File tree 4 files changed +14
-5
lines changed
4 files changed +14
-5
lines changed Original file line number Diff line number Diff line change @@ -5,6 +5,7 @@ module "fargate" {
5
5
create_fargate_pod_execution_role = var. create_fargate_pod_execution_role
6
6
fargate_pod_execution_role_name = var. fargate_pod_execution_role_name
7
7
fargate_profiles = var. fargate_profiles
8
+ permissions_boundary = var. permissions_boundary
8
9
iam_path = var. iam_path
9
10
iam_policy_arn_prefix = local. policy_arn_prefix
10
11
subnets = var. subnets
Original file line number Diff line number Diff line change @@ -38,6 +38,7 @@ No requirements.
38
38
| fargate\_ profiles | Fargate profiles to create. See ` fargate_profile ` keys section in README.md for more details | ` any ` | ` {} ` | no |
39
39
| iam\_ path | IAM roles will be created on this path. | ` string ` | ` "/" ` | no |
40
40
| iam\_ policy\_ arn\_ prefix | IAM policy prefix with the correct AWS partition. | ` string ` | n/a | yes |
41
+ | permissions\_ boundary | If provided, all IAM roles will be created with this permissions boundary attached. | ` string ` | ` null ` | no |
41
42
| subnets | A list of subnets for the EKS Fargate profiles. | ` list(string) ` | ` [] ` | no |
42
43
| tags | A map of tags to add to all resources. | ` map(string) ` | ` {} ` | no |
43
44
Original file line number Diff line number Diff line change 1
1
resource "aws_iam_role" "eks_fargate_pod" {
2
- count = local. create_eks && var. create_fargate_pod_execution_role ? 1 : 0
3
- name_prefix = format (" %s-fargate" , var. cluster_name )
4
- assume_role_policy = data. aws_iam_policy_document . eks_fargate_pod_assume_role [0 ]. json
5
- tags = var. tags
6
- path = var. iam_path
2
+ count = local. create_eks && var. create_fargate_pod_execution_role ? 1 : 0
3
+ name_prefix = format (" %s-fargate" , var. cluster_name )
4
+ assume_role_policy = data. aws_iam_policy_document . eks_fargate_pod_assume_role [0 ]. json
5
+ permissions_boundary = var. permissions_boundary
6
+ tags = var. tags
7
+ path = var. iam_path
7
8
}
8
9
9
10
resource "aws_iam_role_policy_attachment" "eks_fargate_pod" {
Original file line number Diff line number Diff line change @@ -38,6 +38,12 @@ variable "fargate_profiles" {
38
38
default = {}
39
39
}
40
40
41
+ variable "permissions_boundary" {
42
+ description = " If provided, all IAM roles will be created with this permissions boundary attached."
43
+ type = string
44
+ default = null
45
+ }
46
+
41
47
variable "subnets" {
42
48
description = " A list of subnets for the EKS Fargate profiles."
43
49
type = list (string )
You can’t perform that action at this time.
0 commit comments