Interface KubeServiceAccountProps

  • All Superinterfaces:
    software.amazon.jsii.JsiiSerializable
    All Known Implementing Classes:
    KubeServiceAccountProps.Jsii$Proxy

    @Generated(value="jsii-pacmak/1.72.0 (build 4b8828b)",
               date="2023-01-01T02:39:48.365Z")
    @Stability(Stable)
    public interface KubeServiceAccountProps
    extends software.amazon.jsii.JsiiSerializable
    ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets.
    • Method Detail

      • getAutomountServiceAccountToken

        @Stability(Stable)
        @Nullable
        default Boolean getAutomountServiceAccountToken()
        AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted.

        Can be overridden at the pod level.

      • getImagePullSecrets

        @Stability(Stable)
        @Nullable
        default List<LocalObjectReference> getImagePullSecrets()
        ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images in pods that reference this ServiceAccount.

        ImagePullSecrets are distinct from Secrets because Secrets can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet. More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod

      • getMetadata

        @Stability(Stable)
        @Nullable
        default ObjectMeta getMetadata()
        Standard object's metadata.

        More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata

      • getSecrets

        @Stability(Stable)
        @Nullable
        default List<ObjectReference> getSecrets()
        Secrets is a list of the secrets in the same namespace that pods running using this ServiceAccount are allowed to use.

        Pods are only limited to this list if this service account has a "kubernetes.io/enforce-mountable-secrets" annotation set to "true". This field should not be used to find auto-generated service account token secrets for use outside of pods. Instead, tokens can be requested directly using the TokenRequest API, or service account token secrets can be manually created. More info: https://kubernetes.io/docs/concepts/configuration/secret