feat: (PSKD-904) Support credentials when assuming an IAM role#319
feat: (PSKD-904) Support credentials when assuming an IAM role#319dhoucgitter merged 11 commits intostagingfrom
Conversation
Signed-off-by: David.Houck <David.Houck@sas.com>
Signed-off-by: David.Houck <David.Houck@sas.com>
Signed-off-by: David.Houck <David.Houck@sas.com>
Signed-off-by: David.Houck <David.Houck@sas.com>
|
Hi @supear, please review the latest commit for updates based on your suggested doc changes, thanks. |
supear
left a comment
There was a problem hiding this comment.
Just one typo. I think it's good to go once that's fixed!
|
This line from fsx_ontap will need to be adapted for the iam role scenario: .Otherwise it fails like this: |
… comment Signed-off-by: David.Houck <David.Houck@sas.com>
|
Hi @supear, based on your last comment and the new commit, I will go ahead and resolve your doc review comments as completed, sound good? |
Signed-off-by: David.Houck <David.Houck@sas.com>
Hi @ajeffowens , the latest commit should handle creating the correct policy attachment whether using an assumed IAM role or IAM user. I'll message you once I have a new image ready that I'm hoping you can try out again. |
Signed-off-by: David.Houck <David.Houck@sas.com>
…cation Signed-off-by: David.Houck <David.Houck@sas.com>
Signed-off-by: David.Houck <David.Houck@sas.com>
Signed-off-by: David.Houck <David.Houck@sas.com>
Changes
authentication_modeas a General configuration variableadmin_access_entry_role_arnsas a General configuration variable. Add behavior to create an admin level EKS access entry for each role ARN specified in this list of strings.