Skip to content

EKS Pod Identity support for driver level credentials#449

Closed
renanmagagnin wants to merge 12 commits into
awslabs:mainfrom
renanmagagnin:eks-pod-identity-support-driver-level
Closed

EKS Pod Identity support for driver level credentials#449
renanmagagnin wants to merge 12 commits into
awslabs:mainfrom
renanmagagnin:eks-pod-identity-support-driver-level

Conversation

@renanmagagnin
Copy link
Copy Markdown
Contributor

@renanmagagnin renanmagagnin commented Apr 30, 2025

This PR was closed and replaced with #451 because we need the E2E tests to run with the newly added cluster-name parameter. This is not possible in a PR created from a fork.

Description of changes: With this change, we will support the configuration of driver level credentials with EKS Pod Identity. In EKS clusters, this is an alternative to IRSA with an easier configuration process.

Key Changes:

  • Credential Provider

    • In provider_driver.go the container credentials used for EKS Pod Identity are fetched from the driver pod and forwarded to the Mountpoint process. This is done similarly to STS Web Identity credentials used for IRSA.
    • Added unit tests covering different credential setup scenarios (including combinations)
  • Testing

    • Added cluster name as parameter for E2E tests
    • Added E2e tests covering EKS Pod Identity setup scenarios with IAM roles of varying levels of S3 access
    • Manual testing performed on personal EKS cluster

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@renanmagagnin renanmagagnin self-assigned this Apr 30, 2025
@renanmagagnin renanmagagnin requested a review from a team as a code owner April 30, 2025 17:11
@renanmagagnin renanmagagnin marked this pull request as draft April 30, 2025 17:12
Comment thread tests/e2e-kubernetes/go.sum Outdated
Comment thread pkg/driver/node/credentialprovider/provider_driver.go Outdated
Comment thread examples/kubernetes/static_provisioning/static_provisioning.yaml
Copy link
Copy Markdown
Contributor

@unexge unexge left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left some comments but overall LGTM

Comment thread tests/e2e-kubernetes/go.sum Outdated
Comment thread pkg/driver/node/credentialprovider/provider_driver.go Outdated
Comment thread tests/e2e-kubernetes/testsuites/credentials.go Outdated
Comment thread tests/e2e-kubernetes/testsuites/credentials.go Outdated
Comment thread tests/e2e-kubernetes/testsuites/credentials.go
Comment thread tests/e2e-kubernetes/testsuites/util.go Outdated
Comment thread tests/e2e-kubernetes/testsuites/util.go Outdated
@renanmagagnin renanmagagnin changed the title Eks pod identity support driver level EKS Pod Identity support for driver level credentials May 2, 2025
@renanmagagnin renanmagagnin force-pushed the eks-pod-identity-support-driver-level branch from e723e72 to ed8ba1e Compare May 2, 2025 10:51
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
@renanmagagnin renanmagagnin force-pushed the eks-pod-identity-support-driver-level branch from ed8ba1e to 711fba7 Compare May 2, 2025 10:52
@renanmagagnin renanmagagnin marked this pull request as ready for review May 2, 2025 10:55
@renanmagagnin renanmagagnin requested review from unexge and yerzhan7 May 2, 2025 10:55
Signed-off-by: Renan Magagnin <renanmag@amazon.co.uk>
@renanmagagnin
Copy link
Copy Markdown
Contributor Author

Closing and replacing with #451 because we need the E2E tests to run with the newly added cluster-name parameter. This is not possible in a PR created from a fork.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants