gpt4 book ai didi

kubernetes - 如何在 GitHub Actions 等 CI 中以非交互方式登录 ArgoCD CLI?

转载 作者:行者123 更新时间:2023-12-02 01:44:55 24 4
gpt4 key购买 nike

我们有a full-blown setup using AWS EKS with Tekton安装并希望使用 ArgoCD 进行应用程序部署。

As the docs state我们在 GitHub Actions 中的 EKS 上安装了 ArgoCD:

  - name: Install ArgoCD
run: |
echo "--- Create argo namespace and install it"
kubectl create namespace argocd --dry-run=client -o yaml | kubectl apply -f -
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml

我们还公开了 ArgoCD 服务器(包括仪表板)as the docs told us :

  - name: Expose ArgoCD Dashboard
run: |
echo "--- Expose ArgoCD Dashboard via K8s Service"
kubectl patch svc argocd-server -n argocd -p '{"spec": {"type": "LoadBalancer"}}'

echo "--- Wait until Loadbalancer url is present (see https://stackoverflow.com/a/70108500/4964553)"
until kubectl get service/argocd-server -n argocd --output=jsonpath='{.status.loadBalancer}' | grep "ingress"; do : ; done

最后我们用 brew 安装了 argocd CLI:

      echo "--- Install ArgoCD CLI"
brew install argocd

现在我们如何使用 GitHub Actions 进行 argocd 登录(无需人工交互)? argocd login 命令需要用户名和密码...

最佳答案

The same docs tell us how to extract the password对于 argo 有:

kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo

获取 ArgoCD 服务器的 hostname 也没什么大不了的:

kubectl get service argocd-server -n argocd --output=jsonpath='{.status.loadBalancer.ingress[0].hostname}'

由于 argocd login 命令有参数 --username--password我们可以设计我们的登录命令像这样:

argocd login $(kubectl get service argocd-server -n argocd --output=jsonpath='{.status.loadBalancer.ingress[0].hostname}') --username admin --password $(kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo) --insecure

注意 --insecure 以防止 argo CLI 询问类似 WARNING: server certificate had error: x509: certificate is valid for localhost, argocd-server, argocd-server。 argocd、argocd-server.argocd.svc、argocd-server.argocd.svc.cluster.local,而不是 a5f715808162c48c1af54069ba37db0e-1371850981.eu-central-1.elb.amazonaws.com。不安全地进行(是/否)?

成功登录在 GitHub Actions UI 中应该看起来像这样(请参阅 a full log here):

'admin:login' logged in successfully
Context 'a5f715808162c48c1af54069ba37db0e-1371850981.eu-central-1.elb.amazonaws.com' updated

现在您的 GitHub Actions 工作流程应该能够与 ArgoCD 服务器交互。

防止错误 FATA[0000] dial tcp: lookup a965bfb530e8449f5a355f221b2fd107-598531793.eu-central-1.elb.amazonaws.com on 8.8.8.8:53: no such host

如果 argocd-server Kubernetes 服务是在 argocd login 命令运行之前全新安装的,则会出现此错误。然后 argocd login 命令会失败一段时间,直到它最终可以正常工作。

假设存在一些 DNS 传播问题,我们可以通过将 argocd login 命令包装到 until 中来防止此错误破坏我们的 CI 管道,就像已经完成的那样 in this answer .完整的命令将如下所示:

until argocd login $(kubectl get service argocd-server -n argocd --output=jsonpath='{.status.loadBalancer.ingress[0].hostname}') --username admin --password $(kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo) --insecure; do : ; done

在 GitHub Actions 中,这将看起来像这样:

--- Login argocd CLI - now wrapped in until to prevent FATA[0000] dial tcp: lookup 12345.eu-central-1.elb.amazonaws.com on 8.8.8.8:53: no such host
time="2022-02-21T12:57:32Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:57:35Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:57:37Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
[...]
time="2022-02-21T12:58:27Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:58:30Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:58:32Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
'admin:login' logged in successfully
Context 'a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com' updated

Here's also a log .

关于kubernetes - 如何在 GitHub Actions 等 CI 中以非交互方式登录 ArgoCD CLI?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/71030111/

24 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com