Skip to content
This repository was archived by the owner on May 5, 2025. It is now read-only.

Commit b91013d

Browse files
author
odacremolbap
committed
update manifests
1 parent 5ca17bd commit b91013d

17 files changed

+560
-194
lines changed

config/300-awscloudwatchlogssource.yaml

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,28 @@ spec:
117117
oneOf:
118118
- required: [value]
119119
- required: [valueFromSecret]
120+
sessionToken:
121+
description: The AWS session token for temporary credentials.
122+
type: object
123+
properties:
124+
value:
125+
description: Literal value of the session token.
126+
type: string
127+
format: password
128+
valueFromSecret:
129+
description: A reference to a Kubernetes Secret object containing the session token.
130+
type: object
131+
properties:
132+
name:
133+
type: string
134+
key:
135+
type: string
136+
required:
137+
- name
138+
- key
139+
oneOf:
140+
- required: [value]
141+
- required: [valueFromSecret]
120142
assumeIamRole:
121143
description: |-
122144
The ARN of an IAM role for cross-account or remote EKS cluster authorization.
@@ -127,14 +149,36 @@ spec:
127149
- accessKeyID
128150
- secretAccessKey
129151
iamRole:
130-
description: (Amazon EKS only) The ARN of an IAM role which can be impersonated to obtain AWS permissions.
131-
For more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
132-
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
152+
description: Deprecated, please use "iam" object instead.
133153
type: string
134154
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
155+
iam:
156+
description: The IAM role authentication parameters. For Amazon EKS only.
157+
158+
type: object
159+
properties:
160+
roleArn:
161+
description: |-
162+
The ARN of an IAM role which can be impersonated to obtain AWS permissions. For
163+
more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
164+
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
165+
166+
Beware that this IAM role only applies to the receive adapter, for retrieving S3 notifications
167+
from the intermediate Amazon SQS queue. The TriggerMesh controller requires its own set of IAM
168+
permissions for interacting with the Amazon S3 and (optionally) Amazon SQS management APIs. These
169+
can be granted via a separate IAM role, through the 'triggermesh-controller' serviceAccount that
170+
is located inside the 'triggermesh' namespace.
171+
type: string
172+
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
173+
serviceAccount:
174+
description: |-
175+
The name of the service account to be assigned on the receive adapter. Can be created externally and
176+
shared between multiple components.
177+
type: string
135178
oneOf:
136179
- required: [credentials]
137180
- required: [iamRole]
181+
- required: [iam]
138182
sink:
139183
description: The destination of events generated from Amazon CloudWatch Logs.
140184
type: object

config/300-awscloudwatchsource.yaml

Lines changed: 46 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,28 @@ spec:
176176
oneOf:
177177
- required: [value]
178178
- required: [valueFromSecret]
179+
sessionToken:
180+
description: The AWS session token for temporary credentials.
181+
type: object
182+
properties:
183+
value:
184+
description: Literal value of the session token.
185+
type: string
186+
format: password
187+
valueFromSecret:
188+
description: A reference to a Kubernetes Secret object containing the session token.
189+
type: object
190+
properties:
191+
name:
192+
type: string
193+
key:
194+
type: string
195+
required:
196+
- name
197+
- key
198+
oneOf:
199+
- required: [value]
200+
- required: [valueFromSecret]
179201
assumeIamRole:
180202
description: |-
181203
The ARN of an IAM role for cross-account or remote EKS cluster authorization.
@@ -186,14 +208,35 @@ spec:
186208
- accessKeyID
187209
- secretAccessKey
188210
iamRole:
189-
description: (Amazon EKS only) The ARN of an IAM role which can be impersonated to obtain AWS permissions.
190-
For more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
191-
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
211+
description: Deprecated, please use "iam" object instead.
192212
type: string
193213
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
214+
iam:
215+
description: The IAM role authentication parameters. For Amazon EKS only.
216+
type: object
217+
properties:
218+
roleArn:
219+
description: |-
220+
The ARN of an IAM role which can be impersonated to obtain AWS permissions. For
221+
more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
222+
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
223+
224+
Beware that this IAM role only applies to the receive adapter, for retrieving S3 notifications
225+
from the intermediate Amazon SQS queue. The TriggerMesh controller requires its own set of IAM
226+
permissions for interacting with the Amazon S3 and (optionally) Amazon SQS management APIs. These
227+
can be granted via a separate IAM role, through the 'triggermesh-controller' serviceAccount that
228+
is located inside the 'triggermesh' namespace.
229+
type: string
230+
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
231+
serviceAccount:
232+
description: |-
233+
The name of the service account to be assigned on the receive adapter. Can be created externally and
234+
shared between multiple components.
235+
type: string
194236
oneOf:
195237
- required: [credentials]
196238
- required: [iamRole]
239+
- required: [iam]
197240
sink:
198241
description: The destination of events generated from Amazon CloudWatch metrics.
199242
type: object

config/300-awscodecommitsource.yaml

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,28 @@ spec:
127127
oneOf:
128128
- required: [value]
129129
- required: [valueFromSecret]
130+
sessionToken:
131+
description: The AWS session token for temporary credentials.
132+
type: object
133+
properties:
134+
value:
135+
description: Literal value of the session token.
136+
type: string
137+
format: password
138+
valueFromSecret:
139+
description: A reference to a Kubernetes Secret object containing the session token.
140+
type: object
141+
properties:
142+
name:
143+
type: string
144+
key:
145+
type: string
146+
required:
147+
- name
148+
- key
149+
oneOf:
150+
- required: [value]
151+
- required: [valueFromSecret]
130152
assumeIamRole:
131153
description: |-
132154
The ARN of an IAM role for cross-account or remote EKS cluster authorization.
@@ -137,14 +159,36 @@ spec:
137159
- accessKeyID
138160
- secretAccessKey
139161
iamRole:
140-
description: (Amazon EKS only) The ARN of an IAM role which can be impersonated to obtain AWS permissions.
141-
For more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
142-
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
162+
description: Deprecated, please use "iam" object instead.
143163
type: string
144164
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
165+
iam:
166+
description: The IAM role authentication parameters. For Amazon EKS only.
167+
168+
type: object
169+
properties:
170+
roleArn:
171+
description: |-
172+
The ARN of an IAM role which can be impersonated to obtain AWS permissions. For
173+
more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
174+
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
175+
176+
Beware that this IAM role only applies to the receive adapter, for retrieving S3 notifications
177+
from the intermediate Amazon SQS queue. The TriggerMesh controller requires its own set of IAM
178+
permissions for interacting with the Amazon S3 and (optionally) Amazon SQS management APIs. These
179+
can be granted via a separate IAM role, through the 'triggermesh-controller' serviceAccount that
180+
is located inside the 'triggermesh' namespace.
181+
type: string
182+
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
183+
serviceAccount:
184+
description: |-
185+
The name of the service account to be assigned on the receive adapter. Can be created externally and
186+
shared between multiple components.
187+
type: string
145188
oneOf:
146189
- required: [credentials]
147190
- required: [iamRole]
191+
- required: [iam]
148192
sink:
149193
description: The destination of events sourced from Amazon CodeCommit.
150194
type: object

config/300-awscognitoidentitysource.yaml

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,28 @@ spec:
114114
oneOf:
115115
- required: [value]
116116
- required: [valueFromSecret]
117+
sessionToken:
118+
description: The AWS session token for temporary credentials.
119+
type: object
120+
properties:
121+
value:
122+
description: Literal value of the session token.
123+
type: string
124+
format: password
125+
valueFromSecret:
126+
description: A reference to a Kubernetes Secret object containing the session token.
127+
type: object
128+
properties:
129+
name:
130+
type: string
131+
key:
132+
type: string
133+
required:
134+
- name
135+
- key
136+
oneOf:
137+
- required: [value]
138+
- required: [valueFromSecret]
117139
assumeIamRole:
118140
description: |-
119141
The ARN of an IAM role for cross-account or remote EKS cluster authorization.
@@ -124,14 +146,36 @@ spec:
124146
- accessKeyID
125147
- secretAccessKey
126148
iamRole:
127-
description: (Amazon EKS only) The ARN of an IAM role which can be impersonated to obtain AWS permissions.
128-
For more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
129-
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
149+
description: Deprecated, please use "iam" object instead.
130150
type: string
131151
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
152+
iam:
153+
description: The IAM role authentication parameters. For Amazon EKS only.
154+
155+
type: object
156+
properties:
157+
roleArn:
158+
description: |-
159+
The ARN of an IAM role which can be impersonated to obtain AWS permissions. For
160+
more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
161+
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
162+
163+
Beware that this IAM role only applies to the receive adapter, for retrieving S3 notifications
164+
from the intermediate Amazon SQS queue. The TriggerMesh controller requires its own set of IAM
165+
permissions for interacting with the Amazon S3 and (optionally) Amazon SQS management APIs. These
166+
can be granted via a separate IAM role, through the 'triggermesh-controller' serviceAccount that
167+
is located inside the 'triggermesh' namespace.
168+
type: string
169+
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
170+
serviceAccount:
171+
description: |-
172+
The name of the service account to be assigned on the receive adapter. Can be created externally and
173+
shared between multiple components.
174+
type: string
132175
oneOf:
133176
- required: [credentials]
134177
- required: [iamRole]
178+
- required: [iam]
135179
sink:
136180
description: The destination of events sourced from the Amazon Cognito Identity Pool.
137181
type: object

config/300-awscognitouserpoolsource.yaml

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,28 @@ spec:
114114
oneOf:
115115
- required: [value]
116116
- required: [valueFromSecret]
117+
sessionToken:
118+
description: The AWS session token for temporary credentials.
119+
type: object
120+
properties:
121+
value:
122+
description: Literal value of the session token.
123+
type: string
124+
format: password
125+
valueFromSecret:
126+
description: A reference to a Kubernetes Secret object containing the session token.
127+
type: object
128+
properties:
129+
name:
130+
type: string
131+
key:
132+
type: string
133+
required:
134+
- name
135+
- key
136+
oneOf:
137+
- required: [value]
138+
- required: [valueFromSecret]
117139
assumeIamRole:
118140
description: |-
119141
The ARN of an IAM role for cross-account or remote EKS cluster authorization.
@@ -124,14 +146,36 @@ spec:
124146
- accessKeyID
125147
- secretAccessKey
126148
iamRole:
127-
description: (Amazon EKS only) The ARN of an IAM role which can be impersonated to obtain AWS permissions.
128-
For more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
129-
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
149+
description: Deprecated, please use "iam" object instead.
130150
type: string
131151
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
152+
iam:
153+
description: The IAM role authentication parameters. For Amazon EKS only.
154+
155+
type: object
156+
properties:
157+
roleArn:
158+
description: |-
159+
The ARN of an IAM role which can be impersonated to obtain AWS permissions. For
160+
more information about IAM roles for service accounts, please refer to the Amazon EKS User Guide
161+
at https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
162+
163+
Beware that this IAM role only applies to the receive adapter, for retrieving S3 notifications
164+
from the intermediate Amazon SQS queue. The TriggerMesh controller requires its own set of IAM
165+
permissions for interacting with the Amazon S3 and (optionally) Amazon SQS management APIs. These
166+
can be granted via a separate IAM role, through the 'triggermesh-controller' serviceAccount that
167+
is located inside the 'triggermesh' namespace.
168+
type: string
169+
pattern: ^arn:aws(-cn|-us-gov)?:iam::\d{12}:role\/.+$
170+
serviceAccount:
171+
description: |-
172+
The name of the service account to be assigned on the receive adapter. Can be created externally and
173+
shared between multiple components.
174+
type: string
132175
oneOf:
133176
- required: [credentials]
134177
- required: [iamRole]
178+
- required: [iam]
135179
sink:
136180
description: The destination of events sourced from the Amazon Cognito User Pool.
137181
type: object

0 commit comments

Comments
 (0)