File tree Expand file tree Collapse file tree 3 files changed +3
-3
lines changed Expand file tree Collapse file tree 3 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -243,7 +243,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
243
243
| ------| --------| ---------|
244
244
| <a name =" module_eks_managed_node_group " ></a > [ eks\_ managed\_ node\_ group] ( #module\_ eks\_ managed\_ node\_ group ) | ./modules/eks-managed-node-group | n/a |
245
245
| <a name =" module_fargate_profile " ></a > [ fargate\_ profile] ( #module\_ fargate\_ profile ) | ./modules/fargate-profile | n/a |
246
- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-aws-modules/kms/aws | 1 .1.0 |
246
+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-aws-modules/kms/aws | 2 .1.0 |
247
247
| <a name =" module_self_managed_node_group " ></a > [ self\_ managed\_ node\_ group] ( #module\_ self\_ managed\_ node\_ group ) | ./modules/self-managed-node-group | n/a |
248
248
249
249
## Resources
Original file line number Diff line number Diff line change @@ -122,7 +122,7 @@ resource "aws_cloudwatch_log_group" "this" {
122
122
123
123
module "kms" {
124
124
source = " terraform-aws-modules/kms/aws"
125
- version = " 1 .1.0" # Note - be mindful of Terraform/provider version compatibility between modules
125
+ version = " 2 .1.0" # Note - be mindful of Terraform/provider version compatibility between modules
126
126
127
127
create = local. create && var. create_kms_key && local. enable_cluster_encryption_config # not valid on Outposts
128
128
Original file line number Diff line number Diff line change @@ -324,7 +324,7 @@ locals {
324
324
325
325
iam_role_name = coalesce (var. iam_role_name , " Karpenter-${ var . cluster_name } " )
326
326
iam_role_policy_prefix = " arn:${ local . partition } :iam::aws:policy"
327
- cni_policy = var. cluster_ip_family == " ipv6" ? " ${ local . iam_role_policy_prefix } /AmazonEKS_CNI_IPv6_Policy" : " ${ local . iam_role_policy_prefix } /AmazonEKS_CNI_Policy"
327
+ cni_policy = var. cluster_ip_family == " ipv6" ? " arn: ${ local . partition } :iam:: ${ local . account_id } :policy /AmazonEKS_CNI_IPv6_Policy" : " ${ local . iam_role_policy_prefix } /AmazonEKS_CNI_Policy"
328
328
}
329
329
330
330
data "aws_iam_policy_document" "assume_role" {
You can’t perform that action at this time.
0 commit comments