The first part of the change more tightly encapsulates the individual authenticators by pushing down the k8s library usage to only the k8s authenticator and extracting a new interface. Additionally, it moves the authenticators into a distinct package so as to better encapsulate the details.
Better control of authenticator usage
This part allows us to selectively disable authenticators so as to use only the ones that we want to use in our particular deployment.
This change consists of two parts:
The first part of the change more tightly encapsulates the individual authenticators by pushing down the k8s library usage to only the k8s authenticator and extracting a new interface. Additionally, it moves the authenticators into a distinct package so as to better encapsulate the details.
This part allows us to selectively disable authenticators so as to use only the ones that we want to use in our particular deployment.