Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Region validation prevents operations in non-standard regions #28380

Closed
kevensen opened this issue Jul 1, 2016 · 1 comment · Fixed by #28417
Closed

AWS Region validation prevents operations in non-standard regions #28380

kevensen opened this issue Jul 1, 2016 · 1 comment · Fixed by #28417

Comments

@kevensen
Copy link

kevensen commented Jul 1, 2016

I know it sounds like lunacy but there are non-standard AWS regions in which Kubernetes might be deployed (e.g. Eucalyptus). Instead of enumerating each zone in pkg/credentialprovider/aws/aws_credentials.go, perhaps it would be appropriate to add a flag in a configuration file to disable the check.

The region validation would be enabled by default, handling the vast majority of cases. In the edge case that region validation is undesirable, this flag would provide a workaround.

@kevensen
Copy link
Author

kevensen commented Jul 2, 2016

I'd like to work on the solution. If you'd like to assign this to me, that's just fine.

k8s-github-robot pushed a commit that referenced this issue Jul 20, 2016
Automatic merge from submit-queue

AWS: Added experimental option to skip zone check

This pull request resolves #28380.  In the vast majority of cases, it is appropriate to validate the AWS region against a known set of regions.  However, there is the edge case where this is undesirable as Kubernetes may be deployed in an AWS-like environment where the region is not one of the known regions.

By adding the optional **DisableStrictZoneCheck true** to the **[Global]** section in the aws.conf file (e.g. /etc/aws/aws.conf) one can bypass the ragion validation.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant