|
1 | 1 | #!/bin/sh
|
2 | 2 | set -e
|
3 | 3 | set -x
|
4 |
| - |
5 |
| -# ------------------------------------------------------------------------------ |
6 |
| -# Setup environment |
7 |
| -# ------------------------------------------------------------------------------ |
8 |
| - |
9 |
| -mkdir -p /etc/kubernetes/pki |
10 |
| -ln -sf /pki/apiserver-etcd-client/tls.crt /etc/kubernetes/pki/apiserver-etcd-client.crt |
11 |
| -ln -sf /pki/apiserver-etcd-client/tls.key /etc/kubernetes/pki/apiserver-etcd-client.key |
12 |
| -ln -sf /pki/apiserver-kubelet-client/tls.crt /etc/kubernetes/pki/apiserver-kubelet-client.crt |
13 |
| -ln -sf /pki/apiserver-kubelet-client/tls.key /etc/kubernetes/pki/apiserver-kubelet-client.key |
14 |
| -ln -sf /pki/apiserver/tls.crt /etc/kubernetes/pki/apiserver.crt |
15 |
| -ln -sf /pki/apiserver/tls.key /etc/kubernetes/pki/apiserver.key |
16 |
| -ln -sf /pki/ca/tls.crt /etc/kubernetes/pki/ca.crt |
17 |
| -ln -sf /pki/ca/tls.key /etc/kubernetes/pki/ca.key |
18 |
| -ln -sf /pki/front-proxy-ca/tls.key /etc/kubernetes/pki/front-proxy-ca.crt |
19 |
| -ln -sf /pki/front-proxy-ca/tls.crt /etc/kubernetes/pki/front-proxy-ca.key |
20 |
| -ln -sf /pki/front-proxy-client/tls.key /etc/kubernetes/pki/front-proxy-client.crt |
21 |
| -ln -sf /pki/front-proxy-client/tls.crt /etc/kubernetes/pki/front-proxy-client.key |
| 4 | +ENDPOINT=$(awk -F'[ "]+' '$1 == "controlPlaneEndpoint:" {print $2}' /config/kubeadmcfg.yaml) |
22 | 5 |
|
23 | 6 | # ------------------------------------------------------------------------------
|
24 | 7 | # Update secrets and component configs
|
25 | 8 | # ------------------------------------------------------------------------------
|
26 | 9 |
|
27 |
| -cat >kubeadmcfg.yaml <<EOT |
28 |
| -apiVersion: "kubeadm.k8s.io/v1beta2" |
29 |
| -kind: ClusterConfiguration |
30 |
| -imageRepository: k8s.gcr.io |
31 |
| -controlPlaneEndpoint: "${FULL_NAME}-apiserver:6443" |
32 |
| -EOT |
33 |
| - |
34 |
| -{{- if .Values.apiServer.enabled }}{{"\n"}} |
35 |
| -# generate sa key |
36 |
| -if ! kubectl get secret "${FULL_NAME}-pki-sa" >/dev/null; then |
37 |
| - kubeadm init phase certs sa |
38 |
| - kubectl create secret generic "${FULL_NAME}-pki-sa" --from-file=/etc/kubernetes/pki/sa.pub --from-file=/etc/kubernetes/pki/sa.key |
39 |
| -fi |
40 |
| -{{- end }} |
41 |
| - |
42 |
| -# generate cluster-admin kubeconfig |
43 |
| -rm -f /etc/kubernetes/admin.conf |
44 |
| -kubeadm init phase kubeconfig admin --config kubeadmcfg.yaml |
45 |
| -kubectl --kubeconfig=/etc/kubernetes/admin.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" |
46 |
| -kubectl create secret generic "${FULL_NAME}-admin-conf" --from-file=/etc/kubernetes/admin.conf --dry-run=client -o yaml | kubectl apply -f - |
47 |
| - |
48 |
| -{{- if .Values.controllerManager.enabled }}{{"\n"}} |
49 |
| -# generate controller-manager kubeconfig |
50 |
| -rm -f /etc/kubernetes/controller-manager.conf |
51 |
| -kubeadm init phase kubeconfig controller-manager --config kubeadmcfg.yaml |
52 |
| -kubectl --kubeconfig=/etc/kubernetes/controller-manager.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" |
53 |
| -kubectl create secret generic "${FULL_NAME}-controller-manager-conf" --from-file=/etc/kubernetes/controller-manager.conf --dry-run=client -o yaml | kubectl apply -f - |
54 |
| -{{- end }} |
55 |
| - |
56 |
| -{{- if .Values.scheduler.enabled }}{{"\n"}} |
57 |
| -# generate scheduler kubeconfig |
58 |
| -rm -f /etc/kubernetes/scheduler.conf |
59 |
| -kubeadm init phase kubeconfig scheduler --config kubeadmcfg.yaml |
60 |
| -kubectl --kubeconfig=/etc/kubernetes/scheduler.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" |
61 |
| -kubectl create secret generic "${FULL_NAME}-scheduler-conf" --from-file=/etc/kubernetes/scheduler.conf --dry-run=client -o yaml | kubectl apply -f - |
62 |
| -{{- end }} |
63 |
| - |
64 |
| -{{- if .Values.konnectivityServer.enabled }}{{"\n"}} |
65 |
| -# generate konnectivity-server kubeconfig |
66 |
| -openssl req -subj "/CN=system:konnectivity-server" -new -newkey rsa:2048 -nodes -out konnectivity.csr -keyout konnectivity.key -out konnectivity.csr |
67 |
| -openssl x509 -req -in konnectivity.csr -CA /etc/kubernetes/pki/ca.crt -CAkey /etc/kubernetes/pki/ca.key -CAcreateserial -out konnectivity.crt -days 375 -sha256 |
68 |
| -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config set-credentials system:konnectivity-server --client-certificate konnectivity.crt --client-key konnectivity.key --embed-certs=true |
69 |
| -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" --certificate-authority /etc/kubernetes/pki/ca.crt --embed-certs=true |
70 |
| -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config set-context system:konnectivity-server@kubernetes --cluster kubernetes --user system:konnectivity-server |
71 |
| -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config use-context system:konnectivity-server@kubernetes |
72 |
| -kubectl create secret generic "${FULL_NAME}-konnectivity-server-conf" --from-file=/etc/kubernetes/konnectivity-server.conf --dry-run=client -o yaml | kubectl apply -f - |
73 |
| -{{- end }} |
74 |
| - |
75 | 10 | # wait for cluster
|
76 |
| -echo "Waiting for api-server endpoint ${FULL_NAME}-apiserver:6443..." |
77 |
| -until kubectl --kubeconfig /etc/kubernetes/admin.conf cluster-info >/dev/null 2>/dev/null; do |
| 11 | +echo "Waiting for api-server endpoint ${ENDPOINT}..." |
| 12 | +until kubectl cluster-info >/dev/null 2>/dev/null; do |
78 | 13 | sleep 1
|
79 | 14 | done
|
80 | 15 |
|
|
84 | 19 | export KUBECONFIG=/etc/kubernetes/admin.conf
|
85 | 20 |
|
86 | 21 | # upload configuration
|
| 22 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/6 |
87 | 23 | kubeadm init phase upload-config kubeadm --config /config/kubeadmcfg.yaml
|
88 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf patch configmap -n kube-system kubeadm-config \ |
| 24 | +kubectl patch configmap -n kube-system kubeadm-config \ |
89 | 25 | -p '{"data":{"ClusterStatus":"apiEndpoints: {}\napiVersion: kubeadm.k8s.io/v1beta2\nkind: ClusterStatus"}}'
|
90 | 26 |
|
91 | 27 | # upload configuration
|
| 28 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/5 |
92 | 29 | kubeadm init phase upload-config kubelet --config /config/kubeadmcfg.yaml -v1 2>&1 |
|
93 | 30 | while read line; do echo "$line" | grep 'Preserving the CRISocket information for the control-plane node' && killall kubeadm || echo "$line"; done
|
94 | 31 |
|
95 | 32 | # setup bootstrap-tokens
|
| 33 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/7 |
96 | 34 | kubeadm init phase bootstrap-token --config /config/kubeadmcfg.yaml --skip-token-print
|
97 | 35 |
|
98 | 36 | # correct apiserver address for the external clients
|
99 |
| -tmp="$(mktemp -d)" |
100 |
| -kubectl --kubeconfig "$tmp/kubeconfig" config set clusters..server "https://${CONTROL_PLANE_ENDPOINT:-${FULL_NAME}-apiserver:6443}" |
101 |
| -kubectl --kubeconfig "$tmp/kubeconfig" config set clusters..certificate-authority-data "$(base64 /etc/kubernetes/pki/ca.crt | tr -d '\n')" |
102 |
| -kubectl create configmap cluster-info --from-file="$tmp/kubeconfig" --dry-run=client -o yaml | kubectl --kubeconfig /etc/kubernetes/admin.conf apply -n kube-public -f - |
103 |
| -rm -rf "$tmp" |
| 37 | +kubectl apply -n kube-public -f - <<EOT |
| 38 | +apiVersion: v1 |
| 39 | +kind: ConfigMap |
| 40 | +metadata: |
| 41 | + name: cluster-info |
| 42 | +data: |
| 43 | + kubeconfig: | |
| 44 | + apiVersion: v1 |
| 45 | + clusters: |
| 46 | + - cluster: |
| 47 | + certificate-authority-data: $(base64 /pki/admin-client/ca.crt | tr -d '\n') |
| 48 | + server: https://${ENDPOINT} |
| 49 | + name: "" |
| 50 | + contexts: null |
| 51 | + current-context: "" |
| 52 | + kind: Config |
| 53 | + preferences: {} |
| 54 | + users: null |
| 55 | +EOT |
104 | 56 |
|
105 | 57 | {{- if .Values.konnectivityServer.enabled }}{{"\n"}}
|
106 | 58 | # install konnectivity server
|
107 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f /manifests/konnectivity-server-rbac.yaml |
| 59 | +kubectl apply -f /manifests/konnectivity-server-rbac.yaml |
108 | 60 | {{- else }}{{"\n"}}
|
109 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf delete clusterrolebinding/system:konnectivity-server 2>/dev/null || true |
| 61 | +kubectl delete clusterrolebinding/system:konnectivity-server 2>/dev/null || true |
110 | 62 | {{- end }}
|
111 | 63 |
|
112 | 64 | {{- if .Values.konnectivityAgent.enabled }}{{"\n"}}
|
113 | 65 | # install konnectivity agent
|
114 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f /manifests/konnectivity-agent-deployment.yaml -f /manifests/konnectivity-agent-rbac.yaml |
| 66 | +kubectl apply -f /manifests/konnectivity-agent-deployment.yaml -f /manifests/konnectivity-agent-rbac.yaml |
115 | 67 | {{- else }}{{"\n"}}
|
116 | 68 | # uninstall konnectivity agent
|
117 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf -n kube-system delete deployment/konnectivity-agent serviceaccount/konnectivity-agent 2>/dev/null || true |
| 69 | +kubectl -n kube-system delete deployment/konnectivity-agent serviceaccount/konnectivity-agent 2>/dev/null || true |
118 | 70 | {{- end }}
|
119 | 71 |
|
120 | 72 | {{- if .Values.coredns.enabled }}{{"\n"}}
|
121 | 73 | # install coredns addon
|
| 74 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/3 |
122 | 75 | kubeadm init phase addon coredns --config /config/kubeadmcfg.yaml
|
123 | 76 | {{- else }}{{"\n"}}
|
124 | 77 | # uninstall coredns addon
|
125 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf -n kube-system delete configmap/coredns deployment/coredns 2>/dev/null || true |
| 78 | +kubectl -n kube-system delete configmap/coredns deployment/coredns 2>/dev/null || true |
126 | 79 | {{- end }}
|
127 | 80 |
|
128 | 81 | {{- if .Values.kubeProxy.enabled }}{{"\n"}}
|
129 | 82 | # install kube-proxy addon
|
| 83 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/4 |
130 | 84 | kubeadm init phase addon kube-proxy --config /config/kubeadmcfg.yaml
|
131 | 85 | {{- else }}{{"\n"}}
|
132 | 86 | # uninstall kube-proxy addon
|
133 |
| -kubectl --kubeconfig /etc/kubernetes/admin.conf -n kube-system delete configmap/kube-proxy daemonset/kube-proxy 2>/dev/null || true |
| 87 | +kubectl -n kube-system delete configmap/kube-proxy daemonset/kube-proxy 2>/dev/null || true |
134 | 88 | {{- end }}
|
135 | 89 |
|
136 | 90 | {{- with .Values.extraManifests }}{{"\n"}}
|
|
0 commit comments