-
Notifications
You must be signed in to change notification settings - Fork 372
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support eks pod identity association #1972
Comments
In addition, it would be great to support pod identities as an authentication method in Edit: I made a separate issue for this: #1981 |
Crossplane does not currently have enough maintainers to address every issue and pull request. This issue has been automatically marked as |
/fresh This is also important to us as well. This is pretty much the only reason we are not using crossplane right now. |
Crossplane does not currently have enough maintainers to address every issue and pull request. This issue has been automatically marked as |
/fresh would love to have this feature |
/fresh Would be nice |
Hey, folks, quick update on the status of this issue: Since this provider is kind of in maintenance mode and we don't have the time to provide full support we (as maintainers) are not going to implement this and other features on our own. However, we do accept pull requests to include new features into the provider. So feel free to start working on it and assign one of us as reviewer. |
Crossplane does not currently have enough maintainers to address every issue and pull request. This issue has been automatically marked as |
What resource do you need?
Aws recently announced eks pod identities. I'd like to use it via crossplane.
https://docs.aws.amazon.com/eks/latest/userguide/pod-id-association.html
Specifically what is missing is the equivalent of this aws CLI command
aws eks create-pod-identity-association --cluster-name my-cluster --role-arn arn:aws:iam::111122223333:role/my-role --namespace default --service-account my-service-account
What is your use case?
Instead of linking service accounts to iam roles via oidc configuration I'd like to use pod identity
Would you be willing to contribute it using code generator
I'll take a look.
The text was updated successfully, but these errors were encountered: