-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add kubernetesGroups to AccessEntries #32074
base: main
Are you sure you want to change the base?
feat: add kubernetesGroups to AccessEntries #32074
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The pull request linter has failed. See the aws-cdk-automation comment below for failure reasons. If you believe this pull request should receive an exemption, please comment and provide a justification.
A comment requesting an exemption should contain the text Exemption Request
. Additionally, if clarification is needed add Clarification Request
to a comment.
Exemption Request |
This is very much needed 🙏 |
…//github.com/markussiebert/aws-cdk into feat/accessentry-with-kubernetesGroups-30604
…//github.com/markussiebert/aws-cdk into feat/accessentry-with-kubernetesGroups-30604
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #32074 +/- ##
=======================================
Coverage 77.19% 77.19%
=======================================
Files 105 105
Lines 7164 7164
Branches 1311 1311
=======================================
Hits 5530 5530
Misses 1454 1454
Partials 180 180
Flags with carried forward coverage won't be shown. Click here to find out more.
|
The pull request linter fails with the following errors:
PRs must pass status checks before we can provide a meaningful review. If you would like to request an exemption from the status checks or clarification on feedback, please leave a comment on this PR containing ✅ A exemption request has been requested. Please wait for a maintainer's review. |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
No on cares? So obvious feature ... ok will use escape hatches. I know how they work. |
Issue # (if applicable)
Closes #30604
Reason for this change
Right now, it was not possible to set kubernetesGroups on AccessEntries and it was required to set AccessPolicies. Both were artificial limitiations, as Cloudformation nor the EKS Api behave like this.
With allowing kubernetesGroups, it's possible to define custom mappings of IAM Roles to (Cluster)RoleBindings.
Description of changes
No decisions, straight forward code
Description of how you validated changes
Created UnitTests
Checklist
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license