You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_amazon_managed_service_prometheus_workspace_arns"></a> [amazon\_managed\_service\_prometheus\_workspace\_arns](#input\_amazon\_managed\_service\_prometheus\_workspace\_arns)| List of AMP Workspace ARNs to read and write metrics |`list(string)`|`[]`| no |
498
498
| <aname="input_appmesh_controller_policy_name"></a> [appmesh\_controller\_policy\_name](#input\_appmesh\_controller\_policy\_name)| Custom name of the AppMesh Controller IAM policy |`string`|`null`| no |
499
499
| <aname="input_appmesh_envoy_proxy_policy_name"></a> [appmesh\_envoy\_proxy\_policy\_name](#input\_appmesh\_envoy\_proxy\_policy\_name)| Custom name of the AppMesh Envoy Proxy IAM policy |`string`|`null`| no |
500
-
| <aname="input_association_defaults"></a> [association\_defaults](#input\_association\_defaults)| Default values used across all Pod Identity associations created unless a more specific value is provided |`any`|`{}`| no |
501
-
| <aname="input_associations"></a> [associations](#input\_associations)| Map of Pod Identity associations to be created (map of maps) |`any`|`{}`| no |
500
+
| <aname="input_association_defaults"></a> [association\_defaults](#input\_association\_defaults)| Default values used across all Pod Identity associations created unless a more specific value is provided |<pre>object({<br/> cluster_name = optional(string)<br/> disable_session_tags = optional(bool)<br/> namespace = optional(string)<br/> service_account = optional(string)<br/> role_arn = optional(string)<br/> target_role_arn = optional(string)<br/> tags = optional(map(string), {})<br/> })</pre>|`{}`| no |
501
+
| <aname="input_associations"></a> [associations](#input\_associations)| Map of Pod Identity associations to be created (map of maps) |<pre>map(object({<br/> cluster_name = optional(string)<br/> disable_session_tags = optional(bool)<br/> namespace = optional(string)<br/> service_account = optional(string)<br/> role_arn = optional(string)<br/> target_role_arn = optional(string)<br/> tags = optional(map(string), {})<br/> }))</pre>|`{}`| no |
502
502
| <aname="input_attach_amazon_managed_service_prometheus_policy"></a> [attach\_amazon\_managed\_service\_prometheus\_policy](#input\_attach\_amazon\_managed\_service\_prometheus\_policy)| Determines whether to attach the Amazon Managed Service for Prometheus IAM policy to the role |`bool`|`false`| no |
503
503
| <aname="input_attach_aws_appmesh_controller_policy"></a> [attach\_aws\_appmesh\_controller\_policy](#input\_attach\_aws\_appmesh\_controller\_policy)| Determines whether to attach the AppMesh Controller policy to the role |`bool`|`false`| no |
504
504
| <aname="input_attach_aws_appmesh_envoy_proxy_policy"></a> [attach\_aws\_appmesh\_envoy\_proxy\_policy](#input\_attach\_aws\_appmesh\_envoy\_proxy\_policy)| Determines whether to attach the AppMesh Envoy Proxy policy to the role |`bool`|`false`| no |
@@ -559,11 +559,12 @@ No modules.
559
559
| <aname="input_path"></a> [path](#input\_path)| Path of IAM role |`string`|`"/"`| no |
560
560
| <aname="input_permissions_boundary_arn"></a> [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`null`| no |
561
561
| <aname="input_policy_name_prefix"></a> [policy\_name\_prefix](#input\_policy\_name\_prefix)| IAM policy name prefix |`string`|`"AmazonEKS_"`| no |
562
-
| <aname="input_policy_statements"></a> [policy\_statements](#input\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`[]`| no |
562
+
| <aname="input_policy_statements"></a> [policy\_statements](#input\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | <pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> |`null`| no |
563
+
| <aname="input_region"></a> [region](#input\_region)| Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration |`string`|`null`| no |
563
564
| <aname="input_source_policy_documents"></a> [source\_policy\_documents](#input\_source\_policy\_documents)| List of IAM policy documents that are merged together into the exported document |`list(string)`|`[]`| no |
564
565
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
565
-
| <aname="input_trust_policy_conditions"></a> [trust\_policy\_conditions](#input\_trust\_policy\_conditions)| A list of conditions to add to the role trust policy |`any`|`[]`| no |
566
-
| <aname="input_trust_policy_statements"></a> [trust\_policy\_statements](#input\_trust\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for the role trust policy |`any`|`[]`| no |
566
+
| <aname="input_trust_policy_conditions"></a> [trust\_policy\_conditions](#input\_trust\_policy\_conditions)| A list of conditions to add to the role trust policy |<pre>list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> }))</pre>|`[]`| no |
567
+
| <aname="input_trust_policy_statements"></a> [trust\_policy\_statements](#input\_trust\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for the role trust policy |<pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> |`null`| no |
567
568
| <aname="input_use_name_prefix"></a> [use\_name\_prefix](#input\_use\_name\_prefix)| Determines whether the role name and policy name(s) are used as a prefix |`string`|`true`| no |
568
569
| <aname="input_velero_policy_name"></a> [velero\_policy\_name](#input\_velero\_policy\_name)| Custom name of the Velero IAM policy |`string`|`null`| no |
569
570
| <aname="input_velero_s3_bucket_arns"></a> [velero\_s3\_bucket\_arns](#input\_velero\_s3\_bucket\_arns)| List of S3 Bucket ARNs that Velero needs access to list |`list(string)`|`[]`| no |
0 commit comments