Skip to content

Commit 426a827

Browse files
committed
feat: Remove iam-eks-role module
1 parent c29ec1e commit 426a827

File tree

17 files changed

+1
-684
lines changed

17 files changed

+1
-684
lines changed

.pre-commit-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/antonbabenko/pre-commit-terraform
3-
rev: v1.99.4
3+
rev: v1.99.5
44
hooks:
55
- id: terraform_fmt
66
- id: terraform_wrapper_module_for_each

README.md

Lines changed: 0 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -130,32 +130,6 @@ module "iam_assumable_roles_with_saml" {
130130
}
131131
```
132132

133-
`iam-eks-role`:
134-
135-
```hcl
136-
module "iam_eks_role" {
137-
source = "terraform-aws-modules/iam/aws//modules/iam-eks-role"
138-
139-
role_name = "my-app"
140-
141-
cluster_service_accounts = {
142-
"cluster1" = ["default:my-app"]
143-
"cluster2" = [
144-
"default:my-app",
145-
"canary:my-app",
146-
]
147-
}
148-
149-
tags = {
150-
Name = "eks-role"
151-
}
152-
153-
role_policy_arns = {
154-
AmazonEKS_CNI_Policy = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
155-
}
156-
}
157-
```
158-
159133
`iam-github-oidc-provider`:
160134

161135
```hcl
@@ -360,7 +334,6 @@ Use [iam-read-only-policy module](https://github.com/terraform-aws-modules/terra
360334
- [iam-assumable-role](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-assumable-role) - Create individual IAM role which can be assumed from specified ARNs (AWS accounts, IAM users, etc)
361335
- [iam-assumable-roles-with-saml](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-assumable-roles-with-saml) - Create several IAM roles which can be assumed by users with a SAML Identity Provider
362336
- [iam-assumable-roles](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-assumable-roles) - Create several IAM roles which can be assumed from specified ARNs (AWS accounts, IAM users, etc)
363-
- [iam-eks-role](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-eks-role) - Create an IAM role that can be assumed by one or more EKS `ServiceAccount`
364337
- [iam-group-complete](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-group-complete) - IAM group with users who are allowed to assume IAM roles in another AWS account and have access to specified IAM policies
365338
- [iam-group-with-assumable-roles-policy](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-group-with-assumable-roles-policy) - IAM group with users who are allowed to assume IAM roles in the same or in separate AWS account
366339
- [iam-group-with-policies](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-group-with-policies) - IAM group with users who are allowed specified IAM policies (eg, "manage their own IAM user")

examples/iam-eks-role/README.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

examples/iam-eks-role/main.tf

Lines changed: 0 additions & 96 deletions
This file was deleted.

examples/iam-eks-role/outputs.tf

Lines changed: 0 additions & 19 deletions
This file was deleted.

examples/iam-eks-role/variables.tf

Whitespace-only changes.

examples/iam-eks-role/versions.tf

Lines changed: 0 additions & 14 deletions
This file was deleted.

modules/iam-eks-role/README.md

Lines changed: 0 additions & 132 deletions
This file was deleted.

0 commit comments

Comments
 (0)