v3.8.0
===================================================================== --- Changes ------------------------------ - kubectl driver updates; getting better, but still need to fix autocomplete in certain circumstances - added -y|--yes flags to scwrypts to auto-accept user-prompts (use with caution) - figured out the whole mikefarah/yq vs kislyuk/yq thing; use YQ for compatiblity --- Bug fixes ---------------------------- - helm template generation now loads values in a more appropriate order which prevents overwrite by the wrong values file
This commit is contained in:
@ -1,19 +1,44 @@
|
||||
#####################################################################
|
||||
|
||||
DEPENDENCIES+=(
|
||||
kubectl
|
||||
)
|
||||
|
||||
REQUIRED_ENV+=(
|
||||
AWS_ACCOUNT
|
||||
AWS_REGION
|
||||
)
|
||||
DEPENDENCIES+=(kubectl yq)
|
||||
REQUIRED_ENV+=()
|
||||
|
||||
use cloud/aws/cli
|
||||
|
||||
#####################################################################
|
||||
|
||||
EKS_CLUSTER_LOGIN() {
|
||||
EKS__KUBECTL() { EKS kubectl $@; }
|
||||
EKS__FLUX() { EKS flux $@; }
|
||||
|
||||
#####################################################################
|
||||
|
||||
EKS() {
|
||||
local USAGE="
|
||||
usage: cli [...kubectl args...]
|
||||
|
||||
args:
|
||||
cli a kubectl-style CLI (e.g. kubectl, helm, flux, etc)
|
||||
|
||||
Allows access to kubernetes CLI commands by configuring environment
|
||||
to point to a specific cluster.
|
||||
"
|
||||
|
||||
REQUIRED_ENV=(AWS_REGION AWS_ACCOUNT CLUSTER_NAME) DEPENDENCIES=(kubectl $1) CHECK_ENVIRONMENT || return 1
|
||||
|
||||
local CONTEXT="arn:aws:eks:${AWS_REGION}:${AWS_ACCOUNT}:cluster/${CLUSTER_NAME}"
|
||||
|
||||
local CONTEXT_ARGS=()
|
||||
case $1 in
|
||||
helm ) CONTEXT_ARGS+=(--kube-context $CONTEXT) ;;
|
||||
* ) CONTEXT_ARGS+=(--context $CONTEXT) ;;
|
||||
esac
|
||||
|
||||
$1 ${CONTEXT_ARGS[@]} ${@:2}
|
||||
}
|
||||
|
||||
#####################################################################
|
||||
|
||||
EKS__CLUSTER_LOGIN() {
|
||||
local USAGE="
|
||||
usage: [...options...]
|
||||
|
||||
@ -25,6 +50,7 @@ EKS_CLUSTER_LOGIN() {
|
||||
cluster in EKS. Also creates the kubeconfig entry if it does not
|
||||
already exist.
|
||||
"
|
||||
REQUIRED_ENV=(AWS_ACCOUNT AWS_REGION) CHECK_ENVIRONMENT || return 1
|
||||
|
||||
local CLUSTER_NAME
|
||||
|
||||
|
116
zsh/lib/cloud/aws/eksctl.module.zsh
Normal file
116
zsh/lib/cloud/aws/eksctl.module.zsh
Normal file
@ -0,0 +1,116 @@
|
||||
#####################################################################
|
||||
|
||||
DEPENDENCIES+=(eksctl)
|
||||
REQUIRED_ENV+=()
|
||||
|
||||
use cloud/aws/eks
|
||||
|
||||
#####################################################################
|
||||
|
||||
EKSCTL() {
|
||||
REQUIRED_ENV=(AWS_PROFILE AWS_REGION) CHECK_ENVIRONMENT || return 1
|
||||
|
||||
AWS_PROFILE=$AWS_PROFILE AWS_REGION=$AWS_REGION \
|
||||
eksctl $@
|
||||
}
|
||||
|
||||
EKSCTL__CREATE_IAMSERVICEACCOUNT() {
|
||||
local USAGE="
|
||||
usage: serviceaccount-name namespace [...options...] -- [...'eksctl create iamserviceaccount' args...]
|
||||
|
||||
options:
|
||||
--serviceaccount (required) target k8s:ServiceAccount
|
||||
--namespace (required) target k8s:Namespace
|
||||
--role-name (required) name of the IAM role to assign
|
||||
|
||||
--force don't check for existing serviceaccount and override any existing configuration
|
||||
|
||||
eksctl create iamserviceaccount args:
|
||||
$(eksctl create iamserviceaccount --help 2>&1 | grep -v -- '--name' | grep -v -- '--namespace' | grep -v -- '--role-name' | sed 's/^/ /')
|
||||
"
|
||||
REQUIRED_ENV=(AWS_REGION AWS_ACCOUNT CLUSTER_NAME) CHECK_ENVIRONMENT || return 1
|
||||
|
||||
local SERVICEACCOUNT NAMESPACE ROLE_NAME
|
||||
local FORCE=0
|
||||
local EKSCTL_ARGS=()
|
||||
|
||||
while [[ $# -gt 0 ]]
|
||||
do
|
||||
case $1 in
|
||||
--serviceaccount ) SERVICEACCOUNT=$2; shift 1 ;;
|
||||
--namespace ) NAMESPACE=$2; shift 1 ;;
|
||||
--role-name ) ROLE_NAME=$2; shift 1 ;;
|
||||
|
||||
--force ) FORCE=1 ;;
|
||||
|
||||
-- ) shift 1; break ;;
|
||||
|
||||
* ) ERROR "unknown argument '$1'" ;;
|
||||
esac
|
||||
shift 1
|
||||
done
|
||||
|
||||
while [[ $# -gt 0 ]]; do EKSCTL_ARGS+=($1); shift 1; done
|
||||
|
||||
[ $SERVICEACCOUNT ] || ERROR "--serviceaccount is required"
|
||||
[ $NAMESPACE ] || ERROR "--namespace is required"
|
||||
[ $ROLE_NAME ] || ERROR "--role-name is required"
|
||||
|
||||
CHECK_ERRORS --no-fail || return 1
|
||||
|
||||
##########################################
|
||||
|
||||
[[ $FORCE -eq 0 ]] && {
|
||||
_EKS__CHECK_IAMSERVICEACCOUNT_EXISTS
|
||||
local EXISTS_STATUS=$?
|
||||
case $EXISTS_STATUS in
|
||||
0 )
|
||||
SUCCESS "'$NAMESPACE/$SERVICEACCOUNT' already configured with '$ROLE_NAME'"
|
||||
return 0
|
||||
;;
|
||||
1 ) ;; # role does not exist yet; continue with rollout
|
||||
2 )
|
||||
ERROR "'$NAMESPACE/$SERVICEACCOUNT' has been configured with a different role than '$ROLE_NAME'"
|
||||
REMINDER "must use --force flag to overwrite"
|
||||
return 2
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
STATUS "creating iamserviceaccount" \
|
||||
&& EKSCTL create iamserviceaccount \
|
||||
--cluster $CLUSTER_NAME \
|
||||
--namespace $NAMESPACE \
|
||||
--name $SERVICEACCOUNT \
|
||||
--role-name $ROLE_NAME \
|
||||
--override-existing-serviceaccounts \
|
||||
--approve \
|
||||
${EKSCTL_ARGS[@]} \
|
||||
&& SUCCESS "successfully configured '$NAMESPACE/$SERVICEACCOUNT' with IAM role '$ROLE_NAME'" \
|
||||
|| { ERROR "unable to configure '$NAMESPACE/$SERVICEACCOUNT' with IAM role '$ROLE_NAME' (check cloudformation dashboard for details)"; return 3; }
|
||||
}
|
||||
|
||||
_EKS__CHECK_IAMSERVICEACCOUNT_EXISTS() {
|
||||
STATUS "checking for existing role-arn"
|
||||
local CURRENT_ROLE_ARN=$(
|
||||
EKS__KUBECTL --namespace $NAMESPACE get serviceaccount $SERVICEACCOUNT -o yaml \
|
||||
| YQ -r '.metadata.annotations["eks.amazonaws.com/role-arn"]' \
|
||||
| grep -v '^null$' \
|
||||
)
|
||||
|
||||
[ $CURRENT_ROLE_ARN ] || {
|
||||
STATUS "serviceaccount does not exist or has no configured role"
|
||||
return 1
|
||||
}
|
||||
|
||||
[[ $CURRENT_ROLE_ARN =~ "$ROLE_NAME$" ]] || {
|
||||
STATUS "serviceaccount current role does not match desired role:
|
||||
CURRENT : $CURRENT_ROLE_ARN
|
||||
DESIRED : arn:aws:iam::${AWS_ACCOUNT}:role/$ROLE_NAME
|
||||
"
|
||||
return 2
|
||||
}
|
||||
|
||||
STATUS "serviceaccount current role matches desired role"
|
||||
return 0
|
||||
}
|
Reference in New Issue
Block a user