129
129
130
130
# set feature gates if enable Pod priority and preemption
131
131
if [ " ${ENABLE_POD_PRIORITY_PREEMPTION} " == true ]; then
132
- FEATURE_GATES=" $FEATURE_GATES ,PodPriority=true"
132
+ FEATURE_GATES=" ${ FEATURE_GATES} ,PodPriority=true"
133
133
fi
134
134
135
135
# warn if users are running with swap allowed
@@ -169,15 +169,15 @@ function guess_built_binary_path {
169
169
GO_OUT=${GO_OUT:- }
170
170
while getopts " ho:O" OPTION
171
171
do
172
- case $OPTION in
172
+ case ${ OPTION} in
173
173
o)
174
174
echo " skipping build"
175
- GO_OUT=" $OPTARG "
176
- echo " using source $GO_OUT "
175
+ GO_OUT=" ${ OPTARG} "
176
+ echo " using source ${ GO_OUT} "
177
177
;;
178
178
O)
179
179
GO_OUT=$( guess_built_binary_path)
180
- if [ " $GO_OUT " == " " ]; then
180
+ if [ " ${ GO_OUT} " == " " ]; then
181
181
echo " Could not guess the correct output directory to use."
182
182
exit 1
183
183
fi
193
193
esac
194
194
done
195
195
196
- if [ " x$GO_OUT " == " x" ]; then
196
+ if [ " x${ GO_OUT} " == " x" ]; then
197
197
make -C " ${KUBE_ROOT} " WHAT=" cmd/kubectl cmd/hyperkube"
198
198
else
199
199
echo " skipped the build."
@@ -263,20 +263,20 @@ function test_apiserver_off {
263
263
# For the common local scenario, fail fast if server is already running.
264
264
# this can happen if you run local-up-cluster.sh twice and kill etcd in between.
265
265
if [[ " ${API_PORT} " -gt " 0" ]]; then
266
- curl --silent -g $API_HOST : $ API_PORT
266
+ curl --silent -g ${ API_HOST} : ${ API_PORT}
267
267
if [ ! $? -eq 0 ]; then
268
268
echo " API SERVER insecure port is free, proceeding..."
269
269
else
270
- echo " ERROR starting API SERVER, exiting. Some process on $API_HOST is serving already on $API_PORT "
270
+ echo " ERROR starting API SERVER, exiting. Some process on ${ API_HOST} is serving already on ${ API_PORT} "
271
271
exit 1
272
272
fi
273
273
fi
274
274
275
- curl --silent -k -g $API_HOST : $ API_SECURE_PORT
275
+ curl --silent -k -g ${ API_HOST} : ${ API_SECURE_PORT}
276
276
if [ ! $? -eq 0 ]; then
277
277
echo " API SERVER secure port is free, proceeding..."
278
278
else
279
- echo " ERROR starting API SERVER, exiting. Some process on $API_HOST is serving already on $API_SECURE_PORT "
279
+ echo " ERROR starting API SERVER, exiting. Some process on ${ API_HOST} is serving already on ${ API_SECURE_PORT} "
280
280
exit 1
281
281
fi
282
282
}
@@ -335,9 +335,9 @@ function detect_binary {
335
335
336
336
cleanup_dockerized_kubelet ()
337
337
{
338
- if [[ -e $KUBELET_CIDFILE ]]; then
339
- docker kill $( < $KUBELET_CIDFILE ) > /dev/null
340
- rm -f $KUBELET_CIDFILE
338
+ if [[ -e ${ KUBELET_CIDFILE} ]]; then
339
+ docker kill $( < ${ KUBELET_CIDFILE} ) > /dev/null
340
+ rm -f ${ KUBELET_CIDFILE}
341
341
342
342
# Save the docker logs
343
343
if [[ -f /var/log/docker.log ]]; then
@@ -367,7 +367,7 @@ cleanup()
367
367
[[ -n " ${CTLRMGR_PID-} " ]] && CTLRMGR_PIDS=$( pgrep -P ${CTLRMGR_PID} ; ps -o pid= -p ${CTLRMGR_PID} )
368
368
[[ -n " ${CTLRMGR_PIDS-} " ]] && sudo kill ${CTLRMGR_PIDS} 2> /dev/null
369
369
370
- if [[ -n " $DOCKERIZE_KUBELET " ]]; then
370
+ if [[ -n " ${ DOCKERIZE_KUBELET} " ]]; then
371
371
cleanup_dockerized_kubelet
372
372
else
373
373
# Check if the kubelet is still running
@@ -404,7 +404,7 @@ function healthcheck {
404
404
CTLRMGR_PID=
405
405
fi
406
406
407
- if [[ -n " $DOCKERIZE_KUBELET " ]]; then
407
+ if [[ -n " ${ DOCKERIZE_KUBELET} " ]]; then
408
408
# TODO (https://github.com/kubernetes/kubernetes/issues/62474): check health also in this case
409
409
:
410
410
elif [[ -n " ${KUBELET_PID-} " ]] && ! sudo kill -0 ${KUBELET_PID} 2> /dev/null; then
@@ -648,11 +648,11 @@ function start_controller_manager {
648
648
--pvclaimbinder-sync-period=" ${CLAIM_BINDER_SYNC_PERIOD} " \
649
649
--feature-gates=" ${FEATURE_GATES} " \
650
650
${cloud_config_arg} \
651
- --kubeconfig " $CERT_DIR " /controller.kubeconfig \
651
+ --kubeconfig " ${ CERT_DIR} " /controller.kubeconfig \
652
652
--use-service-account-credentials \
653
653
--controllers=" ${KUBE_CONTROLLERS} " \
654
654
--leader-elect=false \
655
- --cert-dir=" $CERT_DIR " \
655
+ --cert-dir=" ${ CERT_DIR} " \
656
656
--master=" https://${API_HOST} :${API_SECURE_PORT} " > " ${CTLRMGR_LOG} " 2>&1 &
657
657
CTLRMGR_PID=$!
658
658
}
@@ -680,7 +680,7 @@ function start_cloud_controller_manager {
680
680
--feature-gates=" ${FEATURE_GATES} " \
681
681
--cloud-provider=${CLOUD_PROVIDER} \
682
682
--cloud-config=${CLOUD_CONFIG} \
683
- --kubeconfig " $CERT_DIR " /controller.kubeconfig \
683
+ --kubeconfig " ${ CERT_DIR} " /controller.kubeconfig \
684
684
--use-service-account-credentials \
685
685
--leader-elect=false \
686
686
--master=" https://${API_HOST} :${API_SECURE_PORT} " > " ${CLOUD_CTLRMGR_LOG} " 2>&1 &
@@ -763,7 +763,7 @@ function start_kubelet {
763
763
--hostname-override=" ${HOSTNAME_OVERRIDE} "
764
764
${cloud_config_arg}
765
765
--address=" ${KUBELET_HOST} "
766
- --kubeconfig " $CERT_DIR " /kubelet.kubeconfig
766
+ --kubeconfig " ${ CERT_DIR} " /kubelet.kubeconfig
767
767
--feature-gates=" ${FEATURE_GATES} "
768
768
--cpu-cfs-quota=" ${CPU_CFS_QUOTA} "
769
769
--enable-controller-attach-detach=" ${ENABLE_CONTROLLER_ATTACH_DETACH} "
@@ -782,7 +782,7 @@ function start_kubelet {
782
782
${net_plugin_args}
783
783
${container_runtime_endpoint_args}
784
784
${image_service_endpoint_args}
785
- --port=" $KUBELET_PORT "
785
+ --port=" ${ KUBELET_PORT} "
786
786
${KUBELET_FLAGS}
787
787
)
788
788
@@ -792,7 +792,7 @@ function start_kubelet {
792
792
else
793
793
794
794
# Build the hyperkube container image if necessary
795
- if [[ -z " $KUBELET_IMAGE " && -n " $DOCKERIZE_KUBELET " ]]; then
795
+ if [[ -z " ${ KUBELET_IMAGE} " && -n " ${ DOCKERIZE_KUBELET} " ]]; then
796
796
HYPERKUBE_BIN=" ${GO_OUT} /hyperkube" REGISTRY=" k8s.gcr.io" VERSION=" latest" make -C " ${KUBE_ROOT} /cluster/images/hyperkube" build
797
797
KUBELET_IMAGE=" k8s.gcr.io/hyperkube-amd64:latest"
798
798
fi
@@ -841,15 +841,15 @@ function start_kubelet {
841
841
--pid=host \
842
842
--privileged=true \
843
843
-i \
844
- --cidfile=$KUBELET_CIDFILE \
844
+ --cidfile=${ KUBELET_CIDFILE} \
845
845
" ${KUBELET_IMAGE} " \
846
846
/kubelet " ${all_kubelet_flags[@]} " > " ${KUBELET_LOG} " 2>&1 &
847
847
# Get PID of kubelet container.
848
848
for i in {1..3}; do
849
849
echo -n " Trying to get PID of kubelet container..."
850
850
KUBELET_PID=$( docker inspect kubelet -f ' {{.State.Pid}}' 2> /dev/null || true)
851
851
if [[ -n ${KUBELET_PID} && ${KUBELET_PID} -gt 0 ]]; then
852
- echo " ok, $KUBELET_PID ."
852
+ echo " ok, ${ KUBELET_PID} ."
853
853
break
854
854
else
855
855
echo " failed, retry in 1 second."
@@ -858,8 +858,8 @@ function start_kubelet {
858
858
done
859
859
fi
860
860
# Quick check that kubelet is running.
861
- if [ -n " $KUBELET_PID " ] && ps -p $KUBELET_PID > /dev/null; then
862
- echo " kubelet ( $KUBELET_PID ) is running."
861
+ if [ -n " ${ KUBELET_PID} " ] && ps -p ${ KUBELET_PID} > /dev/null; then
862
+ echo " kubelet ( ${ KUBELET_PID} ) is running."
863
863
else
864
864
cat ${KUBELET_LOG} ; exit 1
865
865
fi
882
882
# foo: true
883
883
# bar: false
884
884
for gate in $( echo ${FEATURE_GATES} | tr ' ,' ' ' ) ; do
885
- echo $gate | ${SED} -e ' s/\(.*\)=\(.*\)/ \1: \2/'
885
+ echo ${ gate} | ${SED} -e ' s/\(.*\)=\(.*\)/ \1: \2/'
886
886
done
887
887
fi >> /tmp/kube-proxy.yaml
888
888
896
896
${CONTROLPLANE_SUDO} " ${GO_OUT} /hyperkube" scheduler \
897
897
--v=${LOG_LEVEL} \
898
898
--leader-elect=false \
899
- --kubeconfig " $CERT_DIR " /scheduler.kubeconfig \
899
+ --kubeconfig " ${ CERT_DIR} " /scheduler.kubeconfig \
900
900
--feature-gates=" ${FEATURE_GATES} " \
901
901
--master=" https://${API_HOST} :${API_SECURE_PORT} " > " ${SCHEDULER_LOG} " 2>&1 &
902
902
SCHEDULER_PID=$!
@@ -947,17 +947,17 @@ function create_psp_policy {
947
947
}
948
948
949
949
function create_storage_class {
950
- if [ -z " $CLOUD_PROVIDER " ]; then
950
+ if [ -z " ${ CLOUD_PROVIDER} " ]; then
951
951
CLASS_FILE=${KUBE_ROOT} /cluster/addons/storage-class/local/default.yaml
952
952
else
953
953
CLASS_FILE=${KUBE_ROOT} /cluster/addons/storage-class/${CLOUD_PROVIDER} /default.yaml
954
954
fi
955
955
956
- if [ -e $CLASS_FILE ]; then
957
- echo " Create default storage class for $CLOUD_PROVIDER "
958
- ${KUBECTL} --kubeconfig=" ${CERT_DIR} /admin.kubeconfig" create -f $CLASS_FILE
956
+ if [ -e ${ CLASS_FILE} ]; then
957
+ echo " Create default storage class for ${ CLOUD_PROVIDER} "
958
+ ${KUBECTL} --kubeconfig=" ${CERT_DIR} /admin.kubeconfig" create -f ${ CLASS_FILE}
959
959
else
960
- echo " No storage class available for $CLOUD_PROVIDER ."
960
+ echo " No storage class available for ${ CLOUD_PROVIDER} ."
961
961
fi
962
962
}
963
963
@@ -1053,11 +1053,11 @@ kube::util::test_openssl_installed
1053
1053
kube::util::ensure-cfssl
1054
1054
1055
1055
# ## IF the user didn't supply an output/ for the build... Then we detect.
1056
- if [ " $GO_OUT " == " " ]; then
1056
+ if [ " ${ GO_OUT} " == " " ]; then
1057
1057
detect_binary
1058
1058
fi
1059
1059
echo " Detected host and ready to start services. Doing some housekeeping first..."
1060
- echo " Using GO_OUT $GO_OUT "
1060
+ echo " Using GO_OUT ${ GO_OUT} "
1061
1061
KUBELET_CIDFILE=/tmp/kubelet.cid
1062
1062
if [[ " ${ENABLE_DAEMON} " = false ]]; then
1063
1063
trap cleanup EXIT
@@ -1101,7 +1101,7 @@ if [[ -n "${PSP_ADMISSION}" && "${AUTHORIZATION_MODE}" = *RBAC* ]]; then
1101
1101
create_psp_policy
1102
1102
fi
1103
1103
1104
- if [[ " $DEFAULT_STORAGE_CLASS " = " true" ]]; then
1104
+ if [[ " ${ DEFAULT_STORAGE_CLASS} " = " true" ]]; then
1105
1105
create_storage_class
1106
1106
fi
1107
1107
0 commit comments