Skip to content

Support IAM Roles for Service Accounts in EKS #60

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

mananyuki
Copy link
Contributor

Hello, I'm using your plugin on EKS.
AWS has released the new feature for EKS. When I was migrating to this, I found something that didn't work with your plugin.
This feature uses OIDC JSON web token so Aws::AssumeRoleCredentials could not get IAM Roles...
So I modified your plugin to use Aws::AssumeRoleWebIdentityCredentials if web token exists.

Copy link
Collaborator

@cosmo0920 cosmo0920 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good.
BTW, how do we use this change in configuration?
Could you write or provide example configuration without sensitive information to use IAM roles for accounts in EKS?

@mananyuki
Copy link
Contributor Author

@cosmo0920 Thanks for the review. I will write an example configuration in the README.

@mananyuki
Copy link
Contributor Author

I wrote an example configuration in the README.
Please review again 😄

Copy link
Collaborator

@cosmo0920 cosmo0920 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! Thanks for your contribution.

@cosmo0920 cosmo0920 merged commit 1b361e3 into atomita:master Oct 29, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants