diff --git a/README.md b/README.md index 4845175..14a7587 100644 --- a/README.md +++ b/README.md @@ -88,7 +88,7 @@ An opinionated Terraform module that can be used to create and manage an EKS clu | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | [allow\_imdsv1](#input\_allow\_imdsv1) | Whether to allow IMDSv1 access (insecure). | `bool` | `false` | no | -| [ami\_owners](#input\_ami\_owners) | The list of acceptable owners of AMIs to be used for worker nodes. | `list(string)` |
[
"099720109477",
"679593333241",
"amazon",
"self"
]
| no | +| [ami\_owners](#input\_ami\_owners) | The list of acceptable owners of AMIs to be used for worker nodes. | `list(string)` |
[
"099720109477",
"679593333241",
"amazon",
"self"
]
| no | | [aws\_ebs\_csi\_driver\_oidc\_fully\_qualified\_subjects](#input\_aws\_ebs\_csi\_driver\_oidc\_fully\_qualified\_subjects) | The list of trusted resources which can assume the 'aws-ebs-csi-driver' role using OpenID Connect. | `list(string)` | `[]` | no | | [aws\_load\_balancer\_controller\_oidc\_fully\_qualified\_subjects](#input\_aws\_load\_balancer\_controller\_oidc\_fully\_qualified\_subjects) | The list of trusted resources which can assume the 'aws-load-balancer-controller' role using OpenID Connect. | `list(string)` | `[]` | no | | [cert\_manager\_oidc\_fully\_qualified\_subjects](#input\_cert\_manager\_oidc\_fully\_qualified\_subjects) | The list of trusted resources which can assume the 'cert-manager' role using OpenID Connect. | `list(string)` | `[]` | no | @@ -107,7 +107,7 @@ An opinionated Terraform module that can be used to create and manage an EKS clu | [phlare\_bucket\_name](#input\_phlare\_bucket\_name) | The name of the S3 bucket that will be used by Phlare | `string` | `""` | no | | [phlare\_oidc\_fully\_qualified\_subjects](#input\_phlare\_oidc\_fully\_qualified\_subjects) | The list of trusted resources which can assume the 'phlare' role using OpenID Connect. | `list(string)` | `[]` | no | | [region](#input\_region) | The region in which to create the EKS cluster. | `string` | n/a | yes | -| [self\_managed\_node\_groups](#input\_self\_managed\_node\_groups) | A map describing the set of self-managed node groups to create. Other types of node groups besides self-managed are currently not supported. |
map(object({
ami_type = string
ami_name_filter = string
extra_tags = map(string)
instance_type = string
kubelet_extra_args = string
max_nodes = number
min_nodes = number
name = string
pre_bootstrap_user_data = string
post_bootstrap_user_data = string
root_volume_id = string
root_volume_size = number
root_volume_type = string
subnet_ids = list(string)
iam_role_additional_policies = map(string)
iam_role_use_name_prefix = optional(bool, true)
key_name = optional(string)
}))
| n/a | yes | +| [self\_managed\_node\_groups](#input\_self\_managed\_node\_groups) | A map describing the set of self-managed node groups to create. Other types of node groups besides self-managed are currently not supported. |
map(object({
ami_type = string
ami_name_filter = string
extra_tags = map(string)
instance_type = string
kubelet_extra_args = string
max_nodes = number
min_nodes = number
name = string
pre_bootstrap_user_data = string
post_bootstrap_user_data = string
root_volume_id = string
root_volume_size = number
root_volume_type = string
subnet_ids = list(string)
iam_role_additional_policies = map(string)
iam_role_use_name_prefix = optional(bool, true)
key_name = optional(string)
}))
| n/a | yes | | [tags](#input\_tags) | The set of tags to place on the EKS cluster. | `map(string)` | n/a | yes | | [velero\_bucket\_name](#input\_velero\_bucket\_name) | The name of the S3 bucket that will be used to upload Velero backups. | `string` | `""` | no | | [velero\_oidc\_fully\_qualified\_subjects](#input\_velero\_oidc\_fully\_qualified\_subjects) | The list of trusted resources which can assume the 'velero' role using OpenID Connect. | `list(string)` | `[]` | no | @@ -118,6 +118,7 @@ An opinionated Terraform module that can be used to create and manage an EKS clu | Name | Description | |------|-------------| +| [aws\_ebs\_csi\_driver\_policy\_arn](#output\_aws\_ebs\_csi\_driver\_policy\_arn) | n/a | | [aws\_ebs\_csi\_driver\_role\_arn](#output\_aws\_ebs\_csi\_driver\_role\_arn) | n/a | | [aws\_load\_balancer\_controller\_role\_arn](#output\_aws\_load\_balancer\_controller\_role\_arn) | n/a | | [cert\_manager\_role\_arn](#output\_cert\_manager\_role\_arn) | n/a | diff --git a/outputs.tf b/outputs.tf index 44357e8..faca8b0 100644 --- a/outputs.tf +++ b/outputs.tf @@ -16,6 +16,10 @@ output "aws_ebs_csi_driver_role_arn" { value = length(var.aws_ebs_csi_driver_oidc_fully_qualified_subjects) > 0 ? module.iam_assumable_role_aws_ebs_csi_driver[0].iam_role_arn : "" } +output "aws_ebs_csi_driver_policy_arn" { + value = length(var.aws_ebs_csi_driver_oidc_fully_qualified_subjects) > 0 ? aws_iam_policy.aws_ebs_csi_driver[0].arn : "" +} + output "aws_load_balancer_controller_role_arn" { value = length(var.aws_load_balancer_controller_oidc_fully_qualified_subjects) > 0 ? module.iam_assumable_role_aws_load_balancer_controller[0].iam_role_arn : "" }