-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubeconfig update call requires default aws credentials #45
Comments
@yuvipanda do you think this is better solved by reading the .cfg files or just having another required field in |
Planning on releasing a PR that will expect the I'll have to:
|
Or rather, is it ok for the credentials we put in secret/ to be the 'default' profile? Given that we expect only one profile to be there ever |
When I was testing #48 , I had problems getting the
Suppose it doesn't matter either way. Easier to just tell people to put |
@salvis2 re: copy pasting, that makes sense! We could probably error out if there isn't a default profile? |
I can make a PR to instruct users to put |
The
cluster_auth_aws()
function updates the kubeconfig file as part of authentication. This happens on the following lines.For me, I spin up the cluster with a programmatic aws user with minimal permissions. This user is called eksctlbot. While
cluster_auth_aws()
does copy the credentials for this user and includes the[eksctlbot]
identifier in the credentials, theupdate-kubeconfig
call doesn't use the profile flag to use the named profile. It tries to use the "default" profile and I get the error:We should require profile names and pass them to aws calls with the
--profile
flag.Even if #44 is fixed, this would still attempt to authenticate kubectl with the "default" profile and would not work for this use case, so I've submitted this as a separate issue.
The text was updated successfully, but these errors were encountered: