{"id":1290,"date":"2025-09-22T15:44:07","date_gmt":"2025-09-22T07:44:07","guid":{"rendered":"https:\/\/www.jchj.top\/?p=1290"},"modified":"2025-09-28T11:54:05","modified_gmt":"2025-09-28T03:54:05","slug":"k8s%e4%b8%ad%e6%89%8b%e5%8a%a8%e5%88%9b%e5%bb%ba%e4%b8%80%e4%b8%aa%e9%95%bf%e6%9c%9f%e6%9c%89%e6%95%88%e8%a7%92%e8%89%b2%e5%b9%b6%e8%8e%b7%e5%8f%96%e8%af%a5-token-%e5%92%8c-ca-%e8%af%81%e4%b9%a6","status":"publish","type":"post","link":"https:\/\/www.jchj.top\/?p=1290","title":{"rendered":"k8s\u4e2d\u624b\u52a8\u521b\u5efa\u4e00\u4e2a\u957f\u671f\u6709\u6548\u89d2\u8272\u5e76\u83b7\u53d6\u8be5 Token \u548c CA \u8bc1\u4e66"},"content":{"rendered":"\n<p>\u5728 Kubernetes \u4e2d\uff0c\u65e0\u6cd5\u521b\u5efa\u771f\u6b63\u201c\u6c38\u4e45\u6709\u6548\u201d\u7684 Token\uff0c\u8fd9\u662f\u51fa\u4e8e\u5b89\u5168\u8003\u8651\u7684\u8bbe\u8ba1\u3002\u4f46\u4ece Kubernetes v1.24+ \u5f00\u59cb\uff0c\u867d\u7136\u9ed8\u8ba4\u7684 ServiceAccount Token \u4e0d\u518d\u81ea\u52a8\u751f\u6210 Secret\uff0c\u4f46\u4f60\u53ef\u4ee5\u901a\u8fc7\u624b\u52a8\u521b\u5efa\u4e00\u4e2a \u4e0d\u5e26\u81ea\u52a8\u8fc7\u671f\u65f6\u95f4\u7684 Secret \u6765\u5b9e\u73b0\u4e00\u4e2a\u201c\u957f\u671f\u53ef\u7528\u201d\uff08\u53ef\u89c6\u4e3a\u201c\u6c38\u4e45\u201d\uff0c\u76f4\u5230\u4f60\u4e3b\u52a8\u5220\u9664\u6216\u8f6e\u6362\uff09\u7684 Token\u3002<\/p>\n\n\n\n<p>\u26a0\ufe0f \u6ce8\u610f\uff1a\u8fd9\u8fdd\u53cd\u4e86\u96f6\u4fe1\u4efb\u548c\u6700\u5c0f\u6743\u9650\u539f\u5219\uff0c\u4ec5\u5efa\u8bae\u7528\u4e8e\u6d4b\u8bd5\u3001CI\/CD \u6216\u53d7\u63a7\u73af\u5883\u3002<\/p>\n\n\n\n<p>\u2705 \u76ee\u6807<\/p>\n\n\n\n<p>\u521b\u5efa\u4e00\u4e2a ServiceAccount<\/p>\n\n\n\n<p>\u624b\u52a8\u4e3a\u5176\u521b\u5efa\u4e00\u4e2a \u957f\u671f\u6709\u6548\u7684 Secret Token\uff08\u4e0d\u4f7f\u7528 TokenRequest API\uff0c\u907f\u514d\u81ea\u52a8\u8fc7\u671f\uff09<\/p>\n\n\n\n<p>\u83b7\u53d6\u8be5 Token \u548c CA \u8bc1\u4e66<\/p>\n\n\n\n<p>\u5b9e\u73b0\u201c\u6c38\u4e45\u6709\u6548\u671f\u201d\uff08\u9664\u975e\u624b\u52a8\u5220\u9664\u6216\u96c6\u7fa4 CA \u8f6e\u6362\uff09<\/p>\n\n\n\n<p>\ud83d\udd27 \u6b65\u9aa4\uff1a\u521b\u5efa\u6c38\u4e45 Token\uff08\u57fa\u4e8e Secret\uff09<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>\u521b\u5efa ServiceAccount<\/li>\n<\/ol>\n\n\n\n<p>kubectl create serviceaccount git-runner -n default<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>\u624b\u52a8\u521b\u5efa Secret\uff08\u7ed1\u5b9a\u5230 SA\uff0c\u4e0d\u8bbe\u7f6e\u8fc7\u671f\u65f6\u95f4\uff09<\/li>\n<\/ol>\n\n\n\n<p>\u521b\u5efa\u6587\u4ef6 sa-token-secret.yaml\uff1a<\/p>\n\n\n\n<p>apiVersion: v1<\/p>\n\n\n\n<p>kind: Secret<\/p>\n\n\n\n<p>metadata:<\/p>\n\n\n\n<p>name: git-runner-token<\/p>\n\n\n\n<p>namespace: default<\/p>\n\n\n\n<p>annotations:<\/p>\n\n\n\n<p>kubernetes.io\/service-account.name: git-runner<\/p>\n\n\n\n<p>type: kubernetes.io\/service-account-token<\/p>\n\n\n\n<p><strong>\u6ce8\u610f\uff1a\u4e0d\u8981\u8bbe\u7f6e expirationSeconds \u5b57\u6bb5\uff0c\u5c31\u4e0d\u4f1a\u81ea\u52a8\u8fc7\u671f<\/strong><\/p>\n\n\n\n<p>\u5e94\u7528\uff1a<\/p>\n\n\n\n<p>kubectl apply -f sa-token-secret.yaml<\/p>\n\n\n\n<p>\u8fd9\u4e2a Secret \u5c06\u7531 kube-controller-manager \u81ea\u52a8\u586b\u5145 Token \u5185\u5bb9\u3002<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>\u7b49\u5f85 Token \u88ab\u586b\u5145<\/li>\n<\/ol>\n\n\n\n<p>kubectl get secret git-runner-token -n default -o jsonpath='{.data.token}&#8217; | base64 &#8211;decode<\/p>\n\n\n\n<p>\u5982\u679c\u8f93\u51fa\u4e3a\u7a7a\uff0c\u8bf4\u660e Token \u8fd8\u672a\u751f\u6210\uff0c\u7b49\u5f85\u51e0\u79d2\u518d\u8bd5\u3002<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>\u7ed1\u5b9a\u6743\u9650\uff08\u4f8b\u5982 cluster-admin\uff09<\/li>\n<\/ol>\n\n\n\n<p>kubectl create clusterrolebinding git-runner-admin \\<\/p>\n\n\n\n<p>&#8211;clusterrole=cluster-admin \\<\/p>\n\n\n\n<p>&#8211;serviceaccount=default:my-permanent-user<\/p>\n\n\n\n<p>\ud83d\udce6 \u83b7\u53d6\u4f60\u9700\u8981\u7684\u4fe1\u606f<\/p>\n\n\n\n<p>\u2705 \u83b7\u53d6 Bearer Token<\/p>\n\n\n\n<p>TOKEN=$(kubectl get secret git-runner-token -n default -o jsonpath='{.data.token}&#8217; | base64 &#8211;decode)<\/p>\n\n\n\n<p>echo $TOKEN<\/p>\n\n\n\n<p>\u2705 \u83b7\u53d6 Kubernetes CA \u8bc1\u4e66\uff08Base64 \u7f16\u7801\uff09<\/p>\n\n\n\n<p>CA_CERT=$(kubectl config view &#8211;raw -o jsonpath='{.clusters[0].cluster.certificate-authority-data}&#8217;)<\/p>\n\n\n\n<p>echo $CA_CERT<\/p>\n\n\n\n<p>\u2705 \u9a8c\u8bc1 Token \u662f\u5426\u201c\u6c38\u4e45\u201d<\/p>\n\n\n\n<p>\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u67e5\u770b Secret \u7684 Token \u662f\u5426\u5305\u542b\u8fc7\u671f\u65f6\u95f4\uff1a<\/p>\n\n\n\n<p>kubectl get secret git-runner-token -n default -o yaml<\/p>\n\n\n\n<p>\u4f60\u4f1a\u770b\u5230\uff1a<\/p>\n\n\n\n<p>\u6ca1\u6709 expirationSeconds \u5b57\u6bb5 \u2192 \u8868\u793a\u4e0d\u4f1a\u81ea\u52a8\u8fc7\u671f<\/p>\n\n\n\n<p>\u53ea\u8981 Secret \u5b58\u5728\uff0cToken \u5c31\u6709\u6548<\/p>\n\n\n\n<p>\u53ea\u6709\u5f53 Secret \u88ab\u5220\u9664\u3001ServiceAccount \u88ab\u5220\u9664\u3001\u6216\u96c6\u7fa4 CA \u8bc1\u4e66\u8f6e\u6362\u65f6\uff0cToken \u624d\u5931\u6548<\/p>\n\n\n\n<p>\u2705 \u56e0\u6b64\uff0c\u5728\u5b9e\u9645\u4f7f\u7528\u4e2d\u53ef\u89c6\u4e3a\u201c\u6c38\u4e45\u201d\u3002<\/p>\n\n\n\n<p>\ud83d\udd04 \u81ea\u52a8\u5316\u811a\u672c\uff08\u652f\u6301\u201c\u6c38\u4e45 Token\u201d\uff09<\/p>\n\n\n\n<p>#!\/bin\/bash<\/p>\n\n\n\n<p>SA_NAME=&#8221;${1:-my-permanent-user}&#8221;<\/p>\n\n\n\n<p>NAMESPACE=&#8221;${2:-default}&#8221;<\/p>\n\n\n\n<p>echo &#8220;\ud83d\ude80 \u521b\u5efa\u6c38\u4e45 Token \u7684 ServiceAccount: $SA_NAME&#8221;<\/p>\n\n\n\n<p><strong>1. \u521b\u5efa SA<\/strong><\/p>\n\n\n\n<p>kubectl create serviceaccount &#8220;$SA_NAME&#8221; -n &#8220;$NAMESPACE&#8221; &#8211;dry-run=client -o yaml | kubectl apply -f &#8211;<\/p>\n\n\n\n<p><strong>2. \u521b\u5efa\u6c38\u4e45 Secret<\/strong><\/p>\n\n\n\n<p>cat &lt;&lt;EOF | kubectl apply -f &#8211;<\/p>\n\n\n\n<p>apiVersion: v1<\/p>\n\n\n\n<p>kind: Secret<\/p>\n\n\n\n<p>metadata:<\/p>\n\n\n\n<p>name: ${SA_NAME}-token namespace: $NAMESPACE<\/p>\n\n\n\n<p>annotations:<\/p>\n\n\n\n<p>kubernetes.io\/service-account.name: $SA_NAME<\/p>\n\n\n\n<p>type: kubernetes.io\/service-account-token<\/p>\n\n\n\n<p>EOF<\/p>\n\n\n\n<p><strong>3. \u7b49\u5f85 Secret \u5c31\u7eea<\/strong><\/p>\n\n\n\n<p>echo &#8220;\u23f3 \u7b49\u5f85 Token \u751f\u6210&#8230;&#8221;<\/p>\n\n\n\n<p>while ! kubectl get secret &#8220;${SA_NAME}-token&#8221; -n &#8220;$NAMESPACE&#8221; -o jsonpath='{.data.token}&#8217; | base64 &#8211;decode &amp;&gt; \/dev\/null; do<\/p>\n\n\n\n<p>sleep 1<\/p>\n\n\n\n<p>done<\/p>\n\n\n\n<p><strong>4. \u7ed1\u5b9a\u6743\u9650<\/strong><\/p>\n\n\n\n<p>kubectl create clusterrolebinding &#8220;${SA_NAME}-admin&#8221; &#8211;clusterrole=cluster-admin &#8211;serviceaccount=&#8221;$NAMESPACE:$SA_NAME&#8221; &#8211;dry-run=client -o yaml | kubectl apply -f &#8211;<\/p>\n\n\n\n<p><strong>5. \u8f93\u51fa\u7ed3\u679c<\/strong><\/p>\n\n\n\n<p>TOKEN=$(kubectl get secret &#8220;${SA_NAME}-token&#8221; -n &#8220;$NAMESPACE&#8221; -o jsonpath='{.data.token}&#8217; | base64 &#8211;decode)<\/p>\n\n\n\n<p>CA_CERT=$(kubectl config view &#8211;raw -o jsonpath='{.clusters[0].cluster.certificate-authority-data}&#8217;)<\/p>\n\n\n\n<p>echo<\/p>\n\n\n\n<p>echo &#8220;========================================&#8221;<\/p>\n\n\n\n<p>echo &#8220;\u2705 \u6c38\u4e45 Token \u5df2\u521b\u5efa&#8221;<\/p>\n\n\n\n<p>echo &#8220;========================================&#8221;<\/p>\n\n\n\n<p>echo &#8220;\ud83d\udd39 Bearer Token: $TOKEN&#8221;<\/p>\n\n\n\n<p>echo &#8220;\ud83d\udd39 CA \u8bc1\u4e66 (Base64): $CA_CERT&#8221;<\/p>\n\n\n\n<p>echo &#8220;\ud83d\udca1 \u63d0\u793a\uff1a\u6b64 Token \u4e0d\u4f1a\u81ea\u52a8\u8fc7\u671f\uff0c\u9664\u975e Secret \u88ab\u5220\u9664\u6216\u96c6\u7fa4 CA \u8f6e\u6362&#8221;<\/p>\n\n\n\n<p>echo &#8220;========================================&#8221;<\/p>\n\n\n\n<p>\u26a0\ufe0f \u5b89\u5168\u8b66\u544a<\/p>\n\n\n\n<p>\u274c \u4e0d\u8981\u5728\u751f\u4ea7\u73af\u5883\u4f7f\u7528\uff0c\u8fdd\u80cc\u4e86\u5b89\u5168\u6700\u4f73\u5b9e\u8df5\u3002<\/p>\n\n\n\n<p>\ud83d\udd12 \u5efa\u8bae\u4f7f\u7528\u77ed\u751f\u547d\u5468\u671f Token + \u5237\u65b0\u673a\u5236\uff08\u5982 OIDC\uff09\u3002<\/p>\n\n\n\n<p>\ud83d\uded1 \u5982\u679c\u6cc4\u9732\uff0c\u5fc5\u987b\u624b\u52a8\u5220\u9664 Secret \u6216 SA \u6765\u64a4\u9500\u8bbf\u95ee\u3002<\/p>\n\n\n\n<p><strong>\u91cd\u70b9\uff1a<\/strong><\/p>\n\n\n\n<p>\u8fd9\u4e2a\u83b7\u53d6\u7684Kubernetes CA \u8bc1\u4e66\uff08Base64 \u7f16\u7801\uff09\u548c kubectl get secret my-permanent-user-token -n default -o yaml\u67e5\u770b\u7684CA\u4e0d\u4e00\u6837<\/p>\n\n\n\n<p>\u8be6\u7ec6\u89e3\u91ca<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>\u4f60\u770b\u5230\u7684\u4e24\u4e2a CA \u8bc1\u4e66\u5206\u522b\u6765\u81ea\u54ea\u91cc\uff1f<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1081\" height=\"296\" src=\"https:\/\/www.jchj.top\/wp-content\/uploads\/2025\/09\/e4ce6a63-53b8-43b6-8589-e4d3b6db0a7b.png\" alt=\"\" class=\"wp-image-1411\"\/><\/figure>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>\u4e3a\u4ec0\u4e48 git-runner-token Secret \u4e2d\u7684 ca.crt \u53ef\u80fd\u4e0d\u4e00\u6837\u6216\u4e3a\u7a7a\uff1f<\/li>\n<\/ol>\n\n\n\n<p>Kubernetes \u4e0d\u4fdd\u8bc1 \u6240\u6709 kubernetes.io\/service-account-token \u7c7b\u578b\u7684 Secret \u90fd\u5305\u542b ca.crt\u3002<\/p>\n\n\n\n<p>ca.crt \u5b57\u6bb5\u662f \u53ef\u9009\u7684\uff0c\u5b83\u7684\u4f5c\u7528\u662f\uff1a\u8ba9 Pod \u5185\u7684\u5bb9\u5668\u77e5\u9053\u5982\u4f55\u9a8c\u8bc1 API Server \u7684\u8bc1\u4e66\u3002<\/p>\n\n\n\n<p>\u5982\u679c Pod \u8fd0\u884c\u5728\u96c6\u7fa4\u5185\u90e8\uff0ckubelet \u901a\u5e38\u4f1a\u901a\u8fc7\u5176\u4ed6\u65b9\u5f0f\u63d0\u4f9b CA\uff08\u5982\u6302\u8f7d \/var\/run\/secrets\/kubernetes.io\/serviceaccount\/ca.crt\uff09\uff0c\u6240\u4ee5 Secret \u4e2d\u7684 ca.crt \u53ef\u80fd\u88ab\u7701\u7565\u3002<\/p>\n\n\n\n<p>\u67d0\u4e9b\u96c6\u7fa4\uff08\u5982 kubeadm\u3001EKS\u3001k3s\uff09\u884c\u4e3a\u4e0d\u540c\uff0c\u6709\u7684\u586b\u5145\uff0c\u6709\u7684\u4e0d\u586b\u5145\u3002<\/p>\n\n\n\n<p>\ud83d\udccc \u91cd\u70b9\uff1aca.crt \u5728 Secret \u4e2d\u7684\u5b58\u5728\u4e0e\u5426\uff0c\u4e0d\u5f71\u54cd Token \u7684\u6709\u6548\u6027\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5728 Kubernetes \u4e2d\uff0c\u65e0\u6cd5\u521b\u5efa\u771f\u6b63\u201c\u6c38\u4e45\u6709&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,1],"tags":[],"class_list":["post-1290","post","type-post","status-publish","format-standard","hentry","category-k8s-docker","category-1"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.jchj.top\/index.php?rest_route=\/wp\/v2\/posts\/1290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jchj.top\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jchj.top\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jchj.top\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jchj.top\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1290"}],"version-history":[{"count":3,"href":"https:\/\/www.jchj.top\/index.php?rest_route=\/wp\/v2\/posts\/1290\/revisions"}],"predecessor-version":[{"id":1412,"href":"https:\/\/www.jchj.top\/index.php?rest_route=\/wp\/v2\/posts\/1290\/revisions\/1412"}],"wp:attachment":[{"href":"https:\/\/www.jchj.top\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jchj.top\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jchj.top\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}