-
Notifications
You must be signed in to change notification settings - Fork 561
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pod Impersonation for IAM #1439
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
I'm wondering what the status on this is. I see it was implemented then reverted. We want to leverage IRSA with Fargate on EKS. Today I don't see how we could do so without this. |
Is your feature request related to a problem? Please describe.
Currently, IAM role permissions must be assigned to the CSI driver itself rather than the pods that mount the volumes, leaving permissions of preventing which pods can mount these volumes as an exercise to the cluster administrator.
Describe the solution you'd like in detail
AWS EFS CSI Driver can impersonate the pod service account identity and exchange that identity for an IAM role that is used for mounting, instead of the CSI driver's native IAM identity.
Describe alternatives you've considered
n/a
Additional context
#885 seems to describe a similar feature, but was closed by automation
The text was updated successfully, but these errors were encountered: