Merge pull request #11567 from VannTen/cleanup/remove_node_static_token_generation
Remove generation of static tokens for cluster memberspull/11578/head
commit
6c112a9b41
|
@ -174,8 +174,6 @@ The following tags are defined in playbooks:
|
||||||
| init | Windows kubernetes init nodes |
|
| init | Windows kubernetes init nodes |
|
||||||
| iptables | Flush and clear iptable when resetting |
|
| iptables | Flush and clear iptable when resetting |
|
||||||
| k8s-pre-upgrade | Upgrading K8s cluster |
|
| k8s-pre-upgrade | Upgrading K8s cluster |
|
||||||
| k8s-secrets | Configuring K8s certs/keys |
|
|
||||||
| k8s-gen-tokens | Configuring K8s tokens |
|
|
||||||
| kata-containers | Configuring kata-containers runtime |
|
| kata-containers | Configuring kata-containers runtime |
|
||||||
| krew | Install and manage krew |
|
| krew | Install and manage krew |
|
||||||
| kubeadm | Roles linked to kubeadm tasks |
|
| kubeadm | Roles linked to kubeadm tasks |
|
||||||
|
|
|
@ -392,7 +392,7 @@ ansible-playbook -b -i inventory/sample/hosts.ini cluster.yml --tags=etcd --limi
|
||||||
Upgrade kubelet:
|
Upgrade kubelet:
|
||||||
|
|
||||||
```ShellSession
|
```ShellSession
|
||||||
ansible-playbook -b -i inventory/sample/hosts.ini cluster.yml --tags=node --skip-tags=k8s-gen-certs,k8s-gen-tokens
|
ansible-playbook -b -i inventory/sample/hosts.ini cluster.yml --tags=node --skip-tags=k8s-gen-certs
|
||||||
```
|
```
|
||||||
|
|
||||||
Upgrade Kubernetes master components:
|
Upgrade Kubernetes master components:
|
||||||
|
|
|
@ -1,10 +1,6 @@
|
||||||
---
|
---
|
||||||
dependencies:
|
dependencies:
|
||||||
- role: kubernetes/kubeadm_common
|
- role: kubernetes/kubeadm_common
|
||||||
- role: kubernetes/tokens
|
|
||||||
when: kube_token_auth
|
|
||||||
tags:
|
|
||||||
- k8s-secrets
|
|
||||||
- role: adduser
|
- role: adduser
|
||||||
user: "{{ addusers.etcd }}"
|
user: "{{ addusers.etcd }}"
|
||||||
when:
|
when:
|
||||||
|
|
|
@ -148,7 +148,7 @@ apiServer:
|
||||||
profiling: "{{ kube_profiling }}"
|
profiling: "{{ kube_profiling }}"
|
||||||
request-timeout: "{{ kube_apiserver_request_timeout }}"
|
request-timeout: "{{ kube_apiserver_request_timeout }}"
|
||||||
enable-aggregator-routing: "{{ kube_api_aggregator_routing }}"
|
enable-aggregator-routing: "{{ kube_api_aggregator_routing }}"
|
||||||
{% if kube_token_auth | default(true) %}
|
{% if kube_token_auth %}
|
||||||
token-auth-file: {{ kube_token_dir }}/known_tokens.csv
|
token-auth-file: {{ kube_token_dir }}/known_tokens.csv
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if kube_apiserver_service_account_lookup %}
|
{% if kube_apiserver_service_account_lookup %}
|
||||||
|
@ -230,14 +230,14 @@ apiServer:
|
||||||
{% if kube_apiserver_tracing %}
|
{% if kube_apiserver_tracing %}
|
||||||
tracing-config-file: {{ kube_config_dir }}/tracing/apiserver-tracing.yaml
|
tracing-config-file: {{ kube_config_dir }}/tracing/apiserver-tracing.yaml
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if kubernetes_audit or kube_token_auth | default(true) or kube_webhook_token_auth | default(false) or ( cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "gce"] ) or apiserver_extra_volumes or ssl_ca_dirs | length %}
|
{% if kubernetes_audit or kube_token_auth or kube_webhook_token_auth or ( cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "gce"] ) or apiserver_extra_volumes or ssl_ca_dirs | length %}
|
||||||
extraVolumes:
|
extraVolumes:
|
||||||
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "gce"] %}
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "gce"] %}
|
||||||
- name: cloud-config
|
- name: cloud-config
|
||||||
hostPath: {{ kube_config_dir }}/cloud_config
|
hostPath: {{ kube_config_dir }}/cloud_config
|
||||||
mountPath: {{ kube_config_dir }}/cloud_config
|
mountPath: {{ kube_config_dir }}/cloud_config
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if kube_token_auth | default(true) %}
|
{% if kube_token_auth %}
|
||||||
- name: token-auth-config
|
- name: token-auth-config
|
||||||
hostPath: {{ kube_token_dir }}
|
hostPath: {{ kube_token_dir }}
|
||||||
mountPath: {{ kube_token_dir }}
|
mountPath: {{ kube_token_dir }}
|
||||||
|
|
|
@ -9,7 +9,6 @@
|
||||||
become: true
|
become: true
|
||||||
tags:
|
tags:
|
||||||
- kubelet
|
- kubelet
|
||||||
- k8s-secrets
|
|
||||||
- kube-controller-manager
|
- kube-controller-manager
|
||||||
- kube-apiserver
|
- kube-apiserver
|
||||||
- bootstrap-os
|
- bootstrap-os
|
||||||
|
@ -34,7 +33,6 @@
|
||||||
become: true
|
become: true
|
||||||
tags:
|
tags:
|
||||||
- kubelet
|
- kubelet
|
||||||
- k8s-secrets
|
|
||||||
- kube-controller-manager
|
- kube-controller-manager
|
||||||
- kube-apiserver
|
- kube-apiserver
|
||||||
- bootstrap-os
|
- bootstrap-os
|
||||||
|
|
|
@ -1,34 +0,0 @@
|
||||||
#!/bin/bash
|
|
||||||
|
|
||||||
# Copyright 2015 The Kubernetes Authors All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
token_dir=${TOKEN_DIR:-/var/srv/kubernetes}
|
|
||||||
token_file="${token_dir}/known_tokens.csv"
|
|
||||||
|
|
||||||
create_accounts=($@)
|
|
||||||
|
|
||||||
if [ ! -e "${token_file}" ]; then
|
|
||||||
touch "${token_file}"
|
|
||||||
fi
|
|
||||||
|
|
||||||
for account in "${create_accounts[@]}"; do
|
|
||||||
if grep ",${account}," "${token_file}" ; then
|
|
||||||
continue
|
|
||||||
fi
|
|
||||||
token=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
|
|
||||||
echo "${token},${account},${account}" >> "${token_file}"
|
|
||||||
echo "${token}" > "${token_dir}/${account}.token"
|
|
||||||
echo "Added ${account}"
|
|
||||||
done
|
|
|
@ -1,41 +0,0 @@
|
||||||
---
|
|
||||||
- name: "Check_tokens | check if the tokens have already been generated on first control plane node"
|
|
||||||
stat:
|
|
||||||
path: "{{ kube_token_dir }}/known_tokens.csv"
|
|
||||||
get_attributes: false
|
|
||||||
get_checksum: true
|
|
||||||
get_mime: false
|
|
||||||
delegate_to: "{{ groups['kube_control_plane'][0] }}"
|
|
||||||
register: known_tokens_control_plane
|
|
||||||
run_once: true
|
|
||||||
|
|
||||||
- name: "Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false"
|
|
||||||
set_fact:
|
|
||||||
sync_tokens: false
|
|
||||||
gen_tokens: false
|
|
||||||
|
|
||||||
- name: "Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true"
|
|
||||||
set_fact:
|
|
||||||
gen_tokens: true
|
|
||||||
when: not known_tokens_control_plane.stat.exists and kube_token_auth | default(true)
|
|
||||||
run_once: true
|
|
||||||
|
|
||||||
- name: "Check tokens | check if a cert already exists"
|
|
||||||
stat:
|
|
||||||
path: "{{ kube_token_dir }}/known_tokens.csv"
|
|
||||||
get_attributes: false
|
|
||||||
get_checksum: true
|
|
||||||
get_mime: false
|
|
||||||
register: known_tokens
|
|
||||||
|
|
||||||
- name: "Check_tokens | Set 'sync_tokens' to true"
|
|
||||||
set_fact:
|
|
||||||
sync_tokens: >-
|
|
||||||
{%- set tokens = {'sync': False} -%}
|
|
||||||
{%- for server in groups['kube_control_plane'] | intersect(ansible_play_batch)
|
|
||||||
if (not hostvars[server].known_tokens.stat.exists) or
|
|
||||||
(hostvars[server].known_tokens.stat.checksum | default('') != known_tokens_control_plane.stat.checksum | default('')) -%}
|
|
||||||
{%- set _ = tokens.update({'sync': True}) -%}
|
|
||||||
{%- endfor -%}
|
|
||||||
{{ tokens.sync }}
|
|
||||||
run_once: true
|
|
|
@ -1,63 +0,0 @@
|
||||||
---
|
|
||||||
- name: Gen_tokens | copy tokens generation script
|
|
||||||
copy:
|
|
||||||
src: "kube-gen-token.sh"
|
|
||||||
dest: "{{ kube_script_dir }}/kube-gen-token.sh"
|
|
||||||
mode: "0700"
|
|
||||||
run_once: true
|
|
||||||
delegate_to: "{{ groups['kube_control_plane'][0] }}"
|
|
||||||
when: gen_tokens | default(false)
|
|
||||||
|
|
||||||
- name: Gen_tokens | generate tokens for control plane components
|
|
||||||
command: "{{ kube_script_dir }}/kube-gen-token.sh {{ item[0] }}-{{ item[1] }}"
|
|
||||||
environment:
|
|
||||||
TOKEN_DIR: "{{ kube_token_dir }}"
|
|
||||||
with_nested:
|
|
||||||
- [ "system:kubectl" ]
|
|
||||||
- "{{ groups['kube_control_plane'] }}"
|
|
||||||
register: gentoken_control_plane
|
|
||||||
changed_when: "'Added' in gentoken_control_plane.stdout"
|
|
||||||
run_once: true
|
|
||||||
delegate_to: "{{ groups['kube_control_plane'][0] }}"
|
|
||||||
when: gen_tokens | default(false)
|
|
||||||
|
|
||||||
- name: Gen_tokens | generate tokens for node components
|
|
||||||
command: "{{ kube_script_dir }}/kube-gen-token.sh {{ item[0] }}-{{ item[1] }}"
|
|
||||||
environment:
|
|
||||||
TOKEN_DIR: "{{ kube_token_dir }}"
|
|
||||||
with_nested:
|
|
||||||
- [ 'system:kubelet' ]
|
|
||||||
- "{{ groups['kube_node'] }}"
|
|
||||||
register: gentoken_node
|
|
||||||
changed_when: "'Added' in gentoken_node.stdout"
|
|
||||||
run_once: true
|
|
||||||
delegate_to: "{{ groups['kube_control_plane'][0] }}"
|
|
||||||
when: gen_tokens | default(false)
|
|
||||||
|
|
||||||
- name: Gen_tokens | Get list of tokens from first control plane node
|
|
||||||
command: "find {{ kube_token_dir }} -maxdepth 1 -type f"
|
|
||||||
register: tokens_list
|
|
||||||
check_mode: false
|
|
||||||
delegate_to: "{{ groups['kube_control_plane'][0] }}"
|
|
||||||
run_once: true
|
|
||||||
when: sync_tokens | default(false)
|
|
||||||
|
|
||||||
- name: Gen_tokens | Gather tokens
|
|
||||||
shell: "set -o pipefail && tar cfz - {{ tokens_list.stdout_lines | join(' ') }} | base64 --wrap=0"
|
|
||||||
args:
|
|
||||||
executable: /bin/bash
|
|
||||||
register: tokens_data
|
|
||||||
check_mode: false
|
|
||||||
delegate_to: "{{ groups['kube_control_plane'][0] }}"
|
|
||||||
run_once: true
|
|
||||||
when: sync_tokens | default(false)
|
|
||||||
|
|
||||||
- name: Gen_tokens | Copy tokens on control plane nodes
|
|
||||||
shell: "set -o pipefail && echo '{{ tokens_data.stdout | quote }}' | base64 -d | tar xz -C /"
|
|
||||||
args:
|
|
||||||
executable: /bin/bash
|
|
||||||
when:
|
|
||||||
- ('kube_control_plane' in group_names)
|
|
||||||
- sync_tokens | default(false)
|
|
||||||
- inventory_hostname != groups['kube_control_plane'][0]
|
|
||||||
- tokens_data.stdout
|
|
|
@ -1,21 +0,0 @@
|
||||||
---
|
|
||||||
|
|
||||||
- name: Check tokens
|
|
||||||
import_tasks: check-tokens.yml
|
|
||||||
tags:
|
|
||||||
- k8s-secrets
|
|
||||||
- k8s-gen-tokens
|
|
||||||
- facts
|
|
||||||
|
|
||||||
- name: Make sure the tokens directory exits
|
|
||||||
file:
|
|
||||||
path: "{{ kube_token_dir }}"
|
|
||||||
state: directory
|
|
||||||
mode: "0644"
|
|
||||||
group: "{{ kube_cert_group }}"
|
|
||||||
|
|
||||||
- name: Generate tokens
|
|
||||||
import_tasks: gen_tokens.yml
|
|
||||||
tags:
|
|
||||||
- k8s-secrets
|
|
||||||
- k8s-gen-tokens
|
|
Loading…
Reference in New Issue