Skip to content

Commit 9d7deb3

Browse files
committed
fix: Remove legacy IRSAv2 artifact
1 parent 5fa8b3d commit 9d7deb3

File tree

6 files changed

+0
-71
lines changed

6 files changed

+0
-71
lines changed

examples/iam-role-for-service-accounts/README.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,16 +38,13 @@ Run `terraform destroy` when you don't need these resources.
3838
| <a name="module_cluster_autoscaler_irsa"></a> [cluster\_autoscaler\_irsa](#module\_cluster\_autoscaler\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
3939
| <a name="module_disabled"></a> [disabled](#module\_disabled) | ../../modules/iam-role-for-service-accounts | n/a |
4040
| <a name="module_ebs_csi_irsa"></a> [ebs\_csi\_irsa](#module\_ebs\_csi\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
41-
| <a name="module_ebs_csi_irsa_v2"></a> [ebs\_csi\_irsa\_v2](#module\_ebs\_csi\_irsa\_v2) | ../../modules/iam-role-for-service-accounts | n/a |
4241
| <a name="module_efs_csi_irsa"></a> [efs\_csi\_irsa](#module\_efs\_csi\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
4342
| <a name="module_eks"></a> [eks](#module\_eks) | terraform-aws-modules/eks/aws | ~> 21.0 |
4443
| <a name="module_external_dns_irsa"></a> [external\_dns\_irsa](#module\_external\_dns\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
4544
| <a name="module_external_secrets_irsa"></a> [external\_secrets\_irsa](#module\_external\_secrets\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
4645
| <a name="module_fsx_lustre_csi_irsa"></a> [fsx\_lustre\_csi\_irsa](#module\_fsx\_lustre\_csi\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
4746
| <a name="module_fsx_openzfs_csi_irsa"></a> [fsx\_openzfs\_csi\_irsa](#module\_fsx\_openzfs\_csi\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
4847
| <a name="module_irsa"></a> [irsa](#module\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
49-
| <a name="module_irsa_v2_custom_policy"></a> [irsa\_v2\_custom\_policy](#module\_irsa\_v2\_custom\_policy) | ../../modules/iam-role-for-service-accounts | n/a |
50-
| <a name="module_irsa_v2_empty"></a> [irsa\_v2\_empty](#module\_irsa\_v2\_empty) | ../../modules/iam-role-for-service-accounts | n/a |
5148
| <a name="module_load_balancer_controller_irsa"></a> [load\_balancer\_controller\_irsa](#module\_load\_balancer\_controller\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
5249
| <a name="module_load_balancer_controller_targetgroup_binding_only_irsa"></a> [load\_balancer\_controller\_targetgroup\_binding\_only\_irsa](#module\_load\_balancer\_controller\_targetgroup\_binding\_only\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |
5350
| <a name="module_mountpoint_s3_csi_irsa"></a> [mountpoint\_s3\_csi\_irsa](#module\_mountpoint\_s3\_csi\_irsa) | ../../modules/iam-role-for-service-accounts | n/a |

examples/iam-role-for-service-accounts/main.tf

Lines changed: 0 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -17,48 +17,6 @@ locals {
1717
}
1818
}
1919

20-
################################################################################
21-
# IRSAv2 Roles
22-
################################################################################
23-
24-
module "irsa_v2_empty" {
25-
source = "../../modules/iam-role-for-service-accounts"
26-
27-
name = "${local.name}-v2"
28-
29-
enable_irsa_v2 = true
30-
31-
tags = local.tags
32-
}
33-
34-
module "ebs_csi_irsa_v2" {
35-
source = "../../modules/iam-role-for-service-accounts"
36-
37-
name = "ebs-csi-v2"
38-
39-
enable_irsa_v2 = true
40-
attach_ebs_csi_policy = true
41-
42-
tags = local.tags
43-
}
44-
45-
module "irsa_v2_custom_policy" {
46-
source = "../../modules/iam-role-for-service-accounts"
47-
48-
name = "${local.name}-custom-name"
49-
50-
enable_irsa_v2 = true
51-
policy_statements = {
52-
DescribeEc2 = {
53-
actions = ["ec2:Describe*"]
54-
effect = "Allow"
55-
resources = ["*"]
56-
}
57-
}
58-
59-
tags = local.tags
60-
}
61-
6220
################################################################################
6321
# IRSA Roles
6422
################################################################################

modules/iam-role-for-service-accounts/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,6 @@ No modules.
189189
| <a name="input_create_policy"></a> [create\_policy](#input\_create\_policy) | Whether to create an IAM policy that is attached to the IAM role created | `bool` | `true` | no |
190190
| <a name="input_description"></a> [description](#input\_description) | Description of the role | `string` | `null` | no |
191191
| <a name="input_ebs_csi_kms_cmk_arns"></a> [ebs\_csi\_kms\_cmk\_arns](#input\_ebs\_csi\_kms\_cmk\_arns) | KMS CMK ARNs to allow EBS CSI to manage encrypted volumes | `list(string)` | `[]` | no |
192-
| <a name="input_enable_irsa_v2"></a> [enable\_irsa\_v2](#input\_enable\_irsa\_v2) | Determines whether to add the new IRSAv2 IAM assume role trust policy | `bool` | `false` | no |
193192
| <a name="input_external_dns_hosted_zone_arns"></a> [external\_dns\_hosted\_zone\_arns](#input\_external\_dns\_hosted\_zone\_arns) | Route53 hosted zone ARNs to allow External DNS to manage records | `list(string)` | `[]` | no |
194193
| <a name="input_external_secrets_kms_key_arns"></a> [external\_secrets\_kms\_key\_arns](#input\_external\_secrets\_kms\_key\_arns) | List of KMS Key ARNs that are used by Secrets Manager that contain secrets to mount using External Secrets | `list(string)` | `[]` | no |
195194
| <a name="input_external_secrets_secrets_manager_arns"></a> [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns) | List of Secrets Manager ARNs that contain secrets to mount using External Secrets | `list(string)` | `[]` | no |

modules/iam-role-for-service-accounts/main.tf

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -14,23 +14,6 @@ locals {
1414
data "aws_iam_policy_document" "assume" {
1515
count = var.create ? 1 : 0
1616

17-
dynamic "statement" {
18-
for_each = var.enable_irsa_v2 ? [1] : []
19-
20-
content {
21-
sid = "EksAssume"
22-
effect = "Allow"
23-
actions = ["sts:AssumeRole"]
24-
25-
principals {
26-
type = "Service"
27-
# identifier subject to change
28-
# identifiers = ["eks-pods.${local.dns_suffix}"]
29-
identifiers = ["eks.${local.dns_suffix}"]
30-
}
31-
}
32-
}
33-
3417
dynamic "statement" {
3518
for_each = var.oidc_providers
3619

@@ -55,7 +38,6 @@ data "aws_iam_policy_document" "assume" {
5538
variable = "${replace(statement.value.provider_arn, "/^(.*provider/)/", "")}:aud"
5639
values = ["sts.amazonaws.com"]
5740
}
58-
5941
}
6042
}
6143
}

modules/iam-role-for-service-accounts/variables.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,6 @@ variable "oidc_providers" {
6262
default = {}
6363
}
6464

65-
variable "enable_irsa_v2" {
66-
description = "Determines whether to add the new IRSAv2 IAM assume role trust policy"
67-
type = bool
68-
default = false
69-
}
70-
7165
variable "policies" {
7266
description = "Policies to attach to the IAM role in `{'static_name' = 'policy_arn'}` format"
7367
type = map(string)

wrappers/iam-role-for-service-accounts/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@ module "wrapper" {
2828
create_policy = try(each.value.create_policy, var.defaults.create_policy, true)
2929
description = try(each.value.description, var.defaults.description, null)
3030
ebs_csi_kms_cmk_arns = try(each.value.ebs_csi_kms_cmk_arns, var.defaults.ebs_csi_kms_cmk_arns, [])
31-
enable_irsa_v2 = try(each.value.enable_irsa_v2, var.defaults.enable_irsa_v2, false)
3231
external_dns_hosted_zone_arns = try(each.value.external_dns_hosted_zone_arns, var.defaults.external_dns_hosted_zone_arns, [])
3332
external_secrets_kms_key_arns = try(each.value.external_secrets_kms_key_arns, var.defaults.external_secrets_kms_key_arns, [])
3433
external_secrets_secrets_manager_arns = try(each.value.external_secrets_secrets_manager_arns, var.defaults.external_secrets_secrets_manager_arns, [])

0 commit comments

Comments
 (0)