Add support of secret based AuthN/Z for Route53 #1422
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The preferred mechanism of AuthN,Z for aws comm from k8s cluster is using the service account -> role mapping, however in non-managed k8s (no EKS) environments where people just use pure AWS's EC2 instances with kubeadm or using cluster-api (non EKS mode), there the irsa controller (or how is it called today) is missing.
So it would be nice to have a way to make k8gb work also w/o setting this up. Another use-case for this would be a multi-cluster setup where all clusters need to talk to route53, we can't assume the irsa controller in GCP or in Azure.
it's one of the documented ways for externaldns - docs
HOW TO RUN CI
---By default, all the checks will be run automatically. Furthermore, when changing website-related stuff, the preview will be generated by the netlify bot.
Heavy tests
Add the
heavy-tests
label on this PR if you want full-blown tests that include more than 2-cluster scenarios.Debug tests
If the test suite is failing for you, you may want to try triggering
Re-run all jobs
(top right) with debug logging enabled. It will also make the print debug action more verbose.