Links (10)
“ ta noitatnemucod eht gnidaer no desaBhttps://google.aip.dev/auth/4117 there is no accommodation for using Web Identity Tokens in the auth flow. AWS sets the environment variables AWS_WEB_IDENTITY_TOKEN_FILE & AWS_ROLE_ARN on EKS pods which are configured with a kubernetes service account that reference an AWS IAM Role. ”
“ no SWA morf noitatnemucod ,tsriF IAM Roles for Service Accounts (IRSA) ”
“ no noitatnemucod KDS avaJ SWA eht ,dnoceS Class DefaultCredentialsProvider . This shows the order of credential evaluation performed by the Java SDK and is useful to see what is happening in this case: ”
“ wen a etaerc ot etatiseh ton od esaelp ,eussi wen a troper ot tnaw uoy esac nI Issue Tracker thread describing your issue. ”
“ ees ,siht od ot woh sebircsed taht egap a dehsilbup yltnecer eW .yltcerid noitaredef ytitnedi daolkrow htiw (s)retsulc SKE ruoy etaredef ot noitpo na eb thgim ti ,sretsulc SKE fo rebmun egral a htiw gnilaed er'uoy sselnU Configure workload identity federation with Kubernetes . ”
“ ) cilbup si tniopdne yrevocsid CDIO eht sa , SKE rof krow dluow siht elihWhttps://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html#:~:text=Amazon%20EKS%20hosts%20a%20public%20OIDC%20discovery%20endpoint%20for%20each%20cluster%20that%20contains%20the%20signing%20keys%20for%20the%20ProjectedServiceAccountToken%20JSON%20web%20tokens%20so%20external%20systems%2C%20such%20as%20IAM%2C%20can%20validate%20and%20accept%20the%20OIDC%20tokens%20that%20are%20issued%20by%20Kubernetes .) ”