Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider taking a list of account ids #29

Open
leopoldodonnell opened this issue Jan 24, 2017 · 12 comments
Open

Consider taking a list of account ids #29

leopoldodonnell opened this issue Jan 24, 2017 · 12 comments

Comments

@leopoldodonnell
Copy link

We use multiple AWS accounts in a hub and spoke model. The hub account has the official images while other accounts may have all sort of wild animals. Minikube is where developers are working with both experimental and official images, so it would be great to be able to pull from both.

I'd happily implement a pull-request to allow for a list (space or comma?) of account ids just as aws get-login --registry_ids permits, if it would be accepted.

@stevesloka
Copy link
Member

Hey @leopoldodonnell yeah no problem! As you've seen currently we only support a single account inside a single region.

Happy to take PR's if you want to help out, or I can work on as well. I think we'd need to pass maybe a map as a setup if you wanted multiple. We'd have to keep AWS Accounts together with the correct IAM creds.

It would also be nice to do in a way that doesn't break upstream people consuming this app via the minikube addons (https://github.com/kubernetes/minikube#private-container-registries).

@leopoldodonnell
Copy link
Author

Absolutely - I'd make it backward compatible.

I thought I'd add awsaccounts as a space separated list and pass those through, so there'd be an array of registryids instead of just the one.

I could get fancy and extract the default account id to be more consistent with the way that aws get-login --registry-ids works. If that was more desirable, I'd use registry_ids as the environment variable to pass down the additional account ids.

I'll get this done in the next few days. Thanks for getting this plugin into the project - it's a great help

@katp4
Copy link

katp4 commented Feb 6, 2018

Hello @leopoldodonnell , did you ever end up completing this?

@leopoldodonnell
Copy link
Author

leopoldodonnell commented Feb 6, 2018 via email

@katp4
Copy link

katp4 commented Feb 6, 2018

Hey @leopoldodonnell,

Awesome, thanks for the info!

I'm thinking of doing this #57 as opposed to passing account IDs. I would appreciate your feedback on whether its possible or not since you are familiar with the code base.

@leopoldodonnell
Copy link
Author

leopoldodonnell commented Feb 6, 2018 via email

@leopoldodonnell
Copy link
Author

leopoldodonnell commented Feb 6, 2018 via email

@rickard-von-essen
Copy link
Contributor

Just added support for this in #58

@yujunz
Copy link

yujunz commented Dec 11, 2018

How do we specify different access key and secret key for multiple accounts? @rickard-von-essen

@rickard-von-essen
Copy link
Contributor

@yujunz you don't, you give cross account access to that user/role.

@yujunz
Copy link

yujunz commented Dec 11, 2018

you don't, you give cross account access to that user/role.

How shall I do it cross AWS and AWS China? It seems not possible to add IAM role from AWS China to the trust identifiers in AWS global. They two providers are totally isolated.

@mohag
Copy link

mohag commented Oct 30, 2019

Dealing with multiple regions in the same way might be useful as well...

@yujunz You can probably deploy two instances, configured to use different secrets (with the aws-secret-name flag).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants