Skip to content

Re-enable support for IAM Roles for Service Accounts #211

@hasheddan

Description

@hasheddan

What happened?

To conform with Crossplane's new default security context for stacks (crossplane/crossplane#1444), the provider-aws container now runs as non-root (#202). Because we set the non-root user in the Dockerfile, users must rebuild the container to run as root user in order to be able to read the AWS credentials that are injected from the service account into /var/run/secrets/ in the container.

How can we fix it?

There are a few immediate options I could see here:

  1. Create a separate release for running in "insecure mode". This could use a workaround like Fix AWS IAM Roles for Service Accounts permission problem. kubernetes-sigs/external-dns#1185 (comment).
  2. Add fields on ClusterStackInstall (or the next iteration of the installation unit). This seems like the most sustainable long-term solution as there is desire to move away from including an install.yaml in provider packages (install.yaml allows a full Deployment spec to be declared which can be problematic crossplane/crossplane#1441).
  3. Document how a user may build their own package from source in AUTHENTICATION.md. This is a good short-term solution.

Metadata

Metadata

Assignees

Labels

bugSomething isn't working

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions