-
-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(feat): kubeconfig_raw as alternative to local file and setting KUBECONFIG env variable #51
Comments
@lukasmrtvy Hey! Just curious, but why do we need this? For the azurerm_kubenretes_cluster's case, can't we just use |
@mumoshu if you are running tf in CI without cache ( and i believe that caching kubeconfig is not a good idea ), then you will loose this file and this resource will be recreated on every run ( triggering false positive diff ) Probably is possible to do some workaround with local-exec, but why, almost every k8s provider ( kubernetes, helm, kapp, etc ) can use kubeconfig_raw or is able to set host/ca/crt/key/user/token via vars. Examples from AWS, Azure providers: |
@mumoshu any progress on this? thanks |
I would like to propose something along these lines. IMHO we should be able to authenticate with just certificates/tokens like with the kubernetes-alpha and helm providers.
IIRC - I believe that |
I agree, the auth experience of this provider should be consistent with the helm and kubernetes providers. |
I agree. I'll happily review anyone's PR to add that |
Would be nice to support kubeconfig_raw as input in helmfile provider.
For example like this provider https://github.com/vmware-tanzu/terraform-provider-carvel/blob/develop/pkg/provider/kubeconfig.go#L34
Use case:
It should be sensitive input ( hide sensitive stuff in plan/apply steps)
Thanks
Official provider can use also raw input https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs#host
The text was updated successfully, but these errors were encountered: