Skip to content

Commit 2dac32b

Browse files
Update keps/sig-multicluster/5339-clusterprofile-plugin-credentials/README.md
Co-authored-by: Corentin Debains <[email protected]>
1 parent 5335a6b commit 2dac32b

File tree

1 file changed

+1
-1
lines changed
  • keps/sig-multicluster/5339-clusterprofile-plugin-credentials

1 file changed

+1
-1
lines changed

keps/sig-multicluster/5339-clusterprofile-plugin-credentials/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -297,7 +297,7 @@ In this structure, not all fields would apply, such as:
297297
Some credential providers require cluster-specific, non-secret parameters (for example, a `clusterName`) in order to obtain credentials. To standardize how this information is conveyed from a `ClusterProfile` to a plugin, the library follows the existing convention defined by the client authentication API:
298298

299299
> Optional: when a plugin needs per-cluster, non-secret config, set an extension entry with `name: client.authentication.k8s.io/exec` under `Cluster.extensions`.
300-
- The library reads only the `extension` field of that entry and passes it through verbatim to `ExecCredential.Spec.Cluster.Config`.
300+
> The library reads only the `extension` field of that entry and passes it through verbatim to `ExecCredential.Spec.Cluster.Config`.
301301
> The content must be non-secret and cluster-specific. Controller- or environment-specific data must not be placed here.
302302
- Plugins may read values (e.g. `clusterName`) from `ExecCredential.Spec.Cluster.Config`.
303303

0 commit comments

Comments
 (0)