A command line utility and library for using RAM、Credential and permission related features in Alibaba Cloud Container Service For Kubernetes (ACK). 中文文档
Contents
You can download the latest release from Releases page.
https://aliyuncontainerservice.github.io/ack-ram-tool/#credentials
A kubectl/client-go credential plugin for ACK。
Get a kubeconfig with exec credential plugin format:
ack-ram-tool credential-plugin get-kubeconfig --cluster-id <clusterId> > kubeconfigUse this kubeconfig to access cluster:
kubectl --kubeconfig=kubeconfig get nsRemove cached credentials:
rm ~/.kube/cache/ack-ram-tool/credential-plugin/*.jsonEnable RRSA feature :
$ ack-ram-tool rrsa enable --cluster-id <clusterId>
? Are you sure you want to enable RRSA feature? Yes
Enable RRSA feature for cluster c86fdd*** successfullyAssociate an RAM Role to a service account (use the --create-role-if-not-exist flag to
auto create an RAM Role when it doesn't exist):
$ ack-ram-tool rrsa associate-role --cluster-id <clusterId> \
--namespace <namespce> --service-account <serviceAccountName> \
--role-name <roleName>
? Are you sure you want to associate RAM Role test-rrsa to service account test-serviceaccount (namespace: test-namespace)? Yes
Will change the assumeRolePolicyDocument of RAM Role test-rrsa with blow content:
{
"Statement": [
{
"Action": "sts:AssumeRole",
"Effect": "Allow",
"Principal": {
"RAM": [
"acs:ram::18***:root"
]
}
},
{
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"oidc:aud": "sts.aliyuncs.com",
"oidc:iss": "https://oidc-ack-**/c86fdd***",
"oidc:sub": "system:serviceaccount:test-namespace:test-serviceaccount"
}
},
"Effect": "Allow",
"Principal": {
"Federated": [
"acs:ram::18***:oidc-provider/ack-rrsa-c86fdd***"
]
}
}
],
"Version": "1"
}
? Are you sure you want to associate RAM Role test-rrsa to service account test-serviceaccount (namespace: test-namespace)? Yes
Associate RAM Role test-rrsa to service account test-serviceaccount (namespace: test-namespace) successfullyFor more information, refer to the document.
Please report vulnerabilities by email to [email protected]. Also see our SECURITY.md file for details.