Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

kubeconfig handling is overly sensitive #24

Closed
colemickens opened this issue Sep 14, 2017 · 0 comments · Fixed by #52
Closed

kubeconfig handling is overly sensitive #24

colemickens opened this issue Sep 14, 2017 · 0 comments · Fixed by #52

Comments

@colemickens
Copy link
Contributor

colemickens commented Sep 14, 2017

For example, this is a valid config file that kubectl accepts, but this client can not parse into KubernetesClientCredentials:

apiVersion: v1
kind: Config
clusters:
- name: colemick1
  cluster:
    server: https://colemick1-api.westus.cloudapp.azure.com:443
    certificate-authority-data: <redacted>
users:
- name: kubelet
  user:
    client-certificate-data: <redacted>
    client-key-data: <redacted>
contexts:
- context:
    cluster: colemick1
    user: kubelet

I had to:

  1. name the context
  2. actually set the active context in the kubeconfig

I'm not sure it's technically a well-formed kubeconfig, but I figure if kubectl accepts it, that this client should too.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant