You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: Add support for Karpenter v1 controller IAM role permissions (#3126)
* chore: update controller IAM role permissions to support karpenter v1
* Update versions.tf
* Revert "Update versions.tf"
This reverts commit f0e5c79.
* fix: Add support for both v1 and prior to v1 controller permission policy
---------
Co-authored-by: Bryant Biggs <[email protected]>
Copy file name to clipboardExpand all lines: modules/karpenter/README.md
+3Lines changed: 3 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -121,6 +121,8 @@ No modules.
121
121
|[aws_iam_policy_document.controller_assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
122
122
|[aws_iam_policy_document.node_assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
123
123
|[aws_iam_policy_document.queue](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
124
+
|[aws_iam_policy_document.v033](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
125
+
|[aws_iam_policy_document.v1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
124
126
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
125
127
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
126
128
@@ -141,6 +143,7 @@ No modules.
141
143
| <aname="input_enable_irsa"></a> [enable\_irsa](#input\_enable\_irsa)| Determines whether to enable support for IAM role for service accounts |`bool`|`false`| no |
142
144
| <aname="input_enable_pod_identity"></a> [enable\_pod\_identity](#input\_enable\_pod\_identity)| Determines whether to enable support for EKS pod identity |`bool`|`true`| no |
143
145
| <aname="input_enable_spot_termination"></a> [enable\_spot\_termination](#input\_enable\_spot\_termination)| Determines whether to enable native spot termination handling |`bool`|`true`| no |
146
+
| <aname="input_enable_v1_permissions"></a> [enable\_v1\_permissions](#input\_enable\_v1\_permissions)| Determines whether to enable permissions suitable for v1+ (`true`) or for v0.33.x-v0.37.x (`false`) |`bool`|`false`| no |
144
147
| <aname="input_iam_policy_description"></a> [iam\_policy\_description](#input\_iam\_policy\_description)| IAM policy description |`string`|`"Karpenter controller IAM policy"`| no |
145
148
| <aname="input_iam_policy_name"></a> [iam\_policy\_name](#input\_iam\_policy\_name)| Name of the IAM policy |`string`|`"KarpenterController"`| no |
146
149
| <aname="input_iam_policy_path"></a> [iam\_policy\_path](#input\_iam\_policy\_path)| Path of the IAM policy |`string`|`"/"`| no |
0 commit comments