aws-sdk-eks 1.137.0 → 1.139.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e68c21938171b4d51693cffcc5b49738e49d142c3045d808fcec54de7669c77f
4
- data.tar.gz: dd5bbf6f71c6561cc10e78fe64a8a5d0a074a1f94c41b5cba61b499e0caffab2
3
+ metadata.gz: bfafb3c4a993afbab984bdb91bc15f1bcb95d2aa5c6014653fcdf609c9b29ece
4
+ data.tar.gz: 4079bd72a94979ca6da8299cb0f84ee50658ceeded917e1ebe29d5f943117102
5
5
  SHA512:
6
- metadata.gz: 759362c63fcd82b61fb043b1c7186c29ecdb1c4226ca99f54c3bd785c7f8b0d6675f81114e997dea17d700e7209e231ba54b5bc6d18b358ee7dd819263801dcc
7
- data.tar.gz: a363c5b42ef03e04ab4ea176d588c206173796fd2d92c44be6aebc6365a3bd5a96ddd2bce2a70da30fcff6983fd67f9462fb52037b07c6b8429f77c50ecba2d4
6
+ metadata.gz: 46bfcabcb9b0fb7087ac0b931ec1e5eeb22169a11bf3ba39ab4e4da8daf23b2339a895763149253b69cf7ab363257e38527cb3058822f64f631790d8ff0ec2b4
7
+ data.tar.gz: d8042d0978684917d8b55381d1f5c7da5f1ffd672ab35f4f5e6128c30669c3075b05dbeab8fa7938f038c804a6a403985d9d4e1da1b68ddcef01e03a31c4f2a7
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.139.0 (2025-06-11)
5
+ ------------------
6
+
7
+ * Feature - Release for EKS Pod Identity Cross Account feature and disableSessionTags flag.
8
+
9
+ 1.138.0 (2025-06-02)
10
+ ------------------
11
+
12
+ * Feature - Add support for filtering ListInsights API calls on MISCONFIGURATION insight category
13
+
4
14
  1.137.0 (2025-05-12)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.137.0
1
+ 1.139.0
@@ -927,11 +927,11 @@ module Aws::EKS
927
927
  # `DescribeAddonConfiguration`.
928
928
  #
929
929
  # @option params [Array<Types::AddonPodIdentityAssociations>] :pod_identity_associations
930
- # An array of Pod Identity Assocations to be created. Each EKS Pod
931
- # Identity association maps a Kubernetes service account to an IAM Role.
930
+ # An array of EKS Pod Identity associations to be created. Each
931
+ # association maps a Kubernetes service account to an IAM role.
932
932
  #
933
933
  # For more information, see [Attach an IAM Role to an Amazon EKS add-on
934
- # using Pod Identity][1] in the *Amazon EKS User Guide*.
934
+ # using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
935
935
  #
936
936
  #
937
937
  #
@@ -1019,9 +1019,10 @@ module Aws::EKS
1019
1019
  # You can use the `endpointPublicAccess` and `endpointPrivateAccess`
1020
1020
  # parameters to enable or disable public and private access to your
1021
1021
  # cluster's Kubernetes API server endpoint. By default, public access
1022
- # is enabled, and private access is disabled. For more information, see
1023
- # [Amazon EKS Cluster Endpoint Access Control][1] in the <i> <i>Amazon
1024
- # EKS User Guide</i> </i>.
1022
+ # is enabled, and private access is disabled. The endpoint domain name
1023
+ # and IP address family depends on the value of the `ipFamily` for the
1024
+ # cluster. For more information, see [Amazon EKS Cluster Endpoint Access
1025
+ # Control][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
1025
1026
  #
1026
1027
  # You can use the `logging` parameter to enable or disable exporting the
1027
1028
  # Kubernetes control plane logs for your cluster to CloudWatch Logs. By
@@ -1146,8 +1147,8 @@ module Aws::EKS
1146
1147
  # If you set this value to `False` when creating a cluster, the default
1147
1148
  # networking add-ons will not be installed.
1148
1149
  #
1149
- # The default networking addons include vpc-cni, coredns, and
1150
- # kube-proxy.
1150
+ # The default networking add-ons include `vpc-cni`, `coredns`, and
1151
+ # `kube-proxy`.
1151
1152
  #
1152
1153
  # Use this option when you plan to install third-party alternative
1153
1154
  # add-ons or self-manage the default networking add-ons.
@@ -1951,31 +1952,49 @@ module Aws::EKS
1951
1952
 
1952
1953
  # Creates an EKS Pod Identity association between a service account in
1953
1954
  # an Amazon EKS cluster and an IAM role with *EKS Pod Identity*. Use EKS
1954
- # Pod Identity to give temporary IAM credentials to pods and the
1955
+ # Pod Identity to give temporary IAM credentials to Pods and the
1955
1956
  # credentials are rotated automatically.
1956
1957
  #
1957
1958
  # Amazon EKS Pod Identity associations provide the ability to manage
1958
1959
  # credentials for your applications, similar to the way that Amazon EC2
1959
1960
  # instance profiles provide credentials to Amazon EC2 instances.
1960
1961
  #
1961
- # If a pod uses a service account that has an association, Amazon EKS
1962
- # sets environment variables in the containers of the pod. The
1962
+ # If a Pod uses a service account that has an association, Amazon EKS
1963
+ # sets environment variables in the containers of the Pod. The
1963
1964
  # environment variables configure the Amazon Web Services SDKs,
1964
1965
  # including the Command Line Interface, to use the EKS Pod Identity
1965
1966
  # credentials.
1966
1967
  #
1967
- # Pod Identity is a simpler method than *IAM roles for service
1968
+ # EKS Pod Identity is a simpler method than *IAM roles for service
1968
1969
  # accounts*, as this method doesn't use OIDC identity providers.
1969
- # Additionally, you can configure a role for Pod Identity once, and
1970
+ # Additionally, you can configure a role for EKS Pod Identity once, and
1970
1971
  # reuse it across clusters.
1971
1972
  #
1973
+ # Similar to Amazon Web Services IAM behavior, EKS Pod Identity
1974
+ # associations are eventually consistent, and may take several seconds
1975
+ # to be effective after the initial API call returns successfully. You
1976
+ # must design your applications to account for these potential delays.
1977
+ # We recommend that you don’t include association create/updates in the
1978
+ # critical, high-availability code paths of your application. Instead,
1979
+ # make changes in a separate initialization or setup routine that you
1980
+ # run less frequently.
1981
+ #
1982
+ # You can set a *target IAM role* in the same or a different account for
1983
+ # advanced scenarios. With a target role, EKS Pod Identity automatically
1984
+ # performs two role assumptions in sequence: first assuming the role in
1985
+ # the association that is in this account, then using those credentials
1986
+ # to assume the target IAM role. This process provides your Pod with
1987
+ # temporary credentials that have the permissions defined in the target
1988
+ # role, allowing secure access to resources in another Amazon Web
1989
+ # Services account.
1990
+ #
1972
1991
  # @option params [required, String] :cluster_name
1973
- # The name of the cluster to create the association in.
1992
+ # The name of the cluster to create the EKS Pod Identity association in.
1974
1993
  #
1975
1994
  # @option params [required, String] :namespace
1976
1995
  # The name of the Kubernetes namespace inside the cluster to create the
1977
- # association in. The service account and the pods that use the service
1978
- # account must be in this namespace.
1996
+ # EKS Pod Identity association in. The service account and the Pods that
1997
+ # use the service account must be in this namespace.
1979
1998
  #
1980
1999
  # @option params [required, String] :service_account
1981
2000
  # The name of the Kubernetes service account inside the cluster to
@@ -1984,7 +2003,7 @@ module Aws::EKS
1984
2003
  # @option params [required, String] :role_arn
1985
2004
  # The Amazon Resource Name (ARN) of the IAM role to associate with the
1986
2005
  # service account. The EKS Pod Identity agent manages credentials to
1987
- # assume this role for applications in the containers in the pods that
2006
+ # assume this role for applications in the containers in the Pods that
1988
2007
  # use this service account.
1989
2008
  #
1990
2009
  # @option params [String] :client_request_token
@@ -2024,6 +2043,51 @@ module Aws::EKS
2024
2043
  # values with this prefix. Tags with this prefix do not count against
2025
2044
  # your tags per resource limit.
2026
2045
  #
2046
+ # @option params [Boolean] :disable_session_tags
2047
+ # Disable the automatic sessions tags that are appended by EKS Pod
2048
+ # Identity.
2049
+ #
2050
+ # EKS Pod Identity adds a pre-defined set of session tags when it
2051
+ # assumes the role. You can use these tags to author a single role that
2052
+ # can work across resources by allowing access to Amazon Web Services
2053
+ # resources based on matching tags. By default, EKS Pod Identity
2054
+ # attaches six tags, including tags for cluster name, namespace, and
2055
+ # service account name. For the list of tags added by EKS Pod Identity,
2056
+ # see [List of session tags added by EKS Pod Identity][1] in the *Amazon
2057
+ # EKS User Guide*.
2058
+ #
2059
+ # Amazon Web Services compresses inline session policies, managed policy
2060
+ # ARNs, and session tags into a packed binary format that has a separate
2061
+ # limit. If you receive a `PackedPolicyTooLarge` error indicating the
2062
+ # packed binary format has exceeded the size limit, you can attempt to
2063
+ # reduce the size by disabling the session tags added by EKS Pod
2064
+ # Identity.
2065
+ #
2066
+ #
2067
+ #
2068
+ # [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
2069
+ #
2070
+ # @option params [String] :target_role_arn
2071
+ # The Amazon Resource Name (ARN) of the target IAM role to associate
2072
+ # with the service account. This role is assumed by using the EKS Pod
2073
+ # Identity association role, then the credentials for this role are
2074
+ # injected into the Pod.
2075
+ #
2076
+ # When you run applications on Amazon EKS, your application might need
2077
+ # to access Amazon Web Services resources from a different role that
2078
+ # exists in the same or different Amazon Web Services account. For
2079
+ # example, your application running in “Account A” might need to access
2080
+ # resources, such as Amazon S3 buckets in “Account B” or within “Account
2081
+ # A” itself. You can create a association to access Amazon Web Services
2082
+ # resources in “Account B” by creating two IAM roles: a role in “Account
2083
+ # A” and a role in “Account B” (which can be the same or different
2084
+ # account), each with the necessary trust and permission policies. After
2085
+ # you provide these roles in the *IAM role* and *Target IAM role*
2086
+ # fields, EKS will perform role chaining to ensure your application gets
2087
+ # the required permissions. This means Role A will assume Role B,
2088
+ # allowing your Pods to securely access resources like S3 buckets in the
2089
+ # target account.
2090
+ #
2027
2091
  # @return [Types::CreatePodIdentityAssociationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2028
2092
  #
2029
2093
  # * {Types::CreatePodIdentityAssociationResponse#association #association} => Types::PodIdentityAssociation
@@ -2039,6 +2103,8 @@ module Aws::EKS
2039
2103
  # tags: {
2040
2104
  # "TagKey" => "TagValue",
2041
2105
  # },
2106
+ # disable_session_tags: false,
2107
+ # target_role_arn: "String",
2042
2108
  # })
2043
2109
  #
2044
2110
  # @example Response structure
@@ -2054,6 +2120,9 @@ module Aws::EKS
2054
2120
  # resp.association.created_at #=> Time
2055
2121
  # resp.association.modified_at #=> Time
2056
2122
  # resp.association.owner_arn #=> String
2123
+ # resp.association.disable_session_tags #=> Boolean
2124
+ # resp.association.target_role_arn #=> String
2125
+ # resp.association.external_id #=> String
2057
2126
  #
2058
2127
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/CreatePodIdentityAssociation AWS API Documentation
2059
2128
  #
@@ -2504,6 +2573,9 @@ module Aws::EKS
2504
2573
  # resp.association.created_at #=> Time
2505
2574
  # resp.association.modified_at #=> Time
2506
2575
  # resp.association.owner_arn #=> String
2576
+ # resp.association.disable_session_tags #=> Boolean
2577
+ # resp.association.target_role_arn #=> String
2578
+ # resp.association.external_id #=> String
2507
2579
  #
2508
2580
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DeletePodIdentityAssociation AWS API Documentation
2509
2581
  #
@@ -3262,7 +3334,7 @@ module Aws::EKS
3262
3334
  #
3263
3335
  # resp.insight.id #=> String
3264
3336
  # resp.insight.name #=> String
3265
- # resp.insight.category #=> String, one of "UPGRADE_READINESS"
3337
+ # resp.insight.category #=> String, one of "UPGRADE_READINESS", "MISCONFIGURATION"
3266
3338
  # resp.insight.kubernetes_version #=> String
3267
3339
  # resp.insight.last_refresh_time #=> Time
3268
3340
  # resp.insight.last_transition_time #=> Time
@@ -3420,6 +3492,9 @@ module Aws::EKS
3420
3492
  # resp.association.created_at #=> Time
3421
3493
  # resp.association.modified_at #=> Time
3422
3494
  # resp.association.owner_arn #=> String
3495
+ # resp.association.disable_session_tags #=> Boolean
3496
+ # resp.association.target_role_arn #=> String
3497
+ # resp.association.external_id #=> String
3423
3498
  #
3424
3499
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DescribePodIdentityAssociation AWS API Documentation
3425
3500
  #
@@ -4096,7 +4171,18 @@ module Aws::EKS
4096
4171
 
4097
4172
  # Returns a list of all insights checked for against the specified
4098
4173
  # cluster. You can filter which insights are returned by category,
4099
- # associated Kubernetes version, and status.
4174
+ # associated Kubernetes version, and status. The default filter lists
4175
+ # all categories and every status.
4176
+ #
4177
+ # The following lists the available categories:
4178
+ #
4179
+ # * `UPGRADE_READINESS`: Amazon EKS identifies issues that could impact
4180
+ # your ability to upgrade to new versions of Kubernetes. These are
4181
+ # called upgrade insights.
4182
+ #
4183
+ # * `MISCONFIGURATION`: Amazon EKS identifies misconfiguration in your
4184
+ # EKS Hybrid Nodes setup that could impair functionality of your
4185
+ # cluster or workloads. These are called configuration insights.
4100
4186
  #
4101
4187
  # @option params [required, String] :cluster_name
4102
4188
  # The name of the Amazon EKS cluster associated with the insights.
@@ -4135,7 +4221,7 @@ module Aws::EKS
4135
4221
  # resp = client.list_insights({
4136
4222
  # cluster_name: "String", # required
4137
4223
  # filter: {
4138
- # categories: ["UPGRADE_READINESS"], # accepts UPGRADE_READINESS
4224
+ # categories: ["UPGRADE_READINESS"], # accepts UPGRADE_READINESS, MISCONFIGURATION
4139
4225
  # kubernetes_versions: ["String"],
4140
4226
  # statuses: ["PASSING"], # accepts PASSING, WARNING, ERROR, UNKNOWN
4141
4227
  # },
@@ -4148,7 +4234,7 @@ module Aws::EKS
4148
4234
  # resp.insights #=> Array
4149
4235
  # resp.insights[0].id #=> String
4150
4236
  # resp.insights[0].name #=> String
4151
- # resp.insights[0].category #=> String, one of "UPGRADE_READINESS"
4237
+ # resp.insights[0].category #=> String, one of "UPGRADE_READINESS", "MISCONFIGURATION"
4152
4238
  # resp.insights[0].kubernetes_version #=> String
4153
4239
  # resp.insights[0].last_refresh_time #=> Time
4154
4240
  # resp.insights[0].last_transition_time #=> Time
@@ -4771,13 +4857,13 @@ module Aws::EKS
4771
4857
  # `DescribeAddonConfiguration`.
4772
4858
  #
4773
4859
  # @option params [Array<Types::AddonPodIdentityAssociations>] :pod_identity_associations
4774
- # An array of Pod Identity Assocations to be updated. Each EKS Pod
4775
- # Identity association maps a Kubernetes service account to an IAM Role.
4776
- # If this value is left blank, no change. If an empty array is provided,
4777
- # existing Pod Identity Assocations owned by the Addon are deleted.
4860
+ # An array of EKS Pod Identity associations to be updated. Each
4861
+ # association maps a Kubernetes service account to an IAM role. If this
4862
+ # value is left blank, no change. If an empty array is provided,
4863
+ # existing associations owned by the add-on are deleted.
4778
4864
  #
4779
4865
  # For more information, see [Attach an IAM Role to an Amazon EKS add-on
4780
- # using Pod Identity][1] in the *Amazon EKS User Guide*.
4866
+ # using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
4781
4867
  #
4782
4868
  #
4783
4869
  #
@@ -4851,8 +4937,8 @@ module Aws::EKS
4851
4937
  # * You can also use this API operation to enable or disable public and
4852
4938
  # private access to your cluster's Kubernetes API server endpoint. By
4853
4939
  # default, public access is enabled, and private access is disabled.
4854
- # For more information, see [Amazon EKS cluster endpoint access
4855
- # control][3] in the <i> <i>Amazon EKS User Guide</i> </i>.
4940
+ # For more information, see [ Cluster API server endpoint][3] in the
4941
+ # <i> <i>Amazon EKS User Guide</i> </i>.
4856
4942
  #
4857
4943
  # * You can also use this API operation to choose different subnets and
4858
4944
  # security groups for the cluster. You must specify at least two
@@ -5453,11 +5539,31 @@ module Aws::EKS
5453
5539
  req.send_request(options)
5454
5540
  end
5455
5541
 
5456
- # Updates a EKS Pod Identity association. Only the IAM role can be
5457
- # changed; an association can't be moved between clusters, namespaces,
5458
- # or service accounts. If you need to edit the namespace or service
5459
- # account, you need to delete the association and then create a new
5460
- # association with your desired settings.
5542
+ # Updates a EKS Pod Identity association. In an update, you can change
5543
+ # the IAM role, the target IAM role, or `disableSessionTags`. You must
5544
+ # change at least one of these in an update. An association can't be
5545
+ # moved between clusters, namespaces, or service accounts. If you need
5546
+ # to edit the namespace or service account, you need to delete the
5547
+ # association and then create a new association with your desired
5548
+ # settings.
5549
+ #
5550
+ # Similar to Amazon Web Services IAM behavior, EKS Pod Identity
5551
+ # associations are eventually consistent, and may take several seconds
5552
+ # to be effective after the initial API call returns successfully. You
5553
+ # must design your applications to account for these potential delays.
5554
+ # We recommend that you don’t include association create/updates in the
5555
+ # critical, high-availability code paths of your application. Instead,
5556
+ # make changes in a separate initialization or setup routine that you
5557
+ # run less frequently.
5558
+ #
5559
+ # You can set a *target IAM role* in the same or a different account for
5560
+ # advanced scenarios. With a target role, EKS Pod Identity automatically
5561
+ # performs two role assumptions in sequence: first assuming the role in
5562
+ # the association that is in this account, then using those credentials
5563
+ # to assume the target IAM role. This process provides your Pod with
5564
+ # temporary credentials that have the permissions defined in the target
5565
+ # role, allowing secure access to resources in another Amazon Web
5566
+ # Services account.
5461
5567
  #
5462
5568
  # @option params [required, String] :cluster_name
5463
5569
  # The name of the cluster that you want to update the association in.
@@ -5466,7 +5572,7 @@ module Aws::EKS
5466
5572
  # The ID of the association to be updated.
5467
5573
  #
5468
5574
  # @option params [String] :role_arn
5469
- # The new IAM role to change the
5575
+ # The new IAM role to change in the association.
5470
5576
  #
5471
5577
  # @option params [String] :client_request_token
5472
5578
  # A unique, case-sensitive identifier that you provide to ensure the
@@ -5475,6 +5581,51 @@ module Aws::EKS
5475
5581
  # **A suitable default value is auto-generated.** You should normally
5476
5582
  # not need to pass this option.**
5477
5583
  #
5584
+ # @option params [Boolean] :disable_session_tags
5585
+ # Disable the automatic sessions tags that are appended by EKS Pod
5586
+ # Identity.
5587
+ #
5588
+ # EKS Pod Identity adds a pre-defined set of session tags when it
5589
+ # assumes the role. You can use these tags to author a single role that
5590
+ # can work across resources by allowing access to Amazon Web Services
5591
+ # resources based on matching tags. By default, EKS Pod Identity
5592
+ # attaches six tags, including tags for cluster name, namespace, and
5593
+ # service account name. For the list of tags added by EKS Pod Identity,
5594
+ # see [List of session tags added by EKS Pod Identity][1] in the *Amazon
5595
+ # EKS User Guide*.
5596
+ #
5597
+ # Amazon Web Services compresses inline session policies, managed policy
5598
+ # ARNs, and session tags into a packed binary format that has a separate
5599
+ # limit. If you receive a `PackedPolicyTooLarge` error indicating the
5600
+ # packed binary format has exceeded the size limit, you can attempt to
5601
+ # reduce the size by disabling the session tags added by EKS Pod
5602
+ # Identity.
5603
+ #
5604
+ #
5605
+ #
5606
+ # [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
5607
+ #
5608
+ # @option params [String] :target_role_arn
5609
+ # The Amazon Resource Name (ARN) of the target IAM role to associate
5610
+ # with the service account. This role is assumed by using the EKS Pod
5611
+ # Identity association role, then the credentials for this role are
5612
+ # injected into the Pod.
5613
+ #
5614
+ # When you run applications on Amazon EKS, your application might need
5615
+ # to access Amazon Web Services resources from a different role that
5616
+ # exists in the same or different Amazon Web Services account. For
5617
+ # example, your application running in “Account A” might need to access
5618
+ # resources, such as buckets in “Account B” or within “Account A”
5619
+ # itself. You can create a association to access Amazon Web Services
5620
+ # resources in “Account B” by creating two IAM roles: a role in “Account
5621
+ # A” and a role in “Account B” (which can be the same or different
5622
+ # account), each with the necessary trust and permission policies. After
5623
+ # you provide these roles in the *IAM role* and *Target IAM role*
5624
+ # fields, EKS will perform role chaining to ensure your application gets
5625
+ # the required permissions. This means Role A will assume Role B,
5626
+ # allowing your Pods to securely access resources like S3 buckets in the
5627
+ # target account.
5628
+ #
5478
5629
  # @return [Types::UpdatePodIdentityAssociationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
5479
5630
  #
5480
5631
  # * {Types::UpdatePodIdentityAssociationResponse#association #association} => Types::PodIdentityAssociation
@@ -5486,6 +5637,8 @@ module Aws::EKS
5486
5637
  # association_id: "String", # required
5487
5638
  # role_arn: "String",
5488
5639
  # client_request_token: "String",
5640
+ # disable_session_tags: false,
5641
+ # target_role_arn: "String",
5489
5642
  # })
5490
5643
  #
5491
5644
  # @example Response structure
@@ -5501,6 +5654,9 @@ module Aws::EKS
5501
5654
  # resp.association.created_at #=> Time
5502
5655
  # resp.association.modified_at #=> Time
5503
5656
  # resp.association.owner_arn #=> String
5657
+ # resp.association.disable_session_tags #=> Boolean
5658
+ # resp.association.target_role_arn #=> String
5659
+ # resp.association.external_id #=> String
5504
5660
  #
5505
5661
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociation AWS API Documentation
5506
5662
  #
@@ -5529,7 +5685,7 @@ module Aws::EKS
5529
5685
  tracer: tracer
5530
5686
  )
5531
5687
  context[:gem_name] = 'aws-sdk-eks'
5532
- context[:gem_version] = '1.137.0'
5688
+ context[:gem_version] = '1.139.0'
5533
5689
  Seahorse::Client::Request.new(handlers, context)
5534
5690
  end
5535
5691
 
@@ -697,6 +697,8 @@ module Aws::EKS
697
697
  CreatePodIdentityAssociationRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "roleArn"))
698
698
  CreatePodIdentityAssociationRequest.add_member(:client_request_token, Shapes::ShapeRef.new(shape: String, location_name: "clientRequestToken", metadata: {"idempotencyToken" => true}))
699
699
  CreatePodIdentityAssociationRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagMap, location_name: "tags"))
700
+ CreatePodIdentityAssociationRequest.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
701
+ CreatePodIdentityAssociationRequest.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
700
702
  CreatePodIdentityAssociationRequest.struct_class = Types::CreatePodIdentityAssociationRequest
701
703
 
702
704
  CreatePodIdentityAssociationResponse.add_member(:association, Shapes::ShapeRef.new(shape: PodIdentityAssociation, location_name: "association"))
@@ -1299,6 +1301,9 @@ module Aws::EKS
1299
1301
  PodIdentityAssociation.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, location_name: "createdAt"))
1300
1302
  PodIdentityAssociation.add_member(:modified_at, Shapes::ShapeRef.new(shape: Timestamp, location_name: "modifiedAt"))
1301
1303
  PodIdentityAssociation.add_member(:owner_arn, Shapes::ShapeRef.new(shape: String, location_name: "ownerArn"))
1304
+ PodIdentityAssociation.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
1305
+ PodIdentityAssociation.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
1306
+ PodIdentityAssociation.add_member(:external_id, Shapes::ShapeRef.new(shape: String, location_name: "externalId"))
1302
1307
  PodIdentityAssociation.struct_class = Types::PodIdentityAssociation
1303
1308
 
1304
1309
  PodIdentityAssociationSummaries.member = Shapes::ShapeRef.new(shape: PodIdentityAssociationSummary)
@@ -1524,6 +1529,8 @@ module Aws::EKS
1524
1529
  UpdatePodIdentityAssociationRequest.add_member(:association_id, Shapes::ShapeRef.new(shape: String, required: true, location: "uri", location_name: "associationId"))
1525
1530
  UpdatePodIdentityAssociationRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: String, location_name: "roleArn"))
1526
1531
  UpdatePodIdentityAssociationRequest.add_member(:client_request_token, Shapes::ShapeRef.new(shape: String, location_name: "clientRequestToken", metadata: {"idempotencyToken" => true}))
1532
+ UpdatePodIdentityAssociationRequest.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
1533
+ UpdatePodIdentityAssociationRequest.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
1527
1534
  UpdatePodIdentityAssociationRequest.struct_class = Types::UpdatePodIdentityAssociationRequest
1528
1535
 
1529
1536
  UpdatePodIdentityAssociationResponse.add_member(:association, Shapes::ShapeRef.new(shape: PodIdentityAssociation, location_name: "association"))
@@ -252,12 +252,12 @@ module Aws::EKS
252
252
  # @return [String]
253
253
  #
254
254
  # @!attribute [rw] pod_identity_associations
255
- # An array of Pod Identity Assocations owned by the Addon. Each EKS
256
- # Pod Identity association maps a role to a service account in a
257
- # namespace in the cluster.
255
+ # An array of EKS Pod Identity associations owned by the add-on. Each
256
+ # association maps a role to a service account in a namespace in the
257
+ # cluster.
258
258
  #
259
259
  # For more information, see [Attach an IAM Role to an Amazon EKS
260
- # add-on using Pod Identity][1] in the *Amazon EKS User Guide*.
260
+ # add-on using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
261
261
  #
262
262
  #
263
263
  #
@@ -388,13 +388,13 @@ module Aws::EKS
388
388
  include Aws::Structure
389
389
  end
390
390
 
391
- # A type of Pod Identity Association owned by an Amazon EKS Add-on.
391
+ # A type of EKS Pod Identity association owned by an Amazon EKS add-on.
392
392
  #
393
- # Each EKS Pod Identity Association maps a role to a service account in
394
- # a namespace in the cluster.
393
+ # Each association maps a role to a service account in a namespace in
394
+ # the cluster.
395
395
  #
396
396
  # For more information, see [Attach an IAM Role to an Amazon EKS add-on
397
- # using Pod Identity][1] in the *Amazon EKS User Guide*.
397
+ # using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
398
398
  #
399
399
  #
400
400
  #
@@ -417,14 +417,14 @@ module Aws::EKS
417
417
  include Aws::Structure
418
418
  end
419
419
 
420
- # Information about how to configure IAM for an Addon.
420
+ # Information about how to configure IAM for an add-on.
421
421
  #
422
422
  # @!attribute [rw] service_account
423
- # The Kubernetes Service Account name used by the addon.
423
+ # The Kubernetes Service Account name used by the add-on.
424
424
  # @return [String]
425
425
  #
426
426
  # @!attribute [rw] recommended_managed_policies
427
- # A suggested IAM Policy for the addon.
427
+ # A suggested IAM Policy for the add-on.
428
428
  # @return [Array<String>]
429
429
  #
430
430
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/AddonPodIdentityConfiguration AWS API Documentation
@@ -447,7 +447,7 @@ module Aws::EKS
447
447
  # @return [Array<String>]
448
448
  #
449
449
  # @!attribute [rw] compute_types
450
- # Indicates the compute type of the addon version.
450
+ # Indicates the compute type of the add-on version.
451
451
  # @return [Array<String>]
452
452
  #
453
453
  # @!attribute [rw] compatibilities
@@ -459,7 +459,7 @@ module Aws::EKS
459
459
  # @return [Boolean]
460
460
  #
461
461
  # @!attribute [rw] requires_iam_permissions
462
- # Indicates if the Addon requires IAM Permissions to operate, such as
462
+ # Indicates if the add-on requires IAM Permissions to operate, such as
463
463
  # networking permissions.
464
464
  # @return [Boolean]
465
465
  #
@@ -1525,12 +1525,11 @@ module Aws::EKS
1525
1525
  # @return [String]
1526
1526
  #
1527
1527
  # @!attribute [rw] pod_identity_associations
1528
- # An array of Pod Identity Assocations to be created. Each EKS Pod
1529
- # Identity association maps a Kubernetes service account to an IAM
1530
- # Role.
1528
+ # An array of EKS Pod Identity associations to be created. Each
1529
+ # association maps a Kubernetes service account to an IAM role.
1531
1530
  #
1532
1531
  # For more information, see [Attach an IAM Role to an Amazon EKS
1533
- # add-on using Pod Identity][1] in the *Amazon EKS User Guide*.
1532
+ # add-on using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
1534
1533
  #
1535
1534
  #
1536
1535
  #
@@ -1680,8 +1679,8 @@ module Aws::EKS
1680
1679
  # If you set this value to `False` when creating a cluster, the
1681
1680
  # default networking add-ons will not be installed.
1682
1681
  #
1683
- # The default networking addons include vpc-cni, coredns, and
1684
- # kube-proxy.
1682
+ # The default networking add-ons include `vpc-cni`, `coredns`, and
1683
+ # `kube-proxy`.
1685
1684
  #
1686
1685
  # Use this option when you plan to install third-party alternative
1687
1686
  # add-ons or self-manage the default networking add-ons.
@@ -2169,13 +2168,14 @@ module Aws::EKS
2169
2168
  end
2170
2169
 
2171
2170
  # @!attribute [rw] cluster_name
2172
- # The name of the cluster to create the association in.
2171
+ # The name of the cluster to create the EKS Pod Identity association
2172
+ # in.
2173
2173
  # @return [String]
2174
2174
  #
2175
2175
  # @!attribute [rw] namespace
2176
2176
  # The name of the Kubernetes namespace inside the cluster to create
2177
- # the association in. The service account and the pods that use the
2178
- # service account must be in this namespace.
2177
+ # the EKS Pod Identity association in. The service account and the
2178
+ # Pods that use the service account must be in this namespace.
2179
2179
  # @return [String]
2180
2180
  #
2181
2181
  # @!attribute [rw] service_account
@@ -2186,7 +2186,7 @@ module Aws::EKS
2186
2186
  # @!attribute [rw] role_arn
2187
2187
  # The Amazon Resource Name (ARN) of the IAM role to associate with the
2188
2188
  # service account. The EKS Pod Identity agent manages credentials to
2189
- # assume this role for applications in the containers in the pods that
2189
+ # assume this role for applications in the containers in the Pods that
2190
2190
  # use this service account.
2191
2191
  # @return [String]
2192
2192
  #
@@ -2230,6 +2230,53 @@ module Aws::EKS
2230
2230
  # against your tags per resource limit.
2231
2231
  # @return [Hash<String,String>]
2232
2232
  #
2233
+ # @!attribute [rw] disable_session_tags
2234
+ # Disable the automatic sessions tags that are appended by EKS Pod
2235
+ # Identity.
2236
+ #
2237
+ # EKS Pod Identity adds a pre-defined set of session tags when it
2238
+ # assumes the role. You can use these tags to author a single role
2239
+ # that can work across resources by allowing access to Amazon Web
2240
+ # Services resources based on matching tags. By default, EKS Pod
2241
+ # Identity attaches six tags, including tags for cluster name,
2242
+ # namespace, and service account name. For the list of tags added by
2243
+ # EKS Pod Identity, see [List of session tags added by EKS Pod
2244
+ # Identity][1] in the *Amazon EKS User Guide*.
2245
+ #
2246
+ # Amazon Web Services compresses inline session policies, managed
2247
+ # policy ARNs, and session tags into a packed binary format that has a
2248
+ # separate limit. If you receive a `PackedPolicyTooLarge` error
2249
+ # indicating the packed binary format has exceeded the size limit, you
2250
+ # can attempt to reduce the size by disabling the session tags added
2251
+ # by EKS Pod Identity.
2252
+ #
2253
+ #
2254
+ #
2255
+ # [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
2256
+ # @return [Boolean]
2257
+ #
2258
+ # @!attribute [rw] target_role_arn
2259
+ # The Amazon Resource Name (ARN) of the target IAM role to associate
2260
+ # with the service account. This role is assumed by using the EKS Pod
2261
+ # Identity association role, then the credentials for this role are
2262
+ # injected into the Pod.
2263
+ #
2264
+ # When you run applications on Amazon EKS, your application might need
2265
+ # to access Amazon Web Services resources from a different role that
2266
+ # exists in the same or different Amazon Web Services account. For
2267
+ # example, your application running in “Account A” might need to
2268
+ # access resources, such as Amazon S3 buckets in “Account B” or within
2269
+ # “Account A” itself. You can create a association to access Amazon
2270
+ # Web Services resources in “Account B” by creating two IAM roles: a
2271
+ # role in “Account A” and a role in “Account B” (which can be the same
2272
+ # or different account), each with the necessary trust and permission
2273
+ # policies. After you provide these roles in the *IAM role* and
2274
+ # *Target IAM role* fields, EKS will perform role chaining to ensure
2275
+ # your application gets the required permissions. This means Role A
2276
+ # will assume Role B, allowing your Pods to securely access resources
2277
+ # like S3 buckets in the target account.
2278
+ # @return [String]
2279
+ #
2233
2280
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/CreatePodIdentityAssociationRequest AWS API Documentation
2234
2281
  #
2235
2282
  class CreatePodIdentityAssociationRequest < Struct.new(
@@ -2238,7 +2285,9 @@ module Aws::EKS
2238
2285
  :service_account,
2239
2286
  :role_arn,
2240
2287
  :client_request_token,
2241
- :tags)
2288
+ :tags,
2289
+ :disable_session_tags,
2290
+ :target_role_arn)
2242
2291
  SENSITIVE = []
2243
2292
  include Aws::Structure
2244
2293
  end
@@ -2593,9 +2642,9 @@ module Aws::EKS
2593
2642
  # @return [String]
2594
2643
  #
2595
2644
  # @!attribute [rw] pod_identity_configuration
2596
- # The Kubernetes service account name used by the addon, and any
2645
+ # The Kubernetes service account name used by the add-on, and any
2597
2646
  # suggested IAM policies. Use this information to create an IAM Role
2598
- # for the Addon.
2647
+ # for the add-on.
2599
2648
  # @return [Array<Types::AddonPodIdentityConfiguration>]
2600
2649
  #
2601
2650
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DescribeAddonConfigurationResponse AWS API Documentation
@@ -3699,7 +3748,16 @@ module Aws::EKS
3699
3748
  # The criteria to use for the insights.
3700
3749
  #
3701
3750
  # @!attribute [rw] categories
3702
- # The categories to use to filter insights.
3751
+ # The categories to use to filter insights. The following lists the
3752
+ # available categories:
3753
+ #
3754
+ # * `UPGRADE_READINESS`: Amazon EKS identifies issues that could
3755
+ # impact your ability to upgrade to new versions of Kubernetes.
3756
+ # These are called upgrade insights.
3757
+ #
3758
+ # * `MISCONFIGURATION`: Amazon EKS identifies misconfiguration in your
3759
+ # EKS Hybrid Nodes setup that could impair functionality of your
3760
+ # cluster or workloads. These are called configuration insights.
3703
3761
  # @return [Array<String>]
3704
3762
  #
3705
3763
  # @!attribute [rw] kubernetes_versions
@@ -5663,7 +5721,7 @@ module Aws::EKS
5663
5721
  #
5664
5722
  # @!attribute [rw] namespace
5665
5723
  # The name of the Kubernetes namespace inside the cluster to create
5666
- # the association in. The service account and the pods that use the
5724
+ # the association in. The service account and the Pods that use the
5667
5725
  # service account must be in this namespace.
5668
5726
  # @return [String]
5669
5727
  #
@@ -5675,7 +5733,7 @@ module Aws::EKS
5675
5733
  # @!attribute [rw] role_arn
5676
5734
  # The Amazon Resource Name (ARN) of the IAM role to associate with the
5677
5735
  # service account. The EKS Pod Identity agent manages credentials to
5678
- # assume this role for applications in the containers in the pods that
5736
+ # assume this role for applications in the containers in the Pods that
5679
5737
  # use this service account.
5680
5738
  # @return [String]
5681
5739
  #
@@ -5724,12 +5782,55 @@ module Aws::EKS
5724
5782
  # @return [Time]
5725
5783
  #
5726
5784
  # @!attribute [rw] modified_at
5727
- # The most recent timestamp that the association was modified at
5785
+ # The most recent timestamp that the association was modified at.
5728
5786
  # @return [Time]
5729
5787
  #
5730
5788
  # @!attribute [rw] owner_arn
5731
- # If defined, the Pod Identity Association is owned by an Amazon EKS
5732
- # Addon.
5789
+ # If defined, the EKS Pod Identity association is owned by an Amazon
5790
+ # EKS add-on.
5791
+ # @return [String]
5792
+ #
5793
+ # @!attribute [rw] disable_session_tags
5794
+ # The state of the automatic sessions tags. The value of *true*
5795
+ # disables these tags.
5796
+ #
5797
+ # EKS Pod Identity adds a pre-defined set of session tags when it
5798
+ # assumes the role. You can use these tags to author a single role
5799
+ # that can work across resources by allowing access to Amazon Web
5800
+ # Services resources based on matching tags. By default, EKS Pod
5801
+ # Identity attaches six tags, including tags for cluster name,
5802
+ # namespace, and service account name. For the list of tags added by
5803
+ # EKS Pod Identity, see [List of session tags added by EKS Pod
5804
+ # Identity][1] in the *Amazon EKS User Guide*.
5805
+ #
5806
+ #
5807
+ #
5808
+ # [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
5809
+ # @return [Boolean]
5810
+ #
5811
+ # @!attribute [rw] target_role_arn
5812
+ # The Amazon Resource Name (ARN) of the target IAM role to associate
5813
+ # with the service account. This role is assumed by using the EKS Pod
5814
+ # Identity association role, then the credentials for this role are
5815
+ # injected into the Pod.
5816
+ # @return [String]
5817
+ #
5818
+ # @!attribute [rw] external_id
5819
+ # The unique identifier for this EKS Pod Identity association for a
5820
+ # target IAM role. You put this value in the trust policy of the
5821
+ # target role, in a `Condition` to match the `sts.ExternalId`. This
5822
+ # ensures that the target role can only be assumed by this
5823
+ # association. This prevents the *confused deputy problem*. For more
5824
+ # information about the confused deputy problem, see [The confused
5825
+ # deputy problem][1] in the *IAM User Guide*.
5826
+ #
5827
+ # If you want to use the same target role with multiple associations
5828
+ # or other roles, use independent statements in the trust policy to
5829
+ # allow `sts:AssumeRole` access from each role.
5830
+ #
5831
+ #
5832
+ #
5833
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/confused-deputy.html
5733
5834
  # @return [String]
5734
5835
  #
5735
5836
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/PodIdentityAssociation AWS API Documentation
@@ -5744,7 +5845,10 @@ module Aws::EKS
5744
5845
  :tags,
5745
5846
  :created_at,
5746
5847
  :modified_at,
5747
- :owner_arn)
5848
+ :owner_arn,
5849
+ :disable_session_tags,
5850
+ :target_role_arn,
5851
+ :external_id)
5748
5852
  SENSITIVE = []
5749
5853
  include Aws::Structure
5750
5854
  end
@@ -5773,7 +5877,7 @@ module Aws::EKS
5773
5877
  #
5774
5878
  # @!attribute [rw] namespace
5775
5879
  # The name of the Kubernetes namespace inside the cluster to create
5776
- # the association in. The service account and the pods that use the
5880
+ # the association in. The service account and the Pods that use the
5777
5881
  # service account must be in this namespace.
5778
5882
  # @return [String]
5779
5883
  #
@@ -5791,8 +5895,7 @@ module Aws::EKS
5791
5895
  # @return [String]
5792
5896
  #
5793
5897
  # @!attribute [rw] owner_arn
5794
- # If defined, the Pod Identity Association is owned by an Amazon EKS
5795
- # Addon.
5898
+ # If defined, the association is owned by an Amazon EKS add-on.
5796
5899
  # @return [String]
5797
5900
  #
5798
5901
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/PodIdentityAssociationSummary AWS API Documentation
@@ -5937,7 +6040,7 @@ module Aws::EKS
5937
6040
  # It must satisfy the following requirements:
5938
6041
  #
5939
6042
  # * Each block must be within an `IPv4` RFC-1918 network range.
5940
- # Minimum allowed size is /24, maximum allowed size is /8.
6043
+ # Minimum allowed size is /32, maximum allowed size is /8.
5941
6044
  # Publicly-routable addresses aren't supported.
5942
6045
  #
5943
6046
  # * Each block cannot overlap with the range of the VPC CIDR blocks
@@ -5975,7 +6078,7 @@ module Aws::EKS
5975
6078
  # It must satisfy the following requirements:
5976
6079
  #
5977
6080
  # * Each block must be within an `IPv4` RFC-1918 network range.
5978
- # Minimum allowed size is /24, maximum allowed size is /8.
6081
+ # Minimum allowed size is /32, maximum allowed size is /8.
5979
6082
  # Publicly-routable addresses aren't supported.
5980
6083
  #
5981
6084
  # * Each block cannot overlap with the range of the VPC CIDR blocks
@@ -6025,7 +6128,7 @@ module Aws::EKS
6025
6128
  # It must satisfy the following requirements:
6026
6129
  #
6027
6130
  # * Each block must be within an `IPv4` RFC-1918 network range. Minimum
6028
- # allowed size is /24, maximum allowed size is /8. Publicly-routable
6131
+ # allowed size is /32, maximum allowed size is /8. Publicly-routable
6029
6132
  # addresses aren't supported.
6030
6133
  #
6031
6134
  # * Each block cannot overlap with the range of the VPC CIDR blocks for
@@ -6058,7 +6161,7 @@ module Aws::EKS
6058
6161
  # It must satisfy the following requirements:
6059
6162
  #
6060
6163
  # * Each block must be within an `IPv4` RFC-1918 network range.
6061
- # Minimum allowed size is /24, maximum allowed size is /8.
6164
+ # Minimum allowed size is /32, maximum allowed size is /8.
6062
6165
  # Publicly-routable addresses aren't supported.
6063
6166
  #
6064
6167
  # * Each block cannot overlap with the range of the VPC CIDR blocks
@@ -6103,7 +6206,7 @@ module Aws::EKS
6103
6206
  # It must satisfy the following requirements:
6104
6207
  #
6105
6208
  # * Each block must be within an `IPv4` RFC-1918 network range. Minimum
6106
- # allowed size is /24, maximum allowed size is /8. Publicly-routable
6209
+ # allowed size is /32, maximum allowed size is /8. Publicly-routable
6107
6210
  # addresses aren't supported.
6108
6211
  #
6109
6212
  # * Each block cannot overlap with the range of the VPC CIDR blocks for
@@ -6124,7 +6227,7 @@ module Aws::EKS
6124
6227
  # It must satisfy the following requirements:
6125
6228
  #
6126
6229
  # * Each block must be within an `IPv4` RFC-1918 network range.
6127
- # Minimum allowed size is /24, maximum allowed size is /8.
6230
+ # Minimum allowed size is /32, maximum allowed size is /8.
6128
6231
  # Publicly-routable addresses aren't supported.
6129
6232
  #
6130
6233
  # * Each block cannot overlap with the range of the VPC CIDR blocks
@@ -6677,14 +6780,13 @@ module Aws::EKS
6677
6780
  # @return [String]
6678
6781
  #
6679
6782
  # @!attribute [rw] pod_identity_associations
6680
- # An array of Pod Identity Assocations to be updated. Each EKS Pod
6681
- # Identity association maps a Kubernetes service account to an IAM
6682
- # Role. If this value is left blank, no change. If an empty array is
6683
- # provided, existing Pod Identity Assocations owned by the Addon are
6684
- # deleted.
6783
+ # An array of EKS Pod Identity associations to be updated. Each
6784
+ # association maps a Kubernetes service account to an IAM role. If
6785
+ # this value is left blank, no change. If an empty array is provided,
6786
+ # existing associations owned by the add-on are deleted.
6685
6787
  #
6686
6788
  # For more information, see [Attach an IAM Role to an Amazon EKS
6687
- # add-on using Pod Identity][1] in the *Amazon EKS User Guide*.
6789
+ # add-on using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
6688
6790
  #
6689
6791
  #
6690
6792
  #
@@ -7140,7 +7242,7 @@ module Aws::EKS
7140
7242
  # @return [String]
7141
7243
  #
7142
7244
  # @!attribute [rw] role_arn
7143
- # The new IAM role to change the
7245
+ # The new IAM role to change in the association.
7144
7246
  # @return [String]
7145
7247
  #
7146
7248
  # @!attribute [rw] client_request_token
@@ -7151,20 +7253,68 @@ module Aws::EKS
7151
7253
  # not need to pass this option.
7152
7254
  # @return [String]
7153
7255
  #
7256
+ # @!attribute [rw] disable_session_tags
7257
+ # Disable the automatic sessions tags that are appended by EKS Pod
7258
+ # Identity.
7259
+ #
7260
+ # EKS Pod Identity adds a pre-defined set of session tags when it
7261
+ # assumes the role. You can use these tags to author a single role
7262
+ # that can work across resources by allowing access to Amazon Web
7263
+ # Services resources based on matching tags. By default, EKS Pod
7264
+ # Identity attaches six tags, including tags for cluster name,
7265
+ # namespace, and service account name. For the list of tags added by
7266
+ # EKS Pod Identity, see [List of session tags added by EKS Pod
7267
+ # Identity][1] in the *Amazon EKS User Guide*.
7268
+ #
7269
+ # Amazon Web Services compresses inline session policies, managed
7270
+ # policy ARNs, and session tags into a packed binary format that has a
7271
+ # separate limit. If you receive a `PackedPolicyTooLarge` error
7272
+ # indicating the packed binary format has exceeded the size limit, you
7273
+ # can attempt to reduce the size by disabling the session tags added
7274
+ # by EKS Pod Identity.
7275
+ #
7276
+ #
7277
+ #
7278
+ # [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
7279
+ # @return [Boolean]
7280
+ #
7281
+ # @!attribute [rw] target_role_arn
7282
+ # The Amazon Resource Name (ARN) of the target IAM role to associate
7283
+ # with the service account. This role is assumed by using the EKS Pod
7284
+ # Identity association role, then the credentials for this role are
7285
+ # injected into the Pod.
7286
+ #
7287
+ # When you run applications on Amazon EKS, your application might need
7288
+ # to access Amazon Web Services resources from a different role that
7289
+ # exists in the same or different Amazon Web Services account. For
7290
+ # example, your application running in “Account A” might need to
7291
+ # access resources, such as buckets in “Account B” or within “Account
7292
+ # A” itself. You can create a association to access Amazon Web
7293
+ # Services resources in “Account B” by creating two IAM roles: a role
7294
+ # in “Account A” and a role in “Account B” (which can be the same or
7295
+ # different account), each with the necessary trust and permission
7296
+ # policies. After you provide these roles in the *IAM role* and
7297
+ # *Target IAM role* fields, EKS will perform role chaining to ensure
7298
+ # your application gets the required permissions. This means Role A
7299
+ # will assume Role B, allowing your Pods to securely access resources
7300
+ # like S3 buckets in the target account.
7301
+ # @return [String]
7302
+ #
7154
7303
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociationRequest AWS API Documentation
7155
7304
  #
7156
7305
  class UpdatePodIdentityAssociationRequest < Struct.new(
7157
7306
  :cluster_name,
7158
7307
  :association_id,
7159
7308
  :role_arn,
7160
- :client_request_token)
7309
+ :client_request_token,
7310
+ :disable_session_tags,
7311
+ :target_role_arn)
7161
7312
  SENSITIVE = []
7162
7313
  include Aws::Structure
7163
7314
  end
7164
7315
 
7165
7316
  # @!attribute [rw] association
7166
- # The full description of the EKS Pod Identity association that was
7167
- # updated.
7317
+ # The full description of the association that was updated.
7168
7318
  # @return [Types::PodIdentityAssociation]
7169
7319
  #
7170
7320
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociationResponse AWS API Documentation
@@ -7294,8 +7444,10 @@ module Aws::EKS
7294
7444
  # access, your cluster's Kubernetes API server can only receive
7295
7445
  # requests from within the cluster VPC. The default value for this
7296
7446
  # parameter is `true`, which enables public access for your Kubernetes
7297
- # API server. For more information, see [Amazon EKS cluster endpoint
7298
- # access control][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
7447
+ # API server. The endpoint domain name and IP address family depends
7448
+ # on the value of the `ipFamily` for the cluster. For more
7449
+ # information, see [Cluster API server endpoint][1] in the <i>
7450
+ # <i>Amazon EKS User Guide</i> </i>.
7299
7451
  #
7300
7452
  #
7301
7453
  #
@@ -7311,8 +7463,8 @@ module Aws::EKS
7311
7463
  # server. If you disable private access and you have nodes or Fargate
7312
7464
  # pods in the cluster, then ensure that `publicAccessCidrs` includes
7313
7465
  # the necessary CIDR blocks for communication with the nodes or
7314
- # Fargate pods. For more information, see [Amazon EKS cluster endpoint
7315
- # access control][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
7466
+ # Fargate pods. For more information, see [Cluster API server
7467
+ # endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
7316
7468
  #
7317
7469
  #
7318
7470
  #
@@ -7323,11 +7475,16 @@ module Aws::EKS
7323
7475
  # The CIDR blocks that are allowed access to your cluster's public
7324
7476
  # Kubernetes API server endpoint. Communication to the endpoint from
7325
7477
  # addresses outside of the CIDR blocks that you specify is denied. The
7326
- # default value is `0.0.0.0/0`. If you've disabled private endpoint
7327
- # access, make sure that you specify the necessary CIDR blocks for
7328
- # every node and Fargate `Pod` in the cluster. For more information,
7329
- # see [Amazon EKS cluster endpoint access control][1] in the <i>
7330
- # <i>Amazon EKS User Guide</i> </i>.
7478
+ # default value is `0.0.0.0/0` and additionally `::/0` for dual-stack
7479
+ # `IPv6` clusters. If you've disabled private endpoint access, make
7480
+ # sure that you specify the necessary CIDR blocks for every node and
7481
+ # Fargate `Pod` in the cluster. For more information, see [Cluster API
7482
+ # server endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
7483
+ #
7484
+ # Note that the public endpoints are dual-stack for only `IPv6`
7485
+ # clusters that are made after October 2024. You can't add `IPv6`
7486
+ # CIDR blocks to `IPv4` clusters or `IPv6` clusters that were made
7487
+ # before October 2024.
7331
7488
  #
7332
7489
  #
7333
7490
  #
@@ -7381,9 +7538,8 @@ module Aws::EKS
7381
7538
  # the internet. If this value is disabled and you have nodes or
7382
7539
  # Fargate pods in the cluster, then ensure that `publicAccessCidrs`
7383
7540
  # includes the necessary CIDR blocks for communication with the nodes
7384
- # or Fargate pods. For more information, see [Amazon EKS cluster
7385
- # endpoint access control][1] in the <i> <i>Amazon EKS User Guide</i>
7386
- # </i>.
7541
+ # or Fargate pods. For more information, see [Cluster API server
7542
+ # endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
7387
7543
  #
7388
7544
  #
7389
7545
  #
@@ -7392,7 +7548,22 @@ module Aws::EKS
7392
7548
  #
7393
7549
  # @!attribute [rw] public_access_cidrs
7394
7550
  # The CIDR blocks that are allowed access to your cluster's public
7395
- # Kubernetes API server endpoint.
7551
+ # Kubernetes API server endpoint. Communication to the endpoint from
7552
+ # addresses outside of the CIDR blocks that you specify is denied. The
7553
+ # default value is `0.0.0.0/0` and additionally `::/0` for dual-stack
7554
+ # `IPv6` clusters. If you've disabled private endpoint access, make
7555
+ # sure that you specify the necessary CIDR blocks for every node and
7556
+ # Fargate `Pod` in the cluster. For more information, see [Cluster API
7557
+ # server endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
7558
+ #
7559
+ # Note that the public endpoints are dual-stack for only `IPv6`
7560
+ # clusters that are made after October 2024. You can't add `IPv6`
7561
+ # CIDR blocks to `IPv4` clusters or `IPv6` clusters that were made
7562
+ # before October 2024.
7563
+ #
7564
+ #
7565
+ #
7566
+ # [1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html
7396
7567
  # @return [Array<String>]
7397
7568
  #
7398
7569
  # @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/VpcConfigResponse AWS API Documentation
data/lib/aws-sdk-eks.rb CHANGED
@@ -55,7 +55,7 @@ module Aws::EKS
55
55
  autoload :EndpointProvider, 'aws-sdk-eks/endpoint_provider'
56
56
  autoload :Endpoints, 'aws-sdk-eks/endpoints'
57
57
 
58
- GEM_VERSION = '1.137.0'
58
+ GEM_VERSION = '1.139.0'
59
59
 
60
60
  end
61
61
 
data/sig/client.rbs CHANGED
@@ -362,7 +362,9 @@ module Aws
362
362
  service_account: ::String,
363
363
  role_arn: ::String,
364
364
  ?client_request_token: ::String,
365
- ?tags: Hash[::String, ::String]
365
+ ?tags: Hash[::String, ::String],
366
+ ?disable_session_tags: bool,
367
+ ?target_role_arn: ::String
366
368
  ) -> _CreatePodIdentityAssociationResponseSuccess
367
369
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreatePodIdentityAssociationResponseSuccess
368
370
 
@@ -755,7 +757,7 @@ module Aws
755
757
  def list_insights: (
756
758
  cluster_name: ::String,
757
759
  ?filter: {
758
- categories: Array[("UPGRADE_READINESS")]?,
760
+ categories: Array[("UPGRADE_READINESS" | "MISCONFIGURATION")]?,
759
761
  kubernetes_versions: Array[::String]?,
760
762
  statuses: Array[("PASSING" | "WARNING" | "ERROR" | "UNKNOWN")]?
761
763
  },
@@ -1052,7 +1054,9 @@ module Aws
1052
1054
  cluster_name: ::String,
1053
1055
  association_id: ::String,
1054
1056
  ?role_arn: ::String,
1055
- ?client_request_token: ::String
1057
+ ?client_request_token: ::String,
1058
+ ?disable_session_tags: bool,
1059
+ ?target_role_arn: ::String
1056
1060
  ) -> _UpdatePodIdentityAssociationResponseSuccess
1057
1061
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdatePodIdentityAssociationResponseSuccess
1058
1062
 
data/sig/types.rbs CHANGED
@@ -433,6 +433,8 @@ module Aws::EKS
433
433
  attr_accessor role_arn: ::String
434
434
  attr_accessor client_request_token: ::String
435
435
  attr_accessor tags: ::Hash[::String, ::String]
436
+ attr_accessor disable_session_tags: bool
437
+ attr_accessor target_role_arn: ::String
436
438
  SENSITIVE: []
437
439
  end
438
440
 
@@ -807,7 +809,7 @@ module Aws::EKS
807
809
  class Insight
808
810
  attr_accessor id: ::String
809
811
  attr_accessor name: ::String
810
- attr_accessor category: ("UPGRADE_READINESS")
812
+ attr_accessor category: ("UPGRADE_READINESS" | "MISCONFIGURATION")
811
813
  attr_accessor kubernetes_version: ::String
812
814
  attr_accessor last_refresh_time: ::Time
813
815
  attr_accessor last_transition_time: ::Time
@@ -842,7 +844,7 @@ module Aws::EKS
842
844
  class InsightSummary
843
845
  attr_accessor id: ::String
844
846
  attr_accessor name: ::String
845
- attr_accessor category: ("UPGRADE_READINESS")
847
+ attr_accessor category: ("UPGRADE_READINESS" | "MISCONFIGURATION")
846
848
  attr_accessor kubernetes_version: ::String
847
849
  attr_accessor last_refresh_time: ::Time
848
850
  attr_accessor last_transition_time: ::Time
@@ -852,7 +854,7 @@ module Aws::EKS
852
854
  end
853
855
 
854
856
  class InsightsFilter
855
- attr_accessor categories: ::Array[("UPGRADE_READINESS")]
857
+ attr_accessor categories: ::Array[("UPGRADE_READINESS" | "MISCONFIGURATION")]
856
858
  attr_accessor kubernetes_versions: ::Array[::String]
857
859
  attr_accessor statuses: ::Array[("PASSING" | "WARNING" | "ERROR" | "UNKNOWN")]
858
860
  SENSITIVE: []
@@ -1230,6 +1232,9 @@ module Aws::EKS
1230
1232
  attr_accessor created_at: ::Time
1231
1233
  attr_accessor modified_at: ::Time
1232
1234
  attr_accessor owner_arn: ::String
1235
+ attr_accessor disable_session_tags: bool
1236
+ attr_accessor target_role_arn: ::String
1237
+ attr_accessor external_id: ::String
1233
1238
  SENSITIVE: []
1234
1239
  end
1235
1240
 
@@ -1524,6 +1529,8 @@ module Aws::EKS
1524
1529
  attr_accessor association_id: ::String
1525
1530
  attr_accessor role_arn: ::String
1526
1531
  attr_accessor client_request_token: ::String
1532
+ attr_accessor disable_session_tags: bool
1533
+ attr_accessor target_role_arn: ::String
1527
1534
  SENSITIVE: []
1528
1535
  end
1529
1536
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-eks
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.137.0
4
+ version: 1.139.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -18,7 +18,7 @@ dependencies:
18
18
  version: '3'
19
19
  - - ">="
20
20
  - !ruby/object:Gem::Version
21
- version: 3.216.0
21
+ version: 3.225.0
22
22
  type: :runtime
23
23
  prerelease: false
24
24
  version_requirements: !ruby/object:Gem::Requirement
@@ -28,7 +28,7 @@ dependencies:
28
28
  version: '3'
29
29
  - - ">="
30
30
  - !ruby/object:Gem::Version
31
- version: 3.216.0
31
+ version: 3.225.0
32
32
  - !ruby/object:Gem::Dependency
33
33
  name: aws-sigv4
34
34
  requirement: !ruby/object:Gem::Requirement
@@ -84,7 +84,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
84
84
  requirements:
85
85
  - - ">="
86
86
  - !ruby/object:Gem::Version
87
- version: '2.5'
87
+ version: '2.7'
88
88
  required_rubygems_version: !ruby/object:Gem::Requirement
89
89
  requirements:
90
90
  - - ">="