You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.cert_manager](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
67
-
|[aws_iam_policy_document.cert_manager_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
68
-
|[aws_iam_policy_document.cert_manager_irsa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
69
-
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
59
+
|[aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
60
+
|[aws_iam_policy_document.this_irsa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
70
61
|[utils_deep_merge_yaml.argo_application_values](https://registry.terraform.io/providers/cloudposse/utils/latest/docs/data-sources/deep_merge_yaml)| data source |
71
62
|[utils_deep_merge_yaml.default_cluster_issuer_values](https://registry.terraform.io/providers/cloudposse/utils/latest/docs/data-sources/deep_merge_yaml)| data source |
72
63
|[utils_deep_merge_yaml.values](https://registry.terraform.io/providers/cloudposse/utils/latest/docs/data-sources/deep_merge_yaml)| data source |
| <aname="input_cluster_identity_oidc_issuer"></a> [cluster\_identity\_oidc\_issuer](#input\_cluster\_identity\_oidc\_issuer)| The OIDC Identity issuer for the cluster |`string`| n/a | yes |
79
70
| <aname="input_cluster_identity_oidc_issuer_arn"></a> [cluster\_identity\_oidc\_issuer\_arn](#input\_cluster\_identity\_oidc\_issuer\_arn)| The OIDC Identity issuer ARN for the cluster that can be used to associate IAM roles with a service account |`string`| n/a | yes |
80
-
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| The name of the cluster |`string`| n/a | yes |
81
71
| <aname="input_argo_application_enabled"></a> [argo\_application\_enabled](#input\_argo\_application\_enabled)| If set to true, the module will be deployed as ArgoCD application, otherwise it will be deployed as a Helm release |`bool`|`false`| no |
82
72
| <aname="input_argo_application_use_helm"></a> [argo\_application\_use\_helm](#input\_argo\_application\_use\_helm)| If set to true, the ArgoCD Application manifest will be deployed using Kubernetes provider as a Helm release. Otherwise it'll be deployed as a Kubernetes manifest. See Readme for more info |`bool`|`false`| no |
83
73
| <aname="input_argo_application_values"></a> [argo\_application\_values](#input\_argo\_application\_values)| Value overrides to use when deploying argo application object with helm |`string`|`""`| no |
@@ -95,19 +85,29 @@ No modules.
95
85
| <aname="input_helm_create_namespace"></a> [helm\_create\_namespace](#input\_helm\_create\_namespace)| Whether to create k8s namespace with name defined by `k8s_namespace`|`bool`|`true`| no |
96
86
| <aname="input_helm_release_name"></a> [helm\_release\_name](#input\_helm\_release\_name)| Helm release name |`string`|`"cert-manager"`| no |
97
87
| <aname="input_helm_repo_url"></a> [helm\_repo\_url](#input\_helm\_repo\_url)| Helm repository |`string`|`"https://charts.jetstack.io"`| no |
98
-
| <aname="input_k8s_assume_role_arn"></a> [k8s\_assume\_role\_arn](#input\_k8s\_assume\_role\_arn)| Whether to create and use default role or assume existing role. Useful for hosted zones in another AWS account. Default (empty string) use default role. |`string`|`""`| no |
88
+
| <aname="input_k8s_assume_role_arns"></a> [k8s\_assume\_role\_arns](#input\_k8s\_assume\_role\_arns)| Allow IRSA to assume specified role arns. Assume role must be enabled. |`list(string)`|`[]`| no |
89
+
| <aname="input_k8s_assume_role_enabled"></a> [k8s\_assume\_role\_enabled](#input\_k8s\_assume\_role\_enabled)| Whether IRSA is allowed to assume role defined by k8s\_assume\_role\_arn. Useful for hosted zones in another AWS account. |`bool`|`false`| no |
90
+
| <aname="input_k8s_irsa_additional_policies"></a> [k8s\_irsa\_additional\_policies](#input\_k8s\_irsa\_additional\_policies)| Map of the additional policies to be attached to default role. Where key is arbiraty id and value is policy arn. |`map(string)`|`{}`| no |
91
+
| <aname="input_k8s_irsa_policy_enabled"></a> [k8s\_irsa\_policy\_enabled](#input\_k8s\_irsa\_policy\_enabled)| Whether to create opinionated policy to allow operations on specified zones in `policy_allowed_zone_ids`. |`bool`|`true`| no |
99
92
| <aname="input_k8s_irsa_role_create"></a> [k8s\_irsa\_role\_create](#input\_k8s\_irsa\_role\_create)| Whether to create IRSA role and annotate service account |`bool`|`true`| no |
93
+
| <aname="input_k8s_irsa_role_name_prefix"></a> [k8s\_irsa\_role\_name\_prefix](#input\_k8s\_irsa\_role\_name\_prefix)| The IRSA role name prefix for prometheus |`string`|`"cert-manager-irsa"`| no |
100
94
| <aname="input_k8s_namespace"></a> [k8s\_namespace](#input\_k8s\_namespace)| The K8s namespace in which the external-dns will be installed |`string`|`"kube-system"`| no |
101
95
| <aname="input_k8s_rbac_create"></a> [k8s\_rbac\_create](#input\_k8s\_rbac\_create)| Whether to create and use RBAC resources |`bool`|`true`| no |
102
96
| <aname="input_k8s_service_account_create"></a> [k8s\_service\_account\_create](#input\_k8s\_service\_account\_create)| Whether to create Service Account |`bool`|`true`| no |
103
97
| <aname="input_k8s_service_account_name"></a> [k8s\_service\_account\_name](#input\_k8s\_service\_account\_name)| The k8s cert-manager service account name |`string`|`"cert-manager"`| no |
104
98
| <aname="input_policy_allowed_zone_ids"></a> [policy\_allowed\_zone\_ids](#input\_policy\_allowed\_zone\_ids)| List of the Route53 zone ids for service account IAM role access |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
105
99
| <aname="input_settings"></a> [settings](#input\_settings)| Additional settings which will be passed to the Helm chart values, see https://artifacthub.io/packages/helm/cert-manager/cert-manager|`map(any)`|`{}`| no |
100
+
| <aname="input_tags"></a> [tags](#input\_tags)| AWS resources tags |`map(string)`|`{}`| no |
106
101
| <aname="input_values"></a> [values](#input\_values)| Additional values for cert manager helm chart. Values will be merged, in order, as Helm does with multiple -f options |`string`|`""`| no |
0 commit comments