|
1 | 1 | #!/bin/sh |
2 | 2 | set -e |
3 | 3 | set -x |
4 | | - |
5 | | -# ------------------------------------------------------------------------------ |
6 | | -# Setup environment |
7 | | -# ------------------------------------------------------------------------------ |
8 | | - |
9 | | -mkdir -p /etc/kubernetes/pki |
10 | | -ln -sf /pki/apiserver-etcd-client/tls.crt /etc/kubernetes/pki/apiserver-etcd-client.crt |
11 | | -ln -sf /pki/apiserver-etcd-client/tls.key /etc/kubernetes/pki/apiserver-etcd-client.key |
12 | | -ln -sf /pki/apiserver-kubelet-client/tls.crt /etc/kubernetes/pki/apiserver-kubelet-client.crt |
13 | | -ln -sf /pki/apiserver-kubelet-client/tls.key /etc/kubernetes/pki/apiserver-kubelet-client.key |
14 | | -ln -sf /pki/apiserver/tls.crt /etc/kubernetes/pki/apiserver.crt |
15 | | -ln -sf /pki/apiserver/tls.key /etc/kubernetes/pki/apiserver.key |
16 | | -ln -sf /pki/ca/tls.crt /etc/kubernetes/pki/ca.crt |
17 | | -ln -sf /pki/ca/tls.key /etc/kubernetes/pki/ca.key |
18 | | -ln -sf /pki/front-proxy-ca/tls.key /etc/kubernetes/pki/front-proxy-ca.crt |
19 | | -ln -sf /pki/front-proxy-ca/tls.crt /etc/kubernetes/pki/front-proxy-ca.key |
20 | | -ln -sf /pki/front-proxy-client/tls.key /etc/kubernetes/pki/front-proxy-client.crt |
21 | | -ln -sf /pki/front-proxy-client/tls.crt /etc/kubernetes/pki/front-proxy-client.key |
| 4 | +ENDPOINT=$(awk -F'[ "]+' '$1 == "controlPlaneEndpoint:" {print $2}' /config/kubeadmcfg.yaml) |
22 | 5 |
|
23 | 6 | # ------------------------------------------------------------------------------ |
24 | 7 | # Update secrets and component configs |
25 | 8 | # ------------------------------------------------------------------------------ |
26 | 9 |
|
27 | | -cat >kubeadmcfg.yaml <<EOT |
28 | | -apiVersion: "kubeadm.k8s.io/v1beta2" |
29 | | -kind: ClusterConfiguration |
30 | | -imageRepository: k8s.gcr.io |
31 | | -controlPlaneEndpoint: "${FULL_NAME}-apiserver:6443" |
32 | | -EOT |
33 | | - |
34 | | -{{- if .Values.apiServer.enabled }}{{"\n"}} |
35 | | -# generate sa key |
36 | | -if ! kubectl get secret "${FULL_NAME}-pki-sa" >/dev/null; then |
37 | | - kubeadm init phase certs sa |
38 | | - kubectl create secret generic "${FULL_NAME}-pki-sa" --from-file=/etc/kubernetes/pki/sa.pub --from-file=/etc/kubernetes/pki/sa.key |
39 | | -fi |
40 | | -{{- end }} |
41 | | - |
42 | | -# generate cluster-admin kubeconfig |
43 | | -rm -f /etc/kubernetes/admin.conf |
44 | | -kubeadm init phase kubeconfig admin --config kubeadmcfg.yaml |
45 | | -kubectl --kubeconfig=/etc/kubernetes/admin.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" |
46 | | -kubectl create secret generic "${FULL_NAME}-admin-conf" --from-file=/etc/kubernetes/admin.conf --dry-run=client -o yaml | kubectl apply -f - |
47 | | - |
48 | | -{{- if .Values.controllerManager.enabled }}{{"\n"}} |
49 | | -# generate controller-manager kubeconfig |
50 | | -rm -f /etc/kubernetes/controller-manager.conf |
51 | | -kubeadm init phase kubeconfig controller-manager --config kubeadmcfg.yaml |
52 | | -kubectl --kubeconfig=/etc/kubernetes/controller-manager.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" |
53 | | -kubectl create secret generic "${FULL_NAME}-controller-manager-conf" --from-file=/etc/kubernetes/controller-manager.conf --dry-run=client -o yaml | kubectl apply -f - |
54 | | -{{- end }} |
55 | | - |
56 | | -{{- if .Values.scheduler.enabled }}{{"\n"}} |
57 | | -# generate scheduler kubeconfig |
58 | | -rm -f /etc/kubernetes/scheduler.conf |
59 | | -kubeadm init phase kubeconfig scheduler --config kubeadmcfg.yaml |
60 | | -kubectl --kubeconfig=/etc/kubernetes/scheduler.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" |
61 | | -kubectl create secret generic "${FULL_NAME}-scheduler-conf" --from-file=/etc/kubernetes/scheduler.conf --dry-run=client -o yaml | kubectl apply -f - |
62 | | -{{- end }} |
63 | | - |
64 | | -{{- if .Values.konnectivityServer.enabled }}{{"\n"}} |
65 | | -# generate konnectivity-server kubeconfig |
66 | | -openssl req -subj "/CN=system:konnectivity-server" -new -newkey rsa:2048 -nodes -out konnectivity.csr -keyout konnectivity.key -out konnectivity.csr |
67 | | -openssl x509 -req -in konnectivity.csr -CA /etc/kubernetes/pki/ca.crt -CAkey /etc/kubernetes/pki/ca.key -CAcreateserial -out konnectivity.crt -days 375 -sha256 |
68 | | -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config set-credentials system:konnectivity-server --client-certificate konnectivity.crt --client-key konnectivity.key --embed-certs=true |
69 | | -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config set-cluster kubernetes --server "https://${FULL_NAME}-apiserver:6443" --certificate-authority /etc/kubernetes/pki/ca.crt --embed-certs=true |
70 | | -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config set-context system:konnectivity-server@kubernetes --cluster kubernetes --user system:konnectivity-server |
71 | | -kubectl --kubeconfig /etc/kubernetes/konnectivity-server.conf config use-context system:konnectivity-server@kubernetes |
72 | | -kubectl create secret generic "${FULL_NAME}-konnectivity-server-conf" --from-file=/etc/kubernetes/konnectivity-server.conf --dry-run=client -o yaml | kubectl apply -f - |
73 | | -{{- end }} |
74 | | - |
75 | 10 | # wait for cluster |
76 | | -echo "Waiting for api-server endpoint ${FULL_NAME}-apiserver:6443..." |
77 | | -until kubectl --kubeconfig /etc/kubernetes/admin.conf cluster-info >/dev/null 2>/dev/null; do |
| 11 | +echo "Waiting for api-server endpoint ${ENDPOINT}..." |
| 12 | +until kubectl cluster-info >/dev/null 2>/dev/null; do |
78 | 13 | sleep 1 |
79 | 14 | done |
80 | 15 |
|
|
84 | 19 | export KUBECONFIG=/etc/kubernetes/admin.conf |
85 | 20 |
|
86 | 21 | # upload configuration |
| 22 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/6 |
87 | 23 | kubeadm init phase upload-config kubeadm --config /config/kubeadmcfg.yaml |
88 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf patch configmap -n kube-system kubeadm-config \ |
| 24 | +kubectl patch configmap -n kube-system kubeadm-config \ |
89 | 25 | -p '{"data":{"ClusterStatus":"apiEndpoints: {}\napiVersion: kubeadm.k8s.io/v1beta2\nkind: ClusterStatus"}}' |
90 | 26 |
|
91 | 27 | # upload configuration |
| 28 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/5 |
92 | 29 | kubeadm init phase upload-config kubelet --config /config/kubeadmcfg.yaml -v1 2>&1 | |
93 | 30 | while read line; do echo "$line" | grep 'Preserving the CRISocket information for the control-plane node' && killall kubeadm || echo "$line"; done |
94 | 31 |
|
95 | 32 | # setup bootstrap-tokens |
| 33 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/7 |
96 | 34 | kubeadm init phase bootstrap-token --config /config/kubeadmcfg.yaml --skip-token-print |
97 | 35 |
|
98 | 36 | # correct apiserver address for the external clients |
99 | | -tmp="$(mktemp -d)" |
100 | | -kubectl --kubeconfig "$tmp/kubeconfig" config set clusters..server "https://${CONTROL_PLANE_ENDPOINT:-${FULL_NAME}-apiserver:6443}" |
101 | | -kubectl --kubeconfig "$tmp/kubeconfig" config set clusters..certificate-authority-data "$(base64 /etc/kubernetes/pki/ca.crt | tr -d '\n')" |
102 | | -kubectl create configmap cluster-info --from-file="$tmp/kubeconfig" --dry-run=client -o yaml | kubectl --kubeconfig /etc/kubernetes/admin.conf apply -n kube-public -f - |
103 | | -rm -rf "$tmp" |
| 37 | +kubectl apply -n kube-public -f - <<EOT |
| 38 | +apiVersion: v1 |
| 39 | +kind: ConfigMap |
| 40 | +metadata: |
| 41 | + name: cluster-info |
| 42 | +data: |
| 43 | + kubeconfig: | |
| 44 | + apiVersion: v1 |
| 45 | + clusters: |
| 46 | + - cluster: |
| 47 | + certificate-authority-data: $(base64 /pki/admin-client/ca.crt | tr -d '\n') |
| 48 | + server: https://${ENDPOINT} |
| 49 | + name: "" |
| 50 | + contexts: null |
| 51 | + current-context: "" |
| 52 | + kind: Config |
| 53 | + preferences: {} |
| 54 | + users: null |
| 55 | +EOT |
104 | 56 |
|
105 | 57 | {{- if .Values.konnectivityServer.enabled }}{{"\n"}} |
106 | 58 | # install konnectivity server |
107 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f /manifests/konnectivity-server-rbac.yaml |
| 59 | +kubectl apply -f /manifests/konnectivity-server-rbac.yaml |
108 | 60 | {{- else }}{{"\n"}} |
109 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf delete clusterrolebinding/system:konnectivity-server 2>/dev/null || true |
| 61 | +kubectl delete clusterrolebinding/system:konnectivity-server 2>/dev/null || true |
110 | 62 | {{- end }} |
111 | 63 |
|
112 | 64 | {{- if .Values.konnectivityAgent.enabled }}{{"\n"}} |
113 | 65 | # install konnectivity agent |
114 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f /manifests/konnectivity-agent-deployment.yaml -f /manifests/konnectivity-agent-rbac.yaml |
| 66 | +kubectl apply -f /manifests/konnectivity-agent-deployment.yaml -f /manifests/konnectivity-agent-rbac.yaml |
115 | 67 | {{- else }}{{"\n"}} |
116 | 68 | # uninstall konnectivity agent |
117 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf -n kube-system delete deployment/konnectivity-agent serviceaccount/konnectivity-agent 2>/dev/null || true |
| 69 | +kubectl -n kube-system delete deployment/konnectivity-agent serviceaccount/konnectivity-agent 2>/dev/null || true |
118 | 70 | {{- end }} |
119 | 71 |
|
120 | 72 | {{- if .Values.coredns.enabled }}{{"\n"}} |
121 | 73 | # install coredns addon |
| 74 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/3 |
122 | 75 | kubeadm init phase addon coredns --config /config/kubeadmcfg.yaml |
123 | 76 | {{- else }}{{"\n"}} |
124 | 77 | # uninstall coredns addon |
125 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf -n kube-system delete configmap/coredns deployment/coredns 2>/dev/null || true |
| 78 | +kubectl -n kube-system delete configmap/coredns deployment/coredns 2>/dev/null || true |
126 | 79 | {{- end }} |
127 | 80 |
|
128 | 81 | {{- if .Values.kubeProxy.enabled }}{{"\n"}} |
129 | 82 | # install kube-proxy addon |
| 83 | +# TODO: https://github.com/kvaps/kubernetes-in-kubernetes/issues/4 |
130 | 84 | kubeadm init phase addon kube-proxy --config /config/kubeadmcfg.yaml |
131 | 85 | {{- else }}{{"\n"}} |
132 | 86 | # uninstall kube-proxy addon |
133 | | -kubectl --kubeconfig /etc/kubernetes/admin.conf -n kube-system delete configmap/kube-proxy daemonset/kube-proxy 2>/dev/null || true |
| 87 | +kubectl -n kube-system delete configmap/kube-proxy daemonset/kube-proxy 2>/dev/null || true |
134 | 88 | {{- end }} |
135 | 89 |
|
136 | 90 | {{- with .Values.extraManifests }}{{"\n"}} |
|
0 commit comments