You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/iam-role-for-service-accounts/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,7 +201,7 @@ No modules.
201
201
| <aname="input_mountpoint_s3_csi_bucket_arns"></a> [mountpoint\_s3\_csi\_bucket\_arns](#input\_mountpoint\_s3\_csi\_bucket\_arns)| S3 bucket ARNs to allow Mountpoint S3 CSI to list buckets |`list(string)`|`[]`| no |
202
202
| <aname="input_mountpoint_s3_csi_kms_arns"></a> [mountpoint\_s3\_csi\_kms\_arns](#input\_mountpoint\_s3\_csi\_kms\_arns)| KMS Key ARNs to allow Mountpoint S3 CSI driver to download and upload Objects of a S3 bucket using `aws:kms` SSE |`list(string)`|`[]`| no |
203
203
| <aname="input_mountpoint_s3_csi_path_arns"></a> [mountpoint\_s3\_csi\_path\_arns](#input\_mountpoint\_s3\_csi\_path\_arns)| S3 path ARNs to allow Mountpoint S3 CSI driver to manage items at the provided path(s). This is required if `attach_mountpoint_s3_csi_policy = true`|`list(string)`|`[]`| no |
204
-
| <aname="input_name"></a> [name](#input\_name)| Name to use on IAM role created |`string`|`null`| no |
204
+
| <aname="input_name"></a> [name](#input\_name)| Name to use on IAM role created |`string`|`""`| no |
205
205
| <aname="input_node_termination_handler_sqs_queue_arns"></a> [node\_termination\_handler\_sqs\_queue\_arns](#input\_node\_termination\_handler\_sqs\_queue\_arns)| List of SQS ARNs that contain node termination events |`list(string)`|`[]`| no |
206
206
| <aname="input_oidc_providers"></a> [oidc\_providers](#input\_oidc\_providers)| Map of OIDC providers where each provider map should contain the `provider`, `provider_arn`, and `namespace_service_accounts`|`any`|`{}`| no |
207
207
| <aname="input_override_inline_policy_documents"></a> [override\_inline\_policy\_documents](#input\_override\_inline\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid`|`list(string)`|`[]`| no |
var.attach_aws_gateway_controller_policy?"Provides permissions for the AWS Gateway Controller":null,
12
+
var.attach_cert_manager_policy?"Cert Manager policy to allow management of Route53 hosted zone records":null,
13
+
var.attach_cluster_autoscaler_policy?"Cluster autoscaler policy to allow examination and modification of EC2 Auto Scaling Groups":null,
14
+
var.attach_ebs_csi_policy?"Provides permissions to manage EBS volumes via the container storage interface driver":null,
15
+
var.attach_efs_csi_policy?"Provides permissions to manage EFS volumes via the container storage interface driver":null,
16
+
var.attach_mountpoint_s3_csi_policy?"Mountpoint S3 CSI driver policy to allow management of S3":null,
17
+
var.attach_external_dns_policy?"External DNS policy to allow management of Route53 hosted zone records":null,
18
+
var.attach_external_secrets_policy?"Provides permissions to for External Secrets to retrieve secrets from AWS SSM and AWS Secrets Manager":null,
19
+
var.attach_fsx_lustre_csi_policy?"Provides permissions to manage FSx Lustre volumes via the container storage interface driver":null,
20
+
var.attach_fsx_openzfs_csi_policy?"Provides permissions to manage FSx OpenZFS volumes via the container storage interface driver":null,
21
+
var.attach_load_balancer_controller_policy?"Provides permissions for AWS Load Balancer Controller addon":null,
22
+
var.attach_load_balancer_controller_targetgroup_binding_only_policy?"Provides permissions for AWS Load Balancer Controller addon in TargetGroup binding only scenario":null,
23
+
var.attach_amazon_managed_service_prometheus_policy?"Provides permissions to for Amazon Managed Service for Prometheus":null,
24
+
var.attach_node_termination_handler_policy?"Provides permissions to handle node termination events via the Node Termination Handler":null,
25
+
var.attach_velero_policy?"Provides Velero permissions to backup and restore cluster resources":null,
26
+
var.attach_vpc_cni_policy?"Provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes":null,
0 commit comments