-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use of anonymous kubeclient fails on restart/run #396
Comments
So it looks like you guys added I'll do a PR if our team decides to go forward with kubernetes-deploy and add support for EKS Easily fixable locally with 3 extra lines to
|
Thanks for the bug report, @midN . Note that there's also an active PR for EKS support on the kubeclient side, which we'll be eager to pick up in kubernetes-deploy once it is released: ManageIQ/kubeclient#363. |
@KnVerey Nice! i'll not do a PR then, will wait for kubeclient to be merged and meanwhile use our fork with a small addition to make it usable for us :) |
@benlangfeld as far as we know there's nothing else to do, but I don't have an easy way to test it. I'm going to close this issue now that the change has been released though. @midN we've just released version 0.25.0, which contains the kubeclient bump. When you have a chance, can you please try that out and reopen this if it didn't fix the problem for you as expected? |
looks like we are facing this
|
@lucasmazza are you sure |
@KnVerey we aren't using I'm far from an expert on the multiple ways kubectl/kubeclient can authenticate with my google account but I wonder if would be possible to get |
Everything above is wrong, please ignore. It actually looks like |
@lucasmazza Where are your credentials stored, if not in the env var? Your failure is happening inside the |
@timothysmith0609 sorry for the delayed response, but I was part time digging into this. We are using
|
@lucasmazza That sounds like #456 |
@benlangfeld it's a possible issue that tokens might not be refreshed when they might need to be, but on our case kubeclient is not authenticating as expected, regardless of the token freshness. |
Bug report
[Description of the bug]
It looks like compared to
deploy
,restart
andrun
both use Kubeclient instead ofkubectl
command execution.And Kubeclient called from kubernetes-deploy uses an anonymous user to query namespaces.
It fails miserably in protected clusters that disable any access to anonymous users.
Expected behavior: [What you expected to happen]
Use my "authenticated" kubectl to query namespaces
Actual behavior: [What actually happened]
Uses Kubernetes API without any form of authentication and fails
Proposal:
Replace kubeclient usage with
kubectl
calls and letkubectl
handle the authentication.Using kubeclient for authentication and any API calls might result in too much extra work.
Not all clusters use simple username/password or certificate authentication.
AWS EKS Uses custom built script/wrapper to query IAM user/role for example and i suspect
kubeclient
currently does not handle it.The text was updated successfully, but these errors were encountered: