-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client library doesn't support AWS IaM authentication. #315
Comments
Someone needs to implement the Authenticator interface here: |
FYI is a dupe - #238 with the umbrella issue - kubernetes/kubernetes#62185 |
@christopherhein @brendandburns @tvishwanath-arkin Is anyone able to use AWS IAM authentication? I was able to connect to GKE cluster via GCP authenticator. I was looking for AWS authenticator which will connect to AWS EKS cluster, similar to GCP and Azure authenticator |
Isn't here someone from AWS who could contribute and make it work? We are now trying to switch to EKS and burning time on this limitation. I would expect AWS contribution to allow its users to actually use EKS fully... |
I've successfully implemented Here is the code:
I've pasted the code here because I don't consider it as a final solution of the problem. The only advantage is that it doesn't require any modification of client-java library itself (I've used v4.0.0). The drawback is, that it's incompatible with kube config file generated by
Whereas
The These two configurations cannot live together what requires you to keep two versions of the config file (one for To support this solution it would be nice to have yet another environment variable apart of KUBECONFIG which is also used by But obviously, better solution would be to work out of the box just after calling |
@hluchej Thanks for sharing this. |
I am not able to set two versions of the config file |
Did you use the KUBECONFIG environment variable to point to the manually created k8s configuration file? Something like: FYI: I've updated the code, the resulting base64 part of the token should have the padding omitted. |
Any update on this? My team is trying to determine the work involved in getting the java client (this codebase) to talk with an EKS cluster. Can anyone of the core maintainers (or anyone else) comment on what would be the correct approach/solution and the level of effort required to have this working correctly? Happy to contribute a PR if needed. |
It took me a while but it finally worked. A tip in case you're struggling to know why you're getting an For those who are using AWS java SDK2, here goes the code:
|
Is there any progress on this?. @sillva, would you mind to explain how you hooked this up so the API uses this authenticator?, Thanks in advance. |
Looks like this issue is resolved via #512 which gives generic support for the exec construction in
|
Just register the
The object |
Correct but in your example the docker image would need to have the |
@rohinwork, I don't know exactly what do you mean by automatical expiration, but the token contains validity time information and the code handles this. On the other hand, as @sillva pointed out, the #512 should solve the problem. I gave it a try and it's really working! Thanks to it, this issue seems obsolete for me now. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Closing this issue since it is working via the exec implementation. |
Hi @brendandburns , I am trying to understand whether a token can be fetched using AWS IAM access key ID and Secret access key. |
With https://github.com/kubernetes-sigs/aws-iam-authenticator gaining more popularity and also being adopted by AWS to support EKS, we may need to have webhook based authentication implemented
The text was updated successfully, but these errors were encountered: