1. 05 Nov, 2019 3 commits
  2. 04 Nov, 2019 2 commits
  3. 01 Nov, 2019 1 commit
  4. 29 Oct, 2019 4 commits
  5. 25 Oct, 2019 3 commits
  6. 24 Oct, 2019 4 commits
  7. 15 Oct, 2019 1 commit
  8. 08 Oct, 2019 3 commits
  9. 01 Oct, 2019 3 commits
  10. 24 Sep, 2019 2 commits
  11. 17 Sep, 2019 9 commits
  12. 16 Sep, 2019 3 commits
    • Yoan Blanc's avatar
      exoscale: add context support · ab08d84c
      Yoan Blanc authored
      Signed-off-by: default avatarYoan Blanc <yoan@dosimple.ch>
      ab08d84c
    • Kubernetes Prow Robot's avatar
      Merge pull request #1185 from serialx/fix-amazon-iam-roles-service-account · 894360a1
      Kubernetes Prow Robot authored
      Fix AWS IAM Roles for Service Accounts permission problem.
      894360a1
    • Brian Hong's avatar
      Fix AWS IAM Roles for Service Accounts permission · c97781a4
      Brian Hong authored
      Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
      files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
      Unfortunately, external-dns runs as 'nobody' so it cannot access this
      file. External DNS is then unable to make any AWS API calls to work:
      
      ```
      time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
      ```
      
      See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
      
      Below are the file permissions mounted on External DNS pod:
      
      ```
      ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
      total 0
      drwxrwxrwt    3 root     root           100 Sep 11 06:40 .
      drwxr-xr-x    3 root     root            28 Sep 11 06:40 ..
      drwxr-xr-x    2 root     root            60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
      lrwxrwxrwx    1 root     root            31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
      lrwxrwxrwx    1 root     root            12 Sep 11 06:40 token -> ..data/token
      ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
      -rw-------    1 root     root          1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
      ```
      
      This commit fixes this problem by specifying securityContext to make
      mounted volumes with 65534 (nobody) group ownership.
      c97781a4
  13. 12 Sep, 2019 1 commit
  14. 10 Sep, 2019 1 commit