diff --git a/README.md b/README.md index 1d5b5c07be..16778b2131 100644 --- a/README.md +++ b/README.md @@ -443,6 +443,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple | [enable\_security\_groups\_for\_pods](#input\_enable\_security\_groups\_for\_pods) | Determines whether to add the necessary IAM permission policy for security groups for pods | `bool` | `true` | no | | [fargate\_profile\_defaults](#input\_fargate\_profile\_defaults) | Map of Fargate Profile default configurations | `any` | `{}` | no | | [fargate\_profiles](#input\_fargate\_profiles) | Map of Fargate Profile definitions to create | `any` | `{}` | no | +| [iam\_policy\_path](#input\_iam\_policy\_path) | The IAM policy path | `string` | `null` | no | | [iam\_role\_additional\_policies](#input\_iam\_role\_additional\_policies) | Additional policies to be added to the IAM role | `map(string)` | `{}` | no | | [iam\_role\_arn](#input\_iam\_role\_arn) | Existing IAM role ARN for the cluster. Required if `create_iam_role` is set to `false` | `string` | `null` | no | | [iam\_role\_description](#input\_iam\_role\_description) | Description of the role | `string` | `null` | no | diff --git a/main.tf b/main.tf index 18933422f5..07a6747a56 100644 --- a/main.tf +++ b/main.tf @@ -702,7 +702,7 @@ resource "aws_iam_policy" "custom" { name = var.iam_role_use_name_prefix ? null : local.iam_role_name name_prefix = var.iam_role_use_name_prefix ? "${local.iam_role_name}-" : null - path = var.iam_role_path + path = var.iam_policy_path description = var.iam_role_description policy = data.aws_iam_policy_document.custom[0].json diff --git a/variables.tf b/variables.tf index 855c2133ec..10cdb34311 100644 --- a/variables.tf +++ b/variables.tf @@ -469,6 +469,12 @@ variable "iam_role_use_name_prefix" { default = true } +variable "iam_policy_path" { + description = "The IAM policy path" + type = string + default = null +} + variable "iam_role_path" { description = "The IAM role path" type = string