-
Notifications
You must be signed in to change notification settings - Fork 379
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pass fsGroup in install.yaml #242
Conversation
This re-enables support for IAM Roles for Service Accounts by passing an fsGroup, meaning that the projected service account token volume will be owned by the GID and the GID will be added as a supplemental group to the container process. Signed-off-by: hasheddan <[email protected]>
Signed-off-by: hasheddan <[email protected]>
# to support pre-v1.19 Kubernetes clusters | ||
# https://github.com/kubernetes/enhancements/pull/1598 | ||
# https://github.com/aws/amazon-eks-pod-identity-webhook/issues/8 | ||
fsGroup: 65534 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is this fully compatible with the last official release of crossplane (v0.11)? i.e. if someone installs this latest provider-aws but hasn't updated crossplane to a newer master version, will it work OK? (or not crash/break at least)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jbw976 this will not break master
of provider-aws
with Crossplane v0.11
/v0.11.1
, but this will be stripped out meaning that the IAM Role for Service Accounts will not work until someone updates their Crossplane to master
. So in short, this will not introduce any regressions, but will also not be a fix without updating Crossplane. (One could manually edit this as well I think to get the functionality with older Crossplane versions though).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes that sounds perfect. Totally fine with it not being "fixed" until their crossplane version is also updated. The important part is that they won't experience any crashes or complete breaks by using this new provider-aws update without also updating crossplane.
Pass fsGroup in install.yaml
Pass fsGroup in install.yaml
Signed-off-by: hasheddan [email protected]
Description of your changes
This re-enables support for IAM Roles for Service Accounts by passing an fsGroup,
meaning that the projected service account token volume will be owned by the GID and the GID will be added as a supplemental group to the container process.
Fixes #211
Depends on crossplane/crossplane#1577
Checklist
I have:
make reviewable
to ensure this PR is ready for review.app.yaml
to include any new role permissions.