-
Notifications
You must be signed in to change notification settings - Fork 529
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ex_aws and ex_aws_sts does not seems to support IAM authentication within EKS? #1057
Comments
👋🏼 We are interested in contributing to this. Could you let us know if this aligns with the library's direction and perhaps provide some pointers around how you'd expect it to be implemented? |
Thanks Pedro! https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html |
To add to what to @danibachar, in order for this sdk to be able to run properly in EKS using service accounts, I think you'll need to implement something like this in the default credential provider chain for this SDK. |
Hi, Thanks ! |
Hello, When we spun up a new application that needed a new service_account, with only AWS Bedrock access. We found this issue. Since it was not applying the pod level service account, only giving it access to the Nodes instance_role. This is a major issue for this library trying to run in EKS using service accounts. Any progress made towards a fix on this would be greatly appreciated. |
I was also just battling this and this seems to work:
|
Environment
mix deps |grep ex_aws
: 2.5.2 (ex_aws_s3: 2.5.2, ex_aws_sts: latest)mix deps | grep hackney
Current behavior
I have an EKS cluster, when deploying a Deployment using a docker file. The SDK seems to fail to authenticate with the the ServiceAccount that is attached to that deployment.
It seems to default to an
instance_role
and auth with an IAM role of the nodes in the cluster.In our example this IAM role does not have permissions to operate with an S3 bucket. Only the IAM role we have configure with the ServiceAccount.
I have checked that the newly create IAM role has succfient permissions and can operate with the relevant S3
Expected behavior
Working within EKS the SDK should work like any other AWS SDK and allow assuming/working with the IAM role that is attached to a Pod/Deployment using a ServiceAccount
The text was updated successfully, but these errors were encountered: