简体   繁体   中英

How to authenticate to multiple GKE Kubernetes clusters using dynamic and unique google credentials

We have a system designed to manage a large number of Kubernetes clusters housed in external customer accounts simultaneously. This system currently works by having the kubeconfig stored in a database that is queried at runtime, and then passed into the golang kube-client constructor like so:

clientcmd.NewClientConfigFromBytes([]byte(kubeConfigFromDB))

For clusters using basic auth, this "just works".

For EKS clusters, this works as long as both the aws-iam-authenticator is installed on the machine that is running the golang code such that the kube-client can call out to it for authentication, and correct API_AWS_ACCESS_KEY_ID and API_AWS_SECRET_ACCESS_KEY are set within the kubeconfig 's user.exec.env key.

For GKE clusters, it's not clear what the best practice way of achieving this is, and I have not been able to get it to work yet despite trying a handful of different operations detailed below. The standard practice for generating a kubeconfig for a GKE cluster is very similar to EKS (detailed here https://cloud.google.com/kubernetes-engine/docs/how-to/cluster-access-for-kubectl?authuser=1#generate_kubeconfig_entry ) which uses gcloud config config-helper to generate the authentication credentials.

One idea is to use the GOOGLE_APPLICATION_CREDENTIALS environment variable, however the problem with this is that it is global and thus we cannot have our system simultaneously talk to many remote GKE clusters because each needs a unique set of google credentials to authenticate.

My second idea was to use the --impersonate-service-account flag provided to gcloud config config-helper , however it crashes when I run it with the following error:

$ gcloud config config-helper --format=json --impersonate-service-account=acct-with-gke-access@myorg.iam.gserviceaccount.com --project myproject
WARNING: This command is using service account impersonation. All API calls will be executed as [acct-with-gke-access@myorg.iam.gserviceaccount.com].
ERROR: gcloud crashed (AttributeError): 'unicode' object has no attribute 'utcnow'

My final idea is quite complicated. I would get the google-credentials-JSON and put it in the kubeconfig like so:

  user:
    auth-provider:
      config:
        credentials: "<google-credentials-JSON>"
      name: my-custom-forked-gcp

And I would create my own copy of https://github.com/kubernetes/client-go/blob/master/plugin/pkg/client/auth/gcp/gcp.go#L156 and replace line 156

ts, err := google.DefaultTokenSource(context.Background(), scopes...)

with

ts, err := tokenSourceFromJSON(context.Background(),  gcpConfig["credentials"], scopes...)

Where tokenSourceFromJSON is a new method that I add that looks like this:

func tokenSourceFromJSON(ctx context.Context, jsonData string, scopes ...string) (oauth2.TokenSource, error) {
  creds, err := google.CredentialsFromJSON(ctx, []byte(jsonData), scopes...)
  if err != nil {
    return nil, err
  }
  return creds.TokenSource, nil
}

This last idea will probably work (hopefully! I'm working on it now) but it seems like a very complicated solution to a simple problem: to provide the google-credentials-JSON at runtime to the golang kubernetes client to authenticate using those credentials. Is there an easier way?

One idea is to use the GOOGLE_APPLICATION_CREDENTIALS environment variable, however, the problem with this is that it is global and thus we cannot have our system simultaneously talk to many remote GKE clusters because each needs a unique set of Google credentials to authenticate.

You can override your env variable for the specific shell that is running your go program with something like:

os.Setenv("GOOGLE_APPLICATION_CREDENTIALS", value)

My second idea was to use the --impersonate-service-account flag provided to gcloud config config-helper

Looks like a bug in the python code of the gcloud app. As described here utcnow is only applicable to datetime.datetime object. You could check if that module works in python shell in your system.

My final idea is quite complicated.

Seems like this would work as long as the value of credentials: "<google-credentials-JSON>" doesn't change between different sessions to the GCP API (The credentials value might have an expiration)

Note: PR for the final idea.

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM