Skip to content

Commit

Permalink
Merge adc2540 into 7436e89
Browse files Browse the repository at this point in the history
  • Loading branch information
mikkeloscar committed Dec 13, 2018
2 parents 7436e89 + adc2540 commit 0c0162e
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,7 @@ initial credentials and create a secret.

```sh
$ export ARN="arn.of.the.iam.role"
$ kubectl create secret generic aws-iam-<name-of-role> --from-literal "credentials=$(./scripts/get_credentials.sh "$ARN")"
$ kubectl create secret generic aws-iam-<name-of-role> --from-literal "credentials.json=$(./scripts/get_credentials.sh "$ARN")" --from-literal "credentials.process=$(printf "[default]\ncredential_process = cat /meta/aws-iam/credentials.json\n")"
```

Once the secret is created you can deploy the controller using the example
Expand Down
2 changes: 1 addition & 1 deletion scripts/get_credentials.sh
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ aws_secret_access_key="$(echo -n "$assume_role" | jq -r '.Credentials.SecretAcce
aws_session_token="$(echo -n "$assume_role" | jq -r '.Credentials.SessionToken')"
aws_expiration="$(echo -n "$assume_role" | jq -r '.Credentials.Expiration')"

printf "[default]\naws_access_key_id = ${aws_access_key_id}\naws_secret_access_key = $aws_secret_access_key\naws_session_token = $aws_session_token\naws_expiration = $aws_expiration\n"
printf "{\"Version\": 1, \"AccessKeyId\": \"$aws_access_key_id\", \"SecretAccessKey\":\"$aws_secret_access_key\", \"SessionToken\":\"$aws_session_token\", \"Expiration\": \"$aws_expiration\"}"

0 comments on commit 0c0162e

Please sign in to comment.