Kubernetes -- client-go
client-go
is the Go client for Kubernetes.
Authentication
I use EKS at work. Below is the section of my ./kube/config
file,
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
- name: arn:aws:eks:us-east-2:597088060484:cluster/staging
user:
exec:
apiVersion: client.authentication.k8s.io/v1beta1
args:
- --region
- us-east-2
- eks
- get-token
- --cluster-name
- staging
- --output
- json
command: aws
env:
- name: AWS_PROFILE
value: staging-admin
interactiveMode: IfAvailable
provideClusterInfo: false
Note, these configurations are auto generated by aws eks update-kubeconfig
. How does EKS authentication work in this case? From the config above, it seems that kubectl
runs aws eks get-token
using aws profile staging-admin
. Let’s do it
1
2
3
4
5
6
7
8
9
10
$ AWS_PROFILE=staging-admin aws --region us-east-2 eks get-token --cluster-name staging
{
"kind": "ExecCredential",
"apiVersion": "client.authentication.k8s.io/v1beta1",
"spec": {},
"status": {
"expirationTimestamp": "2025-03-08T00:29:16Z",
"token": "k8s-aws-v1...."
}
}
It makes sense. You first generate a token belonging to an aws profile, and then use this token to authenticate with EKS. The corresponding code in client-go
is here. Then this token is used as bearer token and added to the http header. Therefore, what permission does the kubectl
have depends on the aws profile used to get the token.
This post is licensed under CC BY 4.0 by the author.