You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_allow_self_assume_role"></a> [allow\_self\_assume\_role](#input\_allow\_self\_assume\_role)| Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)|`bool`|`false`| no |
197
-
| <aname="input_amazon_managed_service_prometheus_workspace_arns"></a> [amazon\_managed\_service\_prometheus\_workspace\_arns](#input\_amazon\_managed\_service\_prometheus\_workspace\_arns)| List of AMP Workspace ARNs to read and write metrics |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
197
+
| <aname="input_amazon_managed_service_prometheus_workspace_arns"></a> [amazon\_managed\_service\_prometheus\_workspace\_arns](#input\_amazon\_managed\_service\_prometheus\_workspace\_arns)| List of AMP Workspace ARNs to read and write metrics |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
198
198
| <aname="input_assume_role_condition_test"></a> [assume\_role\_condition\_test](#input\_assume\_role\_condition\_test)| Name of the [IAM condition operator](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html) to evaluate when assuming the role |`string`|`"StringEquals"`| no |
199
199
| <aname="input_attach_amazon_managed_service_prometheus_policy"></a> [attach\_amazon\_managed\_service\_prometheus\_policy](#input\_attach\_amazon\_managed\_service\_prometheus\_policy)| Determines whether to attach the Amazon Managed Service for Prometheus IAM policy to the role |`bool`|`false`| no |
200
200
| <aname="input_attach_appmesh_controller_policy"></a> [attach\_appmesh\_controller\_policy](#input\_attach\_appmesh\_controller\_policy)| Determines whether to attach the Appmesh Controller policy to the role |`bool`|`false`| no |
@@ -216,33 +216,33 @@ No modules.
216
216
| <aname="input_attach_node_termination_handler_policy"></a> [attach\_node\_termination\_handler\_policy](#input\_attach\_node\_termination\_handler\_policy)| Determines whether to attach the Node Termination Handler policy to the role |`bool`|`false`| no |
217
217
| <aname="input_attach_velero_policy"></a> [attach\_velero\_policy](#input\_attach\_velero\_policy)| Determines whether to attach the Velero IAM policy to the role |`bool`|`false`| no |
218
218
| <aname="input_attach_vpc_cni_policy"></a> [attach\_vpc\_cni\_policy](#input\_attach\_vpc\_cni\_policy)| Determines whether to attach the VPC CNI IAM policy to the role |`bool`|`false`| no |
219
-
| <aname="input_cert_manager_hosted_zone_arns"></a> [cert\_manager\_hosted\_zone\_arns](#input\_cert\_manager\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow Cert manager to manage records |`list(string)`| <pre>[<br/> "arn:aws:route53:::hostedzone/*"<br/>]</pre> | no |
219
+
| <aname="input_cert_manager_hosted_zone_arns"></a> [cert\_manager\_hosted\_zone\_arns](#input\_cert\_manager\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow Cert manager to manage records |`list(string)`| <pre>[<br> "arn:aws:route53:::hostedzone/*"<br>]</pre> | no |
220
220
| <aname="input_cluster_autoscaler_cluster_ids"></a> [cluster\_autoscaler\_cluster\_ids](#input\_cluster\_autoscaler\_cluster\_ids)|[Deprecated - use `cluster_autoscaler_cluster_names`] List of cluster names to appropriately scope permissions within the Cluster Autoscaler IAM policy |`list(string)`|`[]`| no |
221
221
| <aname="input_cluster_autoscaler_cluster_names"></a> [cluster\_autoscaler\_cluster\_names](#input\_cluster\_autoscaler\_cluster\_names)| List of cluster names to appropriately scope permissions within the Cluster Autoscaler IAM policy |`list(string)`|`[]`| no |
222
222
| <aname="input_create_role"></a> [create\_role](#input\_create\_role)| Whether to create a role |`bool`|`true`| no |
223
223
| <aname="input_ebs_csi_kms_cmk_ids"></a> [ebs\_csi\_kms\_cmk\_ids](#input\_ebs\_csi\_kms\_cmk\_ids)| KMS CMK IDs to allow EBS CSI to manage encrypted volumes |`list(string)`|`[]`| no |
224
224
| <aname="input_enable_karpenter_instance_profile_creation"></a> [enable\_karpenter\_instance\_profile\_creation](#input\_enable\_karpenter\_instance\_profile\_creation)| Determines whether Karpenter will be allowed to create the IAM instance profile (v1beta1/v0.32+) |`bool`|`false`| no |
225
-
| <aname="input_external_dns_hosted_zone_arns"></a> [external\_dns\_hosted\_zone\_arns](#input\_external\_dns\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow External DNS to manage records |`list(string)`| <pre>[<br/> "arn:aws:route53:::hostedzone/*"<br/>]</pre> | no |
226
-
| <aname="input_external_secrets_kms_key_arns"></a> [external\_secrets\_kms\_key\_arns](#input\_external\_secrets\_kms\_key\_arns)| List of KMS Key ARNs that are used by Secrets Manager that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br/> "arn:aws:kms:*:*:key/*"<br/>]</pre> | no |
227
-
| <aname="input_external_secrets_secrets_manager_arns"></a> [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns)| List of Secrets Manager ARNs that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
228
-
| <aname="input_external_secrets_secrets_manager_create_permission"></a> [external\_secrets\_secrets\_manager\_create\_permission](#input\_external\_secrets\_secrets\_manager\_create\_permission)|Determins whether External Secrets may use secretsmanager:CreateSecret|`bool`|`false`| no |
229
-
| <aname="input_external_secrets_ssm_parameter_arns"></a> [external\_secrets\_ssm\_parameter\_arns](#input\_external\_secrets\_ssm\_parameter\_arns)| List of Systems Manager Parameter ARNs that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
225
+
| <aname="input_external_dns_hosted_zone_arns"></a> [external\_dns\_hosted\_zone\_arns](#input\_external\_dns\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow External DNS to manage records |`list(string)`| <pre>[<br> "arn:aws:route53:::hostedzone/*"<br>]</pre> | no |
226
+
| <aname="input_external_secrets_kms_key_arns"></a> [external\_secrets\_kms\_key\_arns](#input\_external\_secrets\_kms\_key\_arns)| List of KMS Key ARNs that are used by Secrets Manager that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br> "arn:aws:kms:*:*:key/*"<br>]</pre> | no |
227
+
| <aname="input_external_secrets_secrets_manager_arns"></a> [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns)| List of Secrets Manager ARNs that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br> "arn:aws:secretsmanager:*:*:secret:*"<br>]</pre> | no |
228
+
| <aname="input_external_secrets_secrets_manager_create_permission"></a> [external\_secrets\_secrets\_manager\_create\_permission](#input\_external\_secrets\_secrets\_manager\_create\_permission)|Determines whether External Secrets may use secretsmanager:CreateSecret|`bool`|`false`| no |
229
+
| <aname="input_external_secrets_ssm_parameter_arns"></a> [external\_secrets\_ssm\_parameter\_arns](#input\_external\_secrets\_ssm\_parameter\_arns)| List of Systems Manager Parameter ARNs that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br> "arn:aws:ssm:*:*:parameter/*"<br>]</pre> | no |
230
230
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`true`| no |
231
-
| <aname="input_fsx_lustre_csi_service_role_arns"></a> [fsx\_lustre\_csi\_service\_role\_arns](#input\_fsx\_lustre\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for Lustre CSI create and manage FSX for Lustre service linked roles |`list(string)`| <pre>[<br/> "arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*"<br/>]</pre> | no |
232
-
| <aname="input_fsx_openzfs_csi_service_role_arns"></a> [fsx\_openzfs\_csi\_service\_role\_arns](#input\_fsx\_openzfs\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for OpenZFS CSI create and manage FSX for openzfs service linked roles |`list(string)`| <pre>[<br/> "arn:aws:iam::*:role/aws-service-role/fsx.amazonaws.com/*"<br/>]</pre> | no |
231
+
| <aname="input_fsx_lustre_csi_service_role_arns"></a> [fsx\_lustre\_csi\_service\_role\_arns](#input\_fsx\_lustre\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for Lustre CSI create and manage FSX for Lustre service linked roles |`list(string)`| <pre>[<br> "arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*"<br>]</pre> | no |
232
+
| <aname="input_fsx_openzfs_csi_service_role_arns"></a> [fsx\_openzfs\_csi\_service\_role\_arns](#input\_fsx\_openzfs\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for OpenZFS CSI create and manage FSX for openzfs service linked roles |`list(string)`| <pre>[<br> "arn:aws:iam::*:role/aws-service-role/fsx.amazonaws.com/*"<br>]</pre> | no |
233
233
| <aname="input_karpenter_controller_cluster_id"></a> [karpenter\_controller\_cluster\_id](#input\_karpenter\_controller\_cluster\_id)|[Deprecated - use `karpenter_controller_cluster_name`] The name of the cluster where the Karpenter controller is provisioned/managing |`string`|`"*"`| no |
234
234
| <aname="input_karpenter_controller_cluster_name"></a> [karpenter\_controller\_cluster\_name](#input\_karpenter\_controller\_cluster\_name)| The name of the cluster where the Karpenter controller is provisioned/managing |`string`|`"*"`| no |
235
-
| <aname="input_karpenter_controller_node_iam_role_arns"></a> [karpenter\_controller\_node\_iam\_role\_arns](#input\_karpenter\_controller\_node\_iam\_role\_arns)| List of node IAM role ARNs Karpenter can use to launch nodes |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
236
-
| <aname="input_karpenter_controller_ssm_parameter_arns"></a> [karpenter\_controller\_ssm\_parameter\_arns](#input\_karpenter\_controller\_ssm\_parameter\_arns)| List of SSM Parameter ARNs that contain AMI IDs launched by Karpenter |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/aws/service/*"<br/>]</pre> | no |
235
+
| <aname="input_karpenter_controller_node_iam_role_arns"></a> [karpenter\_controller\_node\_iam\_role\_arns](#input\_karpenter\_controller\_node\_iam\_role\_arns)| List of node IAM role ARNs Karpenter can use to launch nodes |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
236
+
| <aname="input_karpenter_controller_ssm_parameter_arns"></a> [karpenter\_controller\_ssm\_parameter\_arns](#input\_karpenter\_controller\_ssm\_parameter\_arns)| List of SSM Parameter ARNs that contain AMI IDs launched by Karpenter |`list(string)`| <pre>[<br> "arn:aws:ssm:*:*:parameter/aws/service/*"<br>]</pre> | no |
237
237
| <aname="input_karpenter_sqs_queue_arn"></a> [karpenter\_sqs\_queue\_arn](#input\_karpenter\_sqs\_queue\_arn)| (Optional) ARN of SQS used by Karpenter when native node termination handling is enabled |`string`|`null`| no |
238
238
| <aname="input_karpenter_subnet_account_id"></a> [karpenter\_subnet\_account\_id](#input\_karpenter\_subnet\_account\_id)| Account ID of where the subnets Karpenter will utilize resides. Used when subnets are shared from another account |`string`|`""`| no |
239
239
| <aname="input_karpenter_tag_key"></a> [karpenter\_tag\_key](#input\_karpenter\_tag\_key)| Tag key (`{key = value}`) applied to resources launched by Karpenter through the Karpenter provisioner |`string`|`"karpenter.sh/discovery"`| no |
240
-
| <aname="input_load_balancer_controller_targetgroup_arns"></a> [load\_balancer\_controller\_targetgroup\_arns](#input\_load\_balancer\_controller\_targetgroup\_arns)| List of Target groups ARNs using Load Balancer Controller |`list(string)`| <pre>[<br/> "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"<br/>]</pre> | no |
240
+
| <aname="input_load_balancer_controller_targetgroup_arns"></a> [load\_balancer\_controller\_targetgroup\_arns](#input\_load\_balancer\_controller\_targetgroup\_arns)| List of Target groups ARNs using Load Balancer Controller |`list(string)`| <pre>[<br> "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"<br>]</pre> | no |
241
241
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum CLI/API session duration in seconds between 3600 and 43200 |`number`|`null`| no |
242
242
| <aname="input_mountpoint_s3_csi_bucket_arns"></a> [mountpoint\_s3\_csi\_bucket\_arns](#input\_mountpoint\_s3\_csi\_bucket\_arns)| S3 bucket ARNs to allow Mountpoint S3 CSI to list buckets |`list(string)`|`[]`| no |
243
243
| <aname="input_mountpoint_s3_csi_kms_arns"></a> [mountpoint\_s3\_csi\_kms\_arns](#input\_mountpoint\_s3\_csi\_kms\_arns)| KMS Key ARNs to allow Mountpoint S3 CSI driver to download and upload Objects of a S3 bucket using `aws:kms` SSE |`list(string)`|`[]`| no |
244
244
| <aname="input_mountpoint_s3_csi_path_arns"></a> [mountpoint\_s3\_csi\_path\_arns](#input\_mountpoint\_s3\_csi\_path\_arns)| S3 path ARNs to allow Mountpoint S3 CSI driver to manage items at the provided path(s). This is required if `attach_mountpoint_s3_csi_policy = true`|`list(string)`|`[]`| no |
245
-
| <aname="input_node_termination_handler_sqs_queue_arns"></a> [node\_termination\_handler\_sqs\_queue\_arns](#input\_node\_termination\_handler\_sqs\_queue\_arns)| List of SQS ARNs that contain node termination events |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
245
+
| <aname="input_node_termination_handler_sqs_queue_arns"></a> [node\_termination\_handler\_sqs\_queue\_arns](#input\_node\_termination\_handler\_sqs\_queue\_arns)| List of SQS ARNs that contain node termination events |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
246
246
| <aname="input_oidc_providers"></a> [oidc\_providers](#input\_oidc\_providers)| Map of OIDC providers where each provider map should contain the `provider_arn` and `namespace_service_accounts`|`any`|`{}`| no |
247
247
| <aname="input_policy_name_prefix"></a> [policy\_name\_prefix](#input\_policy\_name\_prefix)| IAM policy name prefix |`string`|`"AmazonEKS_"`| no |
248
248
| <aname="input_role_description"></a> [role\_description](#input\_role\_description)| IAM Role description |`string`|`null`| no |
@@ -252,7 +252,7 @@ No modules.
252
252
| <aname="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`null`| no |
253
253
| <aname="input_role_policy_arns"></a> [role\_policy\_arns](#input\_role\_policy\_arns)| ARNs of any policies to attach to the IAM role |`map(string)`|`{}`| no |
254
254
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add the the IAM role |`map(any)`|`{}`| no |
255
-
| <aname="input_velero_s3_bucket_arns"></a> [velero\_s3\_bucket\_arns](#input\_velero\_s3\_bucket\_arns)| List of S3 Bucket ARNs that Velero needs access to in order to backup and restore cluster resources |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
255
+
| <aname="input_velero_s3_bucket_arns"></a> [velero\_s3\_bucket\_arns](#input\_velero\_s3\_bucket\_arns)| List of S3 Bucket ARNs that Velero needs access to in order to backup and restore cluster resources |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
256
256
| <aname="input_vpc_cni_enable_cloudwatch_logs"></a> [vpc\_cni\_enable\_cloudwatch\_logs](#input\_vpc\_cni\_enable\_cloudwatch\_logs)| Determines whether to enable VPC CNI permission to create CloudWatch Log groups and publish network policy events |`bool`|`false`| no |
257
257
| <aname="input_vpc_cni_enable_ipv4"></a> [vpc\_cni\_enable\_ipv4](#input\_vpc\_cni\_enable\_ipv4)| Determines whether to enable IPv4 permissions for VPC CNI policy |`bool`|`false`| no |
258
258
| <aname="input_vpc_cni_enable_ipv6"></a> [vpc\_cni\_enable\_ipv6](#input\_vpc\_cni\_enable\_ipv6)| Determines whether to enable IPv6 permissions for VPC CNI policy |`bool`|`false`| no |
Copy file name to clipboardExpand all lines: modules/iam-user/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ Creates IAM user, IAM login profile, IAM access key and uploads IAM SSH user pub
6
6
7
7
**If possible, always use PGP encryption to prevent Terraform from keeping unencrypted password and access secret key in state file.**
8
8
9
-
### Keybase pre-requisits
9
+
### Keybase pre-requisites
10
10
11
11
When `pgp_key` is specified as `keybase:username`, make sure that that user has already uploaded public key to keybase.io. For example, user with username `test` has done it properly and you can [verify it here](https://keybase.io/test/pgp_keys.asc).
0 commit comments