Addons
Creating a new addon
To create an addon, first fork the minikube repository, and check out your fork:
git clone git@github.com:<username>/minikube.git
Then go into the source directory:
cd minikube
Create a subdirectory:
mkdir deploy/addons/<addon name>
Add your manifest YAML’s to the directory you have created:
cp *.yaml deploy/addons/<addon name>
Note: If the addon never needs authentication to GCP, then consider adding the following label to the pod’s yaml:
gcp-auth-skip-secret: "true"
To make the addon appear in minikube addons list
, add it to pkg/addons/config.go
. Here is the entry used by the registry
addon, which will work for any addon which does not require custom code:
{
name: "registry",
set: SetBool,
callbacks: []setFn{EnableOrDisableAddon},
},
Next, add all required files using //go:embed
directives to a new embed.FS variable in deploy/addons/assets.go
. Here is the entry used by the csi-hostpath-driver
addon:
// CsiHostpathDriverAssets assets for csi-hostpath-driver addon
//go:embed csi-hostpath-driver/deploy/*.tmpl csi-hostpath-driver/rbac/*.tmpl
CsiHostpathDriverAssets embed.FS
Then, add into pkg/minikube/assets/addons.go
the list of files to copy into the cluster, including manifests. Here is the entry used by the registry
addon:
"registry": NewAddon([]*BinAsset{
MustBinAsset(addons.RegistryAssets,
"registry/registry-rc.yaml.tmpl",
vmpath.GuestAddonsDir,
"registry-rc.yaml",
"0640",
false),
MustBinAsset(addons.RegistryAssets,
"registry/registry-svc.yaml.tmpl",
vmpath.GuestAddonsDir,
"registry-svc.yaml",
"0640",
false),
MustBinAsset(addons.RegistryAssets,
"registry/registry-proxy.yaml.tmpl",
vmpath.GuestAddonsDir,
"registry-proxy.yaml",
"0640",
false),
}, false, "registry", "google"),
The MustBinAsset
arguments are:
- asset variable (typically present in
deploy/addons/assets.go
) - source filename
- destination directory (typically
vmpath.GuestAddonsDir
) - destination filename
- permissions (typically
0640
) - boolean value representing if template substitution is required (often
false
)
The boolean value on the last line is whether the addon should be enabled by default. This should always be false
. In addition, following the addon name on the last line is the maintainer field. This is meant to inform users about the controlling party of an addon’s images. In the case above, the maintainer is Google, since the registry addon uses images that Google controls. When creating a new addon, the source of the images should be contacted and requested whether they are willing to be the point of contact for this addon before being put. If the source does not accept the responsibility, leaving the maintainer field empty is acceptable.
To see other examples, see the addons commit history for other recent examples.
“addons open” support
If your addon contains a NodePort Service, please add the kubernetes.io/minikube-addons-endpoint: <addon name>
label, which is used by the minikube addons open
command:
apiVersion: v1
kind: Service
metadata:
labels:
kubernetes.io/minikube-addons-endpoint: <addon name>
NOTE: minikube addons open
currently only works for the kube-system
namespace: #8089.
Testing addon changes
Rebuild the minikube binary and apply the addon with extra logging enabled:
make && make test && ./out/minikube addons enable <addon name> --alsologtostderr
Please note that you must run make
each time you change your YAML files. To disable the addon when new changes are made, run:
./out/minikube addons disable <addon name> --alsologtostderr
Sending out your PR
Once you have tested your addon, click on new pull request to send us your PR!
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.