OAuth for CLI
By default, Testkube CLI uses the "proxy" client which leverages the kube apiserver proxy to reach the Testkube API server. This implies granting users access to Iestkube internals in order to reach the Testkube APIREST endpoint (when using commands such as testkube get artifact
).
This section describes how to protect the Testkube api-server REST API endpoint with oauth2 authentication authorization grant, for use by the Testkube CLI as an oauth 2 client. In this mode, Testkube users do not need to be granted "Testkube administrator roles".
Testkube doesn't provide a separate user/role management system to protect access to its CLI.
Users can configure OAuth-based authentication modules using Testkube Helm chart parameters and the CLI config command.
Testkube can automatically configure the Kubernetes NGINX Ingress Controller and create the required ingresses.
Provide Parameters for API Ingress
Pass values to Testkube Helm chart during installation or upgrade (they are empty by default). Pay attention to the usage of the scheme (http or https) in URIs.
--set testkube-api.cliIngress.enabled=true \
--set testkube-api.cliIngress.oauth.provider="github"
--set testkube-api.cliIngress.oauth.clientID="XXXXXXXXXX" \
--set testkube-api.cliIngress.oauth.clientSecret="XXXXXXXXXX" \
--set testkube-api.cliIngress.oauth.scopes=""
Create Github OAuth Application
Currently, only GitHub OAuth authentication is supported. It is not yet possible to configure kube api-server to authenticate Testkube CLI OAuth2 against other OAuth2 IDPs.
- GitHub is the authorization server.
- Testkube CLI is the client receiving HTTP redirects from the authorization server on a local HTTP endpoint (http://127.0.0.1:13254) served by the CLI. A local web browser invoked by xdg-open is required to access GitHub web UI, and then follow HTTP redirect to the local HTTP authorization callback endpoint.
- Testkube api-server is the resource server.
Register a new Github OAuth application for your personal or organization account.
Pay attention to the usage of the scheme (http or https) in URIs. The homepage URL should be the Testkube Dashboard home page http://127.0.0.1:13254.
The authorization callback URL should be a prebuilt page at the Testkube Dashboard website http://127.0.0.1:13254/oauth/callback.
Make note of the generated Client ID and Client Secret.
Provide Parameters for CLI
Run the command below to configure oauth parameters (we support GitHub OAuth provider):
kubectl testkube config oauth https://demo.testkube.io/api --client-id XXXXXXXXXX --client-secret XXXXXXXXXX
Output:
You will be redirected to your browser for authentication or you can open the url below manually
https://github.com/login/oauth/authorize?access_type=offline&client_id=XXXXXXXXXX&redirect_uri=http%3A%2F%2F127.0.0.1%3A13254%2Foauth%2Fcallback&response_type=code&state=iRQkcwXV
Authentication will be cancelled in 60 seconds
Authorization for the GitHub application will be requested and access will need to be confirmed.
If authorization is successful, you will see the success page.
Output:
Shutting down server...
Server gracefully stopped 🥇
New api uri set to https://demo.testkube.io/api 🥇
New oauth token gho_XXXXXXXXXX 🥇
Run CLI Commands with OAuth
Now all of your requests with direct client will submit an OAuth token, for example:
kubectl testkube get executors -c direct
Output:
NAME | URI | LABELS
+--------------------+-----+--------+
artillery-executor | |
curl-executor | |
cypress-executor | |
k6-executor | |
postman-executor | |
soapui-executor | |
Environment Variables
You can use 2 environment variables to override CLI config values:
TESTKUBE_API_URI
- For the API uri.
TESTKUBE_OAUTH_ACCESS_TOKEN
- For the OAuth access token.