aws-sdk-eks 1.137.0 → 1.139.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-eks/client.rb +191 -35
- data/lib/aws-sdk-eks/client_api.rb +7 -0
- data/lib/aws-sdk-eks/types.rb +236 -65
- data/lib/aws-sdk-eks.rb +1 -1
- data/sig/client.rbs +7 -3
- data/sig/types.rbs +10 -3
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bfafb3c4a993afbab984bdb91bc15f1bcb95d2aa5c6014653fcdf609c9b29ece
|
4
|
+
data.tar.gz: 4079bd72a94979ca6da8299cb0f84ee50658ceeded917e1ebe29d5f943117102
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 46bfcabcb9b0fb7087ac0b931ec1e5eeb22169a11bf3ba39ab4e4da8daf23b2339a895763149253b69cf7ab363257e38527cb3058822f64f631790d8ff0ec2b4
|
7
|
+
data.tar.gz: d8042d0978684917d8b55381d1f5c7da5f1ffd672ab35f4f5e6128c30669c3075b05dbeab8fa7938f038c804a6a403985d9d4e1da1b68ddcef01e03a31c4f2a7
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.139.0 (2025-06-11)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Release for EKS Pod Identity Cross Account feature and disableSessionTags flag.
|
8
|
+
|
9
|
+
1.138.0 (2025-06-02)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Add support for filtering ListInsights API calls on MISCONFIGURATION insight category
|
13
|
+
|
4
14
|
1.137.0 (2025-05-12)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.139.0
|
data/lib/aws-sdk-eks/client.rb
CHANGED
@@ -927,11 +927,11 @@ module Aws::EKS
|
|
927
927
|
# `DescribeAddonConfiguration`.
|
928
928
|
#
|
929
929
|
# @option params [Array<Types::AddonPodIdentityAssociations>] :pod_identity_associations
|
930
|
-
# An array of Pod Identity
|
931
|
-
#
|
930
|
+
# An array of EKS Pod Identity associations to be created. Each
|
931
|
+
# association maps a Kubernetes service account to an IAM role.
|
932
932
|
#
|
933
933
|
# For more information, see [Attach an IAM Role to an Amazon EKS add-on
|
934
|
-
# using Pod Identity][1] in the *Amazon EKS User Guide*.
|
934
|
+
# using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
|
935
935
|
#
|
936
936
|
#
|
937
937
|
#
|
@@ -1019,9 +1019,10 @@ module Aws::EKS
|
|
1019
1019
|
# You can use the `endpointPublicAccess` and `endpointPrivateAccess`
|
1020
1020
|
# parameters to enable or disable public and private access to your
|
1021
1021
|
# cluster's Kubernetes API server endpoint. By default, public access
|
1022
|
-
# is enabled, and private access is disabled.
|
1023
|
-
#
|
1024
|
-
# EKS
|
1022
|
+
# is enabled, and private access is disabled. The endpoint domain name
|
1023
|
+
# and IP address family depends on the value of the `ipFamily` for the
|
1024
|
+
# cluster. For more information, see [Amazon EKS Cluster Endpoint Access
|
1025
|
+
# Control][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
|
1025
1026
|
#
|
1026
1027
|
# You can use the `logging` parameter to enable or disable exporting the
|
1027
1028
|
# Kubernetes control plane logs for your cluster to CloudWatch Logs. By
|
@@ -1146,8 +1147,8 @@ module Aws::EKS
|
|
1146
1147
|
# If you set this value to `False` when creating a cluster, the default
|
1147
1148
|
# networking add-ons will not be installed.
|
1148
1149
|
#
|
1149
|
-
# The default networking
|
1150
|
-
# kube-proxy
|
1150
|
+
# The default networking add-ons include `vpc-cni`, `coredns`, and
|
1151
|
+
# `kube-proxy`.
|
1151
1152
|
#
|
1152
1153
|
# Use this option when you plan to install third-party alternative
|
1153
1154
|
# add-ons or self-manage the default networking add-ons.
|
@@ -1951,31 +1952,49 @@ module Aws::EKS
|
|
1951
1952
|
|
1952
1953
|
# Creates an EKS Pod Identity association between a service account in
|
1953
1954
|
# an Amazon EKS cluster and an IAM role with *EKS Pod Identity*. Use EKS
|
1954
|
-
# Pod Identity to give temporary IAM credentials to
|
1955
|
+
# Pod Identity to give temporary IAM credentials to Pods and the
|
1955
1956
|
# credentials are rotated automatically.
|
1956
1957
|
#
|
1957
1958
|
# Amazon EKS Pod Identity associations provide the ability to manage
|
1958
1959
|
# credentials for your applications, similar to the way that Amazon EC2
|
1959
1960
|
# instance profiles provide credentials to Amazon EC2 instances.
|
1960
1961
|
#
|
1961
|
-
# If a
|
1962
|
-
# sets environment variables in the containers of the
|
1962
|
+
# If a Pod uses a service account that has an association, Amazon EKS
|
1963
|
+
# sets environment variables in the containers of the Pod. The
|
1963
1964
|
# environment variables configure the Amazon Web Services SDKs,
|
1964
1965
|
# including the Command Line Interface, to use the EKS Pod Identity
|
1965
1966
|
# credentials.
|
1966
1967
|
#
|
1967
|
-
# Pod Identity is a simpler method than *IAM roles for service
|
1968
|
+
# EKS Pod Identity is a simpler method than *IAM roles for service
|
1968
1969
|
# accounts*, as this method doesn't use OIDC identity providers.
|
1969
|
-
# Additionally, you can configure a role for Pod Identity once, and
|
1970
|
+
# Additionally, you can configure a role for EKS Pod Identity once, and
|
1970
1971
|
# reuse it across clusters.
|
1971
1972
|
#
|
1973
|
+
# Similar to Amazon Web Services IAM behavior, EKS Pod Identity
|
1974
|
+
# associations are eventually consistent, and may take several seconds
|
1975
|
+
# to be effective after the initial API call returns successfully. You
|
1976
|
+
# must design your applications to account for these potential delays.
|
1977
|
+
# We recommend that you don’t include association create/updates in the
|
1978
|
+
# critical, high-availability code paths of your application. Instead,
|
1979
|
+
# make changes in a separate initialization or setup routine that you
|
1980
|
+
# run less frequently.
|
1981
|
+
#
|
1982
|
+
# You can set a *target IAM role* in the same or a different account for
|
1983
|
+
# advanced scenarios. With a target role, EKS Pod Identity automatically
|
1984
|
+
# performs two role assumptions in sequence: first assuming the role in
|
1985
|
+
# the association that is in this account, then using those credentials
|
1986
|
+
# to assume the target IAM role. This process provides your Pod with
|
1987
|
+
# temporary credentials that have the permissions defined in the target
|
1988
|
+
# role, allowing secure access to resources in another Amazon Web
|
1989
|
+
# Services account.
|
1990
|
+
#
|
1972
1991
|
# @option params [required, String] :cluster_name
|
1973
|
-
# The name of the cluster to create the association in.
|
1992
|
+
# The name of the cluster to create the EKS Pod Identity association in.
|
1974
1993
|
#
|
1975
1994
|
# @option params [required, String] :namespace
|
1976
1995
|
# The name of the Kubernetes namespace inside the cluster to create the
|
1977
|
-
# association in. The service account and the
|
1978
|
-
# account must be in this namespace.
|
1996
|
+
# EKS Pod Identity association in. The service account and the Pods that
|
1997
|
+
# use the service account must be in this namespace.
|
1979
1998
|
#
|
1980
1999
|
# @option params [required, String] :service_account
|
1981
2000
|
# The name of the Kubernetes service account inside the cluster to
|
@@ -1984,7 +2003,7 @@ module Aws::EKS
|
|
1984
2003
|
# @option params [required, String] :role_arn
|
1985
2004
|
# The Amazon Resource Name (ARN) of the IAM role to associate with the
|
1986
2005
|
# service account. The EKS Pod Identity agent manages credentials to
|
1987
|
-
# assume this role for applications in the containers in the
|
2006
|
+
# assume this role for applications in the containers in the Pods that
|
1988
2007
|
# use this service account.
|
1989
2008
|
#
|
1990
2009
|
# @option params [String] :client_request_token
|
@@ -2024,6 +2043,51 @@ module Aws::EKS
|
|
2024
2043
|
# values with this prefix. Tags with this prefix do not count against
|
2025
2044
|
# your tags per resource limit.
|
2026
2045
|
#
|
2046
|
+
# @option params [Boolean] :disable_session_tags
|
2047
|
+
# Disable the automatic sessions tags that are appended by EKS Pod
|
2048
|
+
# Identity.
|
2049
|
+
#
|
2050
|
+
# EKS Pod Identity adds a pre-defined set of session tags when it
|
2051
|
+
# assumes the role. You can use these tags to author a single role that
|
2052
|
+
# can work across resources by allowing access to Amazon Web Services
|
2053
|
+
# resources based on matching tags. By default, EKS Pod Identity
|
2054
|
+
# attaches six tags, including tags for cluster name, namespace, and
|
2055
|
+
# service account name. For the list of tags added by EKS Pod Identity,
|
2056
|
+
# see [List of session tags added by EKS Pod Identity][1] in the *Amazon
|
2057
|
+
# EKS User Guide*.
|
2058
|
+
#
|
2059
|
+
# Amazon Web Services compresses inline session policies, managed policy
|
2060
|
+
# ARNs, and session tags into a packed binary format that has a separate
|
2061
|
+
# limit. If you receive a `PackedPolicyTooLarge` error indicating the
|
2062
|
+
# packed binary format has exceeded the size limit, you can attempt to
|
2063
|
+
# reduce the size by disabling the session tags added by EKS Pod
|
2064
|
+
# Identity.
|
2065
|
+
#
|
2066
|
+
#
|
2067
|
+
#
|
2068
|
+
# [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
|
2069
|
+
#
|
2070
|
+
# @option params [String] :target_role_arn
|
2071
|
+
# The Amazon Resource Name (ARN) of the target IAM role to associate
|
2072
|
+
# with the service account. This role is assumed by using the EKS Pod
|
2073
|
+
# Identity association role, then the credentials for this role are
|
2074
|
+
# injected into the Pod.
|
2075
|
+
#
|
2076
|
+
# When you run applications on Amazon EKS, your application might need
|
2077
|
+
# to access Amazon Web Services resources from a different role that
|
2078
|
+
# exists in the same or different Amazon Web Services account. For
|
2079
|
+
# example, your application running in “Account A” might need to access
|
2080
|
+
# resources, such as Amazon S3 buckets in “Account B” or within “Account
|
2081
|
+
# A” itself. You can create a association to access Amazon Web Services
|
2082
|
+
# resources in “Account B” by creating two IAM roles: a role in “Account
|
2083
|
+
# A” and a role in “Account B” (which can be the same or different
|
2084
|
+
# account), each with the necessary trust and permission policies. After
|
2085
|
+
# you provide these roles in the *IAM role* and *Target IAM role*
|
2086
|
+
# fields, EKS will perform role chaining to ensure your application gets
|
2087
|
+
# the required permissions. This means Role A will assume Role B,
|
2088
|
+
# allowing your Pods to securely access resources like S3 buckets in the
|
2089
|
+
# target account.
|
2090
|
+
#
|
2027
2091
|
# @return [Types::CreatePodIdentityAssociationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2028
2092
|
#
|
2029
2093
|
# * {Types::CreatePodIdentityAssociationResponse#association #association} => Types::PodIdentityAssociation
|
@@ -2039,6 +2103,8 @@ module Aws::EKS
|
|
2039
2103
|
# tags: {
|
2040
2104
|
# "TagKey" => "TagValue",
|
2041
2105
|
# },
|
2106
|
+
# disable_session_tags: false,
|
2107
|
+
# target_role_arn: "String",
|
2042
2108
|
# })
|
2043
2109
|
#
|
2044
2110
|
# @example Response structure
|
@@ -2054,6 +2120,9 @@ module Aws::EKS
|
|
2054
2120
|
# resp.association.created_at #=> Time
|
2055
2121
|
# resp.association.modified_at #=> Time
|
2056
2122
|
# resp.association.owner_arn #=> String
|
2123
|
+
# resp.association.disable_session_tags #=> Boolean
|
2124
|
+
# resp.association.target_role_arn #=> String
|
2125
|
+
# resp.association.external_id #=> String
|
2057
2126
|
#
|
2058
2127
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/CreatePodIdentityAssociation AWS API Documentation
|
2059
2128
|
#
|
@@ -2504,6 +2573,9 @@ module Aws::EKS
|
|
2504
2573
|
# resp.association.created_at #=> Time
|
2505
2574
|
# resp.association.modified_at #=> Time
|
2506
2575
|
# resp.association.owner_arn #=> String
|
2576
|
+
# resp.association.disable_session_tags #=> Boolean
|
2577
|
+
# resp.association.target_role_arn #=> String
|
2578
|
+
# resp.association.external_id #=> String
|
2507
2579
|
#
|
2508
2580
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DeletePodIdentityAssociation AWS API Documentation
|
2509
2581
|
#
|
@@ -3262,7 +3334,7 @@ module Aws::EKS
|
|
3262
3334
|
#
|
3263
3335
|
# resp.insight.id #=> String
|
3264
3336
|
# resp.insight.name #=> String
|
3265
|
-
# resp.insight.category #=> String, one of "UPGRADE_READINESS"
|
3337
|
+
# resp.insight.category #=> String, one of "UPGRADE_READINESS", "MISCONFIGURATION"
|
3266
3338
|
# resp.insight.kubernetes_version #=> String
|
3267
3339
|
# resp.insight.last_refresh_time #=> Time
|
3268
3340
|
# resp.insight.last_transition_time #=> Time
|
@@ -3420,6 +3492,9 @@ module Aws::EKS
|
|
3420
3492
|
# resp.association.created_at #=> Time
|
3421
3493
|
# resp.association.modified_at #=> Time
|
3422
3494
|
# resp.association.owner_arn #=> String
|
3495
|
+
# resp.association.disable_session_tags #=> Boolean
|
3496
|
+
# resp.association.target_role_arn #=> String
|
3497
|
+
# resp.association.external_id #=> String
|
3423
3498
|
#
|
3424
3499
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DescribePodIdentityAssociation AWS API Documentation
|
3425
3500
|
#
|
@@ -4096,7 +4171,18 @@ module Aws::EKS
|
|
4096
4171
|
|
4097
4172
|
# Returns a list of all insights checked for against the specified
|
4098
4173
|
# cluster. You can filter which insights are returned by category,
|
4099
|
-
# associated Kubernetes version, and status.
|
4174
|
+
# associated Kubernetes version, and status. The default filter lists
|
4175
|
+
# all categories and every status.
|
4176
|
+
#
|
4177
|
+
# The following lists the available categories:
|
4178
|
+
#
|
4179
|
+
# * `UPGRADE_READINESS`: Amazon EKS identifies issues that could impact
|
4180
|
+
# your ability to upgrade to new versions of Kubernetes. These are
|
4181
|
+
# called upgrade insights.
|
4182
|
+
#
|
4183
|
+
# * `MISCONFIGURATION`: Amazon EKS identifies misconfiguration in your
|
4184
|
+
# EKS Hybrid Nodes setup that could impair functionality of your
|
4185
|
+
# cluster or workloads. These are called configuration insights.
|
4100
4186
|
#
|
4101
4187
|
# @option params [required, String] :cluster_name
|
4102
4188
|
# The name of the Amazon EKS cluster associated with the insights.
|
@@ -4135,7 +4221,7 @@ module Aws::EKS
|
|
4135
4221
|
# resp = client.list_insights({
|
4136
4222
|
# cluster_name: "String", # required
|
4137
4223
|
# filter: {
|
4138
|
-
# categories: ["UPGRADE_READINESS"], # accepts UPGRADE_READINESS
|
4224
|
+
# categories: ["UPGRADE_READINESS"], # accepts UPGRADE_READINESS, MISCONFIGURATION
|
4139
4225
|
# kubernetes_versions: ["String"],
|
4140
4226
|
# statuses: ["PASSING"], # accepts PASSING, WARNING, ERROR, UNKNOWN
|
4141
4227
|
# },
|
@@ -4148,7 +4234,7 @@ module Aws::EKS
|
|
4148
4234
|
# resp.insights #=> Array
|
4149
4235
|
# resp.insights[0].id #=> String
|
4150
4236
|
# resp.insights[0].name #=> String
|
4151
|
-
# resp.insights[0].category #=> String, one of "UPGRADE_READINESS"
|
4237
|
+
# resp.insights[0].category #=> String, one of "UPGRADE_READINESS", "MISCONFIGURATION"
|
4152
4238
|
# resp.insights[0].kubernetes_version #=> String
|
4153
4239
|
# resp.insights[0].last_refresh_time #=> Time
|
4154
4240
|
# resp.insights[0].last_transition_time #=> Time
|
@@ -4771,13 +4857,13 @@ module Aws::EKS
|
|
4771
4857
|
# `DescribeAddonConfiguration`.
|
4772
4858
|
#
|
4773
4859
|
# @option params [Array<Types::AddonPodIdentityAssociations>] :pod_identity_associations
|
4774
|
-
# An array of Pod Identity
|
4775
|
-
#
|
4776
|
-
#
|
4777
|
-
# existing
|
4860
|
+
# An array of EKS Pod Identity associations to be updated. Each
|
4861
|
+
# association maps a Kubernetes service account to an IAM role. If this
|
4862
|
+
# value is left blank, no change. If an empty array is provided,
|
4863
|
+
# existing associations owned by the add-on are deleted.
|
4778
4864
|
#
|
4779
4865
|
# For more information, see [Attach an IAM Role to an Amazon EKS add-on
|
4780
|
-
# using Pod Identity][1] in the *Amazon EKS User Guide*.
|
4866
|
+
# using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
|
4781
4867
|
#
|
4782
4868
|
#
|
4783
4869
|
#
|
@@ -4851,8 +4937,8 @@ module Aws::EKS
|
|
4851
4937
|
# * You can also use this API operation to enable or disable public and
|
4852
4938
|
# private access to your cluster's Kubernetes API server endpoint. By
|
4853
4939
|
# default, public access is enabled, and private access is disabled.
|
4854
|
-
# For more information, see [
|
4855
|
-
#
|
4940
|
+
# For more information, see [ Cluster API server endpoint][3] in the
|
4941
|
+
# <i> <i>Amazon EKS User Guide</i> </i>.
|
4856
4942
|
#
|
4857
4943
|
# * You can also use this API operation to choose different subnets and
|
4858
4944
|
# security groups for the cluster. You must specify at least two
|
@@ -5453,11 +5539,31 @@ module Aws::EKS
|
|
5453
5539
|
req.send_request(options)
|
5454
5540
|
end
|
5455
5541
|
|
5456
|
-
# Updates a EKS Pod Identity association.
|
5457
|
-
#
|
5458
|
-
#
|
5459
|
-
#
|
5460
|
-
#
|
5542
|
+
# Updates a EKS Pod Identity association. In an update, you can change
|
5543
|
+
# the IAM role, the target IAM role, or `disableSessionTags`. You must
|
5544
|
+
# change at least one of these in an update. An association can't be
|
5545
|
+
# moved between clusters, namespaces, or service accounts. If you need
|
5546
|
+
# to edit the namespace or service account, you need to delete the
|
5547
|
+
# association and then create a new association with your desired
|
5548
|
+
# settings.
|
5549
|
+
#
|
5550
|
+
# Similar to Amazon Web Services IAM behavior, EKS Pod Identity
|
5551
|
+
# associations are eventually consistent, and may take several seconds
|
5552
|
+
# to be effective after the initial API call returns successfully. You
|
5553
|
+
# must design your applications to account for these potential delays.
|
5554
|
+
# We recommend that you don’t include association create/updates in the
|
5555
|
+
# critical, high-availability code paths of your application. Instead,
|
5556
|
+
# make changes in a separate initialization or setup routine that you
|
5557
|
+
# run less frequently.
|
5558
|
+
#
|
5559
|
+
# You can set a *target IAM role* in the same or a different account for
|
5560
|
+
# advanced scenarios. With a target role, EKS Pod Identity automatically
|
5561
|
+
# performs two role assumptions in sequence: first assuming the role in
|
5562
|
+
# the association that is in this account, then using those credentials
|
5563
|
+
# to assume the target IAM role. This process provides your Pod with
|
5564
|
+
# temporary credentials that have the permissions defined in the target
|
5565
|
+
# role, allowing secure access to resources in another Amazon Web
|
5566
|
+
# Services account.
|
5461
5567
|
#
|
5462
5568
|
# @option params [required, String] :cluster_name
|
5463
5569
|
# The name of the cluster that you want to update the association in.
|
@@ -5466,7 +5572,7 @@ module Aws::EKS
|
|
5466
5572
|
# The ID of the association to be updated.
|
5467
5573
|
#
|
5468
5574
|
# @option params [String] :role_arn
|
5469
|
-
# The new IAM role to change the
|
5575
|
+
# The new IAM role to change in the association.
|
5470
5576
|
#
|
5471
5577
|
# @option params [String] :client_request_token
|
5472
5578
|
# A unique, case-sensitive identifier that you provide to ensure the
|
@@ -5475,6 +5581,51 @@ module Aws::EKS
|
|
5475
5581
|
# **A suitable default value is auto-generated.** You should normally
|
5476
5582
|
# not need to pass this option.**
|
5477
5583
|
#
|
5584
|
+
# @option params [Boolean] :disable_session_tags
|
5585
|
+
# Disable the automatic sessions tags that are appended by EKS Pod
|
5586
|
+
# Identity.
|
5587
|
+
#
|
5588
|
+
# EKS Pod Identity adds a pre-defined set of session tags when it
|
5589
|
+
# assumes the role. You can use these tags to author a single role that
|
5590
|
+
# can work across resources by allowing access to Amazon Web Services
|
5591
|
+
# resources based on matching tags. By default, EKS Pod Identity
|
5592
|
+
# attaches six tags, including tags for cluster name, namespace, and
|
5593
|
+
# service account name. For the list of tags added by EKS Pod Identity,
|
5594
|
+
# see [List of session tags added by EKS Pod Identity][1] in the *Amazon
|
5595
|
+
# EKS User Guide*.
|
5596
|
+
#
|
5597
|
+
# Amazon Web Services compresses inline session policies, managed policy
|
5598
|
+
# ARNs, and session tags into a packed binary format that has a separate
|
5599
|
+
# limit. If you receive a `PackedPolicyTooLarge` error indicating the
|
5600
|
+
# packed binary format has exceeded the size limit, you can attempt to
|
5601
|
+
# reduce the size by disabling the session tags added by EKS Pod
|
5602
|
+
# Identity.
|
5603
|
+
#
|
5604
|
+
#
|
5605
|
+
#
|
5606
|
+
# [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
|
5607
|
+
#
|
5608
|
+
# @option params [String] :target_role_arn
|
5609
|
+
# The Amazon Resource Name (ARN) of the target IAM role to associate
|
5610
|
+
# with the service account. This role is assumed by using the EKS Pod
|
5611
|
+
# Identity association role, then the credentials for this role are
|
5612
|
+
# injected into the Pod.
|
5613
|
+
#
|
5614
|
+
# When you run applications on Amazon EKS, your application might need
|
5615
|
+
# to access Amazon Web Services resources from a different role that
|
5616
|
+
# exists in the same or different Amazon Web Services account. For
|
5617
|
+
# example, your application running in “Account A” might need to access
|
5618
|
+
# resources, such as buckets in “Account B” or within “Account A”
|
5619
|
+
# itself. You can create a association to access Amazon Web Services
|
5620
|
+
# resources in “Account B” by creating two IAM roles: a role in “Account
|
5621
|
+
# A” and a role in “Account B” (which can be the same or different
|
5622
|
+
# account), each with the necessary trust and permission policies. After
|
5623
|
+
# you provide these roles in the *IAM role* and *Target IAM role*
|
5624
|
+
# fields, EKS will perform role chaining to ensure your application gets
|
5625
|
+
# the required permissions. This means Role A will assume Role B,
|
5626
|
+
# allowing your Pods to securely access resources like S3 buckets in the
|
5627
|
+
# target account.
|
5628
|
+
#
|
5478
5629
|
# @return [Types::UpdatePodIdentityAssociationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
5479
5630
|
#
|
5480
5631
|
# * {Types::UpdatePodIdentityAssociationResponse#association #association} => Types::PodIdentityAssociation
|
@@ -5486,6 +5637,8 @@ module Aws::EKS
|
|
5486
5637
|
# association_id: "String", # required
|
5487
5638
|
# role_arn: "String",
|
5488
5639
|
# client_request_token: "String",
|
5640
|
+
# disable_session_tags: false,
|
5641
|
+
# target_role_arn: "String",
|
5489
5642
|
# })
|
5490
5643
|
#
|
5491
5644
|
# @example Response structure
|
@@ -5501,6 +5654,9 @@ module Aws::EKS
|
|
5501
5654
|
# resp.association.created_at #=> Time
|
5502
5655
|
# resp.association.modified_at #=> Time
|
5503
5656
|
# resp.association.owner_arn #=> String
|
5657
|
+
# resp.association.disable_session_tags #=> Boolean
|
5658
|
+
# resp.association.target_role_arn #=> String
|
5659
|
+
# resp.association.external_id #=> String
|
5504
5660
|
#
|
5505
5661
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociation AWS API Documentation
|
5506
5662
|
#
|
@@ -5529,7 +5685,7 @@ module Aws::EKS
|
|
5529
5685
|
tracer: tracer
|
5530
5686
|
)
|
5531
5687
|
context[:gem_name] = 'aws-sdk-eks'
|
5532
|
-
context[:gem_version] = '1.
|
5688
|
+
context[:gem_version] = '1.139.0'
|
5533
5689
|
Seahorse::Client::Request.new(handlers, context)
|
5534
5690
|
end
|
5535
5691
|
|
@@ -697,6 +697,8 @@ module Aws::EKS
|
|
697
697
|
CreatePodIdentityAssociationRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "roleArn"))
|
698
698
|
CreatePodIdentityAssociationRequest.add_member(:client_request_token, Shapes::ShapeRef.new(shape: String, location_name: "clientRequestToken", metadata: {"idempotencyToken" => true}))
|
699
699
|
CreatePodIdentityAssociationRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagMap, location_name: "tags"))
|
700
|
+
CreatePodIdentityAssociationRequest.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
|
701
|
+
CreatePodIdentityAssociationRequest.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
|
700
702
|
CreatePodIdentityAssociationRequest.struct_class = Types::CreatePodIdentityAssociationRequest
|
701
703
|
|
702
704
|
CreatePodIdentityAssociationResponse.add_member(:association, Shapes::ShapeRef.new(shape: PodIdentityAssociation, location_name: "association"))
|
@@ -1299,6 +1301,9 @@ module Aws::EKS
|
|
1299
1301
|
PodIdentityAssociation.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, location_name: "createdAt"))
|
1300
1302
|
PodIdentityAssociation.add_member(:modified_at, Shapes::ShapeRef.new(shape: Timestamp, location_name: "modifiedAt"))
|
1301
1303
|
PodIdentityAssociation.add_member(:owner_arn, Shapes::ShapeRef.new(shape: String, location_name: "ownerArn"))
|
1304
|
+
PodIdentityAssociation.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
|
1305
|
+
PodIdentityAssociation.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
|
1306
|
+
PodIdentityAssociation.add_member(:external_id, Shapes::ShapeRef.new(shape: String, location_name: "externalId"))
|
1302
1307
|
PodIdentityAssociation.struct_class = Types::PodIdentityAssociation
|
1303
1308
|
|
1304
1309
|
PodIdentityAssociationSummaries.member = Shapes::ShapeRef.new(shape: PodIdentityAssociationSummary)
|
@@ -1524,6 +1529,8 @@ module Aws::EKS
|
|
1524
1529
|
UpdatePodIdentityAssociationRequest.add_member(:association_id, Shapes::ShapeRef.new(shape: String, required: true, location: "uri", location_name: "associationId"))
|
1525
1530
|
UpdatePodIdentityAssociationRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: String, location_name: "roleArn"))
|
1526
1531
|
UpdatePodIdentityAssociationRequest.add_member(:client_request_token, Shapes::ShapeRef.new(shape: String, location_name: "clientRequestToken", metadata: {"idempotencyToken" => true}))
|
1532
|
+
UpdatePodIdentityAssociationRequest.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
|
1533
|
+
UpdatePodIdentityAssociationRequest.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
|
1527
1534
|
UpdatePodIdentityAssociationRequest.struct_class = Types::UpdatePodIdentityAssociationRequest
|
1528
1535
|
|
1529
1536
|
UpdatePodIdentityAssociationResponse.add_member(:association, Shapes::ShapeRef.new(shape: PodIdentityAssociation, location_name: "association"))
|
data/lib/aws-sdk-eks/types.rb
CHANGED
@@ -252,12 +252,12 @@ module Aws::EKS
|
|
252
252
|
# @return [String]
|
253
253
|
#
|
254
254
|
# @!attribute [rw] pod_identity_associations
|
255
|
-
# An array of Pod Identity
|
256
|
-
#
|
257
|
-
#
|
255
|
+
# An array of EKS Pod Identity associations owned by the add-on. Each
|
256
|
+
# association maps a role to a service account in a namespace in the
|
257
|
+
# cluster.
|
258
258
|
#
|
259
259
|
# For more information, see [Attach an IAM Role to an Amazon EKS
|
260
|
-
# add-on using Pod Identity][1] in the *Amazon EKS User Guide*.
|
260
|
+
# add-on using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
|
261
261
|
#
|
262
262
|
#
|
263
263
|
#
|
@@ -388,13 +388,13 @@ module Aws::EKS
|
|
388
388
|
include Aws::Structure
|
389
389
|
end
|
390
390
|
|
391
|
-
# A type of Pod Identity
|
391
|
+
# A type of EKS Pod Identity association owned by an Amazon EKS add-on.
|
392
392
|
#
|
393
|
-
# Each
|
394
|
-
#
|
393
|
+
# Each association maps a role to a service account in a namespace in
|
394
|
+
# the cluster.
|
395
395
|
#
|
396
396
|
# For more information, see [Attach an IAM Role to an Amazon EKS add-on
|
397
|
-
# using Pod Identity][1] in the *Amazon EKS User Guide*.
|
397
|
+
# using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
|
398
398
|
#
|
399
399
|
#
|
400
400
|
#
|
@@ -417,14 +417,14 @@ module Aws::EKS
|
|
417
417
|
include Aws::Structure
|
418
418
|
end
|
419
419
|
|
420
|
-
# Information about how to configure IAM for an
|
420
|
+
# Information about how to configure IAM for an add-on.
|
421
421
|
#
|
422
422
|
# @!attribute [rw] service_account
|
423
|
-
# The Kubernetes Service Account name used by the
|
423
|
+
# The Kubernetes Service Account name used by the add-on.
|
424
424
|
# @return [String]
|
425
425
|
#
|
426
426
|
# @!attribute [rw] recommended_managed_policies
|
427
|
-
# A suggested IAM Policy for the
|
427
|
+
# A suggested IAM Policy for the add-on.
|
428
428
|
# @return [Array<String>]
|
429
429
|
#
|
430
430
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/AddonPodIdentityConfiguration AWS API Documentation
|
@@ -447,7 +447,7 @@ module Aws::EKS
|
|
447
447
|
# @return [Array<String>]
|
448
448
|
#
|
449
449
|
# @!attribute [rw] compute_types
|
450
|
-
# Indicates the compute type of the
|
450
|
+
# Indicates the compute type of the add-on version.
|
451
451
|
# @return [Array<String>]
|
452
452
|
#
|
453
453
|
# @!attribute [rw] compatibilities
|
@@ -459,7 +459,7 @@ module Aws::EKS
|
|
459
459
|
# @return [Boolean]
|
460
460
|
#
|
461
461
|
# @!attribute [rw] requires_iam_permissions
|
462
|
-
# Indicates if the
|
462
|
+
# Indicates if the add-on requires IAM Permissions to operate, such as
|
463
463
|
# networking permissions.
|
464
464
|
# @return [Boolean]
|
465
465
|
#
|
@@ -1525,12 +1525,11 @@ module Aws::EKS
|
|
1525
1525
|
# @return [String]
|
1526
1526
|
#
|
1527
1527
|
# @!attribute [rw] pod_identity_associations
|
1528
|
-
# An array of Pod Identity
|
1529
|
-
#
|
1530
|
-
# Role.
|
1528
|
+
# An array of EKS Pod Identity associations to be created. Each
|
1529
|
+
# association maps a Kubernetes service account to an IAM role.
|
1531
1530
|
#
|
1532
1531
|
# For more information, see [Attach an IAM Role to an Amazon EKS
|
1533
|
-
# add-on using Pod Identity][1] in the *Amazon EKS User Guide*.
|
1532
|
+
# add-on using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
|
1534
1533
|
#
|
1535
1534
|
#
|
1536
1535
|
#
|
@@ -1680,8 +1679,8 @@ module Aws::EKS
|
|
1680
1679
|
# If you set this value to `False` when creating a cluster, the
|
1681
1680
|
# default networking add-ons will not be installed.
|
1682
1681
|
#
|
1683
|
-
# The default networking
|
1684
|
-
# kube-proxy
|
1682
|
+
# The default networking add-ons include `vpc-cni`, `coredns`, and
|
1683
|
+
# `kube-proxy`.
|
1685
1684
|
#
|
1686
1685
|
# Use this option when you plan to install third-party alternative
|
1687
1686
|
# add-ons or self-manage the default networking add-ons.
|
@@ -2169,13 +2168,14 @@ module Aws::EKS
|
|
2169
2168
|
end
|
2170
2169
|
|
2171
2170
|
# @!attribute [rw] cluster_name
|
2172
|
-
# The name of the cluster to create the association
|
2171
|
+
# The name of the cluster to create the EKS Pod Identity association
|
2172
|
+
# in.
|
2173
2173
|
# @return [String]
|
2174
2174
|
#
|
2175
2175
|
# @!attribute [rw] namespace
|
2176
2176
|
# The name of the Kubernetes namespace inside the cluster to create
|
2177
|
-
# the association in. The service account and the
|
2178
|
-
# service account must be in this namespace.
|
2177
|
+
# the EKS Pod Identity association in. The service account and the
|
2178
|
+
# Pods that use the service account must be in this namespace.
|
2179
2179
|
# @return [String]
|
2180
2180
|
#
|
2181
2181
|
# @!attribute [rw] service_account
|
@@ -2186,7 +2186,7 @@ module Aws::EKS
|
|
2186
2186
|
# @!attribute [rw] role_arn
|
2187
2187
|
# The Amazon Resource Name (ARN) of the IAM role to associate with the
|
2188
2188
|
# service account. The EKS Pod Identity agent manages credentials to
|
2189
|
-
# assume this role for applications in the containers in the
|
2189
|
+
# assume this role for applications in the containers in the Pods that
|
2190
2190
|
# use this service account.
|
2191
2191
|
# @return [String]
|
2192
2192
|
#
|
@@ -2230,6 +2230,53 @@ module Aws::EKS
|
|
2230
2230
|
# against your tags per resource limit.
|
2231
2231
|
# @return [Hash<String,String>]
|
2232
2232
|
#
|
2233
|
+
# @!attribute [rw] disable_session_tags
|
2234
|
+
# Disable the automatic sessions tags that are appended by EKS Pod
|
2235
|
+
# Identity.
|
2236
|
+
#
|
2237
|
+
# EKS Pod Identity adds a pre-defined set of session tags when it
|
2238
|
+
# assumes the role. You can use these tags to author a single role
|
2239
|
+
# that can work across resources by allowing access to Amazon Web
|
2240
|
+
# Services resources based on matching tags. By default, EKS Pod
|
2241
|
+
# Identity attaches six tags, including tags for cluster name,
|
2242
|
+
# namespace, and service account name. For the list of tags added by
|
2243
|
+
# EKS Pod Identity, see [List of session tags added by EKS Pod
|
2244
|
+
# Identity][1] in the *Amazon EKS User Guide*.
|
2245
|
+
#
|
2246
|
+
# Amazon Web Services compresses inline session policies, managed
|
2247
|
+
# policy ARNs, and session tags into a packed binary format that has a
|
2248
|
+
# separate limit. If you receive a `PackedPolicyTooLarge` error
|
2249
|
+
# indicating the packed binary format has exceeded the size limit, you
|
2250
|
+
# can attempt to reduce the size by disabling the session tags added
|
2251
|
+
# by EKS Pod Identity.
|
2252
|
+
#
|
2253
|
+
#
|
2254
|
+
#
|
2255
|
+
# [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
|
2256
|
+
# @return [Boolean]
|
2257
|
+
#
|
2258
|
+
# @!attribute [rw] target_role_arn
|
2259
|
+
# The Amazon Resource Name (ARN) of the target IAM role to associate
|
2260
|
+
# with the service account. This role is assumed by using the EKS Pod
|
2261
|
+
# Identity association role, then the credentials for this role are
|
2262
|
+
# injected into the Pod.
|
2263
|
+
#
|
2264
|
+
# When you run applications on Amazon EKS, your application might need
|
2265
|
+
# to access Amazon Web Services resources from a different role that
|
2266
|
+
# exists in the same or different Amazon Web Services account. For
|
2267
|
+
# example, your application running in “Account A” might need to
|
2268
|
+
# access resources, such as Amazon S3 buckets in “Account B” or within
|
2269
|
+
# “Account A” itself. You can create a association to access Amazon
|
2270
|
+
# Web Services resources in “Account B” by creating two IAM roles: a
|
2271
|
+
# role in “Account A” and a role in “Account B” (which can be the same
|
2272
|
+
# or different account), each with the necessary trust and permission
|
2273
|
+
# policies. After you provide these roles in the *IAM role* and
|
2274
|
+
# *Target IAM role* fields, EKS will perform role chaining to ensure
|
2275
|
+
# your application gets the required permissions. This means Role A
|
2276
|
+
# will assume Role B, allowing your Pods to securely access resources
|
2277
|
+
# like S3 buckets in the target account.
|
2278
|
+
# @return [String]
|
2279
|
+
#
|
2233
2280
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/CreatePodIdentityAssociationRequest AWS API Documentation
|
2234
2281
|
#
|
2235
2282
|
class CreatePodIdentityAssociationRequest < Struct.new(
|
@@ -2238,7 +2285,9 @@ module Aws::EKS
|
|
2238
2285
|
:service_account,
|
2239
2286
|
:role_arn,
|
2240
2287
|
:client_request_token,
|
2241
|
-
:tags
|
2288
|
+
:tags,
|
2289
|
+
:disable_session_tags,
|
2290
|
+
:target_role_arn)
|
2242
2291
|
SENSITIVE = []
|
2243
2292
|
include Aws::Structure
|
2244
2293
|
end
|
@@ -2593,9 +2642,9 @@ module Aws::EKS
|
|
2593
2642
|
# @return [String]
|
2594
2643
|
#
|
2595
2644
|
# @!attribute [rw] pod_identity_configuration
|
2596
|
-
# The Kubernetes service account name used by the
|
2645
|
+
# The Kubernetes service account name used by the add-on, and any
|
2597
2646
|
# suggested IAM policies. Use this information to create an IAM Role
|
2598
|
-
# for the
|
2647
|
+
# for the add-on.
|
2599
2648
|
# @return [Array<Types::AddonPodIdentityConfiguration>]
|
2600
2649
|
#
|
2601
2650
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DescribeAddonConfigurationResponse AWS API Documentation
|
@@ -3699,7 +3748,16 @@ module Aws::EKS
|
|
3699
3748
|
# The criteria to use for the insights.
|
3700
3749
|
#
|
3701
3750
|
# @!attribute [rw] categories
|
3702
|
-
# The categories to use to filter insights.
|
3751
|
+
# The categories to use to filter insights. The following lists the
|
3752
|
+
# available categories:
|
3753
|
+
#
|
3754
|
+
# * `UPGRADE_READINESS`: Amazon EKS identifies issues that could
|
3755
|
+
# impact your ability to upgrade to new versions of Kubernetes.
|
3756
|
+
# These are called upgrade insights.
|
3757
|
+
#
|
3758
|
+
# * `MISCONFIGURATION`: Amazon EKS identifies misconfiguration in your
|
3759
|
+
# EKS Hybrid Nodes setup that could impair functionality of your
|
3760
|
+
# cluster or workloads. These are called configuration insights.
|
3703
3761
|
# @return [Array<String>]
|
3704
3762
|
#
|
3705
3763
|
# @!attribute [rw] kubernetes_versions
|
@@ -5663,7 +5721,7 @@ module Aws::EKS
|
|
5663
5721
|
#
|
5664
5722
|
# @!attribute [rw] namespace
|
5665
5723
|
# The name of the Kubernetes namespace inside the cluster to create
|
5666
|
-
# the association in. The service account and the
|
5724
|
+
# the association in. The service account and the Pods that use the
|
5667
5725
|
# service account must be in this namespace.
|
5668
5726
|
# @return [String]
|
5669
5727
|
#
|
@@ -5675,7 +5733,7 @@ module Aws::EKS
|
|
5675
5733
|
# @!attribute [rw] role_arn
|
5676
5734
|
# The Amazon Resource Name (ARN) of the IAM role to associate with the
|
5677
5735
|
# service account. The EKS Pod Identity agent manages credentials to
|
5678
|
-
# assume this role for applications in the containers in the
|
5736
|
+
# assume this role for applications in the containers in the Pods that
|
5679
5737
|
# use this service account.
|
5680
5738
|
# @return [String]
|
5681
5739
|
#
|
@@ -5724,12 +5782,55 @@ module Aws::EKS
|
|
5724
5782
|
# @return [Time]
|
5725
5783
|
#
|
5726
5784
|
# @!attribute [rw] modified_at
|
5727
|
-
# The most recent timestamp that the association was modified at
|
5785
|
+
# The most recent timestamp that the association was modified at.
|
5728
5786
|
# @return [Time]
|
5729
5787
|
#
|
5730
5788
|
# @!attribute [rw] owner_arn
|
5731
|
-
# If defined, the Pod Identity
|
5732
|
-
#
|
5789
|
+
# If defined, the EKS Pod Identity association is owned by an Amazon
|
5790
|
+
# EKS add-on.
|
5791
|
+
# @return [String]
|
5792
|
+
#
|
5793
|
+
# @!attribute [rw] disable_session_tags
|
5794
|
+
# The state of the automatic sessions tags. The value of *true*
|
5795
|
+
# disables these tags.
|
5796
|
+
#
|
5797
|
+
# EKS Pod Identity adds a pre-defined set of session tags when it
|
5798
|
+
# assumes the role. You can use these tags to author a single role
|
5799
|
+
# that can work across resources by allowing access to Amazon Web
|
5800
|
+
# Services resources based on matching tags. By default, EKS Pod
|
5801
|
+
# Identity attaches six tags, including tags for cluster name,
|
5802
|
+
# namespace, and service account name. For the list of tags added by
|
5803
|
+
# EKS Pod Identity, see [List of session tags added by EKS Pod
|
5804
|
+
# Identity][1] in the *Amazon EKS User Guide*.
|
5805
|
+
#
|
5806
|
+
#
|
5807
|
+
#
|
5808
|
+
# [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
|
5809
|
+
# @return [Boolean]
|
5810
|
+
#
|
5811
|
+
# @!attribute [rw] target_role_arn
|
5812
|
+
# The Amazon Resource Name (ARN) of the target IAM role to associate
|
5813
|
+
# with the service account. This role is assumed by using the EKS Pod
|
5814
|
+
# Identity association role, then the credentials for this role are
|
5815
|
+
# injected into the Pod.
|
5816
|
+
# @return [String]
|
5817
|
+
#
|
5818
|
+
# @!attribute [rw] external_id
|
5819
|
+
# The unique identifier for this EKS Pod Identity association for a
|
5820
|
+
# target IAM role. You put this value in the trust policy of the
|
5821
|
+
# target role, in a `Condition` to match the `sts.ExternalId`. This
|
5822
|
+
# ensures that the target role can only be assumed by this
|
5823
|
+
# association. This prevents the *confused deputy problem*. For more
|
5824
|
+
# information about the confused deputy problem, see [The confused
|
5825
|
+
# deputy problem][1] in the *IAM User Guide*.
|
5826
|
+
#
|
5827
|
+
# If you want to use the same target role with multiple associations
|
5828
|
+
# or other roles, use independent statements in the trust policy to
|
5829
|
+
# allow `sts:AssumeRole` access from each role.
|
5830
|
+
#
|
5831
|
+
#
|
5832
|
+
#
|
5833
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/confused-deputy.html
|
5733
5834
|
# @return [String]
|
5734
5835
|
#
|
5735
5836
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/PodIdentityAssociation AWS API Documentation
|
@@ -5744,7 +5845,10 @@ module Aws::EKS
|
|
5744
5845
|
:tags,
|
5745
5846
|
:created_at,
|
5746
5847
|
:modified_at,
|
5747
|
-
:owner_arn
|
5848
|
+
:owner_arn,
|
5849
|
+
:disable_session_tags,
|
5850
|
+
:target_role_arn,
|
5851
|
+
:external_id)
|
5748
5852
|
SENSITIVE = []
|
5749
5853
|
include Aws::Structure
|
5750
5854
|
end
|
@@ -5773,7 +5877,7 @@ module Aws::EKS
|
|
5773
5877
|
#
|
5774
5878
|
# @!attribute [rw] namespace
|
5775
5879
|
# The name of the Kubernetes namespace inside the cluster to create
|
5776
|
-
# the association in. The service account and the
|
5880
|
+
# the association in. The service account and the Pods that use the
|
5777
5881
|
# service account must be in this namespace.
|
5778
5882
|
# @return [String]
|
5779
5883
|
#
|
@@ -5791,8 +5895,7 @@ module Aws::EKS
|
|
5791
5895
|
# @return [String]
|
5792
5896
|
#
|
5793
5897
|
# @!attribute [rw] owner_arn
|
5794
|
-
# If defined, the
|
5795
|
-
# Addon.
|
5898
|
+
# If defined, the association is owned by an Amazon EKS add-on.
|
5796
5899
|
# @return [String]
|
5797
5900
|
#
|
5798
5901
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/PodIdentityAssociationSummary AWS API Documentation
|
@@ -5937,7 +6040,7 @@ module Aws::EKS
|
|
5937
6040
|
# It must satisfy the following requirements:
|
5938
6041
|
#
|
5939
6042
|
# * Each block must be within an `IPv4` RFC-1918 network range.
|
5940
|
-
# Minimum allowed size is /
|
6043
|
+
# Minimum allowed size is /32, maximum allowed size is /8.
|
5941
6044
|
# Publicly-routable addresses aren't supported.
|
5942
6045
|
#
|
5943
6046
|
# * Each block cannot overlap with the range of the VPC CIDR blocks
|
@@ -5975,7 +6078,7 @@ module Aws::EKS
|
|
5975
6078
|
# It must satisfy the following requirements:
|
5976
6079
|
#
|
5977
6080
|
# * Each block must be within an `IPv4` RFC-1918 network range.
|
5978
|
-
# Minimum allowed size is /
|
6081
|
+
# Minimum allowed size is /32, maximum allowed size is /8.
|
5979
6082
|
# Publicly-routable addresses aren't supported.
|
5980
6083
|
#
|
5981
6084
|
# * Each block cannot overlap with the range of the VPC CIDR blocks
|
@@ -6025,7 +6128,7 @@ module Aws::EKS
|
|
6025
6128
|
# It must satisfy the following requirements:
|
6026
6129
|
#
|
6027
6130
|
# * Each block must be within an `IPv4` RFC-1918 network range. Minimum
|
6028
|
-
# allowed size is /
|
6131
|
+
# allowed size is /32, maximum allowed size is /8. Publicly-routable
|
6029
6132
|
# addresses aren't supported.
|
6030
6133
|
#
|
6031
6134
|
# * Each block cannot overlap with the range of the VPC CIDR blocks for
|
@@ -6058,7 +6161,7 @@ module Aws::EKS
|
|
6058
6161
|
# It must satisfy the following requirements:
|
6059
6162
|
#
|
6060
6163
|
# * Each block must be within an `IPv4` RFC-1918 network range.
|
6061
|
-
# Minimum allowed size is /
|
6164
|
+
# Minimum allowed size is /32, maximum allowed size is /8.
|
6062
6165
|
# Publicly-routable addresses aren't supported.
|
6063
6166
|
#
|
6064
6167
|
# * Each block cannot overlap with the range of the VPC CIDR blocks
|
@@ -6103,7 +6206,7 @@ module Aws::EKS
|
|
6103
6206
|
# It must satisfy the following requirements:
|
6104
6207
|
#
|
6105
6208
|
# * Each block must be within an `IPv4` RFC-1918 network range. Minimum
|
6106
|
-
# allowed size is /
|
6209
|
+
# allowed size is /32, maximum allowed size is /8. Publicly-routable
|
6107
6210
|
# addresses aren't supported.
|
6108
6211
|
#
|
6109
6212
|
# * Each block cannot overlap with the range of the VPC CIDR blocks for
|
@@ -6124,7 +6227,7 @@ module Aws::EKS
|
|
6124
6227
|
# It must satisfy the following requirements:
|
6125
6228
|
#
|
6126
6229
|
# * Each block must be within an `IPv4` RFC-1918 network range.
|
6127
|
-
# Minimum allowed size is /
|
6230
|
+
# Minimum allowed size is /32, maximum allowed size is /8.
|
6128
6231
|
# Publicly-routable addresses aren't supported.
|
6129
6232
|
#
|
6130
6233
|
# * Each block cannot overlap with the range of the VPC CIDR blocks
|
@@ -6677,14 +6780,13 @@ module Aws::EKS
|
|
6677
6780
|
# @return [String]
|
6678
6781
|
#
|
6679
6782
|
# @!attribute [rw] pod_identity_associations
|
6680
|
-
# An array of Pod Identity
|
6681
|
-
#
|
6682
|
-
#
|
6683
|
-
#
|
6684
|
-
# deleted.
|
6783
|
+
# An array of EKS Pod Identity associations to be updated. Each
|
6784
|
+
# association maps a Kubernetes service account to an IAM role. If
|
6785
|
+
# this value is left blank, no change. If an empty array is provided,
|
6786
|
+
# existing associations owned by the add-on are deleted.
|
6685
6787
|
#
|
6686
6788
|
# For more information, see [Attach an IAM Role to an Amazon EKS
|
6687
|
-
# add-on using Pod Identity][1] in the *Amazon EKS User Guide*.
|
6789
|
+
# add-on using EKS Pod Identity][1] in the *Amazon EKS User Guide*.
|
6688
6790
|
#
|
6689
6791
|
#
|
6690
6792
|
#
|
@@ -7140,7 +7242,7 @@ module Aws::EKS
|
|
7140
7242
|
# @return [String]
|
7141
7243
|
#
|
7142
7244
|
# @!attribute [rw] role_arn
|
7143
|
-
# The new IAM role to change the
|
7245
|
+
# The new IAM role to change in the association.
|
7144
7246
|
# @return [String]
|
7145
7247
|
#
|
7146
7248
|
# @!attribute [rw] client_request_token
|
@@ -7151,20 +7253,68 @@ module Aws::EKS
|
|
7151
7253
|
# not need to pass this option.
|
7152
7254
|
# @return [String]
|
7153
7255
|
#
|
7256
|
+
# @!attribute [rw] disable_session_tags
|
7257
|
+
# Disable the automatic sessions tags that are appended by EKS Pod
|
7258
|
+
# Identity.
|
7259
|
+
#
|
7260
|
+
# EKS Pod Identity adds a pre-defined set of session tags when it
|
7261
|
+
# assumes the role. You can use these tags to author a single role
|
7262
|
+
# that can work across resources by allowing access to Amazon Web
|
7263
|
+
# Services resources based on matching tags. By default, EKS Pod
|
7264
|
+
# Identity attaches six tags, including tags for cluster name,
|
7265
|
+
# namespace, and service account name. For the list of tags added by
|
7266
|
+
# EKS Pod Identity, see [List of session tags added by EKS Pod
|
7267
|
+
# Identity][1] in the *Amazon EKS User Guide*.
|
7268
|
+
#
|
7269
|
+
# Amazon Web Services compresses inline session policies, managed
|
7270
|
+
# policy ARNs, and session tags into a packed binary format that has a
|
7271
|
+
# separate limit. If you receive a `PackedPolicyTooLarge` error
|
7272
|
+
# indicating the packed binary format has exceeded the size limit, you
|
7273
|
+
# can attempt to reduce the size by disabling the session tags added
|
7274
|
+
# by EKS Pod Identity.
|
7275
|
+
#
|
7276
|
+
#
|
7277
|
+
#
|
7278
|
+
# [1]: https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags
|
7279
|
+
# @return [Boolean]
|
7280
|
+
#
|
7281
|
+
# @!attribute [rw] target_role_arn
|
7282
|
+
# The Amazon Resource Name (ARN) of the target IAM role to associate
|
7283
|
+
# with the service account. This role is assumed by using the EKS Pod
|
7284
|
+
# Identity association role, then the credentials for this role are
|
7285
|
+
# injected into the Pod.
|
7286
|
+
#
|
7287
|
+
# When you run applications on Amazon EKS, your application might need
|
7288
|
+
# to access Amazon Web Services resources from a different role that
|
7289
|
+
# exists in the same or different Amazon Web Services account. For
|
7290
|
+
# example, your application running in “Account A” might need to
|
7291
|
+
# access resources, such as buckets in “Account B” or within “Account
|
7292
|
+
# A” itself. You can create a association to access Amazon Web
|
7293
|
+
# Services resources in “Account B” by creating two IAM roles: a role
|
7294
|
+
# in “Account A” and a role in “Account B” (which can be the same or
|
7295
|
+
# different account), each with the necessary trust and permission
|
7296
|
+
# policies. After you provide these roles in the *IAM role* and
|
7297
|
+
# *Target IAM role* fields, EKS will perform role chaining to ensure
|
7298
|
+
# your application gets the required permissions. This means Role A
|
7299
|
+
# will assume Role B, allowing your Pods to securely access resources
|
7300
|
+
# like S3 buckets in the target account.
|
7301
|
+
# @return [String]
|
7302
|
+
#
|
7154
7303
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociationRequest AWS API Documentation
|
7155
7304
|
#
|
7156
7305
|
class UpdatePodIdentityAssociationRequest < Struct.new(
|
7157
7306
|
:cluster_name,
|
7158
7307
|
:association_id,
|
7159
7308
|
:role_arn,
|
7160
|
-
:client_request_token
|
7309
|
+
:client_request_token,
|
7310
|
+
:disable_session_tags,
|
7311
|
+
:target_role_arn)
|
7161
7312
|
SENSITIVE = []
|
7162
7313
|
include Aws::Structure
|
7163
7314
|
end
|
7164
7315
|
|
7165
7316
|
# @!attribute [rw] association
|
7166
|
-
# The full description of the
|
7167
|
-
# updated.
|
7317
|
+
# The full description of the association that was updated.
|
7168
7318
|
# @return [Types::PodIdentityAssociation]
|
7169
7319
|
#
|
7170
7320
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociationResponse AWS API Documentation
|
@@ -7294,8 +7444,10 @@ module Aws::EKS
|
|
7294
7444
|
# access, your cluster's Kubernetes API server can only receive
|
7295
7445
|
# requests from within the cluster VPC. The default value for this
|
7296
7446
|
# parameter is `true`, which enables public access for your Kubernetes
|
7297
|
-
# API server.
|
7298
|
-
#
|
7447
|
+
# API server. The endpoint domain name and IP address family depends
|
7448
|
+
# on the value of the `ipFamily` for the cluster. For more
|
7449
|
+
# information, see [Cluster API server endpoint][1] in the <i>
|
7450
|
+
# <i>Amazon EKS User Guide</i> </i>.
|
7299
7451
|
#
|
7300
7452
|
#
|
7301
7453
|
#
|
@@ -7311,8 +7463,8 @@ module Aws::EKS
|
|
7311
7463
|
# server. If you disable private access and you have nodes or Fargate
|
7312
7464
|
# pods in the cluster, then ensure that `publicAccessCidrs` includes
|
7313
7465
|
# the necessary CIDR blocks for communication with the nodes or
|
7314
|
-
# Fargate pods. For more information, see [
|
7315
|
-
#
|
7466
|
+
# Fargate pods. For more information, see [Cluster API server
|
7467
|
+
# endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
|
7316
7468
|
#
|
7317
7469
|
#
|
7318
7470
|
#
|
@@ -7323,11 +7475,16 @@ module Aws::EKS
|
|
7323
7475
|
# The CIDR blocks that are allowed access to your cluster's public
|
7324
7476
|
# Kubernetes API server endpoint. Communication to the endpoint from
|
7325
7477
|
# addresses outside of the CIDR blocks that you specify is denied. The
|
7326
|
-
# default value is `0.0.0.0/0
|
7327
|
-
#
|
7328
|
-
#
|
7329
|
-
#
|
7330
|
-
# <i>Amazon EKS User Guide</i> </i>.
|
7478
|
+
# default value is `0.0.0.0/0` and additionally `::/0` for dual-stack
|
7479
|
+
# `IPv6` clusters. If you've disabled private endpoint access, make
|
7480
|
+
# sure that you specify the necessary CIDR blocks for every node and
|
7481
|
+
# Fargate `Pod` in the cluster. For more information, see [Cluster API
|
7482
|
+
# server endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
|
7483
|
+
#
|
7484
|
+
# Note that the public endpoints are dual-stack for only `IPv6`
|
7485
|
+
# clusters that are made after October 2024. You can't add `IPv6`
|
7486
|
+
# CIDR blocks to `IPv4` clusters or `IPv6` clusters that were made
|
7487
|
+
# before October 2024.
|
7331
7488
|
#
|
7332
7489
|
#
|
7333
7490
|
#
|
@@ -7381,9 +7538,8 @@ module Aws::EKS
|
|
7381
7538
|
# the internet. If this value is disabled and you have nodes or
|
7382
7539
|
# Fargate pods in the cluster, then ensure that `publicAccessCidrs`
|
7383
7540
|
# includes the necessary CIDR blocks for communication with the nodes
|
7384
|
-
# or Fargate pods. For more information, see [
|
7385
|
-
# endpoint
|
7386
|
-
# </i>.
|
7541
|
+
# or Fargate pods. For more information, see [Cluster API server
|
7542
|
+
# endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
|
7387
7543
|
#
|
7388
7544
|
#
|
7389
7545
|
#
|
@@ -7392,7 +7548,22 @@ module Aws::EKS
|
|
7392
7548
|
#
|
7393
7549
|
# @!attribute [rw] public_access_cidrs
|
7394
7550
|
# The CIDR blocks that are allowed access to your cluster's public
|
7395
|
-
# Kubernetes API server endpoint.
|
7551
|
+
# Kubernetes API server endpoint. Communication to the endpoint from
|
7552
|
+
# addresses outside of the CIDR blocks that you specify is denied. The
|
7553
|
+
# default value is `0.0.0.0/0` and additionally `::/0` for dual-stack
|
7554
|
+
# `IPv6` clusters. If you've disabled private endpoint access, make
|
7555
|
+
# sure that you specify the necessary CIDR blocks for every node and
|
7556
|
+
# Fargate `Pod` in the cluster. For more information, see [Cluster API
|
7557
|
+
# server endpoint][1] in the <i> <i>Amazon EKS User Guide</i> </i>.
|
7558
|
+
#
|
7559
|
+
# Note that the public endpoints are dual-stack for only `IPv6`
|
7560
|
+
# clusters that are made after October 2024. You can't add `IPv6`
|
7561
|
+
# CIDR blocks to `IPv4` clusters or `IPv6` clusters that were made
|
7562
|
+
# before October 2024.
|
7563
|
+
#
|
7564
|
+
#
|
7565
|
+
#
|
7566
|
+
# [1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html
|
7396
7567
|
# @return [Array<String>]
|
7397
7568
|
#
|
7398
7569
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/VpcConfigResponse AWS API Documentation
|
data/lib/aws-sdk-eks.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -362,7 +362,9 @@ module Aws
|
|
362
362
|
service_account: ::String,
|
363
363
|
role_arn: ::String,
|
364
364
|
?client_request_token: ::String,
|
365
|
-
?tags: Hash[::String, ::String]
|
365
|
+
?tags: Hash[::String, ::String],
|
366
|
+
?disable_session_tags: bool,
|
367
|
+
?target_role_arn: ::String
|
366
368
|
) -> _CreatePodIdentityAssociationResponseSuccess
|
367
369
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreatePodIdentityAssociationResponseSuccess
|
368
370
|
|
@@ -755,7 +757,7 @@ module Aws
|
|
755
757
|
def list_insights: (
|
756
758
|
cluster_name: ::String,
|
757
759
|
?filter: {
|
758
|
-
categories: Array[("UPGRADE_READINESS")]?,
|
760
|
+
categories: Array[("UPGRADE_READINESS" | "MISCONFIGURATION")]?,
|
759
761
|
kubernetes_versions: Array[::String]?,
|
760
762
|
statuses: Array[("PASSING" | "WARNING" | "ERROR" | "UNKNOWN")]?
|
761
763
|
},
|
@@ -1052,7 +1054,9 @@ module Aws
|
|
1052
1054
|
cluster_name: ::String,
|
1053
1055
|
association_id: ::String,
|
1054
1056
|
?role_arn: ::String,
|
1055
|
-
?client_request_token: ::String
|
1057
|
+
?client_request_token: ::String,
|
1058
|
+
?disable_session_tags: bool,
|
1059
|
+
?target_role_arn: ::String
|
1056
1060
|
) -> _UpdatePodIdentityAssociationResponseSuccess
|
1057
1061
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdatePodIdentityAssociationResponseSuccess
|
1058
1062
|
|
data/sig/types.rbs
CHANGED
@@ -433,6 +433,8 @@ module Aws::EKS
|
|
433
433
|
attr_accessor role_arn: ::String
|
434
434
|
attr_accessor client_request_token: ::String
|
435
435
|
attr_accessor tags: ::Hash[::String, ::String]
|
436
|
+
attr_accessor disable_session_tags: bool
|
437
|
+
attr_accessor target_role_arn: ::String
|
436
438
|
SENSITIVE: []
|
437
439
|
end
|
438
440
|
|
@@ -807,7 +809,7 @@ module Aws::EKS
|
|
807
809
|
class Insight
|
808
810
|
attr_accessor id: ::String
|
809
811
|
attr_accessor name: ::String
|
810
|
-
attr_accessor category: ("UPGRADE_READINESS")
|
812
|
+
attr_accessor category: ("UPGRADE_READINESS" | "MISCONFIGURATION")
|
811
813
|
attr_accessor kubernetes_version: ::String
|
812
814
|
attr_accessor last_refresh_time: ::Time
|
813
815
|
attr_accessor last_transition_time: ::Time
|
@@ -842,7 +844,7 @@ module Aws::EKS
|
|
842
844
|
class InsightSummary
|
843
845
|
attr_accessor id: ::String
|
844
846
|
attr_accessor name: ::String
|
845
|
-
attr_accessor category: ("UPGRADE_READINESS")
|
847
|
+
attr_accessor category: ("UPGRADE_READINESS" | "MISCONFIGURATION")
|
846
848
|
attr_accessor kubernetes_version: ::String
|
847
849
|
attr_accessor last_refresh_time: ::Time
|
848
850
|
attr_accessor last_transition_time: ::Time
|
@@ -852,7 +854,7 @@ module Aws::EKS
|
|
852
854
|
end
|
853
855
|
|
854
856
|
class InsightsFilter
|
855
|
-
attr_accessor categories: ::Array[("UPGRADE_READINESS")]
|
857
|
+
attr_accessor categories: ::Array[("UPGRADE_READINESS" | "MISCONFIGURATION")]
|
856
858
|
attr_accessor kubernetes_versions: ::Array[::String]
|
857
859
|
attr_accessor statuses: ::Array[("PASSING" | "WARNING" | "ERROR" | "UNKNOWN")]
|
858
860
|
SENSITIVE: []
|
@@ -1230,6 +1232,9 @@ module Aws::EKS
|
|
1230
1232
|
attr_accessor created_at: ::Time
|
1231
1233
|
attr_accessor modified_at: ::Time
|
1232
1234
|
attr_accessor owner_arn: ::String
|
1235
|
+
attr_accessor disable_session_tags: bool
|
1236
|
+
attr_accessor target_role_arn: ::String
|
1237
|
+
attr_accessor external_id: ::String
|
1233
1238
|
SENSITIVE: []
|
1234
1239
|
end
|
1235
1240
|
|
@@ -1524,6 +1529,8 @@ module Aws::EKS
|
|
1524
1529
|
attr_accessor association_id: ::String
|
1525
1530
|
attr_accessor role_arn: ::String
|
1526
1531
|
attr_accessor client_request_token: ::String
|
1532
|
+
attr_accessor disable_session_tags: bool
|
1533
|
+
attr_accessor target_role_arn: ::String
|
1527
1534
|
SENSITIVE: []
|
1528
1535
|
end
|
1529
1536
|
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-eks
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.139.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
@@ -18,7 +18,7 @@ dependencies:
|
|
18
18
|
version: '3'
|
19
19
|
- - ">="
|
20
20
|
- !ruby/object:Gem::Version
|
21
|
-
version: 3.
|
21
|
+
version: 3.225.0
|
22
22
|
type: :runtime
|
23
23
|
prerelease: false
|
24
24
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -28,7 +28,7 @@ dependencies:
|
|
28
28
|
version: '3'
|
29
29
|
- - ">="
|
30
30
|
- !ruby/object:Gem::Version
|
31
|
-
version: 3.
|
31
|
+
version: 3.225.0
|
32
32
|
- !ruby/object:Gem::Dependency
|
33
33
|
name: aws-sigv4
|
34
34
|
requirement: !ruby/object:Gem::Requirement
|
@@ -84,7 +84,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
84
84
|
requirements:
|
85
85
|
- - ">="
|
86
86
|
- !ruby/object:Gem::Version
|
87
|
-
version: '2.
|
87
|
+
version: '2.7'
|
88
88
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
89
89
|
requirements:
|
90
90
|
- - ">="
|