-
Notifications
You must be signed in to change notification settings - Fork 374
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow use of EKS pod identities as an authentication method #1981
Comments
With version 0.46, and the following: apiVersion: aws.crossplane.io/v1beta1
kind: ProviderConfig
metadata:
name: aws-provider
spec:
credentials:
source: InjectedIdentity The result for trying to use pod identity is this error from the
|
Crossplane does not currently have enough maintainers to address every issue and pull request. This issue has been automatically marked as |
/fresh would also love to have this feature |
Crossplane does not currently have enough maintainers to address every issue and pull request. This issue has been automatically marked as |
/fresh |
What problem are you facing?
I would like to use EKS pod identities to grant the provider access to AWS, as an alternative to IRSA
How could Crossplane help solve your problem?
By adding support for this authentication method in
ProviderConfig
.FWIW, I did attempt to use a pod identity with a
ProviderConfig
set to useIRSA
credentials, hoping that it might "just work" given that both IRSA and pod identities work by automatically injecting AWS environment variables into the pod. This approach failed, but I no longer have the exact error message, sorry. Some googling at the time suggested that it might be necessary to use version 2 of the AWS Go client with EKS pod identities.The text was updated successfully, but these errors were encountered: