New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unauthorized error with exec
auth with eks
#1126
Comments
I've used the aws auth plugin quite a bit and a lot of my clients uses it as well via kube-rs. You have redacted this part |
@goenning |
I investigated it further - the setup they use is they have a remote machine running |
Debugged it further - we found out that Go's kubectl doesn't send |
Ah, yeah, that sounds like a good plan on paper. Without having looked too deeply, it sounds like we can probably change the |
Great! either I or someone from our team will send a PR. It might take few weeks though but will let you know if something changes. You can assign it to me meanwhile :) |
not sure if its related but you should update your local version of the awscli so that when you run |
exec
auth with eks
Current and expected behavior
kubectl get pods
of the go client workskubectl get pods
of the kube-rs example fails with "Unauthorized error" (see trace log below)We stumbled upon this bug in metalbear-co/mirrord#984 and thought maybe it's a kube-rs issue, we reproduced it with the example so we believe it's not bad usage causing it.
Possible solution
No response
Additional context
Relevant kubeconfig
Environment
kubectl version --short
Configuration and features
cargo build --release --example kubectl --features rustls-tls,k8s-openapi/v1_26,runtime --no-default-features
Affected crates
kube-core, kube-client, kube-runtime
Would you like to work on fixing this bug?
yes
The text was updated successfully, but these errors were encountered: