|
@@ -0,0 +1,646 @@
|
|
|
+
|
|
|
+set -e
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+GITHUB_URL=https://github.com/rancher/k3s/releases
|
|
|
+
|
|
|
+
|
|
|
+info()
|
|
|
+{
|
|
|
+ echo "[INFO] " "$@"
|
|
|
+}
|
|
|
+fatal()
|
|
|
+{
|
|
|
+ echo "[ERROR] " "$@"
|
|
|
+ exit 1
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+verify_system() {
|
|
|
+ if [ -x /sbin/openrc-run ]; then
|
|
|
+ HAS_OPENRC=true
|
|
|
+ return
|
|
|
+ fi
|
|
|
+ if [ -d /run/systemd ]; then
|
|
|
+ HAS_SYSTEMD=true
|
|
|
+ return
|
|
|
+ fi
|
|
|
+ fatal "Can not find systemd or openrc to use as a process supervisor for k3s"
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+quote() {
|
|
|
+ for arg in "$@"; do
|
|
|
+ printf "%s\n" "$arg" | sed "s/'/'\\\\''/g;1s/^/'/;\$s/\$/'/"
|
|
|
+ done
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+quote_indent() {
|
|
|
+ printf ' \\'"\n"
|
|
|
+ for arg in "$@"; do
|
|
|
+ printf "\t%s "'\\'"\n" "$(quote "$arg")"
|
|
|
+ done
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+escape() {
|
|
|
+ printf "%s" "$@" | sed -e 's/\([][!#$%&()*;<=>?\_`{|}]\)/\\\1/g;'
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+escape_dq() {
|
|
|
+ printf "%s" "$@" | sed -e 's/"/\\"/g'
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+setup_env() {
|
|
|
+
|
|
|
+ case "$1" in
|
|
|
+
|
|
|
+ (-*|"")
|
|
|
+ if [ -z "${K3S_URL}" ]; then
|
|
|
+ CMD_K3S=server
|
|
|
+ else
|
|
|
+ if [ -z "${K3S_TOKEN}" ] && [ -z "${K3S_CLUSTER_SECRET}" ]; then
|
|
|
+ fatal "Defaulted k3s exec command to 'agent' because K3S_URL is defined, but K3S_TOKEN or K3S_CLUSTER_SECRET is not defined."
|
|
|
+ fi
|
|
|
+ CMD_K3S=agent
|
|
|
+ fi
|
|
|
+ ;;
|
|
|
+
|
|
|
+ (*)
|
|
|
+ CMD_K3S="$1"
|
|
|
+ shift
|
|
|
+ ;;
|
|
|
+ esac
|
|
|
+ CMD_K3S_EXEC="${CMD_K3S}$(quote_indent "$@")"
|
|
|
+
|
|
|
+
|
|
|
+ if [ -n "${INSTALL_K3S_NAME}" ]; then
|
|
|
+ SYSTEM_NAME=k3s-${INSTALL_K3S_NAME}
|
|
|
+ else
|
|
|
+ if [ "${CMD_K3S}" = "server" ]; then
|
|
|
+ SYSTEM_NAME=k3s
|
|
|
+ else
|
|
|
+ SYSTEM_NAME=k3s-${CMD_K3S}
|
|
|
+ fi
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ valid_chars=$(printf "%s" "${SYSTEM_NAME}" | sed -e 's/[][!#$%&()*;<=>?\_`{|}/[:space:]]/^/g;' )
|
|
|
+ if [ "${SYSTEM_NAME}" != "${valid_chars}" ]; then
|
|
|
+ invalid_chars=$(printf "%s" "${valid_chars}" | sed -e 's/[^^]/ /g')
|
|
|
+ fatal "Invalid characters for system name:
|
|
|
+ ${SYSTEM_NAME}
|
|
|
+ ${invalid_chars}"
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ SERVICE_K3S=${SYSTEM_NAME}.service
|
|
|
+ UNINSTALL_K3S_SH=${SYSTEM_NAME}-uninstall.sh
|
|
|
+ KILLALL_K3S_SH=k3s-killall.sh
|
|
|
+
|
|
|
+
|
|
|
+ SUDO=sudo
|
|
|
+ if [ `id -u` = 0 ]; then
|
|
|
+ SUDO=
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ if [ -n "${INSTALL_K3S_TYPE}" ]; then
|
|
|
+ SYSTEMD_TYPE="${INSTALL_K3S_TYPE}"
|
|
|
+ else
|
|
|
+ if [ "${CMD_K3S}" = "server" ]; then
|
|
|
+ SYSTEMD_TYPE=notify
|
|
|
+ else
|
|
|
+ SYSTEMD_TYPE=exec
|
|
|
+ fi
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ if [ -n "${INSTALL_K3S_BIN_DIR}" ]; then
|
|
|
+ BIN_DIR="${INSTALL_K3S_BIN_DIR}"
|
|
|
+ else
|
|
|
+ BIN_DIR="/usr/local/bin"
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ if [ -n "${INSTALL_K3S_SYSTEMD_DIR}" ]; then
|
|
|
+ SYSTEMD_DIR="${INSTALL_K3S_SYSTEMD_DIR}"
|
|
|
+ else
|
|
|
+ SYSTEMD_DIR="/etc/systemd/system"
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ if [ "${HAS_SYSTEMD}" = "true" ]; then
|
|
|
+ FILE_K3S_SERVICE=${SYSTEMD_DIR}/${SERVICE_K3S}
|
|
|
+ FILE_K3S_ENV=${SYSTEMD_DIR}/${SERVICE_K3S}.env
|
|
|
+ elif [ "${HAS_OPENRC}" = "true" ]; then
|
|
|
+ $SUDO mkdir -p /etc/rancher/k3s
|
|
|
+ FILE_K3S_SERVICE=/etc/init.d/${SYSTEM_NAME}
|
|
|
+ FILE_K3S_ENV=/etc/rancher/k3s/${SYSTEM_NAME}.env
|
|
|
+ fi
|
|
|
+
|
|
|
+
|
|
|
+ PRE_INSTALL_HASHES=`get_installed_hashes`
|
|
|
+
|
|
|
+
|
|
|
+ if [ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = "true" ]; then
|
|
|
+ INSTALL_K3S_SKIP_DOWNLOAD=true
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+can_skip_download() {
|
|
|
+ if [ "${INSTALL_K3S_SKIP_DOWNLOAD}" != "true" ]; then
|
|
|
+ return 1
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+verify_k3s_is_executable() {
|
|
|
+ if [ ! -x ${BIN_DIR}/k3s ]; then
|
|
|
+ fatal "Executable k3s binary not found at ${BIN_DIR}/k3s"
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+setup_verify_arch() {
|
|
|
+ if [ -z "$ARCH" ]; then
|
|
|
+ ARCH=`uname -m`
|
|
|
+ fi
|
|
|
+ case $ARCH in
|
|
|
+ amd64)
|
|
|
+ ARCH=amd64
|
|
|
+ SUFFIX=
|
|
|
+ ;;
|
|
|
+ x86_64)
|
|
|
+ ARCH=amd64
|
|
|
+ SUFFIX=
|
|
|
+ ;;
|
|
|
+ arm64)
|
|
|
+ ARCH=arm64
|
|
|
+ SUFFIX=-${ARCH}
|
|
|
+ ;;
|
|
|
+ aarch64)
|
|
|
+ ARCH=arm64
|
|
|
+ SUFFIX=-${ARCH}
|
|
|
+ ;;
|
|
|
+ arm*)
|
|
|
+ ARCH=arm
|
|
|
+ SUFFIX=-${ARCH}hf
|
|
|
+ ;;
|
|
|
+ *)
|
|
|
+ fatal "Unsupported architecture $ARCH"
|
|
|
+ esac
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+verify_curl() {
|
|
|
+ if [ -z `which curl || true` ]; then
|
|
|
+ fatal "Can not find curl for downloading files"
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+setup_tmp() {
|
|
|
+ TMP_DIR=`mktemp -d -t k3s-install.XXXXXXXXXX`
|
|
|
+ TMP_HASH=${TMP_DIR}/k3s.hash
|
|
|
+ TMP_BIN=${TMP_DIR}/k3s.bin
|
|
|
+ cleanup() {
|
|
|
+ code=$?
|
|
|
+ set +e
|
|
|
+ trap - EXIT
|
|
|
+ rm -rf ${TMP_DIR}
|
|
|
+ exit $code
|
|
|
+ }
|
|
|
+ trap cleanup INT EXIT
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+get_release_version() {
|
|
|
+ if [ -n "${INSTALL_K3S_VERSION}" ]; then
|
|
|
+ VERSION_K3S="${INSTALL_K3S_VERSION}"
|
|
|
+ else
|
|
|
+ info "Finding latest release"
|
|
|
+ VERSION_K3S=`curl -w "%{url_effective}" -I -L -s -S ${GITHUB_URL}/latest -o /dev/null | sed -e 's|.*/||'`
|
|
|
+ fi
|
|
|
+ info "Using ${VERSION_K3S} as release"
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+download_hash() {
|
|
|
+ HASH_URL=${GITHUB_URL}/download/${VERSION_K3S}/sha256sum-${ARCH}.txt
|
|
|
+ info "Downloading hash ${HASH_URL}"
|
|
|
+ curl -o ${TMP_HASH} -sfL ${HASH_URL} || fatal "Hash download failed"
|
|
|
+ HASH_EXPECTED=`grep " k3s${SUFFIX}$" ${TMP_HASH} | awk '{print $1}'`
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+installed_hash_matches() {
|
|
|
+ if [ -x ${BIN_DIR}/k3s ]; then
|
|
|
+ HASH_INSTALLED=`sha256sum ${BIN_DIR}/k3s | awk '{print $1}'`
|
|
|
+ if [ "${HASH_EXPECTED}" = "${HASH_INSTALLED}" ]; then
|
|
|
+ return
|
|
|
+ fi
|
|
|
+ fi
|
|
|
+ return 1
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+download_binary() {
|
|
|
+ BIN_URL=${GITHUB_URL}/download/${VERSION_K3S}/k3s${SUFFIX}
|
|
|
+ info "Downloading binary ${BIN_URL}"
|
|
|
+ curl -o ${TMP_BIN} -sfL ${BIN_URL} || fatal "Binary download failed"
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+verify_binary() {
|
|
|
+ info "Verifying binary download"
|
|
|
+ HASH_BIN=`sha256sum ${TMP_BIN} | awk '{print $1}'`
|
|
|
+ if [ "${HASH_EXPECTED}" != "${HASH_BIN}" ]; then
|
|
|
+ fatal "Download sha256 does not match ${HASH_EXPECTED}, got ${HASH_BIN}"
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+setup_binary() {
|
|
|
+ chmod 755 ${TMP_BIN}
|
|
|
+ info "Installing k3s to ${BIN_DIR}/k3s"
|
|
|
+ $SUDO chown root:root ${TMP_BIN}
|
|
|
+ $SUDO mv -f ${TMP_BIN} ${BIN_DIR}/k3s
|
|
|
+
|
|
|
+ if command -v getenforce > /dev/null 2>&1; then
|
|
|
+ if [ "Disabled" != `getenforce` ]; then
|
|
|
+ info "SeLinux is enabled, setting permissions"
|
|
|
+ if ! $SUDO semanage fcontext -l | grep "${BIN_DIR}/k3s" > /dev/null 2>&1; then
|
|
|
+ $SUDO semanage fcontext -a -t bin_t "${BIN_DIR}/k3s"
|
|
|
+ fi
|
|
|
+ $SUDO restorecon -v ${BIN_DIR}/k3s > /dev/null
|
|
|
+ fi
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+download_and_verify() {
|
|
|
+ if can_skip_download; then
|
|
|
+ info "Skipping k3s download and verify"
|
|
|
+ verify_k3s_is_executable
|
|
|
+ return
|
|
|
+ fi
|
|
|
+
|
|
|
+ setup_verify_arch
|
|
|
+ verify_curl
|
|
|
+ setup_tmp
|
|
|
+ get_release_version
|
|
|
+ download_hash
|
|
|
+
|
|
|
+ if installed_hash_matches; then
|
|
|
+ info "Skipping binary downloaded, installed k3s matches hash"
|
|
|
+ return
|
|
|
+ fi
|
|
|
+
|
|
|
+ download_binary
|
|
|
+ verify_binary
|
|
|
+ setup_binary
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+create_symlinks() {
|
|
|
+ [ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = "true" ] && return
|
|
|
+ if [ ! -e ${BIN_DIR}/kubectl ]; then
|
|
|
+ info "Creating ${BIN_DIR}/kubectl symlink to k3s"
|
|
|
+ $SUDO ln -s k3s ${BIN_DIR}/kubectl
|
|
|
+ fi
|
|
|
+
|
|
|
+ if [ ! -e ${BIN_DIR}/crictl ]; then
|
|
|
+ info "Creating ${BIN_DIR}/crictl symlink to k3s"
|
|
|
+ $SUDO ln -s k3s ${BIN_DIR}/crictl
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+create_killall() {
|
|
|
+ [ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = "true" ] && return
|
|
|
+ info "Creating killall script ${BIN_DIR}/${KILLALL_K3S_SH}"
|
|
|
+ $SUDO tee ${BIN_DIR}/${KILLALL_K3S_SH} >/dev/null << \EOF
|
|
|
+
|
|
|
+set -x
|
|
|
+[ `id -u` = 0 ] || exec sudo $0 $@
|
|
|
+
|
|
|
+for bin in /var/lib/rancher/k3s/data/**/bin/; do
|
|
|
+ [ -d $bin ] && export PATH=$bin:$PATH
|
|
|
+done
|
|
|
+
|
|
|
+for service in /etc/systemd/system/k3s*.service; do
|
|
|
+ [ -s $service ] && systemctl stop $(basename $service)
|
|
|
+done
|
|
|
+
|
|
|
+for service in /etc/init.d/k3s*; do
|
|
|
+ [ -x $service ] && $service stop
|
|
|
+done
|
|
|
+
|
|
|
+pstree() {
|
|
|
+ for pid in $@; do
|
|
|
+ echo $pid
|
|
|
+ pstree $(ps -o ppid= -o pid= | awk "\$1==$pid {print \$2}")
|
|
|
+ done
|
|
|
+}
|
|
|
+
|
|
|
+killtree() {
|
|
|
+ [ $# -ne 0 ] && kill $(set +x; pstree $@; set -x)
|
|
|
+}
|
|
|
+
|
|
|
+killtree $(lsof | sed -e 's/^[^0-9]*//g; s/ */\t/g' | grep -w 'k3s/data/[^/]*/bin/containerd-shim' | cut -f1 | sort -n -u)
|
|
|
+
|
|
|
+do_unmount() {
|
|
|
+ MOUNTS=`cat /proc/self/mounts | awk '{print $2}' | grep "^$1" | sort -r`
|
|
|
+ if [ -n "${MOUNTS}" ]; then
|
|
|
+ umount ${MOUNTS}
|
|
|
+ fi
|
|
|
+}
|
|
|
+
|
|
|
+do_unmount '/run/k3s'
|
|
|
+do_unmount '/var/lib/rancher/k3s'
|
|
|
+
|
|
|
+nets=$(ip link show | grep 'master cni0' | awk -F': ' '{print $2}' | sed -e 's|@.*||')
|
|
|
+for iface in $nets; do
|
|
|
+ ip link delete $iface;
|
|
|
+done
|
|
|
+ip link delete cni0
|
|
|
+ip link delete flannel.1
|
|
|
+rm -rf /var/lib/cni/
|
|
|
+EOF
|
|
|
+ $SUDO chmod 755 ${BIN_DIR}/${KILLALL_K3S_SH}
|
|
|
+ $SUDO chown root:root ${BIN_DIR}/${KILLALL_K3S_SH}
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+create_uninstall() {
|
|
|
+ [ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = "true" ] && return
|
|
|
+ info "Creating uninstall script ${BIN_DIR}/${UNINSTALL_K3S_SH}"
|
|
|
+ $SUDO tee ${BIN_DIR}/${UNINSTALL_K3S_SH} >/dev/null << EOF
|
|
|
+
|
|
|
+set -x
|
|
|
+[ \`id -u\` = 0 ] || exec sudo \$0 \$@
|
|
|
+
|
|
|
+${BIN_DIR}/${KILLALL_K3S_SH}
|
|
|
+
|
|
|
+if which systemctl; then
|
|
|
+ systemctl disable ${SYSTEM_NAME}
|
|
|
+ systemctl reset-failed ${SYSTEM_NAME}
|
|
|
+ systemctl daemon-reload
|
|
|
+fi
|
|
|
+if which rc-update; then
|
|
|
+ rc-update delete ${SYSTEM_NAME} default
|
|
|
+fi
|
|
|
+
|
|
|
+rm -f ${FILE_K3S_SERVICE}
|
|
|
+rm -f ${FILE_K3S_ENV}
|
|
|
+
|
|
|
+remove_uninstall() {
|
|
|
+ rm -f ${BIN_DIR}/${UNINSTALL_K3S_SH}
|
|
|
+}
|
|
|
+trap remove_uninstall EXIT
|
|
|
+
|
|
|
+if (ls ${SYSTEMD_DIR}/k3s*.service || ls /etc/init.d/k3s*) >/dev/null 2>&1; then
|
|
|
+ set +x; echo "Additional k3s services installed, skipping uninstall of k3s"; set -x
|
|
|
+ exit
|
|
|
+fi
|
|
|
+
|
|
|
+if [ -L ${BIN_DIR}/kubectl ]; then
|
|
|
+ rm -f ${BIN_DIR}/kubectl
|
|
|
+fi
|
|
|
+if [ -L ${BIN_DIR}/crictl ]; then
|
|
|
+ rm -f ${BIN_DIR}/crictl
|
|
|
+fi
|
|
|
+
|
|
|
+rm -rf /etc/rancher/k3s
|
|
|
+rm -rf /var/lib/rancher/k3s
|
|
|
+rm -f ${BIN_DIR}/k3s
|
|
|
+rm -f ${BIN_DIR}/${KILLALL_K3S_SH}
|
|
|
+EOF
|
|
|
+ $SUDO chmod 755 ${BIN_DIR}/${UNINSTALL_K3S_SH}
|
|
|
+ $SUDO chown root:root ${BIN_DIR}/${UNINSTALL_K3S_SH}
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+systemd_disable() {
|
|
|
+ $SUDO rm -f /etc/systemd/system/${SERVICE_K3S} || true
|
|
|
+ $SUDO rm -f /etc/systemd/system/${SERVICE_K3S}.env || true
|
|
|
+ $SUDO systemctl disable ${SYSTEM_NAME} >/dev/null 2>&1 || true
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+create_env_file() {
|
|
|
+ info "env: Creating environment file ${FILE_K3S_ENV}"
|
|
|
+ UMASK=`umask`
|
|
|
+ umask 0377
|
|
|
+ env | grep '^K3S_' | $SUDO tee ${FILE_K3S_ENV} >/dev/null
|
|
|
+ umask $UMASK
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+create_systemd_service_file() {
|
|
|
+ info "systemd: Creating service file ${FILE_K3S_SERVICE}"
|
|
|
+ $SUDO tee ${FILE_K3S_SERVICE} >/dev/null << EOF
|
|
|
+[Unit]
|
|
|
+Description=Lightweight Kubernetes
|
|
|
+Documentation=https://k3s.io
|
|
|
+After=network-online.target
|
|
|
+
|
|
|
+[Service]
|
|
|
+Type=${SYSTEMD_TYPE}
|
|
|
+EnvironmentFile=${FILE_K3S_ENV}
|
|
|
+ExecStartPre=-/sbin/modprobe br_netfilter
|
|
|
+ExecStartPre=-/sbin/modprobe overlay
|
|
|
+ExecStart=${BIN_DIR}/k3s \\
|
|
|
+ ${CMD_K3S_EXEC}
|
|
|
+
|
|
|
+KillMode=process
|
|
|
+Delegate=yes
|
|
|
+LimitNOFILE=infinity
|
|
|
+LimitNPROC=infinity
|
|
|
+LimitCORE=infinity
|
|
|
+TasksMax=infinity
|
|
|
+TimeoutStartSec=0
|
|
|
+Restart=always
|
|
|
+
|
|
|
+[Install]
|
|
|
+WantedBy=multi-user.target
|
|
|
+EOF
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+create_openrc_service_file() {
|
|
|
+ LOG_FILE=/var/log/${SYSTEM_NAME}.log
|
|
|
+
|
|
|
+ info "openrc: Creating service file ${FILE_K3S_SERVICE}"
|
|
|
+ $SUDO tee ${FILE_K3S_SERVICE} >/dev/null << EOF
|
|
|
+
|
|
|
+
|
|
|
+depend() {
|
|
|
+ after net-online
|
|
|
+ need net
|
|
|
+}
|
|
|
+
|
|
|
+start_pre() {
|
|
|
+ rm -f /tmp/k3s.*
|
|
|
+}
|
|
|
+
|
|
|
+supervisor=supervise-daemon
|
|
|
+name="${SYSTEM_NAME}"
|
|
|
+command="${BIN_DIR}/k3s"
|
|
|
+command_args="$(escape_dq "${CMD_K3S_EXEC}")
|
|
|
+ >>${LOG_FILE} 2>&1"
|
|
|
+
|
|
|
+pidfile="/var/run/${SYSTEM_NAME}.pid"
|
|
|
+respawn_delay=5
|
|
|
+
|
|
|
+set -o allexport
|
|
|
+if [ -f /etc/environment ]; then source /etc/environment; fi
|
|
|
+if [ -f ${FILE_K3S_ENV} ]; then source ${FILE_K3S_ENV}; fi
|
|
|
+set +o allexport
|
|
|
+EOF
|
|
|
+ $SUDO chmod 0755 ${FILE_K3S_SERVICE}
|
|
|
+
|
|
|
+ $SUDO tee /etc/logrotate.d/${SYSTEM_NAME} >/dev/null << EOF
|
|
|
+${LOG_FILE} {
|
|
|
+ missingok
|
|
|
+ notifempty
|
|
|
+ copytruncate
|
|
|
+}
|
|
|
+EOF
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+create_service_file() {
|
|
|
+ [ "${HAS_SYSTEMD}" = "true" ] && create_systemd_service_file
|
|
|
+ [ "${HAS_OPENRC}" = "true" ] && create_openrc_service_file
|
|
|
+ return 0
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+get_installed_hashes() {
|
|
|
+ $SUDO sha256sum ${BIN_DIR}/k3s ${FILE_K3S_SERVICE} ${FILE_K3S_ENV} 2>&1 || true
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+systemd_enable() {
|
|
|
+ info "systemd: Enabling ${SYSTEM_NAME} unit"
|
|
|
+ $SUDO systemctl enable ${FILE_K3S_SERVICE} >/dev/null
|
|
|
+ $SUDO systemctl daemon-reload >/dev/null
|
|
|
+}
|
|
|
+
|
|
|
+systemd_start() {
|
|
|
+ info "systemd: Starting ${SYSTEM_NAME}"
|
|
|
+ $SUDO systemctl restart ${SYSTEM_NAME}
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+openrc_enable() {
|
|
|
+ info "openrc: Enabling ${SYSTEM_NAME} service for default runlevel"
|
|
|
+ $SUDO rc-update add ${SYSTEM_NAME} default >/dev/null
|
|
|
+}
|
|
|
+
|
|
|
+openrc_start() {
|
|
|
+ info "openrc: Starting ${SYSTEM_NAME}"
|
|
|
+ $SUDO ${FILE_K3S_SERVICE} restart
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+service_enable_and_start() {
|
|
|
+ [ "${HAS_SYSTEMD}" = "true" ] && systemd_enable
|
|
|
+ [ "${HAS_OPENRC}" = "true" ] && openrc_enable
|
|
|
+
|
|
|
+ [ "${INSTALL_K3S_SKIP_START}" = "true" ] && return
|
|
|
+
|
|
|
+ POST_INSTALL_HASHES=`get_installed_hashes`
|
|
|
+ if [ "${PRE_INSTALL_HASHES}" = "${POST_INSTALL_HASHES}" ]; then
|
|
|
+ info "No change detected so skipping service start"
|
|
|
+ return
|
|
|
+ fi
|
|
|
+
|
|
|
+ [ "${HAS_SYSTEMD}" = "true" ] && systemd_start
|
|
|
+ [ "${HAS_OPENRC}" = "true" ] && openrc_start
|
|
|
+ return 0
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+eval set -- $(escape "${INSTALL_K3S_EXEC}") $(quote "$@")
|
|
|
+
|
|
|
+
|
|
|
+{
|
|
|
+ verify_system
|
|
|
+ setup_env "$@"
|
|
|
+ download_and_verify
|
|
|
+ create_symlinks
|
|
|
+ create_killall
|
|
|
+ create_uninstall
|
|
|
+ systemd_disable
|
|
|
+ create_env_file
|
|
|
+ create_service_file
|
|
|
+ service_enable_and_start
|
|
|
+}
|