-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Granting access to AWS SSO Users. Terraform Cloud/Enterprise #416
Comments
mapping role of AFT (Account Factory Terraform) working fine, plus using open PR KMS - Additional key admins support #414 ... Please merge!
|
Hi @ZeroDeth #414 has been merged. We have support for patching Additionally I would also recommend leveraging our Teams feature which lets you configure a I would also recommend adding a +1 to aws/containers-roadmap#185. Please let us know if these meet your requirements or if you need any additional information. |
Awesome. Thanks @askulkarni2 |
Is your feature request related to a problem? Please describe
I'm looking for a way to use the kubernetes provider to update aws-auth.
Normally, when a EKS Cluster is created and only the users who has access to the Cluster can view information in the EKS Console. But if we provide default Kubernetes “View” cluster role, it will not provide the visibility to all the information that can be viewed from the AWS EKS Console view.
AWS SSO uses the AWS IAM Roles to federate the access to the AWS Console for the SSO Users. Therefore, to provide access to AWS SSO users we need to grant access to the respective AWS SSO role created in the AWS IAM Roles. The Roles are mapped under the “mapRoles” section of the AWS-Auth Configmap.
Just using the AWS SSO Role ARN is not working it deviates from the standard AWS IAM Role ARN format. When authenticating AWS IAM roles with the Kubernetes RBAC via AWS IAM-Authenticator, it only considers the standard Role ARN format.
Describe the solution you'd like
TF cloud means that the cluster is created via a role that is assumed by the TF cloud workspace. These TF cloud instances are very limited they do not contain anything besides terraform, there is no kubectl, awscli or shell present and I can't add it.
How can I patch aws-auth using the kubernetes provider?
Describe alternatives you've considered
A Terraform module to manage cluster authentication (aws-auth) for an Elastic Kubernetes (EKS) cluster on AWS.
The terraform-aws-modules/eks/aws v.18.20.0 release has brought back support aws-auth configmap!
Additional context
Useful Links:
Using Terraform version 1.1.7 with Terraform Cloud and Deploy AWS Control Tower Account Factory for Terraform (AFT)
Hint: Running from CLI working fine.
The text was updated successfully, but these errors were encountered: