You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.assume_role_with_oidc](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
83
83
|[aws_iam_policy_document.cluster_autoscaler](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
84
84
|[aws_iam_policy_document.ebs_csi](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
85
85
|[aws_iam_policy_document.external_dns](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
86
+
|[aws_iam_policy_document.vpc_cni](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
86
87
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
87
88
88
89
## Inputs
89
90
90
91
| Name | Description | Type | Default | Required |
| <aname="input_attach_cluster_autoscaler_policy"></a> [attach\_cluster\_autoscaler\_policy](#input\_attach\_cluster\_autoscaler\_policy)|Whether to attach the Cluster Autoscaler IAM policy to the role |`bool`|`false`| no |
93
-
| <aname="input_attach_ebs_csi_policy"></a> [attach\_ebs\_csi\_policy](#input\_attach\_ebs\_csi\_policy)|Whether to attach the EBS CSI IAM policy to the role |`bool`|`false`| no |
94
-
| <aname="input_attach_external_dns_policy"></a> [attach\_external\_dns\_policy](#input\_attach\_external\_dns\_policy)|Whether to attach the External DNS IAM policy to the role |`bool`|`false`| no |
95
-
| <aname="input_cluster_service_accounts"></a> [cluster\_service\_accounts](#input\_cluster\_service\_accounts)|EKS cluster and k8s ServiceAccount pairs. Each EKS cluster can have multiple k8s ServiceAccount. See README for details |`map(list(string))`|`{}`| no |
93
+
| <aname="input_attach_cluster_autoscaler_policy"></a> [attach\_cluster\_autoscaler\_policy](#input\_attach\_cluster\_autoscaler\_policy)|Determines whether to attach the Cluster Autoscaler IAM policy to the role |`bool`|`false`| no |
94
+
| <aname="input_attach_ebs_csi_policy"></a> [attach\_ebs\_csi\_policy](#input\_attach\_ebs\_csi\_policy)|Determines whether to attach the EBS CSI IAM policy to the role |`bool`|`false`| no |
95
+
| <aname="input_attach_external_dns_policy"></a> [attach\_external\_dns\_policy](#input\_attach\_external\_dns\_policy)|Determines whether to attach the External DNS IAM policy to the role |`bool`|`false`| no |
96
+
| <aname="input_attach_vpc_cni_policy"></a> [attach\_vpc\_cni\_policy](#input\_attach\_vpc\_cni\_policy)|Determines whether to attach the VPC CNI IAM policy to the role |`bool`|`false`| no |
96
97
| <aname="input_create_role"></a> [create\_role](#input\_create\_role)| Whether to create a role |`bool`|`true`| no |
97
98
| <aname="input_ebs_csi_kms_cmk_ids"></a> [ebs\_csi\_kms\_cmk\_ids](#input\_ebs\_csi\_kms\_cmk\_ids)| KMS CMK IDs to allow EBS CSI to manage encrypted volumes |`list(string)`|`[]`| no |
98
99
| <aname="input_external_dns_hosted_zones"></a> [external\_dns\_hosted\_zones](#input\_external\_dns\_hosted\_zones)| Route53 hosted zone IDs to allow external DNS to manage records |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
99
-
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`false`| no |
100
-
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum CLI/API session duration in seconds between 3600 and 43200 |`number`|`43200`| no |
101
-
| <aname="input_provider_url_sa_pairs"></a> [provider\_url\_sa\_pairs](#input\_provider\_url\_sa\_pairs)| OIDC provider URL and k8s ServiceAccount pairs. If the assume role policy requires a mix of EKS clusters and other OIDC providers then this can be used |`map(list(string))`|`{}`| no |
102
-
| <aname="input_role_description"></a> [role\_description](#input\_role\_description)| IAM Role description |`string`|`""`| no |
100
+
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`true`| no |
101
+
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum CLI/API session duration in seconds between 3600 and 43200 |`number`|`null`| no |
102
+
| <aname="input_oidc_providers"></a> [oidc\_providers](#input\_oidc\_providers)|Map of OIDC providers where each provdier map should contain the `provider`, `provider_arns`, and `service_accounts`|`any`|`{}`| no |
103
+
| <aname="input_role_description"></a> [role\_description](#input\_role\_description)| IAM Role description |`string`|`null`| no |
103
104
| <aname="input_role_name"></a> [role\_name](#input\_role\_name)| Name of IAM role |`string`|`null`| no |
104
105
| <aname="input_role_name_prefix"></a> [role\_name\_prefix](#input\_role\_name\_prefix)| IAM role name prefix |`string`|`null`| no |
105
-
| <aname="input_role_path"></a> [role\_path](#input\_role\_path)| Path of IAM role |`string`|`"/"`| no |
106
-
| <aname="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`""`| no |
106
+
| <aname="input_role_path"></a> [role\_path](#input\_role\_path)| Path of IAM role |`string`|`null`| no |
107
+
| <aname="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`null`| no |
107
108
| <aname="input_role_policy_arns"></a> [role\_policy\_arns](#input\_role\_policy\_arns)| ARNs of any policies to attach to the IAM role |`list(string)`|`[]`| no |
108
109
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add the the IAM role |`map(any)`|`{}`| no |
110
+
| <aname="input_vpc_cni_enable_ipv4"></a> [vpc\_cni\_enable\_ipv4](#input\_vpc\_cni\_enable\_ipv4)| Determines whether to enable IPv4 permissions for VPC CNI policy |`bool`|`false`| no |
111
+
| <aname="input_vpc_cni_enable_ipv6"></a> [vpc\_cni\_enable\_ipv6](#input\_vpc\_cni\_enable\_ipv6)| Determines whether to enable IPv6 permissions for VPC CNI policy |`bool`|`false`| no |
0 commit comments