Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow k8s ingress controller serviceAccountToken and serviceAccountCACert to be changed #611

Closed
Dacode45 opened this issue Aug 11, 2016 · 2 comments

Comments

@Dacode45
Copy link

Right now serviceAccountToken and serviceAccountCACert are hardcoded in 'traefik/provider/kubernetes.go'. They should be configurable like defaultKubeEndpoint.

const (
    serviceAccountToken  = "/var/run/secrets/kubernetes.io/serviceaccount/token"
    serviceAccountCACert = "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
    defaultKubeEndpoint  = "http://127.0.0.1:8080"
)
@errm errm self-assigned this Aug 15, 2016
@errm errm added area/provider/k8s/ingress kind/enhancement a new or improved feature. labels Aug 15, 2016
@enxebre
Copy link
Contributor

enxebre commented Dec 20, 2016

Hey @errm, @Dacode45 is this still considered an issue? As Traefik is using "In cluster" config, this is handled internally by the k8s client. Also see #876

@errm
Copy link
Contributor

errm commented Feb 21, 2017

I don't this this is an issue, with k8s we expect Traefik to be in cluster... and we avoid a bunch of complexity by doing so.

@errm errm closed this as completed Feb 21, 2017
@traefik traefik locked and limited conversation to collaborators Sep 1, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

4 participants