-
Notifications
You must be signed in to change notification settings - Fork 399
Closed
crossplane/crossplane
#1577Labels
bugSomething isn't workingSomething isn't working
Description
What happened?
To conform with Crossplane's new default security context for stacks (crossplane/crossplane#1444), the provider-aws
container now runs as non-root (#202). Because we set the non-root user in the Dockerfile, users must rebuild the container to run as root user in order to be able to read the AWS credentials that are injected from the service account into /var/run/secrets/
in the container.
How can we fix it?
There are a few immediate options I could see here:
- Create a separate release for running in "insecure mode". This could use a workaround like Fix AWS IAM Roles for Service Accounts permission problem. kubernetes-sigs/external-dns#1185 (comment).
- Add fields on
ClusterStackInstall
(or the next iteration of the installation unit). This seems like the most sustainable long-term solution as there is desire to move away from including aninstall.yaml
in provider packages (install.yaml allows a full Deployment spec to be declared which can be problematic crossplane/crossplane#1441). - Document how a user may build their own package from source in AUTHENTICATION.md. This is a good short-term solution.
ashlineldridge, marlenepereira and danigar
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working