-
Notifications
You must be signed in to change notification settings - Fork 290
/
apiserver.go
122 lines (102 loc) · 3.49 KB
/
apiserver.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
/*
Copyright 2016 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package apiserver
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/runtime/serializer"
"k8s.io/apimachinery/pkg/version"
"k8s.io/apiserver/pkg/authorization/authorizerfactory"
genericapiserver "k8s.io/apiserver/pkg/server"
)
func NewScheme() *runtime.Scheme {
scheme := runtime.NewScheme()
// we need to add the options to empty v1
// TODO fix the server code to avoid this
metav1.AddToGroupVersion(scheme, schema.GroupVersion{Version: "v1"})
// TODO: keep the generic API server from wanting this
unversioned := schema.GroupVersion{Group: "", Version: "v1"}
scheme.AddUnversionedTypes(unversioned,
&metav1.Status{},
&metav1.APIVersions{},
&metav1.APIGroupList{},
&metav1.APIGroup{},
&metav1.APIResourceList{},
)
return scheme
}
// ExtraConfig holds custom apiserver config
type ExtraConfig struct {
Scheme *runtime.Scheme
Codecs serializer.CodecFactory
APIs map[schema.GroupVersionResource]StorageProvider
ServingInfo *genericapiserver.DeprecatedInsecureServingInfo
Version *version.Info
}
// Config defines the config for the apiserver
type Config struct {
GenericConfig *genericapiserver.RecommendedConfig
ExtraConfig ExtraConfig
}
// TiltServer contains state for a Kubernetes cluster master/api server.
type TiltServer struct {
GenericAPIServer *genericapiserver.GenericAPIServer
}
type completedConfig struct {
GenericConfig genericapiserver.CompletedConfig
ExtraConfig *ExtraConfig
}
// CompletedConfig embeds a private pointer that cannot be instantiated outside of this package.
type CompletedConfig struct {
*completedConfig
}
// Complete fills in any fields not set that are required to have valid data. It's mutating the receiver.
func (cfg *Config) Complete() CompletedConfig {
c := completedConfig{
cfg.GenericConfig.Complete(),
&cfg.ExtraConfig,
}
c.GenericConfig.Authorization = genericapiserver.AuthorizationInfo{
Authorizer: authorizerfactory.NewAlwaysAllowAuthorizer(),
}
c.GenericConfig.Authentication = genericapiserver.AuthenticationInfo{
Authenticator: genericapiserver.InsecureSuperuser{},
}
c.GenericConfig.Version = &version.Info{
Major: "1",
Minor: "0",
}
return CompletedConfig{&c}
}
// New returns a new instance of TiltServer from the given config.
func (c completedConfig) New() (*TiltServer, error) {
genericServer, err := c.GenericConfig.New("tilt-apiserver", genericapiserver.NewEmptyDelegate())
if err != nil {
return nil, err
}
s := &TiltServer{
GenericAPIServer: genericServer,
}
// Add new APIs through inserting into APIs
apiGroups, err := buildAPIGroupInfos(c.ExtraConfig.Scheme, c.ExtraConfig.Codecs, c.ExtraConfig.APIs, c.GenericConfig.RESTOptionsGetter)
if err != nil {
return nil, err
}
for _, apiGroup := range apiGroups {
if err := s.GenericAPIServer.InstallAPIGroup(apiGroup); err != nil {
return nil, err
}
}
return s, nil
}