@@ -156,6 +156,10 @@ func (p *Provider) getClusterConfiguration(c *v1.Cluster) *kubeadmv1beta2.Cluste
156156 utilruntime .Must (json .Merge (& config .Etcd , & c .Spec .Etcd ))
157157 if config .Etcd .Local != nil {
158158 config .Etcd .Local .ImageTag = images .Get ().ETCD .Tag
159+
160+ if config .Etcd .Local .ExtraArgs != nil && p .config .Etcd .ExtraArgs != nil {
161+ utilruntime .Must (mergo .Merge (& config .Etcd .Local .ExtraArgs , p .config .Etcd .ExtraArgs ))
162+ }
159163 }
160164
161165 return config
@@ -198,9 +202,6 @@ func (p *Provider) getAPIServerExtraArgs(c *v1.Cluster) map[string]string {
198202 args ["authorization-webhook-config-file" ] = constants .KubernetesAuthzWebhookConfigFile
199203 args ["authorization-mode" ] = "Node,RBAC,Webhook"
200204 }
201- for k , v := range c .Spec .APIServerExtraArgs {
202- args [k ] = v
203- }
204205
205206 utilruntime .Must (mergo .Merge (& args , c .Spec .APIServerExtraArgs ))
206207 utilruntime .Must (mergo .Merge (& args , p .config .APIServer .ExtraArgs ))
@@ -215,9 +216,6 @@ func (p *Provider) getControllerManagerExtraArgs(c *v1.Cluster) map[string]strin
215216 "cluster-cidr" : c .Spec .ClusterCIDR ,
216217 "service-cluster-ip-range" : c .Status .ServiceCIDR ,
217218 }
218- for k , v := range c .Spec .ControllerManagerExtraArgs {
219- args [k ] = v
220- }
221219
222220 utilruntime .Must (mergo .Merge (& args , c .Spec .ControllerManagerExtraArgs ))
223221 utilruntime .Must (mergo .Merge (& args , p .config .ControllerManager .ExtraArgs ))
@@ -230,9 +228,6 @@ func (p *Provider) getSchedulerExtraArgs(c *v1.Cluster) map[string]string {
230228 "use-legacy-policy-config" : "true" ,
231229 "policy-config-file" : constants .KuberentesSchedulerPolicyConfigFile ,
232230 }
233- for k , v := range c .Spec .SchedulerExtraArgs {
234- args [k ] = v
235- }
236231
237232 utilruntime .Must (mergo .Merge (& args , c .Spec .SchedulerExtraArgs ))
238233 utilruntime .Must (mergo .Merge (& args , p .config .Scheduler .ExtraArgs ))
0 commit comments