Open yegli opened 2 days ago
This issue is currently awaiting triage.
SIG CLI takes a lead on issue triage for this repo, but any Kubernetes member can accept issues by applying the triage/accepted
label.
The triage/accepted
label can be added by org members by writing /triage accepted
in a comment.
get
command approaches all the resources generic, that said there is no custom code specific for secrets. So it is not possible to add this flag in get. I'd recommend writing a script for this.
@ardaguclu Thanks a lot for your quick response I see the issue at hand. Do you know of any efficient way to share the code with other developers as I see this issue is widespread? Would be awesome to make this solution as accessible as possible.
I'd add it in here and if someone stumble upon the same issue, they can use it from here.
What would you like to be added:
kubectl get secret x -o yaml
is a very useful command. I have had multiple use cases where I have secrets in our dev environment and I must verify the base64 encoded information. Unfortunately kubectl doesn't support a flag such as--base64-decode
, which allows printing the secret to the cli in a human readable form.I could create a function on my device that takes the intended value base64 encodes it and then compares the given value with the value provided from the secret, but this isn't intuitive and is hard to share with other developers.
I'd love to take over the according implementation once approved.
The flag
--base64-decode
should print the secret in yaml format with secret values decoded./sig cli
Why is this needed: To improve the workflow of troubleshooting secrets and verifying that the base64 data also matches the intended values.