可以使用AWS CLI来调用sts:AssumeRole。以下是一个bash脚本示例,该脚本使用AWS CLI调用sts:AssumeRole并将返回的令牌添加到Kubectl配置文件中:
#!/bin/bash
# Set the AWS account ID and the EKS cluster name
aws_account_id=
eks_cluster_name=
# Get the AWS CLI version
aws_cli_version=$(aws --version | awk '{print $1}' | cut -c 5-)
# Get the AWS SSO access token
aws_sso_token=$(aws sso get-aws-sso-token --account-id ${aws_account_id} --region us-east-1 --output text --query 'accessToken')
# Get the AWS SSO role credentials
aws_sso_credentials=$(aws sts assume-role --role-arn arn:aws:iam::${aws_account_id}:role/AmazonEKS-admin --role-session-name eks-admin-session --query '[credentials.accessKeyId, credentials.secretAccessKey, credentials.sessionToken]' --output text)
# Parse the AWS SSO role credentials
aws_sso_access_key=$(echo ${aws_sso_credentials} | awk '{print $1}')
aws_sso_secret_key=$(echo ${aws_sso_credentials} | awk '{print $2}')
aws_sso_session_token=$(echo ${aws_sso_credentials} | awk '{print $3}')
# Configure the AWS CLI credentials
aws configure set aws_access_key_id ${aws_sso_access_key}
aws configure set aws_secret_access_key ${aws_sso_secret_key}
aws configure set aws_session_token ${aws_sso_session_token}
aws configure set default.region us-east-1
# Update the Kubectl configuration file with the AWS SSO credentials
kubeconfig_file=~/.kube/config
kubeconfig_data=$(kubectl config view --raw)
kubeconfig_data=$(echo ${kubeconfig_data} | yq r - 'users[0].user.exec.args' | sed "s/imds\/v2\/\?agm=true/imds\/v2?access_key=${aws_sso_access_key}\&secret_key=${aws_sso_secret_key}\&token=${aws_sso_session_token}\®ion=${region}/g")
kubectl