refactor and rebase
parent
86c9d2b747
commit
62ca22a662
|
@ -172,7 +172,7 @@ func initMinikubeFlags() {
|
|||
startCmd.Flags().String(criSocket, "", "The cri socket path to be used.")
|
||||
startCmd.Flags().String(networkPlugin, "", "The name of the network plugin.")
|
||||
startCmd.Flags().Bool(enableDefaultCNI, false, "Enable the default CNI plugin (/etc/cni/net.d/k8s.conf). Used in conjunction with \"--network-plugin=cni\".")
|
||||
startCmd.Flags().StringSlice(waitComponents, kverify.DefaultWaitsKeys, fmt.Sprintf("comma separated list of kuberentes components to verify and wait for after starting a cluster. defaults to %q, available options: %q . other acceptable values are 'all' or 'none', 'true' and 'false'", strings.Join(kverify.DefaultWaitsKeys, ","), strings.Join(kverify.AllValidWaitsList, ",")))
|
||||
startCmd.Flags().StringSlice(waitComponents, kverify.DefaultWaitList, fmt.Sprintf("comma separated list of kuberentes components to verify and wait for after starting a cluster. defaults to %q, available options: %q . other acceptable values are 'all' or 'none', 'true' and 'false'", strings.Join(kverify.DefaultWaitList, ","), strings.Join(kverify.AllValidWaitList, ",")))
|
||||
startCmd.Flags().Duration(waitTimeout, 6*time.Minute, "max time to wait per Kubernetes core services to be healthy.")
|
||||
startCmd.Flags().Bool(nativeSSH, true, "Use native Golang SSH client (default true). Set to 'false' to use the command line 'ssh' command when accessing the docker machine. Useful for the machine drivers when they will not start with 'Waiting for SSH'.")
|
||||
startCmd.Flags().Bool(autoUpdate, true, "If set, automatically updates drivers to the latest version. Defaults to true.")
|
||||
|
@ -1207,31 +1207,31 @@ func getKubernetesVersion(old *config.ClusterConfig) string {
|
|||
// returns map of components to wait for
|
||||
func interpretWaitFlag(cmd cobra.Command) map[string]bool {
|
||||
if !cmd.Flags().Changed(waitComponents) {
|
||||
glog.Infof("Wait Components : %+v", kverify.DefaultWaits)
|
||||
return kverify.DefaultWaits
|
||||
glog.Infof("Wait Components : %+v", kverify.DefaultWaitComponents)
|
||||
return kverify.DefaultWaitComponents
|
||||
}
|
||||
|
||||
waitFlags, err := cmd.Flags().GetStringSlice(waitComponents)
|
||||
if err != nil {
|
||||
glog.Infof("failed to get wait from flags, will use default wait components : %+v", kverify.DefaultWaits)
|
||||
return kverify.DefaultWaits
|
||||
glog.Infof("failed to get wait from flags, will use default wait components : %+v", kverify.DefaultWaitComponents)
|
||||
return kverify.DefaultWaitComponents
|
||||
}
|
||||
|
||||
// before minikube 1.9.0, wait flag was boolean
|
||||
if (len(waitFlags) == 1 && waitFlags[0] == "true") || (len(waitFlags) == 1 && waitFlags[0] == "all") {
|
||||
return kverify.AllWaitsCompos
|
||||
return kverify.AllWaitComponents
|
||||
}
|
||||
|
||||
// respecting legacy flag format --wait=false
|
||||
// before minikube 1.9.0, wait flag was boolean
|
||||
if (len(waitFlags) == 1 && waitFlags[0] == "false") || len(waitFlags) == 1 && waitFlags[0] == "none" {
|
||||
return kverify.NoWaitsCompos
|
||||
return kverify.NoWaitComponents
|
||||
}
|
||||
|
||||
waitCompos := kverify.NoWaitsCompos
|
||||
waitCompos := kverify.NoWaitComponents
|
||||
for _, wc := range waitFlags {
|
||||
seen := false
|
||||
for _, valid := range kverify.AllValidWaitsList {
|
||||
for _, valid := range kverify.AllValidWaitList {
|
||||
if wc == valid {
|
||||
waitCompos[wc] = true
|
||||
seen = true
|
||||
|
@ -1239,7 +1239,7 @@ func interpretWaitFlag(cmd cobra.Command) map[string]bool {
|
|||
}
|
||||
}
|
||||
if !seen {
|
||||
glog.Warningf("The value %q is invalid for --wait flag. valid options are %q", wc, strings.Join(kverify.AllValidWaitsList, ","))
|
||||
glog.Warningf("The value %q is invalid for --wait flag. valid options are %q", wc, strings.Join(kverify.AllValidWaitList, ","))
|
||||
}
|
||||
}
|
||||
return waitCompos
|
||||
|
|
|
@ -41,55 +41,6 @@ import (
|
|||
"k8s.io/minikube/pkg/minikube/cruntime"
|
||||
)
|
||||
|
||||
// WaitForHealthyAPIServer waits for api server status to be running
|
||||
func WaitForHealthyAPIServer(r cruntime.Manager, bs bootstrapper.Bootstrapper, cfg config.ClusterConfig, cr command.Runner, client *kubernetes.Clientset, start time.Time, ip string, port int, timeout time.Duration) error {
|
||||
glog.Infof("waiting for apiserver healthz status ...")
|
||||
hStart := time.Now()
|
||||
|
||||
healthz := func() (bool, error) {
|
||||
if time.Since(start) > timeout {
|
||||
return false, fmt.Errorf("cluster wait timed out during healthz check")
|
||||
}
|
||||
|
||||
if time.Since(start) > minLogCheckTime {
|
||||
announceProblems(r, bs, cfg, cr)
|
||||
time.Sleep(kconst.APICallRetryInterval * 5)
|
||||
}
|
||||
|
||||
status, err := apiServerHealthz(net.ParseIP(ip), port)
|
||||
if err != nil {
|
||||
glog.Warningf("status: %v", err)
|
||||
return false, nil
|
||||
}
|
||||
if status != state.Running {
|
||||
return false, nil
|
||||
}
|
||||
return true, nil
|
||||
}
|
||||
|
||||
if err := wait.PollImmediate(kconst.APICallRetryInterval, kconst.DefaultControlPlaneTimeout, healthz); err != nil {
|
||||
return fmt.Errorf("apiserver healthz never reported healthy")
|
||||
}
|
||||
|
||||
vcheck := func() (bool, error) {
|
||||
if time.Since(start) > timeout {
|
||||
return false, fmt.Errorf("cluster wait timed out during version check")
|
||||
}
|
||||
if err := APIServerVersionMatch(client, cfg.KubernetesConfig.KubernetesVersion); err != nil {
|
||||
glog.Warningf("api server version match failed: %v", err)
|
||||
return false, nil
|
||||
}
|
||||
return true, nil
|
||||
}
|
||||
|
||||
if err := wait.PollImmediate(kconst.APICallRetryInterval, kconst.DefaultControlPlaneTimeout, vcheck); err != nil {
|
||||
return fmt.Errorf("controlPlane never updated to %s", cfg.KubernetesConfig.KubernetesVersion)
|
||||
}
|
||||
|
||||
glog.Infof("duration metric: took %s to wait for apiserver health ...", time.Since(hStart))
|
||||
return nil
|
||||
}
|
||||
|
||||
// WaitForAPIServerProcess waits for api server to be healthy returns error if it doesn't
|
||||
func WaitForAPIServerProcess(r cruntime.Manager, bs bootstrapper.Bootstrapper, cfg config.ClusterConfig, cr command.Runner, start time.Time, timeout time.Duration) error {
|
||||
glog.Infof("waiting for apiserver process to appear ...")
|
||||
|
@ -126,8 +77,70 @@ func apiServerPID(cr command.Runner) (int, error) {
|
|||
return strconv.Atoi(s)
|
||||
}
|
||||
|
||||
// WaitForHealthyAPIServer waits for api server status to be running
|
||||
func WaitForHealthyAPIServer(r cruntime.Manager, bs bootstrapper.Bootstrapper, cfg config.ClusterConfig, cr command.Runner, client *kubernetes.Clientset, start time.Time, hostname string, port int, timeout time.Duration) error {
|
||||
glog.Infof("waiting for apiserver healthz status ...")
|
||||
hStart := time.Now()
|
||||
|
||||
healthz := func() (bool, error) {
|
||||
if time.Since(start) > timeout {
|
||||
return false, fmt.Errorf("cluster wait timed out during healthz check")
|
||||
}
|
||||
|
||||
if time.Since(start) > minLogCheckTime {
|
||||
announceProblems(r, bs, cfg, cr)
|
||||
time.Sleep(kconst.APICallRetryInterval * 5)
|
||||
}
|
||||
|
||||
status, err := apiServerHealthz(hostname, port)
|
||||
if err != nil {
|
||||
glog.Warningf("status: %v", err)
|
||||
return false, nil
|
||||
}
|
||||
if status != state.Running {
|
||||
return false, nil
|
||||
}
|
||||
return true, nil
|
||||
}
|
||||
|
||||
if err := wait.PollImmediate(kconst.APICallRetryInterval, kconst.DefaultControlPlaneTimeout, healthz); err != nil {
|
||||
return fmt.Errorf("apiserver healthz never reported healthy")
|
||||
}
|
||||
|
||||
vcheck := func() (bool, error) {
|
||||
if time.Since(start) > timeout {
|
||||
return false, fmt.Errorf("cluster wait timed out during version check")
|
||||
}
|
||||
if err := APIServerVersionMatch(client, cfg.KubernetesConfig.KubernetesVersion); err != nil {
|
||||
glog.Warningf("api server version match failed: %v", err)
|
||||
return false, nil
|
||||
}
|
||||
return true, nil
|
||||
}
|
||||
|
||||
if err := wait.PollImmediate(kconst.APICallRetryInterval, kconst.DefaultControlPlaneTimeout, vcheck); err != nil {
|
||||
return fmt.Errorf("controlPlane never updated to %s", cfg.KubernetesConfig.KubernetesVersion)
|
||||
}
|
||||
|
||||
glog.Infof("duration metric: took %s to wait for apiserver health ...", time.Since(hStart))
|
||||
return nil
|
||||
}
|
||||
|
||||
// APIServerVersionMatch checks if the server version matches the expected
|
||||
func APIServerVersionMatch(client *kubernetes.Clientset, expected string) error {
|
||||
vi, err := client.ServerVersion()
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "server version")
|
||||
}
|
||||
glog.Infof("control plane version: %s", vi)
|
||||
if version.CompareKubeAwareVersionStrings(vi.String(), expected) != 0 {
|
||||
return fmt.Errorf("controlPane = %q, expected: %q", vi.String(), expected)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// APIServerStatus returns apiserver status in libmachine style state.State
|
||||
func APIServerStatus(cr command.Runner, ip net.IP, port int) (state.State, error) {
|
||||
func APIServerStatus(cr command.Runner, hostname string, port int) (state.State, error) {
|
||||
glog.Infof("Checking apiserver status ...")
|
||||
|
||||
pid, err := apiServerPID(cr)
|
||||
|
@ -140,7 +153,7 @@ func APIServerStatus(cr command.Runner, ip net.IP, port int) (state.State, error
|
|||
rr, err := cr.RunCmd(exec.Command("sudo", "egrep", "^[0-9]+:freezer:", fmt.Sprintf("/proc/%d/cgroup", pid)))
|
||||
if err != nil {
|
||||
glog.Warningf("unable to find freezer cgroup: %v", err)
|
||||
return apiServerHealthz(ip, port)
|
||||
return apiServerHealthz(hostname, port)
|
||||
|
||||
}
|
||||
freezer := strings.TrimSpace(rr.Stdout.String())
|
||||
|
@ -148,13 +161,13 @@ func APIServerStatus(cr command.Runner, ip net.IP, port int) (state.State, error
|
|||
fparts := strings.Split(freezer, ":")
|
||||
if len(fparts) != 3 {
|
||||
glog.Warningf("unable to parse freezer - found %d parts: %s", len(fparts), freezer)
|
||||
return apiServerHealthz(ip, port)
|
||||
return apiServerHealthz(hostname, port)
|
||||
}
|
||||
|
||||
rr, err = cr.RunCmd(exec.Command("sudo", "cat", path.Join("/sys/fs/cgroup/freezer", fparts[2], "freezer.state")))
|
||||
if err != nil {
|
||||
glog.Errorf("unable to get freezer state: %s", rr.Stderr.String())
|
||||
return apiServerHealthz(ip, port)
|
||||
return apiServerHealthz(hostname, port)
|
||||
}
|
||||
|
||||
fs := strings.TrimSpace(rr.Stdout.String())
|
||||
|
@ -162,12 +175,12 @@ func APIServerStatus(cr command.Runner, ip net.IP, port int) (state.State, error
|
|||
if fs == "FREEZING" || fs == "FROZEN" {
|
||||
return state.Paused, nil
|
||||
}
|
||||
return apiServerHealthz(ip, port)
|
||||
return apiServerHealthz(hostname, port)
|
||||
}
|
||||
|
||||
// apiServerHealthz hits the /healthz endpoint and returns libmachine style state.State
|
||||
func apiServerHealthz(ip net.IP, port int) (state.State, error) {
|
||||
url := fmt.Sprintf("https://%s/healthz", net.JoinHostPort(ip.String(), fmt.Sprint(port)))
|
||||
func apiServerHealthz(hostname string, port int) (state.State, error) {
|
||||
url := fmt.Sprintf("https://%s/healthz", net.JoinHostPort(hostname, fmt.Sprint(port)))
|
||||
glog.Infof("Checking apiserver healthz at %s ...", url)
|
||||
// To avoid: x509: certificate signed by unknown authority
|
||||
tr := &http.Transport{
|
||||
|
@ -191,16 +204,3 @@ func apiServerHealthz(ip net.IP, port int) (state.State, error) {
|
|||
}
|
||||
return state.Running, nil
|
||||
}
|
||||
|
||||
// APIServerVersionMatch checks if the server version matches the expected
|
||||
func APIServerVersionMatch(client *kubernetes.Clientset, expected string) error {
|
||||
vi, err := client.ServerVersion()
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "server version")
|
||||
}
|
||||
glog.Infof("control plane version: %s", vi)
|
||||
if version.CompareKubeAwareVersionStrings(vi.String(), expected) != 0 {
|
||||
return fmt.Errorf("controlPane = %q, expected: %q", vi.String(), expected)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
|
|
@ -47,7 +47,7 @@ func WaitForDefaultSA(cs *kubernetes.Clientset) error {
|
|||
}
|
||||
return fmt.Errorf("couldn't find default service account")
|
||||
}
|
||||
if err := retry.Expo(saReady, 500*time.Millisecond, 30*time.Second); err != nil {
|
||||
if err := retry.Expo(saReady, 500*time.Millisecond, 60*time.Second); err != nil {
|
||||
return errors.Wrapf(err, "waited %s for SA", time.Since(pStart))
|
||||
}
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
Copyright 2019 The Kubernetes Authors All rights reserved.
|
||||
Copyright 2016 The Kubernetes Authors All rights reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
|
@ -26,6 +26,8 @@ import (
|
|||
"github.com/docker/machine/libmachine/state"
|
||||
"github.com/golang/glog"
|
||||
core "k8s.io/api/core/v1"
|
||||
meta "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
kconst "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||
"k8s.io/minikube/pkg/minikube/bootstrapper"
|
||||
"k8s.io/minikube/pkg/minikube/command"
|
||||
|
@ -34,31 +36,78 @@ import (
|
|||
"k8s.io/minikube/pkg/minikube/logs"
|
||||
)
|
||||
|
||||
// minLogCheckTime how long to wait before spamming error logs to console
|
||||
const minLogCheckTime = 60 * time.Second
|
||||
|
||||
const (
|
||||
// minLogCheckTime how long to wait before spamming error logs to console
|
||||
minLogCheckTime = 30 * time.Second
|
||||
// APIServerWait is the name used in the flags for k8s api server
|
||||
APIServerWait = "apiserver"
|
||||
// SystemPodsWait is the name used in the flags for pods in the kube system
|
||||
SystemPodsWait = "system_pods"
|
||||
// DefaultServiceAccountWait is the name used in the flags for default service account
|
||||
DefaultServiceAccountWait = "default_sa"
|
||||
// APIServerWaitKey is the name used in the flags for k8s api server
|
||||
APIServerWaitKey = "apiserver"
|
||||
// SystemPodsWaitKey is the name used in the flags for pods in the kube system
|
||||
SystemPodsWaitKey = "system_pods"
|
||||
// DefaultSAWaitKey is the name used in the flags for default service account
|
||||
DefaultSAWaitKey = "default_sa"
|
||||
)
|
||||
|
||||
// DefaultWaits is map of the the default components to wait for
|
||||
var DefaultWaits = map[string]bool{APIServerWait: true, SystemPodsWait: true}
|
||||
// vars related to the --wait flag
|
||||
var (
|
||||
// DefaultWaitComponents is map of the the default components to wait for
|
||||
DefaultWaitComponents = map[string]bool{APIServerWaitKey: true, SystemPodsWaitKey: true}
|
||||
// NoWaitComponents is map of componets to wait for if specified 'none' or 'false'
|
||||
NoWaitComponents = map[string]bool{APIServerWaitKey: false, SystemPodsWaitKey: false, DefaultSAWaitKey: false}
|
||||
// AllWaitComponents is map for waiting for all components.
|
||||
AllWaitComponents = map[string]bool{APIServerWaitKey: true, SystemPodsWaitKey: true, DefaultSAWaitKey: true}
|
||||
// DefaultWaitList is list of all default components to wait for
|
||||
DefaultWaitList = []string{APIServerWaitKey, SystemPodsWaitKey}
|
||||
// AllValidWaitList list of all valid components to wait for
|
||||
AllValidWaitList = []string{APIServerWaitKey, SystemPodsWaitKey, DefaultSAWaitKey}
|
||||
)
|
||||
|
||||
// DefaultWaitsKeys is list of all default components to wait for
|
||||
var DefaultWaitsKeys = []string{APIServerWait, SystemPodsWait}
|
||||
// ShouldWait will return true if the config says need to wait
|
||||
func ShouldWait(wcs map[string]bool) bool {
|
||||
return wcs[APIServerWaitKey] || wcs[SystemPodsWaitKey] || wcs[DefaultSAWaitKey]
|
||||
}
|
||||
|
||||
// NoWaitsCompos is map of componets to wait for if specified 'none' or 'false'
|
||||
var NoWaitsCompos = map[string]bool{APIServerWait: false, SystemPodsWait: false, DefaultServiceAccountWait: false}
|
||||
// ExpectedComponentsRunning returns whether or not all expected components are running
|
||||
func ExpectedComponentsRunning(cs *kubernetes.Clientset) error {
|
||||
expected := []string{
|
||||
"kube-dns", // coredns
|
||||
"etcd",
|
||||
"kube-apiserver",
|
||||
"kube-controller-manager",
|
||||
"kube-proxy",
|
||||
"kube-scheduler",
|
||||
}
|
||||
|
||||
// AllWaitsCompos is map for waiting for all components.
|
||||
var AllWaitsCompos = map[string]bool{APIServerWait: true, SystemPodsWait: true, DefaultServiceAccountWait: true}
|
||||
found := map[string]bool{}
|
||||
|
||||
// AllValidWaitsList list of all valid components to wait for
|
||||
var AllValidWaitsList = []string{APIServerWait, SystemPodsWait, DefaultServiceAccountWait}
|
||||
pods, err := cs.CoreV1().Pods("kube-system").List(meta.ListOptions{})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, pod := range pods.Items {
|
||||
glog.Infof("found pod: %s", podStatusMsg(pod))
|
||||
if pod.Status.Phase != core.PodRunning {
|
||||
continue
|
||||
}
|
||||
for k, v := range pod.ObjectMeta.Labels {
|
||||
if k == "component" || k == "k8s-app" {
|
||||
found[v] = true
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
missing := []string{}
|
||||
for _, e := range expected {
|
||||
if !found[e] {
|
||||
missing = append(missing, e)
|
||||
}
|
||||
}
|
||||
if len(missing) > 0 {
|
||||
return fmt.Errorf("missing components: %v", strings.Join(missing, ", "))
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// podStatusMsg returns a human-readable pod status, for generating debug status
|
||||
func podStatusMsg(pod core.Pod) string {
|
||||
|
@ -80,11 +129,6 @@ func podStatusMsg(pod core.Pod) string {
|
|||
return sb.String()
|
||||
}
|
||||
|
||||
// DontWait will return true if the config is no need to wait
|
||||
func DontWait(wcs map[string]bool) bool {
|
||||
return !wcs[APIServerWait] && !wcs[SystemPodsWait] && !wcs[DefaultServiceAccountWait]
|
||||
}
|
||||
|
||||
// announceProblems checks for problems, and slows polling down if any are found
|
||||
func announceProblems(r cruntime.Manager, bs bootstrapper.Bootstrapper, cfg config.ClusterConfig, cr command.Runner) {
|
||||
problems := logs.FindProblems(r, bs, cfg, cr)
|
|
@ -19,11 +19,9 @@ package kverify
|
|||
|
||||
import (
|
||||
"fmt"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/golang/glog"
|
||||
core "k8s.io/api/core/v1"
|
||||
meta "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/wait"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
|
@ -70,45 +68,3 @@ func WaitForSystemPods(r cruntime.Manager, bs bootstrapper.Bootstrapper, cfg con
|
|||
glog.Infof("duration metric: took %s to wait for pod list to return data ...", time.Since(pStart))
|
||||
return nil
|
||||
}
|
||||
|
||||
// ExpectedComponentsRunning returns whether or not all expected components are running
|
||||
func ExpectedComponentsRunning(cs *kubernetes.Clientset) error {
|
||||
expected := []string{
|
||||
"kube-dns", // coredns
|
||||
"etcd",
|
||||
"kube-apiserver",
|
||||
"kube-controller-manager",
|
||||
"kube-proxy",
|
||||
"kube-scheduler",
|
||||
}
|
||||
|
||||
found := map[string]bool{}
|
||||
|
||||
pods, err := cs.CoreV1().Pods("kube-system").List(meta.ListOptions{})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, pod := range pods.Items {
|
||||
glog.Infof("found pod: %s", podStatusMsg(pod))
|
||||
if pod.Status.Phase != core.PodRunning {
|
||||
continue
|
||||
}
|
||||
for k, v := range pod.ObjectMeta.Labels {
|
||||
if k == "component" || k == "k8s-app" {
|
||||
found[v] = true
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
missing := []string{}
|
||||
for _, e := range expected {
|
||||
if !found[e] {
|
||||
missing = append(missing, e)
|
||||
}
|
||||
}
|
||||
if len(missing) > 0 {
|
||||
return fmt.Errorf("missing components: %v", strings.Join(missing, ", "))
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
|
|
@ -1,12 +1,9 @@
|
|||
/*
|
||||
Copyright 2016 The Kubernetes Authors All rights reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
|
@ -341,18 +338,19 @@ func (k *Bootstrapper) client(ip string, port int) (*kubernetes.Clientset, error
|
|||
// WaitForNode blocks until the node appears to be healthy
|
||||
func (k *Bootstrapper) WaitForNode(cfg config.ClusterConfig, n config.Node, timeout time.Duration) error {
|
||||
start := time.Now()
|
||||
|
||||
if !n.ControlPlane {
|
||||
glog.Infof("%s is not a control plane, nothing to wait for", n.Name)
|
||||
return nil
|
||||
}
|
||||
if kverify.DontWait(cfg.WaitForCompos) {
|
||||
if !kverify.ShouldWait(cfg.WaitForCompos) {
|
||||
glog.Infof("skip waiting for components based on config.")
|
||||
return nil
|
||||
}
|
||||
|
||||
cr, err := cruntime.New(cruntime.Config{Type: cfg.KubernetesConfig.ContainerRuntime, Runner: k.c})
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "new cruntime")
|
||||
return err
|
||||
}
|
||||
|
||||
hostname, _, port, err := driver.ControlPaneEndpoint(&cfg, &n, cfg.Driver)
|
||||
|
@ -360,8 +358,8 @@ func (k *Bootstrapper) WaitForNode(cfg config.ClusterConfig, n config.Node, time
|
|||
return errors.Wrap(err, "get control plane endpoint")
|
||||
}
|
||||
|
||||
if cfg.WaitForCompos[kverify.APIServerWait] {
|
||||
client, err := k.client(ip, port)
|
||||
if cfg.WaitForCompos[kverify.APIServerWaitKey] {
|
||||
client, err := k.client(hostname, port)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "get k8s client")
|
||||
}
|
||||
|
@ -369,13 +367,13 @@ func (k *Bootstrapper) WaitForNode(cfg config.ClusterConfig, n config.Node, time
|
|||
return errors.Wrap(err, "wait for apiserver proc")
|
||||
}
|
||||
|
||||
if err := kverify.WaitForHealthyAPIServer(cr, k, cfg, k.c, client, start, ip, port, timeout); err != nil {
|
||||
if err := kverify.WaitForHealthyAPIServer(cr, k, cfg, k.c, client, start, hostname, port, timeout); err != nil {
|
||||
return errors.Wrap(err, "wait for healthy API server")
|
||||
}
|
||||
}
|
||||
|
||||
if cfg.WaitForCompos[kverify.SystemPodsWait] {
|
||||
client, err := k.client(ip, port)
|
||||
if cfg.WaitForCompos[kverify.SystemPodsWaitKey] {
|
||||
client, err := k.client(hostname, port)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "get k8s client")
|
||||
}
|
||||
|
@ -384,8 +382,8 @@ func (k *Bootstrapper) WaitForNode(cfg config.ClusterConfig, n config.Node, time
|
|||
}
|
||||
}
|
||||
|
||||
if cfg.WaitForCompos[kverify.DefaultServiceAccountWait] {
|
||||
client, err := k.client(ip, port)
|
||||
if cfg.WaitForCompos[kverify.DefaultSAWaitKey] {
|
||||
client, err := k.client(hostname, port)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "get k8s client")
|
||||
}
|
|
@ -156,7 +156,7 @@ func Start(cc config.ClusterConfig, n config.Node, existingAddons map[string]boo
|
|||
}
|
||||
|
||||
// Skip pre-existing, because we already waited for health
|
||||
if !kverify.DontWait(cc.WaitForCompos) && !preExists {
|
||||
if kverify.ShouldWait(cc.WaitForCompos) && !preExists {
|
||||
if err := bs.WaitForNode(cc, n, viper.GetDuration(waitTimeout)); err != nil {
|
||||
return nil, errors.Wrap(err, "Wait failed")
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue