You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_amazon_managed_service_prometheus_workspace_arns"></a> [amazon\_managed\_service\_prometheus\_workspace\_arns](#input\_amazon\_managed\_service\_prometheus\_workspace\_arns)| List of AMP Workspace ARNs to read and write metrics |`list(string)`|<pre>[<br/> "*"<br/>]</pre>| no |
167
+
| <aname="input_amazon_managed_service_prometheus_workspace_arns"></a> [amazon\_managed\_service\_prometheus\_workspace\_arns](#input\_amazon\_managed\_service\_prometheus\_workspace\_arns)| List of AMP Workspace ARNs to read and write metrics |`list(string)`|`[]`| no |
168
168
| <aname="input_assume_role_condition_test"></a> [assume\_role\_condition\_test](#input\_assume\_role\_condition\_test)| Name of the [IAM condition operator](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html) to evaluate when assuming the role |`string`|`"StringEquals"`| no |
169
169
| <aname="input_attach_amazon_managed_service_prometheus_policy"></a> [attach\_amazon\_managed\_service\_prometheus\_policy](#input\_attach\_amazon\_managed\_service\_prometheus\_policy)| Determines whether to attach the Amazon Managed Service for Prometheus IAM policy to the role |`bool`|`false`| no |
170
170
| <aname="input_attach_aws_gateway_controller_policy"></a> [attach\_aws\_gateway\_controller\_policy](#input\_attach\_aws\_gateway\_controller\_policy)| Determines whether to attach the AWS Gateway Controller IAM policy to the role |`bool`|`false`| no |
@@ -183,27 +183,27 @@ No modules.
183
183
| <aname="input_attach_node_termination_handler_policy"></a> [attach\_node\_termination\_handler\_policy](#input\_attach\_node\_termination\_handler\_policy)| Determines whether to attach the Node Termination Handler policy to the role |`bool`|`false`| no |
184
184
| <aname="input_attach_velero_policy"></a> [attach\_velero\_policy](#input\_attach\_velero\_policy)| Determines whether to attach the Velero IAM policy to the role |`bool`|`false`| no |
185
185
| <aname="input_attach_vpc_cni_policy"></a> [attach\_vpc\_cni\_policy](#input\_attach\_vpc\_cni\_policy)| Determines whether to attach the VPC CNI IAM policy to the role |`bool`|`false`| no |
186
-
| <aname="input_cert_manager_hosted_zone_arns"></a> [cert\_manager\_hosted\_zone\_arns](#input\_cert\_manager\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow Cert manager to manage records |`list(string)`|<pre>[<br/> "arn:aws:route53:::hostedzone/*"<br/>]</pre>| no |
186
+
| <aname="input_cert_manager_hosted_zone_arns"></a> [cert\_manager\_hosted\_zone\_arns](#input\_cert\_manager\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow Cert manager to manage records |`list(string)`|`[]`| no |
187
187
| <aname="input_cluster_autoscaler_cluster_names"></a> [cluster\_autoscaler\_cluster\_names](#input\_cluster\_autoscaler\_cluster\_names)| List of cluster names to appropriately scope permissions within the Cluster Autoscaler IAM policy |`list(string)`|`[]`| no |
188
188
| <aname="input_create"></a> [create](#input\_create)| Controls if resources should be created (affects all resources) |`bool`|`true`| no |
189
189
| <aname="input_create_policy"></a> [create\_policy](#input\_create\_policy)| Whether to create an IAM policy that is attached to the IAM role created |`bool`|`true`| no |
190
190
| <aname="input_description"></a> [description](#input\_description)| Description of the role |`string`|`null`| no |
191
191
| <aname="input_ebs_csi_kms_cmk_ids"></a> [ebs\_csi\_kms\_cmk\_ids](#input\_ebs\_csi\_kms\_cmk\_ids)| KMS CMK IDs to allow EBS CSI to manage encrypted volumes |`list(string)`|`[]`| no |
192
192
| <aname="input_enable_irsa_v2"></a> [enable\_irsa\_v2](#input\_enable\_irsa\_v2)| Determines whether to add the new IRSAv2 IAM assume role trust policy |`bool`|`false`| no |
193
-
| <aname="input_external_dns_hosted_zone_arns"></a> [external\_dns\_hosted\_zone\_arns](#input\_external\_dns\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow External DNS to manage records |`list(string)`|<pre>[<br/> "arn:aws:route53:::hostedzone/*"<br/>]</pre>| no |
194
-
| <aname="input_external_secrets_kms_key_arns"></a> [external\_secrets\_kms\_key\_arns](#input\_external\_secrets\_kms\_key\_arns)| List of KMS Key ARNs that are used by Secrets Manager that contain secrets to mount using External Secrets |`list(string)`|<pre>[<br/> "arn:aws:kms:*:*:key/*"<br/>]</pre>| no |
195
-
| <aname="input_external_secrets_secrets_manager_arns"></a> [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns)| List of Secrets Manager ARNs that contain secrets to mount using External Secrets |`list(string)`|<pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre>| no |
193
+
| <aname="input_external_dns_hosted_zone_arns"></a> [external\_dns\_hosted\_zone\_arns](#input\_external\_dns\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow External DNS to manage records |`list(string)`|`[]`| no |
194
+
| <aname="input_external_secrets_kms_key_arns"></a> [external\_secrets\_kms\_key\_arns](#input\_external\_secrets\_kms\_key\_arns)| List of KMS Key ARNs that are used by Secrets Manager that contain secrets to mount using External Secrets |`list(string)`|`[]`| no |
195
+
| <aname="input_external_secrets_secrets_manager_arns"></a> [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns)| List of Secrets Manager ARNs that contain secrets to mount using External Secrets |`list(string)`|`[]`| no |
196
196
| <aname="input_external_secrets_secrets_manager_create_permission"></a> [external\_secrets\_secrets\_manager\_create\_permission](#input\_external\_secrets\_secrets\_manager\_create\_permission)| Determines whether External Secrets may use secretsmanager:CreateSecret|`bool`|`false`| no |
197
-
| <aname="input_external_secrets_ssm_parameter_arns"></a> [external\_secrets\_ssm\_parameter\_arns](#input\_external\_secrets\_ssm\_parameter\_arns)| List of Systems Manager Parameter ARNs that contain secrets to mount using External Secrets |`list(string)`|<pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre>| no |
197
+
| <aname="input_external_secrets_ssm_parameter_arns"></a> [external\_secrets\_ssm\_parameter\_arns](#input\_external\_secrets\_ssm\_parameter\_arns)| List of Systems Manager Parameter ARNs that contain secrets to mount using External Secrets |`list(string)`|`[]`| no |
198
198
| <aname="input_fsx_lustre_csi_service_role_arns"></a> [fsx\_lustre\_csi\_service\_role\_arns](#input\_fsx\_lustre\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for Lustre CSI create and manage FSX for Lustre service linked roles |`list(string)`| <pre>[<br/> "arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*"<br/>]</pre> | no |
199
199
| <aname="input_fsx_openzfs_csi_service_role_arns"></a> [fsx\_openzfs\_csi\_service\_role\_arns](#input\_fsx\_openzfs\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for OpenZFS CSI create and manage FSX for openzfs service linked roles |`list(string)`| <pre>[<br/> "arn:aws:iam::*:role/aws-service-role/fsx.amazonaws.com/*"<br/>]</pre> | no |
200
-
| <aname="input_load_balancer_controller_targetgroup_arns"></a> [load\_balancer\_controller\_targetgroup\_arns](#input\_load\_balancer\_controller\_targetgroup\_arns)| List of Target groups ARNs using Load Balancer Controller |`list(string)`|<pre>[<br/> "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"<br/>]</pre>| no |
200
+
| <aname="input_load_balancer_controller_targetgroup_arns"></a> [load\_balancer\_controller\_targetgroup\_arns](#input\_load\_balancer\_controller\_targetgroup\_arns)| List of Target groups ARNs using Load Balancer Controller |`list(string)`|`[]`| no |
201
201
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours |`number`|`null`| no |
202
202
| <aname="input_mountpoint_s3_csi_bucket_arns"></a> [mountpoint\_s3\_csi\_bucket\_arns](#input\_mountpoint\_s3\_csi\_bucket\_arns)| S3 bucket ARNs to allow Mountpoint S3 CSI to list buckets |`list(string)`|`[]`| no |
203
203
| <aname="input_mountpoint_s3_csi_kms_arns"></a> [mountpoint\_s3\_csi\_kms\_arns](#input\_mountpoint\_s3\_csi\_kms\_arns)| KMS Key ARNs to allow Mountpoint S3 CSI driver to download and upload Objects of a S3 bucket using `aws:kms` SSE |`list(string)`|`[]`| no |
204
204
| <aname="input_mountpoint_s3_csi_path_arns"></a> [mountpoint\_s3\_csi\_path\_arns](#input\_mountpoint\_s3\_csi\_path\_arns)| S3 path ARNs to allow Mountpoint S3 CSI driver to manage items at the provided path(s). This is required if `attach_mountpoint_s3_csi_policy = true`|`list(string)`|`[]`| no |
205
205
| <aname="input_name"></a> [name](#input\_name)| Name to use on IAM role created |`string`|`null`| no |
206
-
| <aname="input_node_termination_handler_sqs_queue_arns"></a> [node\_termination\_handler\_sqs\_queue\_arns](#input\_node\_termination\_handler\_sqs\_queue\_arns)| List of SQS ARNs that contain node termination events |`list(string)`|<pre>[<br/> "*"<br/>]</pre>| no |
206
+
| <aname="input_node_termination_handler_sqs_queue_arns"></a> [node\_termination\_handler\_sqs\_queue\_arns](#input\_node\_termination\_handler\_sqs\_queue\_arns)| List of SQS ARNs that contain node termination events |`list(string)`|`[]`| no |
207
207
| <aname="input_oidc_providers"></a> [oidc\_providers](#input\_oidc\_providers)| Map of OIDC providers where each provider map should contain the `provider`, `provider_arn`, and `namespace_service_accounts`|`any`|`{}`| no |
208
208
| <aname="input_override_policy_documents"></a> [override\_policy\_documents](#input\_override\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid`|`list(string)`|`[]`| no |
209
209
| <aname="input_path"></a> [path](#input\_path)| Path of IAM role |`string`|`"/"`| no |
@@ -216,7 +216,7 @@ No modules.
216
216
| <aname="input_source_policy_documents"></a> [source\_policy\_documents](#input\_source\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s |`list(string)`|`[]`| no |
217
217
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
218
218
| <aname="input_use_name_prefix"></a> [use\_name\_prefix](#input\_use\_name\_prefix)| Determines whether the IAM role/policy name (`name`/`policy_name`) is used as a prefix |`bool`|`true`| no |
219
-
| <aname="input_velero_s3_bucket_arns"></a> [velero\_s3\_bucket\_arns](#input\_velero\_s3\_bucket\_arns)| List of S3 Bucket ARNs that Velero needs access to in order to backup and restore cluster resources |`list(string)`|<pre>[<br/> "*"<br/>]</pre>| no |
219
+
| <aname="input_velero_s3_bucket_arns"></a> [velero\_s3\_bucket\_arns](#input\_velero\_s3\_bucket\_arns)| List of S3 Bucket ARNs that Velero needs access to in order to backup and restore cluster resources |`list(string)`|`[]`| no |
220
220
| <aname="input_vpc_cni_enable_cloudwatch_logs"></a> [vpc\_cni\_enable\_cloudwatch\_logs](#input\_vpc\_cni\_enable\_cloudwatch\_logs)| Determines whether to enable VPC CNI permission to create CloudWatch Log groups and publish network policy events |`bool`|`false`| no |
221
221
| <aname="input_vpc_cni_enable_ipv4"></a> [vpc\_cni\_enable\_ipv4](#input\_vpc\_cni\_enable\_ipv4)| Determines whether to enable IPv4 permissions for VPC CNI policy |`bool`|`false`| no |
222
222
| <aname="input_vpc_cni_enable_ipv6"></a> [vpc\_cni\_enable\_ipv6](#input\_vpc\_cni\_enable\_ipv6)| Determines whether to enable IPv6 permissions for VPC CNI policy |`bool`|`false`| no |
0 commit comments