|
| 1 | +--- |
| 2 | +- name: Test k8s authentication methods |
| 3 | + hosts: localhost |
| 4 | + connection: local |
| 5 | + gather_facts: false |
| 6 | + become: false |
| 7 | + vars: |
| 8 | + kubeconfig_file: '~/.kube/config' |
| 9 | + k8s_host: '{{ lookup("env", "K8S_AUTH_HOST") }}' |
| 10 | + k8s_validate_certs: '{{ lookup("env", "K8S_AUTH_VERIFY_SSL") | default(false) | bool }}' |
| 11 | + k8s_username: '{{ lookup("env", "K8S_AUTH_USERNAME") | default("kubeconfig") }}' |
| 12 | + k8s_password: '{{ lookup("env", "K8S_AUTH_PASSWORD") | default(omit) }}' |
| 13 | + k8s_api_key: '{{ lookup("env", "K8S_AUTH_TOKEN") | default(omit) }}' |
| 14 | + k8s_ca_cert_file: '{{ lookup("env", "K8S_AUTH_SSL_CA_CERT") | default(omit) }}' |
| 15 | + tasks: |
| 16 | + - name: Check for pre-existing kubeconfig |
| 17 | + ansible.builtin.stat: |
| 18 | + path: '{{ kubeconfig_file }}' |
| 19 | + register: kubeconfig_stat |
| 20 | + |
| 21 | + - name: Exit if kubeconfig found |
| 22 | + ansible.builtin.fail: |
| 23 | + msg: '{{ kubeconfig_file }} already exists! Exiting' |
| 24 | + when: kubeconfig_stat.stat.exists |
| 25 | + |
| 26 | + - name: Get namespaces to test parameters |
| 27 | + kubernetes.core.k8s_info: |
| 28 | + host: '{{ k8s_host }}' |
| 29 | + validate_certs: '{{ k8s_validate_certs }}' |
| 30 | + username: '{{ k8s_username }}' |
| 31 | + api_key: '{{ k8s_api_key }}' |
| 32 | + ca_cert: '{{ k8s_ca_cert_file | default(omit) }}' |
| 33 | + kind: namespace |
| 34 | + when: k8s_api_key |
| 35 | + |
| 36 | + - name: Login explicitly |
| 37 | + when: not k8s_api_key |
| 38 | + block: |
| 39 | + - name: Login explicitly to get token |
| 40 | + kubernetes.core.k8s_auth: |
| 41 | + host: '{{ k8s_host }}' |
| 42 | + validate_certs: '{{ k8s_validate_certs }}' |
| 43 | + username: '{{ k8s_username }}' |
| 44 | + password: '{{ k8s_password }}' |
| 45 | + ca_cert: '{{ k8s_ca_cert_file | default(omit) }}' |
| 46 | + register: auth |
| 47 | + |
| 48 | + - name: Set api_key |
| 49 | + ansible.builtin.set_fact: |
| 50 | + k8s_api_key: '{{ auth.openshift_auth.api_key }}' |
| 51 | + |
| 52 | + - name: Update username if needed |
| 53 | + ansible.builtin.set_fact: |
| 54 | + config_k8s_username: 'kube:admin' |
| 55 | + when: k8s_username == 'kubeadmin' |
| 56 | + |
| 57 | + - name: Determine clustername |
| 58 | + ansible.builtin.set_fact: |
| 59 | + config_k8s_clustername: "{{ k8s_host | regex_replace('https://', '') | regex_replace('\\.', '-') }}" |
| 60 | + |
| 61 | + - name: Write config file |
| 62 | + ansible.builtin.copy: |
| 63 | + content: |- |
| 64 | + apiVersion: v1 |
| 65 | + clusters: |
| 66 | + - cluster: |
| 67 | + {% if k8s_validate_certs is false %} |
| 68 | + insecure-skip-tls-verify: true |
| 69 | + {% endif %} |
| 70 | + {% if k8s_ca_cert_file -%} |
| 71 | + certificate-authority-data: {{ lookup("file", k8s_ca_cert_file) | b64encode }} |
| 72 | + {% endif %} |
| 73 | + server: {{ k8s_host }} |
| 74 | + name: {{ config_k8s_clustername }} |
| 75 | + contexts: |
| 76 | + - context: |
| 77 | + cluster: {{ config_k8s_clustername }} |
| 78 | + namespace: default |
| 79 | + user: {{ config_k8s_username | default(k8s_username) }}/{{ config_k8s_clustername }} |
| 80 | + name: default/{{ config_k8s_clustername }}/{{ config_k8s_username | default(k8s_username) }} |
| 81 | + current-context: default/{{ config_k8s_clustername }}/{{ config_k8s_username | default(k8s_username) }} |
| 82 | + kind: Config |
| 83 | + preferences: {} |
| 84 | + users: |
| 85 | + - name: {{ config_k8s_username | default(k8s_username) }}/{{ config_k8s_clustername }} |
| 86 | + user: |
| 87 | + token: {{ k8s_api_key }} |
| 88 | + dest: '{{ kubeconfig_file }}' |
| 89 | + mode: '0640' |
| 90 | + |
| 91 | + - name: Notify user |
| 92 | + ansible.builtin.debug: |
| 93 | + msg: "Wrote {{ kubeconfig_file }}" |
0 commit comments