簡體   English   中英

如何使用 JSON 服務帳戶密鑰在 GO 中獲取 Kubernetes 客戶端集?

[英]How can I get a Kubernetes clientset in GO using a JSON service account key?

我需要使用從 JSON 服務帳戶密鑰文件中提取的令牌創建 Kubernetes 客戶端集。

我在配置中明確提供了這個令牌,但是它仍然在尋找 Google Application-Default 憑據,並且因為找不到它們而崩潰。

下面是我的代碼:

package main

import (
    "context"
    "encoding/base64"
    "fmt"
    "io/ioutil"

    "golang.org/x/oauth2"
    "golang.org/x/oauth2/google"
    gke "google.golang.org/api/container/v1"
    "google.golang.org/api/option"
    "k8s.io/client-go/kubernetes"
    _ "k8s.io/client-go/plugin/pkg/client/auth/gcp"
    "k8s.io/client-go/tools/clientcmd"
    "k8s.io/client-go/tools/clientcmd/api"
)

const (
    projectID   = "my_project_id"
    clusterName = "my_cluster_name"
    scope       = "https://www.googleapis.com/auth/cloud-platform"
)

func main() {
    ctx := context.Background()

    // Read JSON key and extract the token
    data, err := ioutil.ReadFile("sa_key.json")
    if err != nil {
        panic(err)
    }
    creds, err := google.CredentialsFromJSON(ctx, data, scope)
    if err != nil {
        panic(err)
    }
    token, err := creds.TokenSource.Token()
    if err != nil {
        panic(err)
    }
    fmt.Println("token", token.AccessToken)

    // Create GKE client
    tokenSource := oauth2.StaticTokenSource(token)
    gkeClient, err := gke.NewService(ctx, option.WithTokenSource(tokenSource))
    if err != nil {
        panic(err)
    }

    // Create a dynamic kube config
    inMemKubeConfig, err := createInMemKubeConfig(ctx, gkeClient, token, projectID)
    if err != nil {
        panic(err)
    }

    // Use it to create a rest.Config
    config, err := clientcmd.NewNonInteractiveClientConfig(*inMemKubeConfig, clusterName, &clientcmd.ConfigOverrides{CurrentContext: clusterName}, nil).ClientConfig()
    if err != nil {
        panic(err)
    }

    // Create the clientset
    clientset, err := kubernetes.NewForConfig(config)
    if err != nil {
        panic(err) // this where the code crashes because it can't find the Google ADCs
    }

    fmt.Printf("clientset %+v\n", clientset)
}

func createInMemKubeConfig(ctx context.Context, client *gke.Service, token *oauth2.Token, projectID string) (*api.Config, error) {
    k8sConf := api.Config{
        APIVersion: "v1",
        Kind:       "Config",
        Clusters:   map[string]*api.Cluster{},
        AuthInfos:  map[string]*api.AuthInfo{},
        Contexts:   map[string]*api.Context{},
    }

    // List all clusters in project with id projectID across all zones ("-")
    resp, err := client.Projects.Zones.Clusters.List(projectID, "-").Context(ctx).Do()
    if err != nil {
        return nil, err
    }

    for _, f := range resp.Clusters {
        name := fmt.Sprintf("gke_%s_%s_%s", projectID, f.Zone, f.Name) // My custom naming convention
        cert, err := base64.StdEncoding.DecodeString(f.MasterAuth.ClusterCaCertificate)
        if err != nil {
            return nil, err
        }

        k8sConf.Clusters[name] = &api.Cluster{
            CertificateAuthorityData: cert,
            Server:                   "https://" + f.Endpoint,
        }

        k8sConf.Contexts[name] = &api.Context{
            Cluster:  name,
            AuthInfo: name,
        }

        k8sConf.AuthInfos[name] = &api.AuthInfo{
            Token: token.AccessToken,
            AuthProvider: &api.AuthProviderConfig{
                Name: "gcp",
                Config: map[string]string{
                    "scopes": scope,
                },
            },
        }
    }
    return &k8sConf, nil
}

這是錯誤消息:

panic: cannot construct google default token source: google: could not find default credentials. See https://developers.google.com/accounts/docs/application-default-credentials for more information.

您在指定上下文名稱為gke_%s_%s_%s地方使用了clusterName兩次。

你的上下文被命名為gke_%s_%s_%s

name := fmt.Sprintf("gke_%s_%s_%s", projectID, f.Zone, f.Name)

k8sConf.Contexts[name] = &api.Context{
  Cluster:  name,
  AuthInfo: name,
}

但是,當您使用clientcmd.NewNonInteractiveConfig時,您使用clusterName作為context參數,然后再次作為CurrentContext覆蓋。

clientcmd.NewNonInteractiveClientConfig(
  *inMemKubeConfig,
  clusterName,                   // Incorrect should be `gke_%s_%s_%s`
  &clientcmd.ConfigOverrides{
    CurrentContext: clusterName, // Redudant and incorrect
  },
  nil,
).ClientConfig()

您想使用等效的gke_%s_%s_%s名稱。 或者,在定義上下文name時使用集群name

config, err := clientcmd.NewNonInteractiveClientConfig(
  *inMemKubeConfig,
  "gke_%s_%s_%s", // You need to replace this with the Context name
  &clientcmd.ConfigOverrides{},
  clientcmd.DefaultClientConfig.ConfigAccess(),
).ClientConfig()

這對我有用。

它基於這個要點,這正是我想要的。 它使用oauth2.TokenSource object 可以輸入各種令牌類型,因此非常靈活。

我花了很長時間才找到這個解決方案,所以我希望這對某人有幫助!

package main

import (
    "context"
    "encoding/base64"
    "fmt"
    "io/ioutil"
    "log"
    "net/http"

    gke "google.golang.org/api/container/v1"
    "google.golang.org/api/option"

    "golang.org/x/oauth2"
    "golang.org/x/oauth2/google"
    metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    "k8s.io/client-go/kubernetes"
    "k8s.io/client-go/rest"
    clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
)

const (
    googleAuthPlugin = "gcp"
    projectID        = "my_project"
    clusterName      = "my_cluster"
    zone             = "my_cluster_zone"
    scope            = "https://www.googleapis.com/auth/cloud-platform"
)

type googleAuthProvider struct {
    tokenSource oauth2.TokenSource
}

// These funcitons are needed even if we don't utilize them
// So that googleAuthProvider is an rest.AuthProvider interface
func (g *googleAuthProvider) WrapTransport(rt http.RoundTripper) http.RoundTripper {
    return &oauth2.Transport{
        Base:   rt,
        Source: g.tokenSource,
    }
}
func (g *googleAuthProvider) Login() error { return nil }


func main() {
    ctx := context.Background()

    // Extract a token from the JSON SA key
    data, err := ioutil.ReadFile("sa_key.json")
    if err != nil {
        panic(err)
    }
    creds, err := google.CredentialsFromJSON(ctx, data, scope)
    if err != nil {
        panic(err)
    }
    token, err := creds.TokenSource.Token()
    if err != nil {
        panic(err)
    }
    tokenSource := oauth2.StaticTokenSource(token)

    // Authenticate with the token
    // If it's nil use Google ADC
    if err := rest.RegisterAuthProviderPlugin(googleAuthPlugin,
        func(clusterAddress string, config map[string]string, persister rest.AuthProviderConfigPersister) (rest.AuthProvider, error) {
            var err error
            if tokenSource == nil {
                tokenSource, err = google.DefaultTokenSource(ctx, scope)
                if err != nil {
                    return nil, fmt.Errorf("failed to create google token source: %+v", err)
                }
            }
            return &googleAuthProvider{tokenSource: tokenSource}, nil
        }); err != nil {
        log.Fatalf("Failed to register %s auth plugin: %v", googleAuthPlugin, err)
    }

    gkeClient, err := gke.NewService(ctx, option.WithTokenSource(tokenSource))
    if err != nil {
        panic(err)
    }

    clientset, err := getClientSet(ctx, gkeClient, projectID, org, env)
    if err != nil {
        panic(err)
    }

    // Demo to make sure it works
    pods, err := clientset.CoreV1().Pods("").List(ctx, metav1.ListOptions{})
    if err != nil {
        panic(err)
    }
    log.Printf("There are %d pods in the cluster", len(pods.Items))
    for _, pod := range pods.Items {
        fmt.Println(pod.Name)
    }
}

func getClientSet(ctx context.Context, client *gke.Service, projectID, name string) (*kubernetes.Clientset, error) {
    // Get cluster info
    cluster, err := client.Projects.Zones.Clusters.Get(projectID, zone, name).Context(ctx).Do()
    if err != nil {
        panic(err)
    }

    // Decode cluster CA certificate
    cert, err := base64.StdEncoding.DecodeString(cluster.MasterAuth.ClusterCaCertificate)
    if err != nil {
        return nil, err
    }

    // Build a config using the cluster info
    config := &rest.Config{
        TLSClientConfig: rest.TLSClientConfig{
            CAData: cert,
        },
        Host:         "https://" + cluster.Endpoint,
        AuthProvider: &clientcmdapi.AuthProviderConfig{Name: googleAuthPlugin},
    }

    return kubernetes.NewForConfig(config)
}

暫無
暫無

聲明:本站的技術帖子網頁,遵循CC BY-SA 4.0協議,如果您需要轉載,請注明本站網址或者原文地址。任何問題請咨詢:yoyou2525@163.com.

 
粵ICP備18138465號  © 2020-2024 STACKOOM.COM