kauthproxy 
This is a kubectl plugin to forward a local port to a pod or service via authentication proxy.
It gets a token from the credential plugin (e.g. aws-iam-authenticator or kubelogin) and forwards requests to a pod or service with Authorization: Bearer token
header.
Take a look at the concept:
+--------------------------------+
| Browser |
+--------------------------------+
↓ http://localhost:8000
+--------------------------------+ +-----------------------------+
| kubectl auth-proxy | <-- token -- | client-go credential plugin |
+--------------------------------+ +-----------------------------+
↓ https://localhost:443
↓ Authorization: Bearer token
+--------------------------------+
| Kubernetes Dashboard (service) |
+--------------------------------+
Status: alpha and not for production.
Getting Started
Install
You can install the latest release from Homebrew, Krew or GitHub Releases as follows:
# Homebrew
brew tap int128/kauthproxy
brew install kauthproxy
# Krew (TODO)
kubectl krew install auth-proxy
# GitHub Releases
curl -LO https://github.com/int128/kauthproxy/releases/download/v0.1.0/kauthproxy_linux_amd64.zip
unzip kauthproxy_linux_amd64.zip
ln -s kauthproxy kubectl-auth_proxy
Kubernetes Dashboard on Amazon EKS
You need to configure the kubeconfig to use aws-iam-authenticator or aws eks get-token
.
To run an authentication proxy to the service:
kubectl auth-proxy -n kube-system https://kubernetes-dashboard.svc
Open http://localhost:8000 and you can access the Kubernetes Dashboard with the token.
Kubernetes Dashboard with OpenID Connect authentication
You need to configure the kubeconfig to use kubelogin.
Run the following command,
kubectl auth-proxy -n kube-system https://kubernetes-dashboard.svc
Open http://localhost:8000 and you can access the Kubernetes Dashboard with the token.
Kibana with OpenID Connect authentication
You need to configure the kubeconfig to use kubelogin.
Run the following command,
kubectl auth-proxy https://kibana
Open http://localhost:8000 and you can access the Kibana with the token.
Known Issues
- kauthproxy always skips TLS verification for a pod. TODO: add a flag
Usage
Forward a local port to a pod or service via authentication proxy.
To forward a local port to a service, set a service name with .svc suffix. e.g. http://service-name.svc
To forward a local port to a pod, set a pod name. e.g. http://pod-name
LOCAL_ADDR defaults to localhost:8000.
Usage:
kubectl auth-proxy REMOTE_URL [LOCAL_ADDR] [flags]
Examples:
kubectl auth-proxy https://kubernetes-dashboard.svc
Flags:
--as string Username to impersonate for the operation
--as-group stringArray Group to impersonate for the operation, this flag can be repeated to specify multiple groups.
--cache-dir string Default HTTP cache directory (default "~/.kube/http-cache")
--certificate-authority string Path to a cert file for the certificate authority
--client-certificate string Path to a client certificate file for TLS
--client-key string Path to a client key file for TLS
--cluster string The name of the kubeconfig cluster to use
--context string The name of the kubeconfig context to use
-h, --help help for kubectl
--insecure-skip-tls-verify If true, the server's certificate will not be checked for validity. This will make your HTTPS connections insecure
--kubeconfig string Path to the kubeconfig file to use for CLI requests.
-n, --namespace string If present, the namespace scope for this CLI request
--request-timeout string The length of time to wait before giving up on a single server request. Non-zero values should contain a corresponding time unit (e.g. 1s, 2m, 3h). A value of zero means don't timeout requests. (default "0")
-s, --server string The address and port of the Kubernetes API server
--token string Bearer token for authentication to the API server
--user string The name of the kubeconfig user to use
--version version for kubectl
Contributions
This is an open source software.
Feel free to open issues and pull requests.