-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecate using gencred
and switch to using Google principals to authenticate to GKE clusters
#28142
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/priority important-longterm |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
@upodroid [edit: is this] still important with the migration? (not sure what we settled on in k8s-infra) |
It is important, Argo is configured to access clusters using gke-auth plugin and we want prow to do the same as well |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The new gke auth plugin doesn't store access tokens in the kubeconfig file.
Intree gcp plugin used to do the following which wasn't great.
Related to #27896
/sig testing
/sig k8s-infra
The text was updated successfully, but these errors were encountered: