kyma alpha authorize ​
Configure trust between a Kyma cluster and a GitHub repository.
Synopsis ​
Configure trust between a Kyma cluster and a GitHub repository by creating an OpenIDConnect resource and RoleBinding or ClusterRoleBinding
bash
kyma alpha authorize repository [flags]Flags ​
text
--client-id string OIDC client ID (audience) expected in the token (required)
--cluster-wide If true, create a ClusterRoleBinding; otherwise, a RoleBinding
--clusterrole string ClusterRole name to bind (usable for RoleBinding or ClusterRoleBinding)
--dry-run Print resources without applying
--issuer-url string OIDC issuer (default "https://token.actions.githubusercontent.com")
--name string Name for the OpenIDConnect resource (optional; default derives from clientId)
--namespace string Namespace for RoleBinding (required if not cluster-wide and binding a Role or namespaced ClusterRole)
-o, --output string Output format (yaml or json)
--prefix string Username prefix for the repository claim (e.g., gh-oidc:)
--repository string GitHub repo in owner/name format (e.g., kyma-project/cli) (required)
--role string Role name to bind (namespaced)
--context string The name of the kubeconfig context to use
-h, --help Help for the command
--kubeconfig string Path to the Kyma kubeconfig file
--show-extensions-error Prints a possible error when fetching extensions fails
--skip-extensions Skip fetching extensions from the target Kyma environmentSee also ​
- kyma alpha - Groups command prototypes for which the API may still change