Skip to content

Commit 9e73d13

Browse files
Update keps/sig-multicluster/5339-clusterprofile-plugin-credentials/README.md
Co-authored-by: Corentin Debains <[email protected]>
1 parent 7c2d395 commit 9e73d13

File tree

1 file changed

+1
-1
lines changed
  • keps/sig-multicluster/5339-clusterprofile-plugin-credentials

1 file changed

+1
-1
lines changed

keps/sig-multicluster/5339-clusterprofile-plugin-credentials/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ In this structure, not all fields would apply, such as:
296296

297297
Some credential providers require cluster-specific, non-secret parameters (for example, a `clusterName`) in order to obtain credentials. To standardize how this information is conveyed from a `ClusterProfile` to a plugin, the library follows the existing convention defined by the client authentication API:
298298

299-
- Optional: when a plugin needs per-cluster, non-secret config, set an extension entry with `name: client.authentication.k8s.io/exec` under `Cluster.extensions`.
299+
> Optional: when a plugin needs per-cluster, non-secret config, set an extension entry with `name: client.authentication.k8s.io/exec` under `Cluster.extensions`.
300300
- The library reads only the `extension` field of that entry and passes it through verbatim to `ExecCredential.Spec.Cluster.Config`.
301301
- The content must be non-secret and cluster-specific. Controller- or environment-specific data must not be placed here.
302302
- Plugins may read values (e.g. `clusterName`) from `ExecCredential.Spec.Cluster.Config`.

0 commit comments

Comments
 (0)