-
New Feature
-
Resolution: Unresolved
-
Major
-
kubernetes 3651.v908e7db_10d06
kubernetes-credentials 0.9.0
I am trying to set up agents within a GKE autopilot cluster. As part of the plugin auth configuration, I can choose a secret from the Jenkins server. File, secret text, user/password. According to the documentation, those are legacy authentication methods, and not will be supported in future version, and aren't supported by GKE autopilot. So, I need a different approach to authenticate to GKE. I tried with this. And it did not work. It seems the only way to authenticate with k8s is using static credentials (??).
It would be great, if you could add new options to use other methods as GCP Service accounts and gcloud.
In the meantime, it would be great if we can found a workaround together. I want to understand which OS user and which piece of code is executing the "Test Connection" task in the Jenkins kubernetes cloud form. Because we could inject the Service account through the OS environment variables, and make it work.