Skip to content

Commit

Permalink
Fix OIDC provider (#1411)
Browse files Browse the repository at this point in the history
  • Loading branch information
njuettner authored Apr 21, 2022
1 parent ddcfd40 commit 997dceb
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions src/content/advanced/iam-roles-for-service-accounts/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,12 +64,12 @@ In oder to use the IAM role with a service account you need to create new AWS ro
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::AWS_ACCOUNT:oidc-provider/s3-REGION.amazonaws.com/AWS_ACCOUNT-g8s-CLUSTER_ID-oidc-pod-identity"
"Federated": "arn:aws:iam::AWS_ACCOUNT:oidc-provider/s3.REGION.amazonaws.com/AWS_ACCOUNT-g8s-CLUSTER_ID-oidc-pod-identity"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"s3-REGION.amazonaws.com/AWS_ACCOUNT-g8s-CLUSTER_ID-oidc-pod-identity:sub": "system:serviceaccount:NAMESPACE:SA_NAME"
"s3.REGION.amazonaws.com/AWS_ACCOUNT-g8s-CLUSTER_ID-oidc-pod-identity:sub": "system:serviceaccount:NAMESPACE:SA_NAME"
}
}
}
Expand Down

0 comments on commit 997dceb

Please sign in to comment.