Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for AWS External account Web Identity Token File based Authentication #643

Open
thebongy opened this issue Apr 28, 2023 · 1 comment

Comments

@thebongy
Copy link

thebongy commented Apr 28, 2023

Currently, authenticating with findDefaultCredentials() in AWS environments with workload identity federation only supports two schemes of authentication on AWS:

AWS supports another authentication scheme called "WEB_IDENTITY_TOKEN_FILE" which uses oauth2/OIDC to generate temporary AWS credetials. This is commonly used in EKS environments when k8 service accounts are annotated to use an AWS IAM role: (https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html). It would be great if this SDK also supports this to make the integration in eks based workloads seamless.

@duckie
Copy link

duckie commented Dec 14, 2023

This feature is dearly missing for some use cases.

For job based stuff, like Atlantis for instance, or other CI software, you can make do by populating your environment with a call to STS AssumeRoleWithWebIdentity and get a set of tokens for the duration of your job.

But for controllers, such as GCP Secret CSI store, the only way to go is to have a service account long term json credentials.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants