Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass fsGroup in install.yaml #242

Merged
merged 2 commits into from
Jun 5, 2020

Conversation

hasheddan
Copy link
Member

Signed-off-by: hasheddan [email protected]

Description of your changes

This re-enables support for IAM Roles for Service Accounts by passing an fsGroup,
meaning that the projected service account token volume will be owned by the GID and the GID will be added as a supplemental group to the container process.

Fixes #211
Depends on crossplane/crossplane#1577

Checklist

I have:

  • Run make reviewable to ensure this PR is ready for review.
  • Ensured this PR contains a neat, self documenting set of commits.
  • Updated any relevant documentation, examples, or release notes.
  • Updated the dependencies in app.yaml to include any new role permissions.

hasheddan added 2 commits June 3, 2020 13:08
This re-enables support for IAM Roles for
Service Accounts by passing an fsGroup,
meaning that the projected service account
token volume will be owned by the GID and
the GID will be added as a supplemental group
to the container process.

Signed-off-by: hasheddan <[email protected]>
@hasheddan hasheddan requested a review from jbw976 June 4, 2020 18:36
@hasheddan hasheddan marked this pull request as ready for review June 4, 2020 18:36
# to support pre-v1.19 Kubernetes clusters
# https://github.com/kubernetes/enhancements/pull/1598
# https://github.com/aws/amazon-eks-pod-identity-webhook/issues/8
fsGroup: 65534
Copy link
Member

@jbw976 jbw976 Jun 4, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is this fully compatible with the last official release of crossplane (v0.11)? i.e. if someone installs this latest provider-aws but hasn't updated crossplane to a newer master version, will it work OK? (or not crash/break at least)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jbw976 this will not break master of provider-aws with Crossplane v0.11/v0.11.1, but this will be stripped out meaning that the IAM Role for Service Accounts will not work until someone updates their Crossplane to master. So in short, this will not introduce any regressions, but will also not be a fix without updating Crossplane. (One could manually edit this as well I think to get the functionality with older Crossplane versions though).

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes that sounds perfect. Totally fine with it not being "fixed" until their crossplane version is also updated. The important part is that they won't experience any crashes or complete breaks by using this new provider-aws update without also updating crossplane.

@jbw976 jbw976 merged commit da16f14 into crossplane-contrib:master Jun 5, 2020
wolffbe pushed a commit to wolffbe/provider-aws that referenced this pull request Feb 12, 2021
namku pushed a commit to namku/provider-aws that referenced this pull request Mar 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Re-enable support for IAM Roles for Service Accounts
2 participants