-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
periodically reload tokens read from TokenFile in kubeconfig #70606
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, one nit
Like we do with InClusterConfig.
@awly Fixed, PTAL. |
/lgtm |
/assign @liggitt |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, mikedanese The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
@@ -229,11 +229,11 @@ func (config *DirectClientConfig) getUserIdentificationPartialConfig(configAuthI | |||
if len(configAuthInfo.Token) > 0 { | |||
mergedConfig.BearerToken = configAuthInfo.Token | |||
} else if len(configAuthInfo.TokenFile) > 0 { | |||
tokenBytes, err := ioutil.ReadFile(configAuthInfo.TokenFile) | |||
if err != nil { | |||
ts := restclient.NewCachedFileTokenSource(configAuthInfo.TokenFile) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This broke clients that depend on these methods. We shouldn't have broken this without providing an alternate path.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree with Clayton here, BearerToken
was never deprecated and we don't provide alternative, yet suddenly it's empty. We should deprecate this field and provide users with explanation what they should be using instead.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the BearerToken field is not deprecated, setting a BearerToken in the config struct is still valid (if kubeconfig contains a bearer token, the resulting config also contains a bearer token)
The transformation of TokenFile -> bearer token (and what InClusterConfig returns) is what is in question.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The transformation of TokenFile -> bearer token (and what InClusterConfig returns) is what is in question.
Yes, sorry for my short-circuited answer :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm looking into plumbing both BearerToken and TokenFile out to the config and moving the refresh behavior into the round tripper constructed from the config
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
opened #71713
Like we do with InClusterConfig.
/kind cleanup
/sig auth