Koch is a minimal sh script that works around oc tool, that is:
- Fast: one login and you are ready to go,
- Simple: based on lightweight commands such as curl and yq,
- Secure: Koch creates temporary token using cli and you don't need anymore service account and the web console to login!,
- Configurable: all clusters are defined in a yaml file similar to other tools,
- Supported: Koch supports Openshift® v3.x and 4.x
- Easy: quick to install – start using it in minutes.
- Interoperable: support for Mac and Linux operating systems
Authentication can be achieved through:
- Prompt: the CLI requests user and password data
- Bitwarden: the bitwarden client by looking at user and password in a strongbox entry.
- sh, used to execute the script
- perl, used to parse the access token in the folder (tested with v5.30.3 and v5.36.0)
- yq, used to manage yaml configuration (tested with v4.33.0)
- curl, used to request temporary authentication token
- oc, used to perform login and logout operation once received the token.
- bw (bitwarden-cli, optional), used to request credentials
- jq (optional), used to parse credentials json
- starship, used to know the current kubectl context
- kubectx, to change between kubectl context
- kubens, to change the current namespace
- fzf , to properly select the kubernetes context and namespace
This script downloads and install the koch script in the bin directory of the user. You can also install system-wide.
curl -o koch https://raw.githubusercontent.com/faan11/koch/1.2.1/koch
mv koch $HOME/.local/bin/
chmod +x $HOME/.local/bin/koch
You can get the help command by simply typing
koch
The following command defines a cluster configuration.
koch define <context-name> --oauth="$AUTH_SERVER" --api="$API_SERVER" --context="$KUBECTL_CONTEXT" --secrethandler="$SECRETHANDLER" --secretname="$SECRETNAME" --insecure="true"
where context-name represents the cluster configuration name.
$AUTH_SERVER represents the scheme and the host used to point out the authentication server ( for instance https://myauthservice.com ).
$API_SERVER is the scheme and the host of api server used to perform login (for instance, https://apiserver:6443 ).
Once the configuration is defined, the user can perform authentication by using the context name.
Authentication can be done in two ways:
-
private authentication (recommended): This type of authentication performs login and opens a new shell. The authentication will be available only to the new shell. Once it is closed, the context is removed and the terminal can view the system kubectl context. This procedure is advised due to the following advantages:
- Isolation: The system can't access the token by default.
- Temporary: Once the shell is closed, Koch releases the authentication token.
A private shell can be created with the following command:
koch psh <context-name>
-
user authentication: User authentication saves the context in the default KUBECONFIG environment file. The following command can request the temporary authentication token and perform authentication using oc login.
koch login <context-name>
Koch logout performs the logout operation.
koch logout
Koch supports only bash and zsh shell autocompletion. The autocompletion is limited to the login command. It is used to filter koch profiles.
eval "$(koch completion zsh)" # inside your .zshrc file
eval "$(koch completion bash)" # inside your .bashrc file
Feel free to open an issue in the repo and proposes new ideas.
- Fabio Pagnotta fabiopagnotta.92@gmail.com
- Vladimir Mozharov