You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -372,7 +372,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
372
372
|[aws_eks_addon_version.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_addon_version)| data source |
373
373
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
374
374
|[aws_iam_policy_document.cni_ipv6_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
375
-
|[aws_iam_policy_document.eks_auto_custom](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
375
+
|[aws_iam_policy_document.custom](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
376
376
|[aws_iam_policy_document.node_assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
377
377
|[aws_iam_session_context.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_session_context)| data source |
378
378
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
@@ -435,11 +435,11 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
435
435
| <aname="input_dataplane_wait_duration"></a> [dataplane\_wait\_duration](#input\_dataplane\_wait\_duration)| Duration to wait after the EKS cluster has become active before creating the dataplane components (EKS managed node group(s), self-managed node group(s), Fargate profile(s)) |`string`|`"30s"`| no |
436
436
| <aname="input_eks_managed_node_group_defaults"></a> [eks\_managed\_node\_group\_defaults](#input\_eks\_managed\_node\_group\_defaults)| Map of EKS managed node group default configurations |`any`|`{}`| no |
437
437
| <aname="input_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#input\_eks\_managed\_node\_groups)| Map of EKS managed node group definitions to create |`any`|`{}`| no |
438
+
| <aname="input_enable_auto_mode_custom_tags"></a> [enable\_auto\_mode\_custom\_tags](#input\_enable\_auto\_mode\_custom\_tags)| Determines whether to enable permissions for custom tags resources created by EKS Auto Mode |`bool`|`true`| no |
438
439
| <aname="input_enable_cluster_creator_admin_permissions"></a> [enable\_cluster\_creator\_admin\_permissions](#input\_enable\_cluster\_creator\_admin\_permissions)| Indicates whether or not to add the cluster creator (the identity used by Terraform) as an administrator via access entry |`bool`|`false`| no |
439
440
| <aname="input_enable_efa_support"></a> [enable\_efa\_support](#input\_enable\_efa\_support)| Determines whether to enable Elastic Fabric Adapter (EFA) support |`bool`|`false`| no |
440
441
| <aname="input_enable_irsa"></a> [enable\_irsa](#input\_enable\_irsa)| Determines whether to create an OpenID Connect Provider for EKS to enable IRSA |`bool`|`true`| no |
441
442
| <aname="input_enable_kms_key_rotation"></a> [enable\_kms\_key\_rotation](#input\_enable\_kms\_key\_rotation)| Specifies whether key rotation is enabled |`bool`|`true`| no |
442
-
| <aname="input_enable_node_custom_tags_permissions"></a> [enable\_node\_custom\_tags\_permissions](#input\_enable\_node\_custom\_tags\_permissions)| Determines whether to enable permissions for custom tags for the EKS Auto node IAM role |`bool`|`true`| no |
443
443
| <aname="input_enable_security_groups_for_pods"></a> [enable\_security\_groups\_for\_pods](#input\_enable\_security\_groups\_for\_pods)| Determines whether to add the necessary IAM permission policy for security groups for pods |`bool`|`true`| no |
444
444
| <aname="input_fargate_profile_defaults"></a> [fargate\_profile\_defaults](#input\_fargate\_profile\_defaults)| Map of Fargate Profile default configurations |`any`|`{}`| no |
445
445
| <aname="input_fargate_profiles"></a> [fargate\_profiles](#input\_fargate\_profiles)| Map of Fargate Profile definitions to create |`any`|`{}`| no |
@@ -467,7 +467,6 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
467
467
| <aname="input_node_iam_role_name"></a> [node\_iam\_role\_name](#input\_node\_iam\_role\_name)| Name to use on the EKS Auto node IAM role created |`string`|`null`| no |
468
468
| <aname="input_node_iam_role_path"></a> [node\_iam\_role\_path](#input\_node\_iam\_role\_path)| The EKS Auto node IAM role path |`string`|`null`| no |
469
469
| <aname="input_node_iam_role_permissions_boundary"></a> [node\_iam\_role\_permissions\_boundary](#input\_node\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the EKS Auto node IAM role |`string`|`null`| no |
470
-
| <aname="input_node_iam_role_policy_statements"></a> [node\_iam\_role\_policy\_statements](#input\_node\_iam\_role\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed |`any`|`[]`| no |
471
470
| <aname="input_node_iam_role_tags"></a> [node\_iam\_role\_tags](#input\_node\_iam\_role\_tags)| A map of additional tags to add to the EKS Auto node IAM role created |`map(string)`|`{}`| no |
472
471
| <aname="input_node_iam_role_use_name_prefix"></a> [node\_iam\_role\_use\_name\_prefix](#input\_node\_iam\_role\_use\_name\_prefix)| Determines whether the EKS Auto node IAM role name (`node_iam_role_name`) is used as a prefix |`bool`|`true`| no |
473
472
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created. Set `source_cluster_security_group = true` inside rules to set the `cluster_security_group` as source |`any`|`{}`| no |
0 commit comments