Skip to content

Commit 7a25e3e

Browse files
committed
chore: update README.md
1 parent 78ee99b commit 7a25e3e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -340,14 +340,14 @@ Module usage with two unmanaged worker groups:
340340
| Name | Version |
341341
|------|---------|
342342
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.0 |
343-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.74.0 |
343+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.75.1 |
344344
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 3.1.0, != 4.0.0 |
345345

346346
## Providers
347347

348348
| Name | Version |
349349
|------|---------|
350-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.74.0 |
350+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.75.1 |
351351
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 3.1.0, != 4.0.0 |
352352

353353
## Modules
@@ -396,7 +396,7 @@ Module usage with two unmanaged worker groups:
396396
| <a name="input_access_entry_map"></a> [access\_entry\_map](#input\_access\_entry\_map) | Map of IAM Principal ARNs to access configuration.<br/>Preferred over other inputs as this configuration remains stable<br/>when elements are added or removed, but it requires that the Principal ARNs<br/>and Policy ARNs are known at plan time.<br/>Can be used along with other `access_*` inputs, but do not duplicate entries.<br/>Map `access_policy_associations` keys are policy ARNs, policy<br/>full name (AmazonEKSViewPolicy), or short name (View).<br/>It is recommended to use the default `user_name` because the default includes<br/>IAM role or user name and the session name for assumed roles.<br/>As a special case in support of backwards compatibility, membership in the<br/>`system:masters` group is is translated to an association with the ClusterAdmin policy.<br/>In all other cases, including any `system:*` group in `kubernetes_groups` is prohibited. | <pre>map(object({<br/> # key is principal_arn<br/> user_name = optional(string)<br/> # Cannot assign "system:*" groups to IAM users, use ClusterAdmin and Admin instead<br/> kubernetes_groups = optional(list(string), [])<br/> type = optional(string, "STANDARD")<br/> access_policy_associations = optional(map(object({<br/> # key is policy_arn or policy_name<br/> access_scope = optional(object({<br/> type = optional(string, "cluster")<br/> namespaces = optional(list(string))<br/> }), {}) # access_scope<br/> })), {}) # access_policy_associations<br/> }))</pre> | `{}` | no |
397397
| <a name="input_access_policy_associations"></a> [access\_policy\_associations](#input\_access\_policy\_associations) | List of AWS managed EKS access policies to associate with IAM principles.<br/>Use when Principal ARN or Policy ARN is not known at plan time.<br/>`policy_arn` can be the full ARN, the full name (AmazonEKSViewPolicy) or short name (View). | <pre>list(object({<br/> principal_arn = string<br/> policy_arn = string<br/> access_scope = optional(object({<br/> type = optional(string, "cluster")<br/> namespaces = optional(list(string))<br/> }), {})<br/> }))</pre> | `[]` | no |
398398
| <a name="input_additional_tag_map"></a> [additional\_tag\_map](#input\_additional\_tag\_map) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.<br/>This is for some rare cases where resources want additional configuration of tags<br/>and therefore take a list of maps with tag key, value, and additional configuration. | `map(string)` | `{}` | no |
399-
| <a name="input_addons"></a> [addons](#input\_addons) | Manages [`aws_eks_addon`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) resources.<br/>Note: `resolve_conflicts` is deprecated. If `resolve_conflicts` is set and<br/>`resolve_conflicts_on_create` or `resolve_conflicts_on_update` is not set,<br/>`resolve_conflicts` will be used instead. If `resolve_conflicts_on_create` is<br/>not set and `resolve_conflicts` is `PRESERVE`, `resolve_conflicts_on_create`<br/>will be set to `NONE`.<br/>If `additional_tags` are specified, they are added to the standard resource tags. | <pre>list(object({<br/> addon_name = string<br/> addon_version = optional(string, null)<br/> configuration_values = optional(string, null)<br/> # resolve_conflicts is deprecated, but we keep it for backwards compatibility<br/> # and because if not declared, Terraform will silently ignore it.<br/> resolve_conflicts = optional(string, null)<br/> resolve_conflicts_on_create = optional(string, null)<br/> resolve_conflicts_on_update = optional(string, null)<br/> service_account_role_arn = optional(string, null)<br/> create_timeout = optional(string, null)<br/> update_timeout = optional(string, null)<br/> delete_timeout = optional(string, null)<br/> additional_tags = optional(map(string), {})<br/> }))</pre> | `[]` | no |
399+
| <a name="input_addons"></a> [addons](#input\_addons) | Manages [`aws_eks_addon`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) resources.<br/>Note: `resolve_conflicts` is deprecated. If `resolve_conflicts` is set and<br/>`resolve_conflicts_on_create` or `resolve_conflicts_on_update` is not set,<br/>`resolve_conflicts` will be used instead. If `resolve_conflicts_on_create` is<br/>not set and `resolve_conflicts` is `PRESERVE`, `resolve_conflicts_on_create`<br/>will be set to `NONE`.<br/>If `additional_tags` are specified, they are added to the standard resource tags. | <pre>list(object({<br/> addon_name = string<br/> addon_version = optional(string, null)<br/> configuration_values = optional(string, null)<br/> # resolve_conflicts is deprecated, but we keep it for backwards compatibility<br/> # and because if not declared, Terraform will silently ignore it.<br/> resolve_conflicts = optional(string, null)<br/> resolve_conflicts_on_create = optional(string, null)<br/> resolve_conflicts_on_update = optional(string, null)<br/> service_account_role_arn = optional(string, null)<br/> pod_identity_association = optional(map(string), {})<br/> create_timeout = optional(string, null)<br/> update_timeout = optional(string, null)<br/> delete_timeout = optional(string, null)<br/> additional_tags = optional(map(string), {})<br/> }))</pre> | `[]` | no |
400400
| <a name="input_addons_depends_on"></a> [addons\_depends\_on](#input\_addons\_depends\_on) | If provided, all addons will depend on this object, and therefore not be installed until this object is finalized.<br/>This is useful if you want to ensure that addons are not applied before some other condition is met, e.g. node groups are created.<br/>See [issue #170](https://github.com/cloudposse/terraform-aws-eks-cluster/issues/170) for more details. | `any` | `null` | no |
401401
| <a name="input_allowed_cidr_blocks"></a> [allowed\_cidr\_blocks](#input\_allowed\_cidr\_blocks) | A list of IPv4 CIDRs to allow access to the cluster.<br/>The length of this list must be known at "plan" time. | `list(string)` | `[]` | no |
402402
| <a name="input_allowed_security_group_ids"></a> [allowed\_security\_group\_ids](#input\_allowed\_security\_group\_ids) | A list of IDs of Security Groups to allow access to the cluster. | `list(string)` | `[]` | no |

0 commit comments

Comments
 (0)