We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What would you like to be added:
Admin kubeconfig should use SA token instead of client cert auth.
Why is this needed:
SA token does not expire and it can be easily revoked via kube api if needed. Cert auth does expire and revoke is not possible.
The text was updated successfully, but these errors were encountered:
How about generating a short lived bootstrap token for each run?
Sorry, something went wrong.
With admin kubeconfig I mean the config that pharos kubeconfig fetches (which is stored in master at ~/.kube/config).
pharos kubeconfig
~/.kube/config
kke
Successfully merging a pull request may close this issue.
What would you like to be added:
Admin kubeconfig should use SA token instead of client cert auth.
Why is this needed:
SA token does not expire and it can be easily revoked via kube api if needed. Cert auth does expire and revoke is not possible.
The text was updated successfully, but these errors were encountered: