Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: EKS IAM Roles for Service Accounts for Runner Pods #226

Merged
merged 1 commit into from
Dec 8, 2020
Merged

Commits on Dec 8, 2020

  1. feat: EKS IAM Roles for Service Accounts for Runner Pods

    One of the pod recreation conditions has been modified to use hash of runner spec, so that the controller does not keep restarting pods mutated by admission webhooks. This naturally allows us, for example, to use IRSA for EKS that requires its admission webhook to mutate the runner pod to have additional, IRSA-related volumes, volume mounts and env.
    
    Resolves #200
    Yusuke Kuoka committed Dec 8, 2020
    Configuration menu
    Copy the full SHA
    d222ef6 View commit details
    Browse the repository at this point in the history