Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for AWS Auth with WebIdentity/OIDC #1112

Closed
wants to merge 1 commit into from

Conversation

samskeyti88
Copy link
Contributor

Add support for AWS Auth with WebIdentity/OIDC
#1075

@bstascavage
Copy link

Any movement on this? I am running into an issue related to this.

@barryib
Copy link

barryib commented Nov 30, 2020

@fviard Any chance to get this reviewed ? This tool is used in lot of other cool project (like Gitlab) and this issue prevent us for using the backup feature in EKS.

@fviard
Copy link
Contributor

fviard commented Nov 30, 2020

@barryib Hi, I will try to review it in the coming days.

@hanfi
Copy link

hanfi commented Jan 11, 2021

is this PR forgotten ?? it will be great to get this PR merged, s3cmd is used by gitlab task runner and in a EKS environment this is the only serious way to authenticate to backup buckets.
i'm sure Gitlab will update their docker images to the newer s3cmd version to enable connection through EKS IODC Webidentity for backups since putting AWS creds into EKS secrets is not a good practice.

@hickey
Copy link

hickey commented Apr 14, 2021

@samskeyti88 It appears that your branch needs to be rebased against the current master and resolve the conflicts. Maybe doing so will entice the maintainers to consider and move this PR forward. I think that there is a lot of us out here that would like to see this PR merged.

@stevehipwell
Copy link

Any progress on this?

@ZF-fredericvanlinthoudt

@fviard It would be really helpful if you could review (& approve) this PR 🥇
GitLab uses s3cmd in their task runner to store backups on S3 and if GitLab is running on AWS EKS then the most practical & secure way to authenticate towards S3 is by assuming roles with web identity via IRSA.
Some companies just don't allow the use of IAM access key & secrets in production environments and this would definitely be a proper solution to get it working in the right way.
Thanks for considering this!

@fviard
Copy link
Contributor

fviard commented May 12, 2021

@ZF-fredericvanlinthoudt I'm sorry that it takes me a little bit of time to enter in this subject, but i'm looking at it and will rebase/merge it soon.

@mosspilot
Copy link

Would love to see this implemented / merged. It is a really worthwhile feature with security benefits. Anything we can do to help move this across the finish line?

@fviard fviard added this to the 2.2.0 milestone Jul 5, 2021
@fviard
Copy link
Contributor

fviard commented Jul 5, 2021

I have rebased and completed this PR with changes that I have pushed to master.

With commits up to d761ead , this feature should now be available.

@samskeyti88 Thank you very much for this PR

@mosspilot I have pushed things to master, but it is untested, so the best help that you could provide me is to give a try to the MASTER branch and let me know if everything works ok or if you have any issue.

Also, the final change now support AssumeRole and AssumeRoleWithWebIdentity.
If you only have the AWS_ROLE_ARN env variable set, "AssumeRole" will be used.
If you have in addition AWS_WEB_IDENTITY_TOKEN_FILE set, it is "AssumeRoleWithWebIdentity" that will be used.

That would be great is someone is able to give a try to the support for AssumeRole also.

@fviard fviard closed this Jul 5, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants