-
Notifications
You must be signed in to change notification settings - Fork 372
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Re-enable support for IAM Roles for Service Accounts #211
Comments
@hasheddan Looking at kubernetes-sigs/external-dns#1185 (comment) , is there any unexpected or bad side effects of using |
@muvaf I think that would be fine. Another option would be to just set it in the |
What happened?
To conform with Crossplane's new default security context for stacks (crossplane/crossplane#1444), the
provider-aws
container now runs as non-root (#202). Because we set the non-root user in the Dockerfile, users must rebuild the container to run as root user in order to be able to read the AWS credentials that are injected from the service account into/var/run/secrets/
in the container.How can we fix it?
There are a few immediate options I could see here:
ClusterStackInstall
(or the next iteration of the installation unit). This seems like the most sustainable long-term solution as there is desire to move away from including aninstall.yaml
in provider packages (install.yaml allows a full Deployment spec to be declared which can be problematic crossplane/crossplane#1441).The text was updated successfully, but these errors were encountered: