You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -386,6 +388,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
386
388
|[aws_eks_addon_version.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_addon_version)| data source |
387
389
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
388
390
|[aws_iam_policy_document.cni_ipv6_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
391
+
|[aws_iam_policy_document.eks_auto_custom](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
389
392
|[aws_iam_policy_document.node_assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
390
393
|[aws_iam_session_context.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_session_context)| data source |
391
394
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
@@ -452,6 +455,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
452
455
| <aname="input_enable_efa_support"></a> [enable\_efa\_support](#input\_enable\_efa\_support)| Determines whether to enable Elastic Fabric Adapter (EFA) support |`bool`|`false`| no |
453
456
| <aname="input_enable_irsa"></a> [enable\_irsa](#input\_enable\_irsa)| Determines whether to create an OpenID Connect Provider for EKS to enable IRSA |`bool`|`true`| no |
454
457
| <aname="input_enable_kms_key_rotation"></a> [enable\_kms\_key\_rotation](#input\_enable\_kms\_key\_rotation)| Specifies whether key rotation is enabled |`bool`|`true`| no |
458
+
| <aname="input_enable_node_custom_tags_permissions"></a> [enable\_node\_custom\_tags\_permissions](#input\_enable\_node\_custom\_tags\_permissions)| Determines whether to enable permissions for custom tags for the EKS Auto node IAM role |`bool`|`true`| no |
455
459
| <aname="input_enable_security_groups_for_pods"></a> [enable\_security\_groups\_for\_pods](#input\_enable\_security\_groups\_for\_pods)| Determines whether to add the necessary IAM permission policy for security groups for pods |`bool`|`true`| no |
456
460
| <aname="input_fargate_profile_defaults"></a> [fargate\_profile\_defaults](#input\_fargate\_profile\_defaults)| Map of Fargate Profile default configurations |`any`|`{}`| no |
457
461
| <aname="input_fargate_profiles"></a> [fargate\_profiles](#input\_fargate\_profiles)| Map of Fargate Profile definitions to create |`any`|`{}`| no |
@@ -479,6 +483,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
479
483
| <aname="input_node_iam_role_name"></a> [node\_iam\_role\_name](#input\_node\_iam\_role\_name)| Name to use on the EKS Auto node IAM role created |`string`|`null`| no |
480
484
| <aname="input_node_iam_role_path"></a> [node\_iam\_role\_path](#input\_node\_iam\_role\_path)| The EKS Auto node IAM role path |`string`|`null`| no |
481
485
| <aname="input_node_iam_role_permissions_boundary"></a> [node\_iam\_role\_permissions\_boundary](#input\_node\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the EKS Auto node IAM role |`string`|`null`| no |
486
+
| <aname="input_node_iam_role_policy_statements"></a> [node\_iam\_role\_policy\_statements](#input\_node\_iam\_role\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed |`any`|`[]`| no |
482
487
| <aname="input_node_iam_role_tags"></a> [node\_iam\_role\_tags](#input\_node\_iam\_role\_tags)| A map of additional tags to add to the EKS Auto node IAM role created |`map(string)`|`{}`| no |
483
488
| <aname="input_node_iam_role_use_name_prefix"></a> [node\_iam\_role\_use\_name\_prefix](#input\_node\_iam\_role\_use\_name\_prefix)| Determines whether the EKS Auto node IAM role name (`node_iam_role_name`) is used as a prefix |`bool`|`true`| no |
484
489
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created. Set `source_cluster_security_group = true` inside rules to set the `cluster_security_group` as source |`any`|`{}`| no |
description="Determines whether to enable permissions for custom tags for the EKS Auto node IAM role"
625
+
type=bool
626
+
default=true
627
+
}
628
+
629
+
variable"node_iam_role_policy_statements" {
630
+
description="A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed"
0 commit comments