Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@jroper
Copy link
Contributor

@jroper jroper commented Oct 31, 2025

This adds support for async auth providers. There are many use cases for this, for example, authenticating with Kubernetes in AWS but outside of EKS, you need to make API calls to get a frequently rotated token. This allows that token to be looked up in a non blocking way.

This also prepares the way for better support for reloading tokens in Kubernetes itself given that they are now frequently rotated.

@doriordan
Copy link
Owner

THanks James, I will take a look at this tomorrow.

This adds support for async auth providers. There are many use cases for this,
for example, authenticating with Kubernetes in AWS but outside of EKS, you need
to make API calls to get a frequently rotated token. This allows that token to
be looked up in a non blocking way.

This also prepares the way for better support for reloading tokens in
Kubernetes itself given that they are now frequently rotated.
@jroper jroper force-pushed the async-auth-providers branch from 8788023 to 89de2fb Compare November 3, 2025 01:58
jroper added a commit to jroper/skuber that referenced this pull request Nov 3, 2025
Fixes doriordan#350

This implements token reloading for in cluster config. It's built on doriordan#424 so
that needs to be reviewed/merged first.

Also fixed a resource leak where the input streams for reading the files for
in cluster config were not being closed. This was necessary to fix given that
we're now frequently loading those streams.
@doriordan doriordan merged commit 3d68c63 into doriordan:master Nov 4, 2025
@doriordan
Copy link
Owner

LGTM, merged

jroper added a commit to jroper/skuber that referenced this pull request Nov 5, 2025
Fixes doriordan#350

This implements token reloading for in cluster config. It's built on doriordan#424 so
that needs to be reviewed/merged first.

Also fixed a resource leak where the input streams for reading the files for
in cluster config were not being closed. This was necessary to fix given that
we're now frequently loading those streams.
doriordan pushed a commit that referenced this pull request Nov 5, 2025
Fixes #350

This implements token reloading for in cluster config. It's built on #424 so
that needs to be reviewed/merged first.

Also fixed a resource leak where the input streams for reading the files for
in cluster config were not being closed. This was necessary to fix given that
we're now frequently loading those streams.
@doriordan
Copy link
Owner

@jroper following this change compilation for 2.12 was broken because ExecutionContext.parasitic was only introduced in 2.13. So I have changed those usages to ExecutionContext.global in https://github.com/doriordan/skuber/pull/431/files. While this does involved some additional context switching overhead I doubt it would be problematic for this use case.

@jroper
Copy link
Contributor Author

jroper commented Nov 10, 2025

Ah good point.

@jroper jroper deleted the async-auth-providers branch November 10, 2025 04:40
doriordan pushed a commit that referenced this pull request Nov 10, 2025
This adds support for async auth providers. There are many use cases for this,
for example, authenticating with Kubernetes in AWS but outside of EKS, you need
to make API calls to get a frequently rotated token. This allows that token to
be looked up in a non blocking way.

This also prepares the way for better support for reloading tokens in
Kubernetes itself given that they are now frequently rotated.
doriordan pushed a commit that referenced this pull request Nov 10, 2025
Fixes #350

This implements token reloading for in cluster config. It's built on #424 so
that needs to be reviewed/merged first.

Also fixed a resource leak where the input streams for reading the files for
in cluster config were not being closed. This was necessary to fix given that
we're now frequently loading those streams.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants