Skip to content

Commit 8d26f3d

Browse files
stefanmcshaneDanil-Grigorev
authored andcommitted
update json tag
1 parent 097fda6 commit 8d26f3d

File tree

3 files changed

+12
-13
lines changed

3 files changed

+12
-13
lines changed

config/crd/bases/controlplane.cluster.x-k8s.io_awsmanagedcontrolplanes.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3093,6 +3093,10 @@ spec:
30933093
which allows the service principal `pods.eks.amazonaws.com` in
30943094
its trust policy.
30953095
properties:
3096+
roleARN:
3097+
description: RoleARN is the ARN of an IAM role which the Service
3098+
Account can assume.
3099+
type: string
30963100
serviceAccountName:
30973101
description: ServiceAccountName is the name of the kubernetes
30983102
Service Account within the namespace
@@ -3103,10 +3107,6 @@ spec:
31033107
which the kubernetes Service Account resides in. Defaults
31043108
to "default" namespace.
31053109
type: string
3106-
serviceAccountRoleARN:
3107-
description: RoleARN is the ARN of an IAM role which the Service
3108-
Account can assume.
3109-
type: string
31103110
required:
31113111
- serviceAccountName
31123112
- serviceAccountNamespace

controlplane/eks/api/v1beta2/types.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -289,5 +289,5 @@ type PodIdentityAssociation struct {
289289
ServiceAccountNamespace string `json:"serviceAccountNamespace"`
290290
// RoleARN is the ARN of an IAM role which the Service Account can assume.
291291
// +kubebuilder:validation:Required
292-
RoleARN string `json:"serviceAccountRoleARN,omitempty"`
292+
RoleARN string `json:"roleARN,omitempty"`
293293
}

docs/book/src/topics/eks/pod-identity-associations.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,13 @@ kind: AWSManagedControlPlane
5353
spec:
5454
# [...]
5555
podIdentityAssociations:
56-
- serviceAccount:
57-
namespace: default
58-
name: myserviceaccount
59-
roleARN: arn:aws:iam::012345678901:role/capi-test-role
56+
- serviceAccountNamespace: default
57+
serviceAccountName: myserviceaccount
58+
roleARN: arn:aws:iam::012345678901:role/capi-test-role
6059
```
6160

62-
- `serviceAccount.namespace` and `serviceAccount.name` refer to the [`ServiceAccount`](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/) object in the Kubernetes cluster
63-
- `serviceAccount.roleARN` is the AWS ARN for the IAM role you created in step 1 (named `capi-test-role` in this tutorial). Make sure to copy this exactly from your AWS console (`IAM > Roles`).
61+
- `.serviceAccountNamespace` and `.serviceAccountName` refer to the [`ServiceAccount`](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/) object in the Kubernetes cluster
62+
- `.roleARN` is the AWS ARN for the IAM role you created in step 1 (named `capi-test-role` in this tutorial). Make sure to copy this exactly from your AWS console (`IAM > Roles`).
6463

6564
To use the same IAM role across multiple service accounts/namespaces, you must create multiple associations.
6665

@@ -82,8 +81,8 @@ spec:
8281
podIdentityAssociations:
8382
- serviceAccountNamespace: default
8483
serviceAccountName: myserviceaccount
85-
serviceAccountRoleARN: arn:aws:iam::012345678901:role/capi-test-role
84+
roleARN: arn:aws:iam::012345678901:role/capi-test-role
8685
- serviceAccountNamespace: another-namespace
8786
serviceAccountName: another-service-account
88-
serviceAccountRoleARN: arn:aws:iam::012345678901:role/capi-test-role
87+
roleARN: arn:aws:iam::012345678901:role/capi-test-role
8988
```

0 commit comments

Comments
 (0)