-
Notifications
You must be signed in to change notification settings - Fork 119
Description
Describe the problem/challenge you have
kubectl
allows specifying --as
, --as-group
, or --as-uid
to impersonate a different user. I would expect kapp
to work the same way. This allows e.g. to use a user with read-only access by default and specify --as=<user>
to apply changes to the cluster. This can prevent accidental cluster changes by forcing the user to explicitly specify the user with write-access.
Describe the solution you'd like
I want to be able to pass --as
, --as-group
, or --as-uid
options to any kapp
command that interacts with the cluster. These options should be passed through to kubectl
or added as HTTP header to the API call.
Anything else you would like to add:
- https://kubernetes.io/docs/reference/access-authn-authz/authentication/#user-impersonation
- https://kubernetes.io/docs/reference/kubectl/generated/kubectl/#options
Vote on this request
This is an invitation to the community to vote on issues, to help us prioritize our backlog. Use the "smiley face" up to the right of this comment to vote.
👍 "I would like to see this addressed as soon as possible"
👎 "There are other more important things to focus on right now"
We are also happy to receive and review Pull Requests if you want to help working on this issue.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status