diff --git a/tools/clientcmd/validation.go b/tools/clientcmd/validation.go index 629c0b30..720d0b88 100644 --- a/tools/clientcmd/validation.go +++ b/tools/clientcmd/validation.go @@ -250,8 +250,6 @@ func validateAuthInfo(authInfoName string, authInfo clientcmdapi.AuthInfo) []err for _, v := range authInfo.Exec.Env { if len(v.Name) == 0 { validationErrors = append(validationErrors, fmt.Errorf("env variable name must be specified for %v to use exec authentication plugin", authInfoName)) - } else if len(v.Value) == 0 { - validationErrors = append(validationErrors, fmt.Errorf("env variable %s value must be specified for %v to use exec authentication plugin", v.Name, authInfoName)) } } } diff --git a/tools/clientcmd/validation_test.go b/tools/clientcmd/validation_test.go index 4742b1a1..1680eeb1 100644 --- a/tools/clientcmd/validation_test.go +++ b/tools/clientcmd/validation_test.go @@ -443,22 +443,19 @@ func TestValidateAuthInfoExecWithAuthProvider(t *testing.T) { test.testConfig(t) } -func TestValidateAuthInfoExecInvalidEnv(t *testing.T) { +func TestValidateAuthInfoExecNoEnv(t *testing.T) { config := clientcmdapi.NewConfig() config.AuthInfos["user"] = &clientcmdapi.AuthInfo{ Exec: &clientcmdapi.ExecConfig{ Command: "/bin/example", APIVersion: "clientauthentication.k8s.io/v1alpha1", Env: []clientcmdapi.ExecEnvVar{ - {Name: "foo"}, // No value + {Name: "foo", Value: ""}, }, }, } test := configValidationTest{ config: config, - expectedErrorSubstring: []string{ - "env variable foo value must be specified for user to use exec authentication plugin", - }, } test.testAuthInfo("user", t)