-
Notifications
You must be signed in to change notification settings - Fork 500
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New plugin: gke-exec-credential #118
Conversation
This comment has been minimized.
This comment has been minimized.
1 similar comment
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here (e.g. What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for the PR. I'll currently put this on hold, as we're considering allowing only official vendors to allow submitting plugins with the vendor prefix (in this case We haven't yet come to a decision about the plugin acceptance criteria, but will do soon. Aside from that, I think (since I work on GKE) we should probably distribute a credential retriever binary ourselves as part of gcloud SDK that's automatically installed (just like |
I've found several other reasons why this might not be suitable for a distribution via krew's centralized index:
I don't see a clear benefit to this tool than GKE's current model where we create per-context "user" entry (sure, it's wasteful, but that's something GKE command can probably fix). I'm curious about why you’re developing this plugin and why you think it's beneficial. Feel free to drop me a line at {my-username}@google.com. |
Ah, something to mention in the naming guide?
Of course I would be happy to close this if that is in the works! Since my script merely massages the JSON output a bit from an existing
The redundancy (when you have multiple clusters registered) is an annoyance, but independent of this tool since you could of course manually deduplicate.
Perhaps the README was not sufficiently clear. The purpose of this tool is to help migrate towards the newer and more generic authentication method, to reduce the pressure on clients to perfect support for older vendor-specific methods such as |
But when users run Also, right now this plugin is just 1-line, I'm not sure if it's something we should be accepting to the main repo as it is.
Ideally this should be distributed as part of gcloud ––if there's a need. Right now our team doesn't see a clear benefit for it. You will still be depending on P.S. If you would like to authenticate to GKE in headless environments, you can just use the |
That is why when running this command I back up my
Yes that would be nice.
Correct, just using a more general authentication method than |
/hold |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale /cc @corneliusweig I feel like we should only accept plugins that are directly used interactively (e.g. kubectl foo) by the user and we shouldn't be a vessel for adding other sorts of kubernetes binaries to PATH. But at the same time, credential plugins are recognized by kubectl, and we are a kubectl plugin manager (despite the two things are not the same thing), we can use krew's ability to ship multi-platform binaries to PATH and have other kubectl commands use these sorts of creds plugins independently. This would broaden krew's use cases. I think we'll need more data/evidence or agreement on whether these should be admitted or not. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
https://github.com/jglick/gke-exec-credential/blob/master/README.md#gke-exec-credential and see kubernetes/kubernetes#62185
Checklist for plugin developers:
kubectl krew install --manifest=[...] --archive=[...]
)