Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement default auto-configuration of plugin from service account tokens when running in K8S #386

Merged
merged 2 commits into from
Jan 7, 2024

Conversation

chadlwilson
Copy link
Member

Change cluster URL and security tokens to be optional, defaulting to those mounted into the pod.

By default the plugin now uses the Fabric Kubernetes Client auto-configuration support to configure
itself when the values are un-set from the Plugin Settings UI. This will be the best defaults for
almost all users. If any of Cluster URL / Namespace / Security Token / CA Cert data are overridden
by the user, they will be used instead. If the pod does not have service account values available
it will fail without values being set.

…that mounted into the pod

- fixes #44
- fixes #328 (by removing the need for use of such approaches)

By default the plugin now uses the Fabric Kubernetes Client auto-configuration support to configure
itself when the values are un-set from the Plugin Settings UI. This will be the best defaults for
almost all users. If any of Cluster URL / Namespace / Security Token / CA Cert data are overridden
by the user, they will be used instead. If the pod does not have service account values available
it will fail without values being set.
@chadlwilson chadlwilson merged commit f4dfc72 into master Jan 7, 2024
1 check passed
@chadlwilson chadlwilson deleted the allow-optional-service-token branch January 7, 2024 14:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
1 participant