mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-17 00:57:28 +01:00
feat: Add variable to provide additional OIDC thumbprints (#1865)
Co-authored-by: Anton Babenko <anton@antonbabenko.com>
This commit is contained in:
@@ -791,6 +791,7 @@ Full contributing [guidelines are covered here](https://github.com/terraform-aws
|
||||
| <a name="input_create_cni_ipv6_iam_policy"></a> [create\_cni\_ipv6\_iam\_policy](#input\_create\_cni\_ipv6\_iam\_policy) | Determines whether to create an [`AmazonEKS_CNI_IPv6_Policy`](https://docs.aws.amazon.com/eks/latest/userguide/cni-iam-role.html#cni-iam-role-create-ipv6-policy) | `bool` | `false` | no |
|
||||
| <a name="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role) | Determines whether a an IAM role is created or to use an existing IAM role | `bool` | `true` | no |
|
||||
| <a name="input_create_node_security_group"></a> [create\_node\_security\_group](#input\_create\_node\_security\_group) | Determines whether to create a security group for the node groups or use the existing `node_security_group_id` | `bool` | `true` | no |
|
||||
| <a name="input_custom_oidc_thumbprints"></a> [custom\_oidc\_thumbprints](#input\_custom\_oidc\_thumbprints) | Additional list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider's server certificate(s) | `list(string)` | `[]` | no |
|
||||
| <a name="input_eks_managed_node_group_defaults"></a> [eks\_managed\_node\_group\_defaults](#input\_eks\_managed\_node\_group\_defaults) | Map of EKS managed node group default configurations | `any` | `{}` | no |
|
||||
| <a name="input_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#input\_eks\_managed\_node\_groups) | Map of EKS managed node group definitions to create | `any` | `{}` | no |
|
||||
| <a name="input_enable_irsa"></a> [enable\_irsa](#input\_enable\_irsa) | Determines whether to create an OpenID Connect Provider for EKS to enable IRSA | `bool` | `true` | no |
|
||||
|
||||
2
main.tf
2
main.tf
@@ -156,7 +156,7 @@ resource "aws_iam_openid_connect_provider" "oidc_provider" {
|
||||
count = var.create && var.enable_irsa ? 1 : 0
|
||||
|
||||
client_id_list = distinct(compact(concat(["sts.${data.aws_partition.current.dns_suffix}"], var.openid_connect_audiences)))
|
||||
thumbprint_list = [data.tls_certificate.this[0].certificates[0].sha1_fingerprint]
|
||||
thumbprint_list = concat([data.tls_certificate.this[0].certificates[0].sha1_fingerprint], var.custom_oidc_thumbprints)
|
||||
url = aws_eks_cluster.this[0].identity[0].oidc[0].issuer
|
||||
|
||||
tags = merge(
|
||||
|
||||
@@ -247,6 +247,12 @@ variable "openid_connect_audiences" {
|
||||
default = []
|
||||
}
|
||||
|
||||
variable "custom_oidc_thumbprints" {
|
||||
description = "Additional list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider's server certificate(s)"
|
||||
type = list(string)
|
||||
default = []
|
||||
}
|
||||
|
||||
################################################################################
|
||||
# Cluster IAM Role
|
||||
################################################################################
|
||||
|
||||
Reference in New Issue
Block a user