Skip to content

Commit b9e8a4c

Browse files
stefanmcshanek0da
authored andcommitted
update json tag
1 parent a2f3cc1 commit b9e8a4c

File tree

3 files changed

+12
-13
lines changed

3 files changed

+12
-13
lines changed

config/crd/bases/controlplane.cluster.x-k8s.io_awsmanagedcontrolplanes.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3126,6 +3126,10 @@ spec:
31263126
which allows the service principal `pods.eks.amazonaws.com` in
31273127
its trust policy.
31283128
properties:
3129+
roleARN:
3130+
description: RoleARN is the ARN of an IAM role which the Service
3131+
Account can assume.
3132+
type: string
31293133
serviceAccountName:
31303134
description: ServiceAccountName is the name of the kubernetes
31313135
Service Account within the namespace
@@ -3136,10 +3140,6 @@ spec:
31363140
which the kubernetes Service Account resides in. Defaults
31373141
to "default" namespace.
31383142
type: string
3139-
serviceAccountRoleARN:
3140-
description: RoleARN is the ARN of an IAM role which the Service
3141-
Account can assume.
3142-
type: string
31433143
required:
31443144
- serviceAccountName
31453145
- serviceAccountNamespace

controlplane/eks/api/v1beta2/types.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -293,5 +293,5 @@ type PodIdentityAssociation struct {
293293
ServiceAccountNamespace string `json:"serviceAccountNamespace"`
294294
// RoleARN is the ARN of an IAM role which the Service Account can assume.
295295
// +kubebuilder:validation:Required
296-
RoleARN string `json:"serviceAccountRoleARN,omitempty"`
296+
RoleARN string `json:"roleARN,omitempty"`
297297
}

docs/book/src/topics/eks/pod-identity-associations.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,13 @@ kind: AWSManagedControlPlane
5353
spec:
5454
# [...]
5555
podIdentityAssociations:
56-
- serviceAccount:
57-
namespace: default
58-
name: myserviceaccount
59-
roleARN: arn:aws:iam::012345678901:role/capi-test-role
56+
- serviceAccountNamespace: default
57+
serviceAccountName: myserviceaccount
58+
roleARN: arn:aws:iam::012345678901:role/capi-test-role
6059
```
6160

62-
- `serviceAccount.namespace` and `serviceAccount.name` refer to the [`ServiceAccount`](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/) object in the Kubernetes cluster
63-
- `serviceAccount.roleARN` is the AWS ARN for the IAM role you created in step 1 (named `capi-test-role` in this tutorial). Make sure to copy this exactly from your AWS console (`IAM > Roles`).
61+
- `.serviceAccountNamespace` and `.serviceAccountName` refer to the [`ServiceAccount`](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/) object in the Kubernetes cluster
62+
- `.roleARN` is the AWS ARN for the IAM role you created in step 1 (named `capi-test-role` in this tutorial). Make sure to copy this exactly from your AWS console (`IAM > Roles`).
6463

6564
To use the same IAM role across multiple service accounts/namespaces, you must create multiple associations.
6665

@@ -82,8 +81,8 @@ spec:
8281
podIdentityAssociations:
8382
- serviceAccountNamespace: default
8483
serviceAccountName: myserviceaccount
85-
serviceAccountRoleARN: arn:aws:iam::012345678901:role/capi-test-role
84+
roleARN: arn:aws:iam::012345678901:role/capi-test-role
8685
- serviceAccountNamespace: another-namespace
8786
serviceAccountName: another-service-account
88-
serviceAccountRoleARN: arn:aws:iam::012345678901:role/capi-test-role
87+
roleARN: arn:aws:iam::012345678901:role/capi-test-role
8988
```

0 commit comments

Comments
 (0)