Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add cert manager deployment #139

Merged
merged 4 commits into from
Jan 24, 2022
Merged

add cert manager deployment #139

merged 4 commits into from
Jan 24, 2022

Conversation

prasita123
Copy link
Contributor

Issue #, if available:

Description of changes: updates to

  • deploy/deployment-base.yaml
    • setting in-cluster=false
    • update volumeMounts paths
    • add cert-manager deployment
      • cert-manager.io/v1 ClusterIssuer
      • cert-manager.io/v1 Certificate
  • deploy/mutatingwebhook.yaml
    • add annotations to replace caBundle

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@prasita123 prasita123 requested a review from a team as a code owner January 24, 2022 18:30
@prasita123
Copy link
Contributor Author

relates to #134

@wongma7
Copy link
Member

wongma7 commented Jan 24, 2022

the README must be updated as well to mention that cert-manager is a prerequisite. and remove mention of CSR https://github.com/aws/amazon-eks-pod-identity-webhook#in-cluster

@prasita123
Copy link
Contributor Author

prasita123 commented Jan 24, 2022

These changes were tested by using IAMserviceaccounts
Reference: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
Steps:

pod configuration:

apiVersion: v1
kind: Pod
metadata:
   name: my-test-pod
   namespace: test-pod-service-account-namespace
spec:
   serviceAccountName: test-pod-service-account
   containers:
   - name: aws-cli
     args: ["-c", "aws s3 ls s3://"]
     command:
     - sh
     image: mikesir87/aws-cli:latest
   restartPolicy: Never 

Validated the webhook to be working by checking the deployment

% kubectl get pod my-test-pod -n test-pod-service-account-namespace -o yaml | grep AWS
- name: AWS_ROLE_ARN
- name: AWS_WEB_IDENTITY_TOKEN_FILE

Validated cert rotation by checking the contents in secret pod-identity-webhook-cert before and after the cert renewal period.

README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants