From f6726a5e1318714d24c4667369f8757688114ff6 Mon Sep 17 00:00:00 2001 From: Nicholas Turner <1205393+nckturner@users.noreply.github.com> Date: Tue, 9 Jul 2019 21:56:35 -0700 Subject: [PATCH] Remove deprecated language from README mapUsers and mapRoles is not deprecated and this language is confusing to users. --- README.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/README.md b/README.md index 631bb9881..a68a98669 100644 --- a/README.md +++ b/README.md @@ -84,7 +84,7 @@ systemctl restart kubelet.service ### Configure IAMIdentityMapping Custom Resource Definitions -In the `master` version of the AWS IAM Authenticator you can configure your users using one of two methods. The deprecated `mapUsers` and `mapRoles` as seen in the [Full Configuration Format](#full-configuration-format) or using [Kubernetes Custom Resource Definitions](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/). This method allows the authenticator server to always stay upto date with the latest allowed user. See [Issues #79](https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/79) for more details. +In the `master` version of the AWS IAM Authenticator you can configure your users using one of two methods. The `mapUsers` and `mapRoles` as seen in the [Full Configuration Format](#full-configuration-format) or using the new (alpha) [Kubernetes Custom Resource Definitions](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/). This method allows the authenticator server to always stay upto date with the latest allowed user. See [Issues #79](https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/79) for more details. To setup an `IAMIdentityMapping` CRD you'll first need to `apply` the CRD manifest: @@ -347,8 +347,6 @@ server: # role to assume before querying EC2 API in order to discover metadata like EC2 private DNS Name ec2DescribeInstancesRoleARN: arn:aws:iam::000000000000:role/DescribeInstancesRole - # DEPRECATED: Going forward these roles will be defined using Custom - # Resource definitions. See above Custom Resource Definitions for more info. # each mapRoles entry maps an IAM role to a username and set of groups # Each username and group can optionally contain template parameters: # 1) "{{AccountID}}" is the 12 digit AWS ID. @@ -392,8 +390,6 @@ server: groups: - system:masters - # DEPRECATED: Going forward these roles will be defined using Custom - # Resource definitions. See above Custom Resource Definitions for more info. # each mapUsers entry maps an IAM role to a static username and set of groups mapUsers: # map user IAM user Alice in 000000000000 to user "alice" in group "system:masters"