-
Notifications
You must be signed in to change notification settings - Fork 119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extracting/Migrating the Credential Provider: KEP + Alpha Implementation #13
Comments
/assign @mcrute |
Also related kubernetes/kubernetes#70675 |
@mcrute and I are doodling out some ideas for this, hoping we can have an alpha feature-gated version of this in for v1.15. |
Would secret a possible solution for this? |
Yes, this is one of the possible solutions we're discussing. KEP is work in progress :) |
/milestone v1.15 |
For v1.15, p0: KEP + alpha implementation |
Rough draft of the KEP, mostly just the problem statement at this point. |
@andrewsykim What's your proposal for alpha implementation? |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
/lifecycle frozen |
As part of the cloud provider extraction/migration, we should start to look into how the credential provider is going to be extracted so that the kubelet does not rely on cloud SDKs for image pulling credentials. Also to support future credential providers without adding it into the main tree.
Need to work with SIG Auth and propose a KEP to extract/migrate credential providers to move out-of-tree.
related: kubernetes/kubernetes#68810
cc @justinsb @mcrute
The text was updated successfully, but these errors were encountered: