@@ -38,7 +38,7 @@ data "aws_iam_policy_document" "cert_manager" {
38
38
resource "aws_iam_policy" "cert_manager" {
39
39
count = var. create_role && var. attach_cert_manager_policy ? 1 : 0
40
40
41
- name_prefix = " AmazonEKS_Cert_Manager_Policy -"
41
+ name_prefix = " ${ var . policy_name_prefix } Cert_Manager_Policy -"
42
42
path = var. role_path
43
43
description = " Cert Manager policy to allow management of Route53 hosted zone records"
44
44
policy = data. aws_iam_policy_document . cert_manager [0 ]. json
@@ -97,7 +97,7 @@ data "aws_iam_policy_document" "cluster_autoscaler" {
97
97
resource "aws_iam_policy" "cluster_autoscaler" {
98
98
count = var. create_role && var. attach_cluster_autoscaler_policy ? 1 : 0
99
99
100
- name_prefix = " AmazonEKS_Cluster_Autoscaler_Policy -"
100
+ name_prefix = " ${ var . policy_name_prefix } Cluster_Autoscaler_Policy -"
101
101
path = var. role_path
102
102
description = " Cluster autoscaler policy to allow examination and modification of EC2 Auto Scaling Groups"
103
103
policy = data. aws_iam_policy_document . cluster_autoscaler [0 ]. json
@@ -292,7 +292,7 @@ data "aws_iam_policy_document" "ebs_csi" {
292
292
resource "aws_iam_policy" "ebs_csi" {
293
293
count = var. create_role && var. attach_ebs_csi_policy ? 1 : 0
294
294
295
- name_prefix = " AmazonEKS_EBS_CSI_Policy -"
295
+ name_prefix = " ${ var . policy_name_prefix } EBS_CSI_Policy -"
296
296
path = var. role_path
297
297
description = " Provides permissions to manage EBS volumes via the container storage interface driver"
298
298
policy = data. aws_iam_policy_document . ebs_csi [0 ]. json
@@ -352,7 +352,7 @@ data "aws_iam_policy_document" "efs_csi" {
352
352
resource "aws_iam_policy" "efs_csi" {
353
353
count = var. create_role && var. attach_efs_csi_policy ? 1 : 0
354
354
355
- name_prefix = " AmazonEKS_EFS_CSI_Policy -"
355
+ name_prefix = " ${ var . policy_name_prefix } EFS_CSI_Policy -"
356
356
path = var. role_path
357
357
description = " Provides permissions to manage EFS volumes via the container storage interface driver"
358
358
policy = data. aws_iam_policy_document . efs_csi [0 ]. json
@@ -393,7 +393,7 @@ data "aws_iam_policy_document" "external_dns" {
393
393
resource "aws_iam_policy" "external_dns" {
394
394
count = var. create_role && var. attach_external_dns_policy ? 1 : 0
395
395
396
- name_prefix = " AmazonEKS_External_DNS_Policy -"
396
+ name_prefix = " ${ var . policy_name_prefix } External_DNS_Policy -"
397
397
path = var. role_path
398
398
description = " External DNS policy to allow management of Route53 hosted zone records"
399
399
policy = data. aws_iam_policy_document . external_dns [0 ]. json
@@ -435,7 +435,7 @@ data "aws_iam_policy_document" "external_secrets" {
435
435
resource "aws_iam_policy" "external_secrets" {
436
436
count = var. create_role && var. attach_external_secrets_policy ? 1 : 0
437
437
438
- name_prefix = " AmazonEKS_External_Secrets_Policy -"
438
+ name_prefix = " ${ var . policy_name_prefix } External_Secrets_Policy -"
439
439
path = var. role_path
440
440
description = " Provides permissions to for External Secrets to retrieve secrets from AWS SSM and AWS Secrets Manager"
441
441
policy = data. aws_iam_policy_document . external_secrets [0 ]. json
@@ -492,7 +492,7 @@ data "aws_iam_policy_document" "fsx_lustre_csi" {
492
492
resource "aws_iam_policy" "fsx_lustre_csi" {
493
493
count = var. create_role && var. attach_fsx_lustre_csi_policy ? 1 : 0
494
494
495
- name_prefix = " AmazonEKS_FSx_Lustre_CSI_Policy -"
495
+ name_prefix = " ${ var . policy_name_prefix } FSx_Lustre_CSI_Policy -"
496
496
path = var. role_path
497
497
description = " Provides permissions to manage FSx Lustre volumes via the container storage interface driver"
498
498
policy = data. aws_iam_policy_document . fsx_lustre_csi [0 ]. json
@@ -586,7 +586,7 @@ data "aws_iam_policy_document" "karpenter_controller" {
586
586
resource "aws_iam_policy" "karpenter_controller" {
587
587
count = var. create_role && var. attach_karpenter_controller_policy ? 1 : 0
588
588
589
- name_prefix = " AmazonEKS_Karpenter_Controller_Policy -"
589
+ name_prefix = " ${ var . policy_name_prefix } Karpenter_Controller_Policy -"
590
590
path = var. role_path
591
591
description = " Provides permissions to handle node termination events via the Node Termination Handler"
592
592
policy = data. aws_iam_policy_document . karpenter_controller [0 ]. json
@@ -837,7 +837,7 @@ data "aws_iam_policy_document" "load_balancer_controller" {
837
837
resource "aws_iam_policy" "load_balancer_controller" {
838
838
count = var. create_role && var. attach_load_balancer_controller_policy ? 1 : 0
839
839
840
- name_prefix = " AmazonEKS_AWS_Load_Balancer_Controller -"
840
+ name_prefix = " ${ var . policy_name_prefix } AWS_Load_Balancer_Controller -"
841
841
path = var. role_path
842
842
description = " Provides permissions for AWS Load Balancer Controller addon"
843
843
policy = data. aws_iam_policy_document . load_balancer_controller [0 ]. json
@@ -881,7 +881,7 @@ data "aws_iam_policy_document" "load_balancer_controller_targetgroup_only" {
881
881
resource "aws_iam_policy" "load_balancer_controller_targetgroup_only" {
882
882
count = var. create_role && var. attach_load_balancer_controller_targetgroup_binding_only_policy ? 1 : 0
883
883
884
- name_prefix = " AmazonEKS_AWS_Load_Balancer_Controller_TargetGroup_Only -"
884
+ name_prefix = " ${ var . policy_name_prefix } AWS_Load_Balancer_Controller_TargetGroup_Only -"
885
885
path = var. role_path
886
886
description = " Provides permissions for AWS Load Balancer Controller addon in TargetGroup binding only scenario"
887
887
policy = data. aws_iam_policy_document . load_balancer_controller_targetgroup_only [0 ]. json
@@ -994,7 +994,7 @@ data "aws_iam_policy_document" "appmesh_controller" {
994
994
resource "aws_iam_policy" "appmesh_controller" {
995
995
count = var. create_role && var. attach_appmesh_controller_policy ? 1 : 0
996
996
997
- name_prefix = " AmazonEKS_Appmesh_Controller -"
997
+ name_prefix = " ${ var . policy_name_prefix } Appmesh_Controller -"
998
998
path = var. role_path
999
999
description = " Provides permissions to for appmesh controller"
1000
1000
policy = data. aws_iam_policy_document . appmesh_controller [0 ]. json
@@ -1036,7 +1036,7 @@ data "aws_iam_policy_document" "appmesh_envoy_proxy" {
1036
1036
resource "aws_iam_policy" "appmesh_envoy_proxy" {
1037
1037
count = var. create_role && var. attach_appmesh_envoy_proxy_policy ? 1 : 0
1038
1038
1039
- name_prefix = " AmazonEKS_Appmesh_Envoy_Proxy -"
1039
+ name_prefix = " ${ var . policy_name_prefix } Appmesh_Envoy_Proxy -"
1040
1040
path = var. role_path
1041
1041
description = " Provides permissions to for appmesh envoy proxy"
1042
1042
policy = data. aws_iam_policy_document . appmesh_envoy_proxy [0 ]. json
@@ -1075,7 +1075,7 @@ data "aws_iam_policy_document" "amazon_managed_service_prometheus" {
1075
1075
resource "aws_iam_policy" "amazon_managed_service_prometheus" {
1076
1076
count = var. create_role && var. attach_amazon_managed_service_prometheus_policy ? 1 : 0
1077
1077
1078
- name_prefix = " AmazonEKS_Managed_Service_Prometheus_Policy -"
1078
+ name_prefix = " ${ var . policy_name_prefix } Managed_Service_Prometheus_Policy -"
1079
1079
path = var. role_path
1080
1080
description = " Provides permissions to for Amazon Managed Service for Prometheus"
1081
1081
policy = data. aws_iam_policy_document . amazon_managed_service_prometheus [0 ]. json
@@ -1122,7 +1122,7 @@ data "aws_iam_policy_document" "node_termination_handler" {
1122
1122
resource "aws_iam_policy" "node_termination_handler" {
1123
1123
count = var. create_role && var. attach_node_termination_handler_policy ? 1 : 0
1124
1124
1125
- name_prefix = " AmazonEKS_Node_Termination_Handler_Policy -"
1125
+ name_prefix = " ${ var . policy_name_prefix } Node_Termination_Handler_Policy -"
1126
1126
path = var. role_path
1127
1127
description = " Provides permissions to handle node termination events via the Node Termination Handler"
1128
1128
policy = data. aws_iam_policy_document . node_termination_handler [0 ]. json
@@ -1182,7 +1182,7 @@ data "aws_iam_policy_document" "velero" {
1182
1182
resource "aws_iam_policy" "velero" {
1183
1183
count = var. create_role && var. attach_velero_policy ? 1 : 0
1184
1184
1185
- name_prefix = " AmazonEKS_Velero_Policy -"
1185
+ name_prefix = " ${ var . policy_name_prefix } Velero_Policy -"
1186
1186
path = var. role_path
1187
1187
description = " Provides Velero permissions to backup and restore cluster resources"
1188
1188
policy = data. aws_iam_policy_document . velero [0 ]. json
@@ -1252,7 +1252,7 @@ data "aws_iam_policy_document" "vpc_cni" {
1252
1252
resource "aws_iam_policy" "vpc_cni" {
1253
1253
count = var. create_role && var. attach_vpc_cni_policy ? 1 : 0
1254
1254
1255
- name_prefix = " AmazonEKS_CNI_Policy -"
1255
+ name_prefix = " ${ var . policy_name_prefix } CNI_Policy -"
1256
1256
path = var. role_path
1257
1257
description = " Provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes"
1258
1258
policy = data. aws_iam_policy_document . vpc_cni [0 ]. json
0 commit comments