-
Notifications
You must be signed in to change notification settings - Fork 925
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose all auth-provider config keys #1093
Comments
/triage accepted We need to take a look if these types are pulled in by config as a start. |
@eddiezane: Please ensure the request meets the requirements listed here. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@eddiezane I tried to resolve this issue, the |
After some review, this appears (I think) to be an issue with the client-go API rather than kubectl itself. The way that the paths are walked from the config key assumes that the AuthProvider field will be a Unsure if there should be a workaround for this specific struct in kubectl or if we should be open an issue with client-go repo to update the |
Also of note it looks like |
@tewe Does Example: ❯ kubectl config set-credentials test --auth-provider=test --auth-provider-arg=refresh-token=test
User "test" set. Resulting config:
|
(My solution has been kubelogin) Can (In the case of the refresh token, setting it to a bogus value probably has the same effect) |
It looks like if you were to use |
Thanks! I'll leave this open due to the confusing error message. |
I noticed today that It would be great to be able to set this field from the CLI. Are there lists of what can and cannot be set easily available? That would be a nice quality of life improvement to have documented, perhaps in the |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Is this still broken? The last pull request seems to have been closed. |
Yes, unfortunately this became a rather monumental task. I had something working but it was decided that the sig did not wish to extend the existing dot delimited syntax (which makes sense) and instead we would look to moving to using jsonpath instead. Unfortunately I have not had time to do this and I don't think anyone else has tried to pick it up. |
This issue has not been updated in over 1 year, and should be re-triaged. You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
kubectl config unset users.foo.auth-provider.azure.refresh-token
dies with "error: unable to parse one or more field values" becausepkg/cmd/config/navigation_step_parser.go
cannot deal with pointers and*AuthProviderConfig
is one.What would you like to be added:
Allow
kubectl config
to un/set any field in the YAML, particularlyauth-provider
settings.Why is this needed:
When giving people access to a cluster it is often necessary to deal with authentication issues, and sending them command lines is easier for everybody than instructions on how to edit the kubeconfig by hand.
The text was updated successfully, but these errors were encountered: