diff --git a/cmd/minikube/cmd/config/configure.go b/cmd/minikube/cmd/config/configure.go index 1fee633c73..d681bd8c28 100644 --- a/cmd/minikube/cmd/config/configure.go +++ b/cmd/minikube/cmd/config/configure.go @@ -46,6 +46,7 @@ var addonsConfigureCmd = &cobra.Command{ // Default values awsAccessID := "changeme" awsAccessKey := "changeme" + awsSessionToken := "" awsRegion := "changeme" awsAccount := "changeme" awsRole := "changeme" @@ -59,6 +60,7 @@ var addonsConfigureCmd = &cobra.Command{ if enableAWSECR { awsAccessID = AskForStaticValue("-- Enter AWS Access Key ID: ") awsAccessKey = AskForStaticValue("-- Enter AWS Secret Access Key: ") + awsSessionToken = AskForStaticValueOptional("-- (Optional) Enter AWS Session Token: ") awsRegion = AskForStaticValue("-- Enter AWS Region: ") awsAccount = AskForStaticValue("-- Enter 12 digit AWS Account ID: ") awsRole = AskForStaticValueOptional("-- (Optional) Enter ARN of AWS role to assume: ") @@ -97,6 +99,7 @@ var addonsConfigureCmd = &cobra.Command{ map[string]string{ "AWS_ACCESS_KEY_ID": awsAccessID, "AWS_SECRET_ACCESS_KEY": awsAccessKey, + "AWS_SESSION_TOKEN": awsSessionToken, "aws-account": awsAccount, "aws-region": awsRegion, "aws-assume-role": awsRole, diff --git a/deploy/addons/registry-creds/registry-creds-rc.yaml b/deploy/addons/registry-creds/registry-creds-rc.yaml index f68cd74d78..269526643a 100644 --- a/deploy/addons/registry-creds/registry-creds-rc.yaml +++ b/deploy/addons/registry-creds/registry-creds-rc.yaml @@ -35,6 +35,16 @@ spec: secretKeyRef: name: registry-creds-ecr key: AWS_SECRET_ACCESS_KEY + - name: AWS_SESSION_TOKEN + valueFrom: + secretKeyRef: + name: registry-creds-ecr + key: AWS_SESSION_TOKEN + - name: awsregion + valueFrom: + secretKeyRef: + name: registry-creds-ecr + key: aws-region - name: awsaccount valueFrom: secretKeyRef: