forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
types.go
238 lines (222 loc) · 7.86 KB
/
types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
package cmd
import (
"bytes"
"fmt"
"io"
"strings"
"github.com/MakeNowJust/heredoc"
"github.com/spf13/cobra"
"github.com/openshift/origin/pkg/cmd/templates"
"github.com/openshift/origin/pkg/cmd/util/clientcmd"
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
)
type concept struct {
Name string
Abbreviation string
Description string
}
var concepts = []concept{
{
"Containers",
"",
heredoc.Doc(`
A definition of how to run one or more processes inside of a portable Linux
environment. Containers are started from an Image and are usually isolated
from other containers on the same machine.
`),
},
{
"Image",
"",
heredoc.Doc(`
A layered Linux filesystem that contains application code, dependencies,
and any supporting operating system libraries. An image is identified by
a name that can be local to the current cluster or point to a remote Docker
registry (a storage server for images).
`),
}, {
"Pods",
"pod",
heredoc.Doc(`
A set of one or more containers that are deployed onto a Node together and
share a unique IP and Volumes (persistent storage). Pods also define the
security and runtime policy for each container.
`),
}, {
"Labels",
"",
heredoc.Doc(`
Labels are key value pairs that can be assigned to any resource in the
system for grouping and selection. Many resources use labels to identify
sets of other resources.
`),
}, {
"Volumes",
"",
heredoc.Doc(`
Containers are not persistent by default - on restart their contents are
cleared. Volumes are mounted filesystems available to Pods and their
containers which may be backed by a number of host-local or network
attached storage endpoints. The simplest volume type is EmptyDir, which
is a temporary directory on a single machine. Administrators may also
allow you to request a Persistent Volume that is automatically attached
to your pods.
`),
}, {
"Nodes",
"node",
heredoc.Doc(`
Machines set up in the cluster to run containers. Usually managed
by administrators and not by end users.
`),
}, {
"Services",
"svc",
heredoc.Doc(`
A name representing a set of pods (or external servers) that are
accessed by other pods. The service gets an IP and a DNS name, and can be
exposed externally to the cluster via a port or a Route. It's also easy
to consume services from pods because an environment variable with the
name <SERVICE>_HOST is automatically injected into other pods.
`),
}, {
"Routes",
"route",
heredoc.Doc(`
A route is an external DNS entry (either a top level domain or a
dynamically allocated name) that is created to point to a service so that
it can be accessed outside the cluster. The administrator may configure
one or more Routers to handle those routes, typically through an Apache
or HAProxy load balancer / proxy.
`),
},
{
"Replication Controllers",
"rc",
heredoc.Doc(`
A replication controller maintains a specific number of pods based on a
template that match a set of labels. If pods are deleted (because the
node they run on is taken out of service) the controller creates a new
copy of that pod. A replication controller is most commonly used to
represent a single deployment of part of an application based on a
built image.
`),
},
{
"Deployment Configuration",
"dc",
heredoc.Doc(`
Defines the template for a pod and manages deploying new images or
configuration changes whenever those change. A single deployment
configuration is usually analogous to a single micro-service. Can support
many different deployment patterns, including full restart, customizable
rolling updates, and fully custom behaviors, as well as pre- and post-
hooks. Each deployment is represented as a replication controller.
`),
},
{
"Build Configuration",
"bc",
heredoc.Doc(`
Contains a description of how to build source code and a base image into a
new image - the primary method for delivering changes to your application.
Builds can be source based and use builder images for common languages like
Java, PHP, Ruby, or Python, or be Docker based and create builds from a
Dockerfile. Each build configuration has web-hooks and can be triggered
automatically by changes to their base images.
`),
},
{
"Builds",
"build",
heredoc.Doc(`
Builds create a new image from source code, other images, Dockerfiles, or
binary input. A build is run inside of a container and has the same
restrictions normal pods have. A build usually results in an image pushed
to a Docker registry, but you can also choose to run a post-build test that
does not push an image.
`),
},
{
"Image Streams and Image Stream Tags",
"is,istag",
heredoc.Doc(`
An image stream groups sets of related images under tags - analogous to a
branch in a source code repository. Each image stream may have one or
more tags (the default tag is called "latest") and those tags may point
at external Docker registries, at other tags in the same stream, or be
controlled to directly point at known images. In addition, images can be
pushed to an image stream tag directly via the integrated Docker
registry.
`),
},
{
"Secrets",
"secret",
heredoc.Doc(`
The secret resource can hold text or binary secrets for delivery into
your pods. By default, every container is given a single secret which
contains a token for accessing the API (with limited privileges) at
/var/run/secrets/kubernetes.io/serviceaccount. You can create new
secrets and mount them in your own pods, as well as reference secrets
from builds (for connecting to remote servers) or use them to import
remote images into an image stream.
`),
},
{
"Projects",
"project",
heredoc.Doc(`
All of the above resources (except Nodes) exist inside of a project.
Projects have a list of members and their roles, like viewer, editor,
or admin, as well as a set of security controls on the running pods, and
limits on how many resources the project can use. The names of each
resource are unique within a project. Developers may request projects
be created, but administrators control the resources allocated to
projects.
`),
},
}
func writeConcept(w io.Writer, c concept) {
fmt.Fprintf(w, "* %s", c.Name)
if len(c.Abbreviation) > 0 {
fmt.Fprintf(w, " [%s]", c.Abbreviation)
}
fmt.Fprintln(w, ":")
for _, s := range strings.Split(c.Description, "\n") {
fmt.Fprintf(w, " %s\n", s)
}
}
var (
typesLong = templates.LongDesc(`
Concepts and Types
Kubernetes and OpenShift help developers and operators build, test, and deploy
applications in a containerized cloud environment. Applications may be composed
of all of the components below, although most developers will be concerned with
Services, Deployments, and Builds for delivering changes.
Concepts:
%[1]sFor more, see https://docs.openshift.com`)
typesExample = templates.Examples(`
# View all projects you have access to
%[1]s get projects
# See a list of all services in the current project
%[1]s get svc
# Describe a deployment configuration in detail
%[1]s describe dc mydeploymentconfig
# Show the images tagged into an image stream
%[1]s describe is ruby-centos7`)
)
func NewCmdTypes(fullName string, f *clientcmd.Factory, out io.Writer) *cobra.Command {
buf := &bytes.Buffer{}
for _, c := range concepts {
writeConcept(buf, c)
}
cmd := &cobra.Command{
Use: "types",
Short: "An introduction to concepts and types",
Long: fmt.Sprintf(typesLong, buf.String()),
Example: fmt.Sprintf(typesExample, fullName),
Run: kcmdutil.DefaultSubCommandRun(out),
}
return cmd
}