Skip to content
This repository has been archived by the owner on Jul 26, 2022. It is now read-only.

Commit

Permalink
docs: add assume-role limits per ns
Browse files Browse the repository at this point in the history
Signed-off-by: Moritz Johner <[email protected]>
  • Loading branch information
moolen committed Aug 21, 2019
1 parent f8d7286 commit 7c1f646
Showing 1 changed file with 11 additions and 1 deletion.
12 changes: 11 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,16 @@ Set AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY env vars in the session/pod.
You can use envVarsFromSecret in the helm chart to create these env vars from existing k8s secrets

Additionally, you can specify a `roleArn` which will be assumed before retrieving the secret.
You can limit the range of roles which can be assumed by this particular *namespace* by using annotations on the namespace resource.
The annotation value is evaluated as a regular expression and tries to match the `roleArn`.

```yaml
kind: Namespace
metadata:
name: iam-example
annotations:
iam.amazonaws.com/permitted: "arn:aws:iam::123456789012:role/.*"
```
### Add a secret
Expand Down Expand Up @@ -128,7 +138,7 @@ secretDescriptor:
name: password
```
The following IAM policy allows a user to access parameters matching `prod-*`.
The following IAM policy allows a user or role to access parameters matching `prod-*`.
```json
{
"Version": "2012-10-17",
Expand Down

0 comments on commit 7c1f646

Please sign in to comment.