Skip to content

IAM roles for service accounts integration with AWS Bedrock auth #568

@shivam-dubey-1

Description

@shivam-dubey-1

Description:

What issue is being seen? Describe what should be happening instead of
The AI Gateway's BackendSecurityPolicy CRD doesn't properly support IRSA (IAM Roles for Service Accounts) for AWS authentication. When attempting to use a service account with an associated IAM role for AWS Bedrock access, the configuration fails with validation errors.

Current behavior: The BackendSecurityPolicy CRD validation rejects IRSA configuration.
Expected behavior: The BackendSecurityPolicy should support IRSA configuration for AWS authentication.

Repro steps:

eksctl create iamserviceaccount
--name bedrock-sa
--namespace default
--cluster cluster_name
--region us-east-1
--attach-policy-arn arn:aws:iam::aws:policy/AmazonBedrockFullAccess
--approve

apiVersion: aigateway.envoyproxy.io/v1alpha1
kind: BackendSecurityPolicy
metadata:
name: envoy-ai-gateway-basic-aws-credentials
namespace: default
spec:
type: AWSCredentials
awsCredentials:
region: us-east-1
serviceAccount:
name: bedrock-sa

Error from server (BadRequest): error when creating "bedrock.yaml": BackendSecurityPolicy in version "v1alpha1" cannot be handled as a BackendSecurityPolicy: strict decoding error: unknown field "spec.awsCredentials.serviceAccount"

Metadata

Metadata

Assignees

No one assigned

    Labels

    apiControl Plane APIenhancementNew feature or requestfeatureNew Features

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions