mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-04-30 04:14:41 +02:00
feat: Add support for custom IAM role policy (#3087)
This commit is contained in:
@@ -283,6 +283,8 @@ module "fargate_profile" {
|
||||
# To better understand why this `lookup()` logic is required, see:
|
||||
# https://github.com/hashicorp/terraform/issues/31646#issuecomment-1217279031
|
||||
iam_role_additional_policies = lookup(each.value, "iam_role_additional_policies", lookup(var.fargate_profile_defaults, "iam_role_additional_policies", {}))
|
||||
create_iam_role_policy = try(each.value.create_iam_role_policy, var.fargate_profile_defaults.create_iam_role_policy, true)
|
||||
iam_role_policy_statements = try(each.value.iam_role_policy_statements, var.fargate_profile_defaults.iam_role_policy_statements, [])
|
||||
|
||||
tags = merge(var.tags, try(each.value.tags, var.fargate_profile_defaults.tags, {}))
|
||||
}
|
||||
@@ -393,6 +395,8 @@ module "eks_managed_node_group" {
|
||||
# To better understand why this `lookup()` logic is required, see:
|
||||
# https://github.com/hashicorp/terraform/issues/31646#issuecomment-1217279031
|
||||
iam_role_additional_policies = lookup(each.value, "iam_role_additional_policies", lookup(var.eks_managed_node_group_defaults, "iam_role_additional_policies", {}))
|
||||
create_iam_role_policy = try(each.value.create_iam_role_policy, var.eks_managed_node_group_defaults.create_iam_role_policy, true)
|
||||
iam_role_policy_statements = try(each.value.iam_role_policy_statements, var.eks_managed_node_group_defaults.iam_role_policy_statements, [])
|
||||
|
||||
# Autoscaling group schedule
|
||||
create_schedule = try(each.value.create_schedule, var.eks_managed_node_group_defaults.create_schedule, true)
|
||||
@@ -534,6 +538,8 @@ module "self_managed_node_group" {
|
||||
# To better understand why this `lookup()` logic is required, see:
|
||||
# https://github.com/hashicorp/terraform/issues/31646#issuecomment-1217279031
|
||||
iam_role_additional_policies = lookup(each.value, "iam_role_additional_policies", lookup(var.self_managed_node_group_defaults, "iam_role_additional_policies", {}))
|
||||
create_iam_role_policy = try(each.value.create_iam_role_policy, var.self_managed_node_group_defaults.create_iam_role_policy, true)
|
||||
iam_role_policy_statements = try(each.value.iam_role_policy_statements, var.self_managed_node_group_defaults.iam_role_policy_statements, [])
|
||||
|
||||
# Access entry
|
||||
create_access_entry = try(each.value.create_access_entry, var.self_managed_node_group_defaults.create_access_entry, true)
|
||||
|
||||
Reference in New Issue
Block a user