-
Notifications
You must be signed in to change notification settings - Fork 424
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #317 from otterley/update-configmap-doc
Update examples/README
- Loading branch information
Showing
2 changed files
with
29 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -86,7 +86,10 @@ data: | |
# each mapRoles entry maps an IAM role to a username and set of groups | ||
# Each username and group can optionally contain template parameters: | ||
# 1) "{{AccountID}}" is the 12 digit AWS ID. | ||
# 2) "{{SessionName}}" is the role session name. | ||
# 2) "{{SessionName}}" is the role session name, with `@` characters | ||
# transliterated to `-` characters. | ||
# 3) "{{SessionNameRaw}}" is the role session name, without character | ||
# transliteration (available in version >= 0.5). | ||
mapRoles: | ||
# statically map arn:aws:iam::000000000000:role/KubernetesAdmin to a cluster admin | ||
- roleARN: arn:aws:iam::000000000000:role/KubernetesAdmin | ||
|
@@ -112,6 +115,16 @@ data: | |
username: admin:{{SessionName}} | ||
groups: | ||
- system:masters | ||
# map federated users in my "KubernetesOtherAdmin" role to users like | ||
# "alice-example.com". The SessionName is an arbitrary role name | ||
# like an e-mail address passed by the identity provider. Note that if this | ||
# role is assumed directly by an IAM User (not via federation), the user | ||
# can control the SessionName. Note that the "{{SessionName}}" macro is | ||
# quoted to ensure it is properly parsed as a string. | ||
- roleARN: arn:aws:iam::000000000000:role/KubernetesOtherAdmin | ||
username: "{{SessionName}}" | ||
groups: | ||
- system:masters | ||
# map federated users in my "KubernetesUsers" role to users like | ||
# "[email protected]". SessionNameRaw is sourced from the same place as | ||
# SessionName with the distinction that no transformation is performed | ||
|
@@ -210,4 +223,3 @@ spec: | |
- name: state | ||
hostPath: | ||
path: /var/aws-iam-authenticator/ | ||
|