Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue #482 - Support IAM Authentication for managing external K8s clusters #588

Merged
merged 1 commit into from
Sep 13, 2018

Conversation

alexmt
Copy link
Collaborator

@alexmt alexmt commented Sep 13, 2018

Closes #482

upsert bool
inCluster bool
upsert bool
awsAuth bool
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think awsAuth bool is redundant. We can infer AWS auth by the presence of awsClusterName.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sound good to me. Removed awsAuth

ExecProvider: &api.ExecConfig{
APIVersion: "client.authentication.k8s.io/v1alpha1",
Command: "aws-iam-authenticator",
Args: []string{"token", "-i", c.Config.AWSAuthConfig.ClusterName},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are forgetting to pass roleARN if it is non-empty.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you! fixed.

@alexmt
Copy link
Collaborator Author

alexmt commented Sep 13, 2018

@jessesuen PTAL

@alexmt alexmt merged commit 57a3123 into argoproj:master Sep 13, 2018
@alexmt alexmt deleted the 482-iam-auth branch September 13, 2018 07:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants