Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for AWS EKS IRSA feature #13

Open
iptizer opened this issue Mar 23, 2021 · 2 comments
Open

Support for AWS EKS IRSA feature #13

iptizer opened this issue Mar 23, 2021 · 2 comments

Comments

@iptizer
Copy link

iptizer commented Mar 23, 2021

This is a feature request/ asking whether PR would be accepted for the following environment:

  • self-hosted runners
  • AWS EKS Kubernetes cluster

When running a self hosted runner inside an AWS EKS Kubernetes cluster AWS has a feature called IRSA (IAM roles for service accounts). This feature allows accessing the AWS API directly from a pod.With this feature different environment variables + different API calls are used.
See nr 3 (Web Identity Token credentials from the environment or container) in credentials precedence.

Trigger are the following two env variables:

  • 'AWS_ROLE_ARN'
  • 'AWS_WEB_IDENTITY_TOKEN_FILE'

The implementation could look as follows:

  • if variables are set
    • execute aws sts assume-web-role-identity which will then return AWS_SECRET_KEYS & others.

It will require a rewrite of these lines + making $INPUT_ACCESS_KEY & $INPUT_SECRET_ACCESS_KEY optional. But it should be backwards compatible.

How do we proceed?

@elgohr
Copy link
Owner

elgohr commented Aug 8, 2021

Hey, sorry for the late reply. I have to think about that...

@elgohr
Copy link
Owner

elgohr commented Aug 8, 2021

Sure, why not 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants