-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC authentication seems broken in 2.3.0 #103
Comments
also doesn't work authentication to EKS with aws-iam-authenticator |
For authentication to EKS with tell me if that works, so I can check in more detail if it doesn't. For OIDC authentication this is a regression, due to switch of the node kubernetes client to the official one, which didn't support it yet. kubernetes-client/javascript#303 probably fixes it. |
@dkapanidis , The official JS kubernetes client doesn't support (yet) persisting oidc tokens in the configfile after refreshing them (kubernetes-client/javascript#340), does Kubernetic deal with that on its own ? We use many clients (kubectl, python client and Kubernetic) at the same time, but sometimes a client may end up loading old tokens from the configfile and we're forced to do the refresh manually. Thanks |
Kubernetic has switched from JS client to Go client for kubernetes connectivity recently, so this should no longer be an issue. For |
After downloading the latest version 2.3.0, OIDC-based authentication no longer works.
The text was updated successfully, but these errors were encountered: