-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow for wildcard of the namespace in the IAM condition for namespaces with a pattern #193
Comments
Up for this functionality also |
+1 We have a similar scenario where we launch ephemeral envs with unique namespaces. |
Just want to add that we also tried |
we also have a use case for this +1 |
I could also really use this functionality. Not being able to use wildcard patterns in the namespace has completely prevented my organization from moving forward with transition to this feature from the standard IRSA method. With multiple teams deploying to the cluster, often to feature branches that live in their own namespaces, expecting them to first update their EKS Pod Identities with the new namespace first is a massive inconvenience. |
Would be nice have this to support ephemeral envs |
We need that either. +1! |
Needs this feature for ephemeral environments |
+1 need this feature for ephemeral environments |
I have the same problem, namespaces are generated randomly for ephemeral environments and cannot be defined and associated before. |
What would you like to be added:
Reference to this issue: #58
We'd like to have wildcard implemented for incomplete namespaces, for example:
In the current state of things, implementing it the way shown above will result in a failure to assume the role, with an error message "An unknown error occurred" reported via Cloudtrails.
Why is this needed:
Our namespace model follows a pattern with which such a feature would allow us to specifically grant permissions on SAs in namespaces following this pattern.
The text was updated successfully, but these errors were encountered: