Skip to content

Instantly share code, notes, and snippets.

@ams0
Created November 8, 2018 15:26
Show Gist options
  • Save ams0/b73ca507901ec02a8773bb2b5adfe8b6 to your computer and use it in GitHub Desktop.
Save ams0/b73ca507901ec02a8773bb2b5adfe8b6 to your computer and use it in GitHub Desktop.
#!/bin/bash
set -e
set -o pipefail
# Add user to k8s using service account, no RBAC (must create RBAC after this script)
if [[ -z "$1" ]] || [[ -z "$2" ]]; then
echo "usage: $0 <service_account_name> <namespace>"
exit 1
fi
SERVICE_ACCOUNT_NAME=$1
NAMESPACE="$2"
KUBECFG_FILE_NAME="/tmp/kube/k8s-${SERVICE_ACCOUNT_NAME}-${NAMESPACE}-conf"
TARGET_FOLDER="/tmp/kube"
create_target_folder() {
echo -n "Creating target directory to hold files in ${TARGET_FOLDER}..."
mkdir -p "${TARGET_FOLDER}"
printf "done"
}
create_namespace() {
echo -e "\\nCreating the namespace: ${NAMESPACE}"
kubectl create ns ${NAMESPACE}
printf "created namespace ${NAMESPACE}"
}
create_service_account() {
echo -e "\\nCreating a service account: ${SERVICE_ACCOUNT_NAME}-${NAMESPACE}"
kubectl create sa -n ${NAMESPACE} "${SERVICE_ACCOUNT_NAME}"
}
create_tiller_service_account() {
echo -e "\\nCreating a service account for tiller in ${NAMESPACE}"
kubectl create sa -n ${NAMESPACE} tiller
}
create_role() {
echo -e "\\nCreating a manager role for -${NAMESPACE}"
cat <<EOF | kubectl apply -f -
kind: Role
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: ${NAMESPACE}-manager
namespace: ${NAMESPACE}
rules:
- apiGroups: ["*"]
resources: ["*"]
verbs: ["*"]
EOF
}
create_role_binding() {
echo -e "\\nCreating a role binding for ${SERVICE_ACCOUNT_NAME} in ${NAMESPACE}"
kubectl create rolebinding ${NAMESPACE}-manager --role ${NAMESPACE}-manager -n ${NAMESPACE} --serviceaccount=${NAMESPACE}:${SERVICE_ACCOUNT_NAME}
}
create_tiller_role() {
echo -e "\\nCreating a tiller role for ns ${NAMESPACE}"
cat <<EOF | kubectl apply -f -
kind: Role
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: tiller-manager
namespace: ${NAMESPACE}
rules:
- apiGroups: ["", "extensions", "apps"]
resources: ["*"]
verbs: ["*"]
EOF
}
create_tiller_role_binding() {
echo -e "\\nCreating a role binding for tiller in ${NAMESPACE}"
kubectl create rolebinding tiller-manager --role tiller-manager -n ${NAMESPACE} --serviceaccount=${NAMESPACE}:tiller
}
get_secret_name_from_service_account() {
echo -e "\\nGetting secret of service account ${SERVICE_ACCOUNT_NAME}-${NAMESPACE}"
SECRET_NAME=$(kubectl get sa -n ${NAMESPACE} "${SERVICE_ACCOUNT_NAME}" -o json | jq -r .secrets[].name)
echo "Secret name: ${SECRET_NAME}"
}
extract_ca_crt_from_secret() {
echo -e -n "\\nExtracting ca.crt from secret..."
kubectl get secret -n ${NAMESPACE} "${SECRET_NAME}" -o json | jq \
-r '.data["ca.crt"]' | base64 -D > "${TARGET_FOLDER}/ca.crt"
printf "done"
}
get_user_token_from_secret() {
echo -e -n "\\nGetting user token from secret..."
USER_TOKEN=$(kubectl get secret -n ${NAMESPACE} "${SECRET_NAME}" -o json | jq -r '.data["token"]' | base64 -D)
printf "done"
}
set_kube_config_values() {
context=$(kubectl config current-context)
echo -e "\\nSetting current context to: $context"
CLUSTER_NAME=$(kubectl config get-contexts "$context" | awk '{print $3}' | tail -n 1)
echo "Cluster name: ${CLUSTER_NAME}"
ENDPOINT=$(kubectl config view \
-o jsonpath="{.clusters[?(@.name == \"${CLUSTER_NAME}\")].cluster.server}")
echo "Endpoint: ${ENDPOINT}"
# Set up the config
echo -e "\\nPreparing k8s-${SERVICE_ACCOUNT_NAME}-${NAMESPACE}-conf"
echo -n "Setting a cluster entry in kubeconfig..."
kubectl config set-cluster "${CLUSTER_NAME}" \
--kubeconfig="${KUBECFG_FILE_NAME}" \
--server="${ENDPOINT}" \
--certificate-authority="${TARGET_FOLDER}/ca.crt" \
--embed-certs=true
echo -n "Setting token credentials entry in kubeconfig..."
kubectl config set-credentials \
"${SERVICE_ACCOUNT_NAME}-${NAMESPACE}-${CLUSTER_NAME}" \
--kubeconfig="${KUBECFG_FILE_NAME}" \
--token="${USER_TOKEN}"
echo -n "Setting a context entry in kubeconfig..."
kubectl config set-context \
"${SERVICE_ACCOUNT_NAME}-${NAMESPACE}-${CLUSTER_NAME}" \
--kubeconfig="${KUBECFG_FILE_NAME}" \
--cluster="${CLUSTER_NAME}" \
--user="${SERVICE_ACCOUNT_NAME}-${NAMESPACE}-${CLUSTER_NAME}" \
--namespace="${NAMESPACE}"
echo -n "Setting the current-context in the kubeconfig file..."
kubectl config use-context "${SERVICE_ACCOUNT_NAME}-${NAMESPACE}-${CLUSTER_NAME}" \
--kubeconfig="${KUBECFG_FILE_NAME}"
}
create_target_folder
create_namespace
create_service_account
create_role
create_role_binding
create_tiller_service_account
create_tiller_role
create_tiller_role_binding
get_secret_name_from_service_account
extract_ca_crt_from_secret
get_user_token_from_secret
set_kube_config_values
echo -e "\\nAll done! Test with:"
echo "KUBECONFIG=${KUBECFG_FILE_NAME} kubectl get pods"
KUBECONFIG=${KUBECFG_FILE_NAME} kubectl get pods
echo -e "\\nNow you can deploy helm using"
echo -e "\\nhelm init --service-account tiller --tiller-namespace ${NAMESPACE}"
echo -e "\\nand test helm with"
echo -e "\\nKUBECONFIG=/tmp/kube/k8s-developer-dev-conf helm version --tiller-namespace dev"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment