#!/usr/bin/env bash # Copyright 2016 The Kubernetes Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Due to the GCE custom metadata size limit, we split the entire script into two # files configure.sh and configure-helper.sh. The functionality of downloading # kubernetes configuration, manifests, docker images, and binary files are # put in configure.sh, which is uploaded via GCE custom metadata. set -o errexit set -o nounset set -o pipefail ### Hardcoded constants DEFAULT_CNI_VERSION='v0.9.1' DEFAULT_CNI_HASH='b5a59660053a5f1a33b5dd5624d9ed61864482d9dc8e5b79c9b3afc3d6f62c9830e1c30f9ccba6ee76f5fb1ff0504e58984420cc0680b26cb643f1cb07afbd1c' DEFAULT_NPD_VERSION='v0.8.8' DEFAULT_NPD_HASH='ba8315a29368bfc33bdc602eb02d325b0b80e295c8739da35616de5b562c372bd297a2553f3ccd4daaecd67698b659b2c7068a2d2a0b9418ad29233fb75ff3f2' DEFAULT_CRICTL_VERSION='v1.21.0' DEFAULT_CRICTL_HASH='e4fb9822cb5f71ab8f85021c66170613aae972f4b32030e42868fb36a3bc3ea8642613df8542bf716fad903ed4d7528021ecb28b20c6330448cd2bd2b76bd776' DEFAULT_MOUNTER_TAR_SHA='7956fd42523de6b3107ddc3ce0e75233d2fcb78436ff07a1389b6eaac91fb2b1b72a08f7a219eaf96ba1ca4da8d45271002e0d60e0644e796c665f99bb356516' ### # Standard curl flags. CURL_FLAGS='--fail --silent --show-error --retry 5 --retry-delay 3 --connect-timeout 10 --retry-connrefused' function set-broken-motd { cat > /etc/motd < "${KUBE_HOME}/kube-env")" rm -f "${tmp_kube_env}" ) } function download-kubelet-config { local -r dest="$1" echo "Downloading Kubelet config file, if it exists" # Fetch kubelet config file from GCE metadata server. ( umask 077 local -r tmp_kubelet_config="/tmp/kubelet-config.yaml" # shellcheck disable=SC2086 retry-forever 10 curl ${CURL_FLAGS} \ -H "X-Google-Metadata-Request: True" \ -o "${tmp_kubelet_config}" \ http://metadata.google.internal/computeMetadata/v1/instance/attributes/kubelet-config # only write to the final location if curl succeeds mv "${tmp_kubelet_config}" "${dest}" ) } function download-kube-master-certs { # Fetch kube-env from GCE metadata server. ( umask 077 local -r tmp_kube_master_certs="/tmp/kube-master-certs.yaml" # shellcheck disable=SC2086 retry-forever 10 curl ${CURL_FLAGS} \ -H "X-Google-Metadata-Request: True" \ -o "${tmp_kube_master_certs}" \ http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-master-certs # Convert the yaml format file into a shell-style file. eval "$(python3 -c ''' import pipes,sys,yaml items = yaml.load(sys.stdin, Loader=yaml.BaseLoader).items() for k, v in items: print("readonly {var}={value}".format(var=k, value=pipes.quote(str(v)))) ''' < "${tmp_kube_master_certs}" > "${KUBE_HOME}/kube-master-certs")" rm -f "${tmp_kube_master_certs}" ) } function validate-hash { local -r file="$1" local -r expected="$2" actual_sha1=$(sha1sum "${file}" | awk '{ print $1 }') || true actual_sha512=$(sha512sum "${file}" | awk '{ print $1 }') || true if [[ "${actual_sha1}" != "${expected}" ]] && [[ "${actual_sha512}" != "${expected}" ]]; then echo "== ${file} corrupted, sha1 ${actual_sha1}/sha512 ${actual_sha512} doesn't match expected ${expected} ==" return 1 fi } # Get default service account credentials of the VM. GCE_METADATA_INTERNAL="http://metadata.google.internal/computeMetadata/v1/instance" function get-credentials { # shellcheck disable=SC2086 curl ${CURL_FLAGS} \ -H "Metadata-Flavor: Google" \ "${GCE_METADATA_INTERNAL}/service-accounts/default/token" \ | python3 -c 'import sys; import json; print(json.loads(sys.stdin.read())["access_token"])' } function valid-storage-scope { # shellcheck disable=SC2086 curl ${CURL_FLAGS} \ -H "Metadata-Flavor: Google" \ "${GCE_METADATA_INTERNAL}/service-accounts/default/scopes" \ | grep -E "auth/devstorage|auth/cloud-platform" } # Retry a download until we get it. Takes a hash and a set of URLs. # # $1 is the sha512/sha1 hash of the URL. Can be "" if the sha512/sha1 hash is unknown. # $2+ are the URLs to download. function download-or-bust { local -r hash="$1" shift 1 while true; do for url in "$@"; do local file="${url##*/}" rm -f "${file}" # if the url belongs to GCS API we should use oauth2_token in the headers local curl_headers="" if [[ "$url" =~ ^https://storage.googleapis.com.* ]] && valid-storage-scope ; then curl_headers="Authorization: Bearer $(get-credentials)" fi if ! curl ${curl_headers:+-H "${curl_headers}"} -f --ipv4 -Lo "${file}" --connect-timeout 20 --max-time 300 --retry 6 --retry-delay 10 --retry-connrefused "${url}"; then echo "== Failed to download ${url}. Retrying. ==" elif [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then echo "== Hash validation of ${url} failed. Retrying. ==" else if [[ -n "${hash}" ]]; then echo "== Downloaded ${url} (HASH = ${hash}) ==" else echo "== Downloaded ${url} ==" fi return fi done done } function is-preloaded { local -r key=$1 local -r value=$2 grep -qs "${key},${value}" "${KUBE_HOME}/preload_info" } function split-commas { echo -e "${1//,/'\n'}" } function remount-flexvolume-directory { local -r flexvolume_plugin_dir=$1 mkdir -p "$flexvolume_plugin_dir" mount --bind "$flexvolume_plugin_dir" "$flexvolume_plugin_dir" mount -o remount,exec "$flexvolume_plugin_dir" } function install-gci-mounter-tools { CONTAINERIZED_MOUNTER_HOME="${KUBE_HOME}/containerized_mounter" local -r mounter_tar_sha="${DEFAULT_MOUNTER_TAR_SHA}" if is-preloaded "mounter" "${mounter_tar_sha}"; then echo "mounter is preloaded." return fi echo "Downloading gci mounter tools." mkdir -p "${CONTAINERIZED_MOUNTER_HOME}" chmod a+x "${CONTAINERIZED_MOUNTER_HOME}" mkdir -p "${CONTAINERIZED_MOUNTER_HOME}/rootfs" download-or-bust "${mounter_tar_sha}" "https://storage.googleapis.com/kubernetes-release/gci-mounter/mounter.tar" cp "${KUBE_HOME}/kubernetes/server/bin/mounter" "${CONTAINERIZED_MOUNTER_HOME}/mounter" chmod a+x "${CONTAINERIZED_MOUNTER_HOME}/mounter" mv "${KUBE_HOME}/mounter.tar" /tmp/mounter.tar tar xf /tmp/mounter.tar -C "${CONTAINERIZED_MOUNTER_HOME}/rootfs" rm /tmp/mounter.tar mkdir -p "${CONTAINERIZED_MOUNTER_HOME}/rootfs/var/lib/kubelet" } # Install node problem detector binary. function install-node-problem-detector { if [[ -n "${NODE_PROBLEM_DETECTOR_VERSION:-}" ]]; then local -r npd_version="${NODE_PROBLEM_DETECTOR_VERSION}" local -r npd_hash="${NODE_PROBLEM_DETECTOR_TAR_HASH}" else local -r npd_version="${DEFAULT_NPD_VERSION}" local -r npd_hash="${DEFAULT_NPD_HASH}" fi local -r npd_tar="node-problem-detector-${npd_version}-${HOST_PLATFORM}_${HOST_ARCH}.tar.gz" if is-preloaded "${npd_tar}" "${npd_hash}"; then echo "${npd_tar} is preloaded." return fi echo "Downloading ${npd_tar}." local -r npd_release_path="${NODE_PROBLEM_DETECTOR_RELEASE_PATH:-https://storage.googleapis.com/kubernetes-release}" download-or-bust "${npd_hash}" "${npd_release_path}/node-problem-detector/${npd_tar}" local -r npd_dir="${KUBE_HOME}/node-problem-detector" mkdir -p "${npd_dir}" tar xzf "${KUBE_HOME}/${npd_tar}" -C "${npd_dir}" --overwrite mv "${npd_dir}/bin"/* "${KUBE_BIN}" chmod a+x "${KUBE_BIN}/node-problem-detector" rmdir "${npd_dir}/bin" rm -f "${KUBE_HOME}/${npd_tar}" } function install-cni-binaries { local -r cni_version=${CNI_VERSION:-$DEFAULT_CNI_VERSION} if [[ -n "${CNI_VERSION:-}" ]]; then local -r cni_hash="${CNI_HASH:-}" else local -r cni_hash="${DEFAULT_CNI_HASH}" fi local -r cni_tar="${CNI_TAR_PREFIX}${cni_version}.tgz" local -r cni_url="${CNI_STORAGE_URL_BASE}/${cni_version}/${cni_tar}" if is-preloaded "${cni_tar}" "${cni_hash}"; then echo "${cni_tar} is preloaded." return fi echo "Downloading cni binaries" download-or-bust "${cni_hash}" "${cni_url}" local -r cni_dir="${KUBE_HOME}/cni" mkdir -p "${cni_dir}/bin" tar xzf "${KUBE_HOME}/${cni_tar}" -C "${cni_dir}/bin" --overwrite mv "${cni_dir}/bin"/* "${KUBE_BIN}" rmdir "${cni_dir}/bin" rm -f "${KUBE_HOME}/${cni_tar}" } # Install crictl binary. # Assumptions: HOST_PLATFORM and HOST_ARCH are specified by calling detect_host_info. function install-crictl { if [[ -n "${CRICTL_VERSION:-}" ]]; then local -r crictl_version="${CRICTL_VERSION}" local -r crictl_hash="${CRICTL_TAR_HASH}" else local -r crictl_version="${DEFAULT_CRICTL_VERSION}" local -r crictl_hash="${DEFAULT_CRICTL_HASH}" fi local -r crictl="crictl-${crictl_version}-${HOST_PLATFORM}-${HOST_ARCH}.tar.gz" # Create crictl config file. cat > /etc/crictl.yaml </dev/null 2>&1; then echo "Unable to automatically install docker. Bailing out..." return fi # Install Docker deps, some of these are already installed in the image but # that's fine since they won't re-install and we can reuse the code below # for another image someday. apt-get update apt-get install -y --no-install-recommends \ apt-transport-https \ ca-certificates \ socat \ curl \ gnupg2 \ software-properties-common \ lsb-release release=$(lsb_release -cs) # Add the Docker apt-repository # shellcheck disable=SC2086 curl ${CURL_FLAGS} \ --location \ "https://download.docker.com/${HOST_PLATFORM}/$(. /etc/os-release; echo "$ID")/gpg" \ | apt-key add - add-apt-repository \ "deb [arch=${HOST_ARCH}] https://download.docker.com/${HOST_PLATFORM}/$(. /etc/os-release; echo "$ID") \ $release stable" # Install Docker apt-get update && \ apt-get install -y --no-install-recommends "${GCI_DOCKER_VERSION:-"docker-ce=5:19.03.*"}" rm -rf /var/lib/apt/lists/* } # If we are on ubuntu we can try to install containerd function install-containerd-ubuntu { # bailout if we are not on ubuntu if [[ -z "$(command -v lsb_release)" || $(lsb_release -si) != "Ubuntu" ]]; then echo "Unable to automatically install containerd in non-ubuntu image. Bailing out..." exit 2 fi # Install dependencies, some of these are already installed in the image but # that's fine since they won't re-install and we can reuse the code below # for another image someday. apt-get update apt-get install -y --no-install-recommends \ apt-transport-https \ ca-certificates \ socat \ curl \ gnupg2 \ software-properties-common \ lsb-release release=$(lsb_release -cs) # Add the Docker apt-repository (as we install containerd from there) # shellcheck disable=SC2086 curl ${CURL_FLAGS} \ --location \ "https://download.docker.com/${HOST_PLATFORM}/$(. /etc/os-release; echo "$ID")/gpg" \ | apt-key add - add-apt-repository \ "deb [arch=${HOST_ARCH}] https://download.docker.com/${HOST_PLATFORM}/$(. /etc/os-release; echo "$ID") \ $release stable" # Install containerd from Docker repo apt-get update && \ apt-get install -y --no-install-recommends containerd rm -rf /var/lib/apt/lists/* # Override to latest versions of containerd and runc systemctl stop containerd if [[ -n "${UBUNTU_INSTALL_CONTAINERD_VERSION:-}" ]]; then # TODO(https://github.com/containerd/containerd/issues/2901): Remove this check once containerd has arm64 release. if [[ $(dpkg --print-architecture) != "amd64" ]]; then echo "Unable to automatically install containerd in non-amd64 image. Bailing out..." exit 2 fi # containerd versions have slightly different url(s), so try both # shellcheck disable=SC2086 ( curl ${CURL_FLAGS} \ --location \ "https://github.com/containerd/containerd/releases/download/${UBUNTU_INSTALL_CONTAINERD_VERSION}/containerd-${UBUNTU_INSTALL_CONTAINERD_VERSION:1}-${HOST_PLATFORM}-${HOST_ARCH}.tar.gz" \ || curl ${CURL_FLAGS} \ --location \ "https://github.com/containerd/containerd/releases/download/${UBUNTU_INSTALL_CONTAINERD_VERSION}/containerd-${UBUNTU_INSTALL_CONTAINERD_VERSION:1}.${HOST_PLATFORM}-${HOST_ARCH}.tar.gz" ) \ | tar --overwrite -xzv -C /usr/ fi if [[ -n "${UBUNTU_INSTALL_RUNC_VERSION:-}" ]]; then # TODO: Remove this check once runc has arm64 release. if [[ $(dpkg --print-architecture) != "amd64" ]]; then echo "Unable to automatically install runc in non-amd64. Bailing out..." exit 2 fi # shellcheck disable=SC2086 curl ${CURL_FLAGS} \ --location \ "https://github.com/opencontainers/runc/releases/download/${UBUNTU_INSTALL_RUNC_VERSION}/runc.${HOST_ARCH}" --output /usr/sbin/runc \ && chmod 755 /usr/sbin/runc fi sudo systemctl start containerd } function ensure-container-runtime { container_runtime="${CONTAINER_RUNTIME:-docker}" if [[ "${container_runtime}" == "docker" ]]; then if ! command -v docker >/dev/null 2>&1; then install-docker if ! command -v docker >/dev/null 2>&1; then echo "ERROR docker not found. Aborting." exit 2 fi fi docker version elif [[ "${container_runtime}" == "containerd" ]]; then # Install containerd/runc if requested if [[ -n "${UBUNTU_INSTALL_CONTAINERD_VERSION:-}" || -n "${UBUNTU_INSTALL_RUNC_VERSION:-}" ]]; then install-containerd-ubuntu fi # Verify presence and print versions of ctr, containerd, runc if ! command -v ctr >/dev/null 2>&1; then echo "ERROR ctr not found. Aborting." exit 2 fi ctr --version if ! command -v containerd >/dev/null 2>&1; then echo "ERROR containerd not found. Aborting." exit 2 fi containerd --version if ! command -v runc >/dev/null 2>&1; then echo "ERROR runc not found. Aborting." exit 2 fi runc --version fi } # Downloads kubernetes binaries and kube-system manifest tarball, unpacks them, # and places them into suitable directories. Files are placed in /home/kubernetes. function install-kube-binary-config { cd "${KUBE_HOME}" local server_binary_tar_urls while IFS= read -r url; do server_binary_tar_urls+=("$url") done < <(split-commas "${SERVER_BINARY_TAR_URL}") local -r server_binary_tar="${server_binary_tar_urls[0]##*/}" if [[ -n "${SERVER_BINARY_TAR_HASH:-}" ]]; then local -r server_binary_tar_hash="${SERVER_BINARY_TAR_HASH}" else echo "Downloading binary release sha512 (not found in env)" download-or-bust "" "${server_binary_tar_urls[@]/.tar.gz/.tar.gz.sha512}" local -r server_binary_tar_hash=$(cat "${server_binary_tar}.sha512") fi if is-preloaded "${server_binary_tar}" "${server_binary_tar_hash}"; then echo "${server_binary_tar} is preloaded." else echo "Downloading binary release tar" download-or-bust "${server_binary_tar_hash}" "${server_binary_tar_urls[@]}" tar xzf "${KUBE_HOME}/${server_binary_tar}" -C "${KUBE_HOME}" --overwrite # Copy docker_tag and image files to ${KUBE_HOME}/kube-docker-files. local -r src_dir="${KUBE_HOME}/kubernetes/server/bin" local dst_dir="${KUBE_HOME}/kube-docker-files" mkdir -p "${dst_dir}" cp "${src_dir}/"*.docker_tag "${dst_dir}" if [[ "${KUBERNETES_MASTER:-}" == "false" ]]; then cp "${src_dir}/kube-proxy.tar" "${dst_dir}" else cp "${src_dir}/kube-apiserver.tar" "${dst_dir}" cp "${src_dir}/kube-controller-manager.tar" "${dst_dir}" cp "${src_dir}/kube-scheduler.tar" "${dst_dir}" cp -r "${KUBE_HOME}/kubernetes/addons" "${dst_dir}" fi load-docker-images mv "${src_dir}/kubelet" "${KUBE_BIN}" mv "${src_dir}/kubectl" "${KUBE_BIN}" # Some older images have LICENSES baked-in as a file. Presumably they will # have the directory baked-in eventually. rm -rf "${KUBE_HOME}"/LICENSES mv "${KUBE_HOME}/kubernetes/LICENSES" "${KUBE_HOME}" mv "${KUBE_HOME}/kubernetes/kubernetes-src.tar.gz" "${KUBE_HOME}" fi if [[ "${KUBERNETES_MASTER:-}" == "false" ]] && \ [[ "${ENABLE_NODE_PROBLEM_DETECTOR:-}" == "standalone" ]]; then install-node-problem-detector fi if [[ "${NETWORK_PROVIDER:-}" == "kubenet" ]] || \ [[ "${NETWORK_PROVIDER:-}" == "cni" ]]; then install-cni-binaries fi # Put kube-system pods manifests in ${KUBE_HOME}/kube-manifests/. install-kube-manifests chmod -R 755 "${KUBE_BIN}" # Install gci mounter related artifacts to allow mounting storage volumes in GCI install-gci-mounter-tools # Remount the Flexvolume directory with the "exec" option, if needed. if [[ "${REMOUNT_VOLUME_PLUGIN_DIR:-}" == "true" && -n "${VOLUME_PLUGIN_DIR:-}" ]]; then remount-flexvolume-directory "${VOLUME_PLUGIN_DIR}" fi # Install crictl on each node. install-crictl # TODO(awly): include the binary and license in the OS image. install-exec-auth-plugin # Clean up. rm -rf "${KUBE_HOME}/kubernetes" rm -f "${KUBE_HOME}/${server_binary_tar}" rm -f "${KUBE_HOME}/${server_binary_tar}.sha512" } # This function detects the platform/arch of the machine where the script runs, # and sets the HOST_PLATFORM and HOST_ARCH environment variables accordingly. # Callers can specify HOST_PLATFORM_OVERRIDE and HOST_ARCH_OVERRIDE to skip the detection. # This function is adapted from the detect_client_info function in cluster/get-kube-binaries.sh # and kube::util::host_os, kube::util::host_arch functions in hack/lib/util.sh # This function should be synced with detect_host_info in ./configure-helper.sh function detect_host_info() { HOST_PLATFORM=${HOST_PLATFORM_OVERRIDE:-"$(uname -s)"} case "${HOST_PLATFORM}" in Linux|linux) HOST_PLATFORM="linux" ;; *) echo "Unknown, unsupported platform: ${HOST_PLATFORM}." >&2 echo "Supported platform(s): linux." >&2 echo "Bailing out." >&2 exit 2 esac HOST_ARCH=${HOST_ARCH_OVERRIDE:-"$(uname -m)"} case "${HOST_ARCH}" in x86_64*|i?86_64*|amd64*) HOST_ARCH="amd64" ;; aHOST_arch64*|aarch64*|arm64*) HOST_ARCH="arm64" ;; *) echo "Unknown, unsupported architecture (${HOST_ARCH})." >&2 echo "Supported architecture(s): amd64 and arm64." >&2 echo "Bailing out." >&2 exit 2 ;; esac } # Retries a command forever with a delay between retries. # Args: # $1 : delay between retries, in seconds. # $2... : the command to run. function retry-forever { local -r delay="$1" shift 1 until "$@"; do echo "== $* failed, retrying after ${delay}s" sleep "${delay}" done } # Initializes variables used by the log-* functions. # # get-metadata-value must be defined before calling this function. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-init { # Used by log-* functions. LOG_CLUSTER_ID=$(get-metadata-value 'instance/attributes/cluster-uid' 'get-metadata-value-error') LOG_INSTANCE_NAME=$(hostname) LOG_BOOT_ID=$(journalctl --list-boots | grep -E '^ *0' | awk '{print $2}') declare -Ag LOG_START_TIMES declare -ag LOG_TRAP_STACK LOG_STATUS_STARTED='STARTED' LOG_STATUS_COMPLETED='COMPLETED' LOG_STATUS_ERROR='ERROR' } # Sets an EXIT trap. # Args: # $1:... : the trap command. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-trap-push { local t="${*:1}" LOG_TRAP_STACK+=("${t}") # shellcheck disable=2064 trap "${t}" EXIT } # Removes and restores an EXIT trap. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-trap-pop { # Remove current trap. unset 'LOG_TRAP_STACK[-1]' # Restore previous trap. if [ ${#LOG_TRAP_STACK[@]} -ne 0 ]; then local t="${LOG_TRAP_STACK[-1]}" # shellcheck disable=2064 trap "${t}" EXIT else # If no traps in stack, clear. trap EXIT fi } # Logs the end of a bootstrap step that errored. # Args: # $1 : bootstrap step name. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-error { local bootstep="$1" log-proto "${bootstep}" "${LOG_STATUS_ERROR}" "encountered non-zero exit code" } # Wraps a command with bootstrap logging. # Args: # $1 : bootstrap step name. # $2... : the command to run. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-wrap { local bootstep="$1" local command="${*:2}" log-trap-push "log-error ${bootstep}" log-proto "${bootstep}" "${LOG_STATUS_STARTED}" $command log-proto "${bootstep}" "${LOG_STATUS_COMPLETED}" log-trap-pop } # Logs a bootstrap step start. Prefer log-wrap. # Args: # $1 : bootstrap step name. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-start { local bootstep="$1" log-trap-push "log-error ${bootstep}" log-proto "${bootstep}" "${LOG_STATUS_STARTED}" } # Logs a bootstrap step end. Prefer log-wrap. # Args: # $1 : bootstrap step name. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-end { local bootstep="$1" log-proto "${bootstep}" "${LOG_STATUS_COMPLETED}" log-trap-pop } # Writes a log proto to stdout. # Args: # $1: bootstrap step name. # $2: status. Either 'STARTED', 'COMPLETED', or 'ERROR'. # $3: optional status reason. # # NOTE: this function is duplicated in configure-helper.sh, any changes here # should be duplicated there as well. function log-proto { local bootstep="$1" local status="$2" local status_reason="${3:-}" # Get current time. local current_time current_time="$(date --utc '+%s.%N')" # ...formatted as UTC RFC 3339. local timestamp timestamp="$(date --utc --date="@${current_time}" '+%FT%T.%NZ')" # Calculate latency. local latency='null' if [ "${status}" == "${LOG_STATUS_STARTED}" ]; then LOG_START_TIMES["${bootstep}"]="${current_time}" else local start_time="${LOG_START_TIMES["${bootstep}"]}" unset 'LOG_START_TIMES['"${bootstep}"']' # Bash cannot do non-integer math, shell out to awk. latency="$(echo "${current_time} ${start_time}" | awk '{print $1 - $2}')s" # The default latency is null which cannot be wrapped as a string so we must # do it here instead of the printf. latency="\"${latency}\"" fi printf '[cloud.kubernetes.monitoring.proto.SerialportLog] {"cluster_hash":"%s","vm_instance_name":"%s","boot_id":"%s","timestamp":"%s","bootstrap_status":{"step_name":"%s","status":"%s","status_reason":"%s","latency":%s}}\n' \ "${LOG_CLUSTER_ID}" "${LOG_INSTANCE_NAME}" "${LOG_BOOT_ID}" "${timestamp}" "${bootstep}" "${status}" "${status_reason}" "${latency}" } ######### Main Function ########## log-init log-start 'ConfigureMain' echo "Start to install kubernetes files" log-wrap 'DetectHostInfo' detect_host_info # if install fails, message-of-the-day (motd) will warn at login shell log-wrap 'SetBrokenMotd' set-broken-motd KUBE_HOME="/home/kubernetes" KUBE_BIN="${KUBE_HOME}/bin" # download and source kube-env log-wrap 'DownloadKubeEnv' download-kube-env log-wrap 'SourceKubeEnv' source "${KUBE_HOME}/kube-env" log-wrap 'DownloadKubeletConfig' download-kubelet-config "${KUBE_HOME}/kubelet-config.yaml" # master certs if [[ "${KUBERNETES_MASTER:-}" == "true" ]]; then log-wrap 'DownloadKubeMasterCerts' download-kube-master-certs fi # ensure chosen container runtime is present log-wrap 'EnsureContainerRuntime' ensure-container-runtime # binaries and kube-system manifests log-wrap 'InstallKubeBinaryConfig' install-kube-binary-config echo "Done for installing kubernetes files" log-end 'ConfigureMain'