-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix reusing instanceRoleARN for nodegroups authorized with access entry #7707
Conversation
0046e64
to
f4890b9
Compare
3664bb5
to
dfc653e
Compare
0f92718
to
d50d034
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shall we also update the integration tests to cover the scenario described in the bug?
Otherwise, LGTM! 🚀
837c8c1
to
096183f
Compare
Yup, I have been working on it (I should have added it as a TODO item). |
3752883
to
bd3a822
Compare
The integration test is currently blocked on testing as the integration test account lacks certain permissions. |
3e67461
to
7a088a9
Compare
Integration tests are passing now. |
…ries This changelist changes the design of creating access entries for self-managed nodegroups that use a pre-existing instanceRoleARN by creating the access entry resource outside of the CloudFormation stack by making a separate call to the AWS API. When deleting such a nodegroup, it's the user's responsibility to also delete the corresponding access entry when no more nodegroups are associated with it. This is because eksctl cannot tell if an access entry resource is still in use by non-eksctl created self-managed nodegroups. Self-managed nodegroups not using a pre-existing instanceRoleARN will continue to have the access entry resource in the CloudFormation stack, making delete nodegroup an atomic operation for most use cases. Fixes eksctl-io#7502
7a088a9
to
c2d8c80
Compare
Description
This changelist changes the design of creating access entries for self-managed nodegroups that use a pre-existing
instanceRoleARN
by creating the access entry resource outside of the CloudFormation stack by making a separate call to the AWS API. When deleting such a nodegroup, it's the user's responsibility to also delete the corresponding access entry when no more nodegroups are associated with it. This is because eksctl cannot tell if an access entry resource is still in use by non-eksctl created self-managed nodegroups.Self-managed nodegroups not using a pre-existing
instanceRoleARN
will continue to have the access entry resource in the CloudFormation stack, makingdelete nodegroup
an atomic operation for most use cases.Fixes #7502
Checklist
README.md
, or theuserdocs
directory)area/nodegroup
) and kind (e.g.kind/improvement
)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯