You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -396,7 +396,7 @@ Module usage with two unmanaged worker groups:
396
396
| <a name="input_access_entry_map"></a> [access\_entry\_map](#input\_access\_entry\_map) | Map of IAM Principal ARNs to access configuration.<br/>Preferred over other inputs as this configuration remains stable<br/>when elements are added or removed, but it requires that the Principal ARNs<br/>and Policy ARNs are known at plan time.<br/>Can be used along with other `access_*` inputs, but do not duplicate entries.<br/>Map `access_policy_associations` keys are policy ARNs, policy<br/>full name (AmazonEKSViewPolicy), or short name (View).<br/>It is recommended to use the default `user_name` because the default includes<br/>IAM role or user name and the session name for assumed roles.<br/>As a special case in support of backwards compatibility, membership in the<br/>`system:masters` group is is translated to an association with the ClusterAdmin policy.<br/>In all other cases, including any `system:*` group in `kubernetes_groups` is prohibited. | <pre>map(object({<br/> # key is principal_arn<br/> user_name = optional(string)<br/> # Cannot assign "system:*" groups to IAM users, use ClusterAdmin and Admin instead<br/> kubernetes_groups = optional(list(string), [])<br/> type = optional(string, "STANDARD")<br/> access_policy_associations = optional(map(object({<br/> # key is policy_arn or policy_name<br/> access_scope = optional(object({<br/> type = optional(string, "cluster")<br/> namespaces = optional(list(string))<br/> }), {}) # access_scope<br/> })), {}) # access_policy_associations<br/> }))</pre> | `{}` | no |
397
397
| <aname="input_access_policy_associations"></a> [access\_policy\_associations](#input\_access\_policy\_associations)| List of AWS managed EKS access policies to associate with IAM principles.<br/>Use when Principal ARN or Policy ARN is not known at plan time.<br/>`policy_arn` can be the full ARN, the full name (AmazonEKSViewPolicy) or short name (View). | <pre>list(object({<br/> principal_arn = string<br/> policy_arn = string<br/> access_scope = optional(object({<br/> type = optional(string, "cluster")<br/> namespaces = optional(list(string))<br/> }), {})<br/> }))</pre> |`[]`| no |
398
398
| <aname="input_additional_tag_map"></a> [additional\_tag\_map](#input\_additional\_tag\_map)| Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.<br/>This is for some rare cases where resources want additional configuration of tags<br/>and therefore take a list of maps with tag key, value, and additional configuration. |`map(string)`|`{}`| no |
399
-
| <a name="input_addons"></a> [addons](#input\_addons) | Manages [`aws_eks_addon`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) resources.<br/>Note: `resolve_conflicts` is deprecated. If `resolve_conflicts` is set and<br/>`resolve_conflicts_on_create` or `resolve_conflicts_on_update` is not set,<br/>`resolve_conflicts` will be used instead. If `resolve_conflicts_on_create` is<br/>not set and `resolve_conflicts` is `PRESERVE`, `resolve_conflicts_on_create`<br/>will be set to `NONE`.<br/>If `additional_tags` are specified, they are added to the standard resource tags. | <pre>list(object({<br/> addon_name = string<br/> addon_version = optional(string, null)<br/> configuration_values = optional(string, null)<br/> # resolve_conflicts is deprecated, but we keep it for backwards compatibility<br/> # and because if not declared, Terraform will silently ignore it.<br/> resolve_conflicts = optional(string, null)<br/> resolve_conflicts_on_create = optional(string, null)<br/> resolve_conflicts_on_update = optional(string, null)<br/> service_account_role_arn = optional(string, null)<br/> create_timeout = optional(string, null)<br/> update_timeout = optional(string, null)<br/> delete_timeout = optional(string, null)<br/> additional_tags = optional(map(string), {})<br/> }))</pre> | `[]` | no |
399
+
| <a name="input_addons"></a> [addons](#input\_addons) | Manages [`aws_eks_addon`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) resources.<br/>Note: `resolve_conflicts` is deprecated. If `resolve_conflicts` is set and<br/>`resolve_conflicts_on_create` or `resolve_conflicts_on_update` is not set,<br/>`resolve_conflicts` will be used instead. If `resolve_conflicts_on_create` is<br/>not set and `resolve_conflicts` is `PRESERVE`, `resolve_conflicts_on_create`<br/>will be set to `NONE`.<br/>If `additional_tags` are specified, they are added to the standard resource tags. | <pre>list(object({<br/> addon_name = string<br/> addon_version = optional(string, null)<br/> configuration_values = optional(string, null)<br/> # resolve_conflicts is deprecated, but we keep it for backwards compatibility<br/> # and because if not declared, Terraform will silently ignore it.<br/> resolve_conflicts = optional(string, null)<br/> resolve_conflicts_on_create = optional(string, null)<br/> resolve_conflicts_on_update = optional(string, null)<br/> service_account_role_arn = optional(string, null)<br/> pod_identity_association = optional(map(string), {})<br/> create_timeout = optional(string, null)<br/> update_timeout = optional(string, null)<br/> delete_timeout = optional(string, null)<br/> additional_tags = optional(map(string), {})<br/> }))</pre> | `[]` | no |
400
400
| <aname="input_addons_depends_on"></a> [addons\_depends\_on](#input\_addons\_depends\_on)| If provided, all addons will depend on this object, and therefore not be installed until this object is finalized.<br/>This is useful if you want to ensure that addons are not applied before some other condition is met, e.g. node groups are created.<br/>See [issue #170](https://github.com/cloudposse/terraform-aws-eks-cluster/issues/170) for more details. |`any`|`null`| no |
401
401
| <aname="input_allowed_cidr_blocks"></a> [allowed\_cidr\_blocks](#input\_allowed\_cidr\_blocks)| A list of IPv4 CIDRs to allow access to the cluster.<br/>The length of this list must be known at "plan" time. |`list(string)`|`[]`| no |
402
402
| <aname="input_allowed_security_group_ids"></a> [allowed\_security\_group\_ids](#input\_allowed\_security\_group\_ids)| A list of IDs of Security Groups to allow access to the cluster. |`list(string)`|`[]`| no |
0 commit comments