret returns a fake "kubeadm-certs" Secret.
func getKubeadmCertsSecret() *corev1.Secret {
// The cert data is empty because the actual content is not relevant for the dryrun test.
data := map[string][]byte{
constants.CACertName: {},
constants.CAKeyName: {},
constants.FrontProxyCACertName: {},
constants.FrontProxyCAKeyName: {},
constants.ServiceAccountPrivateKeyName: {},
constants.ServiceAccountPublicKeyName: {},
strings.ReplaceAll(constants.EtcdCACertName, "/", "-"): {},
strings.ReplaceAll(constants.EtcdCAKeyName, "/", "-"): {},
}
return getSecret(metav1.NamespaceSystem, constants.KubeadmCertsSecret, data)
}
// getKubeletConfigMap returns a fake "kubelet-config" ConfigMap.
func getKubeletConfigMap() *corev1.ConfigMap {
configData := `apiVersion: kubelet.config.k8s.io/v1beta1
authentication:
anonymous:
enabled: false
webhook:
enabled: true
x509:
clientCAFile: /etc/kubernetes/pki/ca.crt
authorization:
mode: Webhook
cgroupDriver: systemd
clusterDNS:
- 10.96.0.10
clusterDomain: cluster.local
healthzBindAddress: 127.0.0.1
healthzPort: 10248
kind: KubeletConfiguration
memorySwap: {}
resolvConf: /run/systemd/resolve/resolv.conf
rotateCertificates: true
staticPodPath: /etc/kubernetes/manifests
`
data := map[string]string{
constants.KubeletBaseConfigurationConfigMapKey: configData,
}
return getConfigMap(metav1.NamespaceSystem, constants.KubeletBaseConfigurationConfigMap, data)
}
// getKubeProxyConfigMap returns a fake "kube-proxy" ConfigMap.
func getKubeProxyConfigMap() *corev1.ConfigMap {
configData := `apiVersion: kubeproxy.config.k8s.io/v1alpha1
bindAddress: 0.0.0.0
bindAddressHardFail: false
clientConnection:
kubeconfig: /var/lib/kube-proxy/kubeconfig.conf
clusterCIDR: 192.168.0.0/16
kind: KubeProxyConfiguration
`
kubeconfigData := `apiVersion: v1
kind: Config
clusters:
- cluster:
certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
server: https://192.168.0.101:6443
name: default
contexts:
- context:
cluster: default
namespace: default
user: default
name: default
current-context: default
users:
- name: default
user:
tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
`
data := map[string]string{
constants.KubeProxyConfigMapKey: configData,
"kubeconfig.conf": kubeconfigData,
}
return getConfigMap(metav1.NamespaceSystem, constants.KubeProxyConfigMap, data)
}