-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for CredentialProvider and CredentialProviderConfig resources #9813
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
This should be in Kubespray. /remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
k8s docs : https://kubernetes.io/docs/tasks/administer-cluster/kubelet-credential-provider/ |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen
/lifecycle frozen
/remove-lifecycle rotten
We'll need this eventually, this is upstream k8s direction.
|
@VannTen: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
It's gotten a bit more mature at this point and is not hard to add into kubespray imho. I will try to get some time this month to take a crack at it. |
What would you like to be added:
Modern K8s versions have the ability to use an 'image credential provider'. The support/maturity around it is not great but we can be ahead of the game by putting the configuration options into kubespray.
https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/#kubelet-config-k8s-io-v1beta1-CredentialProvider
https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/#kubelet-config-k8s-io-v1beta1-CredentialProviderConfig
Why is this needed:
This is a kubernetes native way of handling credentials for things like AWS ECR that have frequent expirations. This is useful if you do not want to constantly rotate credentials and face possibilities of images unable to pull and if you do not want to implement a custom open source solution for this shared problem assuming one exists.
The text was updated successfully, but these errors were encountered: