-
Notifications
You must be signed in to change notification settings - Fork 4.3k
Add assume-role-arn option to update-kubeconfig command for cross-account access #9443
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Conversation
…ount access This update improves the `update-kubeconfig` functionality by adding: * Support for assuming an IAM role when retrieving cluster details. These changes ensure better compatibility with cross-account access
@sdomme Can you please run
The resulting file should be identical to this one. |
@aemous Does the name of the files also need to be identical? Because I got one generated with a different name. |
The file names can be different |
Hi @sdomme,
EDIT: Approving this PR otherwise. |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## develop #9443 +/- ##
========================================
Coverage 93.39% 93.39%
========================================
Files 210 210
Lines 16983 16993 +10
========================================
+ Hits 15861 15871 +10
Misses 1122 1122 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Issue #, if available: #8554
This PR supersedes #9364
Description of changes:
This change introduces support for assuming an IAM role when retrieving cluster information in the
update-kubeconfig
command. By specifying the --assume-role-arn argument, users can assume a cross-account IAM role to access cluster details. The implementation updates the EKSClient to handle role assumption using the AWS STS service and injects the temporary credentials into the EKS client configuration. This enhancement improves cross-account compatibility and simplifies cluster management in multi-account environments.By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.