You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/iam-role-for-service-accounts-eks/README.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,7 @@
1
1
# IAM Role for Service Accounts in EKS
2
2
3
3
Creates an IAM role which can be assumed by AWS EKS `ServiceAccount`s with optional policies for commonly used controllers/custom resources within EKS. The optional policies supported include:
|[aws_iam_policy_document.karpenter_controller](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
174
177
|[aws_iam_policy_document.load_balancer_controller](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
175
178
|[aws_iam_policy_document.load_balancer_controller_targetgroup_only](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
179
+
|[aws_iam_policy_document.mountpoint_s3_csi](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
176
180
|[aws_iam_policy_document.node_termination_handler](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
177
181
|[aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
178
182
|[aws_iam_policy_document.velero](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -202,6 +206,7 @@ No modules.
202
206
| <aname="input_attach_karpenter_controller_policy"></a> [attach\_karpenter\_controller\_policy](#input\_attach\_karpenter\_controller\_policy)| Determines whether to attach the Karpenter Controller policy to the role |`bool`|`false`| no |
203
207
| <aname="input_attach_load_balancer_controller_policy"></a> [attach\_load\_balancer\_controller\_policy](#input\_attach\_load\_balancer\_controller\_policy)| Determines whether to attach the Load Balancer Controller policy to the role |`bool`|`false`| no |
204
208
| <aname="input_attach_load_balancer_controller_targetgroup_binding_only_policy"></a> [attach\_load\_balancer\_controller\_targetgroup\_binding\_only\_policy](#input\_attach\_load\_balancer\_controller\_targetgroup\_binding\_only\_policy)| Determines whether to attach the Load Balancer Controller policy for the TargetGroupBinding only |`bool`|`false`| no |
209
+
| <aname="input_attach_mountpoint_s3_csi_policy"></a> [attach\_mountpoint\_s3\_csi\_policy](#input\_attach\_mountpoint\_s3\_csi\_policy)| Determines whether to attach the Mountpoint S3 CSI IAM policy to the role |`bool`|`false`| no |
205
210
| <aname="input_attach_node_termination_handler_policy"></a> [attach\_node\_termination\_handler\_policy](#input\_attach\_node\_termination\_handler\_policy)| Determines whether to attach the Node Termination Handler policy to the role |`bool`|`false`| no |
206
211
| <aname="input_attach_velero_policy"></a> [attach\_velero\_policy](#input\_attach\_velero\_policy)| Determines whether to attach the Velero IAM policy to the role |`bool`|`false`| no |
207
212
| <aname="input_attach_vpc_cni_policy"></a> [attach\_vpc\_cni\_policy](#input\_attach\_vpc\_cni\_policy)| Determines whether to attach the VPC CNI IAM policy to the role |`bool`|`false`| no |
@@ -227,6 +232,8 @@ No modules.
227
232
| <aname="input_karpenter_tag_key"></a> [karpenter\_tag\_key](#input\_karpenter\_tag\_key)| Tag key (`{key = value}`) applied to resources launched by Karpenter through the Karpenter provisioner |`string`|`"karpenter.sh/discovery"`| no |
228
233
| <aname="input_load_balancer_controller_targetgroup_arns"></a> [load\_balancer\_controller\_targetgroup\_arns](#input\_load\_balancer\_controller\_targetgroup\_arns)| List of Target groups ARNs using Load Balancer Controller |`list(string)`| <pre>[<br> "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"<br>]</pre> | no |
229
234
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum CLI/API session duration in seconds between 3600 and 43200 |`number`|`null`| no |
235
+
| <aname="input_mountpoint_s3_csi_bucket_arns"></a> [mountpoint\_s3\_csi\_bucket\_arns](#input\_mountpoint\_s3\_csi\_bucket\_arns)| S3 bucket ARNs to allow Mountpoint S3 CSI to list buckets |`list(string)`|`[]`| no |
236
+
| <aname="input_mountpoint_s3_csi_path_arns"></a> [mountpoint\_s3\_csi\_path\_arns](#input\_mountpoint\_s3\_csi\_path\_arns)| S3 path ARNs to allow Mountpoint S3 CSI driver to manage items at the provided path(s). This is required if `attach_mountpoint_s3_csi_policy = true`|`list(string)`|`[]`| no |
230
237
| <aname="input_node_termination_handler_sqs_queue_arns"></a> [node\_termination\_handler\_sqs\_queue\_arns](#input\_node\_termination\_handler\_sqs\_queue\_arns)| List of SQS ARNs that contain node termination events |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
231
238
| <aname="input_oidc_providers"></a> [oidc\_providers](#input\_oidc\_providers)| Map of OIDC providers where each provider map should contain the `provider_arn` and `namespace_service_accounts`|`any`|`{}`| no |
232
239
| <aname="input_policy_name_prefix"></a> [policy\_name\_prefix](#input\_policy\_name\_prefix)| IAM policy name prefix |`string`|`"AmazonEKS_"`| no |
description="Determines whether to attach the Mountpoint S3 CSI IAM policy to the role"
151
+
type=bool
152
+
default=false
153
+
}
154
+
155
+
variable"mountpoint_s3_csi_bucket_arns" {
156
+
description="S3 bucket ARNs to allow Mountpoint S3 CSI to list buckets"
157
+
type=list(string)
158
+
default=[]
159
+
}
160
+
161
+
variable"mountpoint_s3_csi_path_arns" {
162
+
description="S3 path ARNs to allow Mountpoint S3 CSI driver to manage items at the provided path(s). This is required if `attach_mountpoint_s3_csi_policy = true`"
163
+
type=list(string)
164
+
default=[]
165
+
}
166
+
148
167
# External DNS
149
168
variable"attach_external_dns_policy" {
150
169
description="Determines whether to attach the External DNS IAM policy to the role"
0 commit comments