-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add iam identityMappings to config file #874
Comments
Should it be a map? or perhaps an array of mappings? |
@martina-if yes, good point - I've updated the description to reflect what is currently understood about this :) |
how is this related to #841 ? |
+1 to this feature. This will make it a lot easier instead of having separate |
upvote upvote upvote |
Upvote as well! |
see also #967 |
iam.identityMapping
to config file
+1, any update on when this feature might be considered for implementation? |
Closing. We are expecting an new API from AWS to handle cluster permissions, so we could implement this feature but it would likely be replaced very soon by this new API. I think it makes sense to halt any new development on |
the iamidentitymappings is the eksctl feature exposing the identity mapping used by I also note that |
fix naming mistake in clusterrolebinding, expose env var to controller via downward api
We have commands for managing IAM identity mapping now, and config file can be used as input, but we don't yet support definitions of the identity mappings in the config file itself.
I thing this would be the most suitable way to expose it:
At the I'm not sure about how the array/map itself should look like.
We would probably want to keen nodegroups out of the picture for now, i.e. what we do automatically at the moment, can remain invisible at the level of config file. Users who want to manage node IAM roles along with
--update-auth-configmap=false
, should be able to do it and use config file to set authenticate their nodegroup roles.The text was updated successfully, but these errors were encountered: