@@ -272,9 +272,14 @@ elif [ "$BINARY_BUCKET_REGION" = "eu-isoe-west-1" ]; then
272
272
elif [ " $BINARY_BUCKET_REGION " = " us-isof-south-1" ]; then
273
273
S3_DOMAIN=" csp.hci.ic.gov"
274
274
fi
275
+
276
+ # TODO: start deprecating these.
275
277
S3_URL_BASE=" https://$BINARY_BUCKET_NAME .s3.$BINARY_BUCKET_REGION .$S3_DOMAIN /$KUBERNETES_VERSION /$KUBERNETES_BUILD_DATE /bin/linux/$ARCH "
276
278
S3_PATH=" s3://$BINARY_BUCKET_NAME /$KUBERNETES_VERSION /$KUBERNETES_BUILD_DATE /bin/linux/$ARCH "
277
279
280
+ S3_HTTP_BASE=" https://$BINARY_BUCKET_NAME .s3.$BINARY_BUCKET_REGION .$S3_DOMAIN "
281
+ S3_URI_BASE=" s3://$BINARY_BUCKET_NAME "
282
+
278
283
BINARIES=(
279
284
kubelet
280
285
aws-iam-authenticator
@@ -290,6 +295,7 @@ for binary in ${BINARIES[*]}; do
290
295
sudo wget $S3_URL_BASE /$binary .sha256
291
296
fi
292
297
sudo sha256sum -c $binary .sha256
298
+ sudo rm $binary .sha256
293
299
sudo chmod +x $binary
294
300
sudo mv $binary /usr/bin/
295
301
done
@@ -304,31 +310,35 @@ if vercmp "$iam_auth_version" lt "v0.5.9"; then
304
310
exit 1
305
311
fi
306
312
307
- # Since CNI 0.7.0, all releases are done in the plugins repo.
308
- CNI_PLUGIN_FILENAME=" cni-plugins-linux-${ARCH} -${CNI_PLUGIN_VERSION} "
309
-
310
313
if [ " $PULL_CNI_FROM_GITHUB " = " true" ]; then
314
+ CNI_PLUGIN_FILENAME=" cni-plugins-linux-${ARCH} -${CNI_PLUGIN_VERSION} "
315
+ # Since CNI 0.7.0, all releases are done in the plugins repo.
311
316
echo " Downloading CNI plugins from Github"
312
317
wget " https://github.com/containernetworking/plugins/releases/download/${CNI_PLUGIN_VERSION} /${CNI_PLUGIN_FILENAME} .tgz"
313
318
wget " https://github.com/containernetworking/plugins/releases/download/${CNI_PLUGIN_VERSION} /${CNI_PLUGIN_FILENAME} .tgz.sha512"
314
319
sudo sha512sum -c " ${CNI_PLUGIN_FILENAME} .tgz.sha512"
315
320
rm " ${CNI_PLUGIN_FILENAME} .tgz.sha512"
321
+ sudo tar -xvf " ${CNI_PLUGIN_FILENAME} .tgz" -C /opt/cni/bin
322
+ rm " ${CNI_PLUGIN_FILENAME} .tgz"
316
323
else
324
+ CNI_PLUGIN_FILENAME=" cni-plugins"
325
+ # TODO: this will eventually become a reused structure for all binaries. once
326
+ # that time comes, revisit implementing this path assembly in its own helper.
327
+ CNI_PLUGINS_PATH=" bin/cni-plugins/${CNI_PLUGIN_VERSION} /linux/${ARCH} /${CNI_PLUGIN_FILENAME} .tgz"
317
328
if [[ -n " $AWS_ACCESS_KEY_ID " ]]; then
318
329
echo " AWS cli present - using it to copy binaries from s3."
319
- aws s3 cp --region $BINARY_BUCKET_REGION $S3_PATH /${CNI_PLUGIN_FILENAME} .tgz .
320
- aws s3 cp --region $BINARY_BUCKET_REGION $S3_PATH /${CNI_PLUGIN_FILENAME} .tgz. sha256 .
330
+ aws s3 cp --region $BINARY_BUCKET_REGION " ${S3_URI_BASE} /${CNI_PLUGINS_PATH} " .
331
+ aws s3 cp --region $BINARY_BUCKET_REGION " ${S3_URI_BASE} /${CNI_PLUGINS_PATH} . sha256" .
321
332
else
322
333
echo " AWS cli missing - using wget to fetch cni binaries from s3. Note: This won't work for private bucket."
323
- sudo wget " $S3_URL_BASE /${CNI_PLUGIN_FILENAME} .tgz "
324
- sudo wget " $S3_URL_BASE /${CNI_PLUGIN_FILENAME} .tgz .sha256"
334
+ sudo wget " ${S3_HTTP_BASE} /${CNI_PLUGINS_PATH} "
335
+ sudo wget " ${S3_HTTP_BASE} /${CNI_PLUGINS_PATH} .sha256"
325
336
fi
326
337
sudo sha256sum -c " ${CNI_PLUGIN_FILENAME} .tgz.sha256"
338
+ rm " ${CNI_PLUGIN_FILENAME} .tgz.sha256"
339
+ sudo tar -xvf " ${CNI_PLUGIN_FILENAME} .tgz" -C /opt/cni/bin
340
+ rm " ${CNI_PLUGIN_FILENAME} .tgz"
327
341
fi
328
- sudo tar -xvf " ${CNI_PLUGIN_FILENAME} .tgz" -C /opt/cni/bin
329
- rm " ${CNI_PLUGIN_FILENAME} .tgz"
330
-
331
- sudo rm ./* .sha256
332
342
333
343
sudo mkdir -p /etc/kubernetes/kubelet
334
344
sudo mkdir -p /etc/systemd/system/kubelet.service.d
0 commit comments