Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support specifying assume_role_arn for Kube cluster matchers #28282

Merged
merged 2 commits into from Jun 28, 2023

Conversation

tigrato
Copy link
Contributor

@tigrato tigrato commented Jun 26, 2023

This PR allows users to assume different AWS roles when interacting with AWS EKS API. It allows users to proxy EKS clusters in different AWS accounts using the same Teleport Kubernetes Service.

Example configuration:

kubernetes_service:
  enabled: true
  resources:
  - labels:
      'a': 'b'
    aws:
      assume_role_arn: "arn:aws:iam::0987654321:role/KubeAccess"
      external_id: "0987654321"
  - labels:
      'c': 'd'
    aws:
      assume_role_arn: "arn:aws:iam::123456789012:role/KubeAccess"
      external_id: "123456789012"

Part of #27156

This PR allows users to assume different AWS roles when interacting with
AWS EKS API. It allows users to proxy EKS clusters in different AWS
accounts using the same Teleport Kubernetes Service.

Example configuration:

```yaml

kubernetes_service:
  enabled: true
  resources:
  - labels:
      'a': 'b'
    aws:
      assume_role_arn: "arn:aws:iam::0987654321:role/KubeAccess"
      external_id: "0987654321"
  - labels:
      'c': 'd'
    aws:
      assume_role_arn: "arn:aws:iam::123456789012:role/KubeAccess"
      external_id: "123456789012"

```
@tigrato tigrato enabled auto-merge June 26, 2023 15:24
lib/kube/proxy/kube_creds_test.go Outdated Show resolved Hide resolved
@public-teleport-github-review-bot public-teleport-github-review-bot bot removed the request for review from ravicious June 28, 2023 09:34
@tigrato tigrato added this pull request to the merge queue Jun 28, 2023
Merged via the queue into master with commit 73cfb29 Jun 28, 2023
22 checks passed
@tigrato tigrato deleted the tigrato/compute-assume-role-from-matcher branch June 28, 2023 09:55
@public-teleport-github-review-bot

@tigrato See the table below for backport results.

Branch Result
branch/v13 Failed

tigrato added a commit that referenced this pull request Jul 7, 2023
* Support specifiying `assume_role_arn` for Kube cluster matchers

This PR allows users to assume different AWS roles when interacting with
AWS EKS API. It allows users to proxy EKS clusters in different AWS
accounts using the same Teleport Kubernetes Service.

Example configuration:

```yaml

kubernetes_service:
  enabled: true
  resources:
  - labels:
      'a': 'b'
    aws:
      assume_role_arn: "arn:aws:iam::0987654321:role/KubeAccess"
      external_id: "0987654321"
  - labels:
      'c': 'd'
    aws:
      assume_role_arn: "arn:aws:iam::123456789012:role/KubeAccess"
      external_id: "123456789012"

```

* reuse eks token validation
github-merge-queue bot pushed a commit that referenced this pull request Jul 10, 2023
… (#28832)

* Support specifiying `assume_role_arn` for Kube cluster matchers

This PR allows users to assume different AWS roles when interacting with
AWS EKS API. It allows users to proxy EKS clusters in different AWS
accounts using the same Teleport Kubernetes Service.

Example configuration:

```yaml

kubernetes_service:
  enabled: true
  resources:
  - labels:
      'a': 'b'
    aws:
      assume_role_arn: "arn:aws:iam::0987654321:role/KubeAccess"
      external_id: "0987654321"
  - labels:
      'c': 'd'
    aws:
      assume_role_arn: "arn:aws:iam::123456789012:role/KubeAccess"
      external_id: "123456789012"

```

* reuse eks token validation
@r0mant r0mant mentioned this pull request Jul 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants