ManageIQ / kubeclient

A Ruby client for Kubernetes REST API
MIT License
419 stars 167 forks source link

Assume role support for aws eks credentials #630

Closed alauddinulaganathan closed 7 months ago

alauddinulaganathan commented 7 months ago
  1. Describe what this Pull Request does and why you think it is needed. We are using this kubeclient to perform API operations against the AWS EKS (kubernetes) clusters (i.e. the Kubernetes API Server). But we are not using access_key & secret_key directly as it is generally considered insecure. Hence we use - role based access control along with AWS STS to perform authentication (i.e. short lived temporary credentials). But the support for such Credentials Provider is not there in this Client (only supports - static Credentials & profile based static credentials).

I tried a small change to support the AssumeRoleCredentials Provider and it worked nicely. Hence I thought this would be a nice feature enhancement for this repo to users like me who want to use role based access with STS assumed role credentials.

  1. If this fixes an existing issue, please specify in Fixes #<id> format Not a bug fix. It is a feature enhancement.
alauddinulaganathan commented 7 months ago

@miq-bot add-label enhancement @miq-bot add-label aws @miq-bot add-label eks @miq-bot add-label aws_eks

agrare commented 7 months ago

Test failures should be resolved by #631 and #632