@@ -110,6 +110,7 @@ data "aws_iam_policy_document" "cluster_autoscaler" {
110
110
dynamic "statement" {
111
111
# TODO - remove *_ids at next breaking change
112
112
for_each = toset (coalescelist (var. cluster_autoscaler_cluster_ids , var. cluster_autoscaler_cluster_names ))
113
+
113
114
content {
114
115
actions = [
115
116
" autoscaling:SetDesiredCapacity" ,
@@ -306,6 +307,7 @@ data "aws_iam_policy_document" "ebs_csi" {
306
307
307
308
dynamic "statement" {
308
309
for_each = length (var. ebs_csi_kms_cmk_ids ) > 0 ? [1 ] : []
310
+
309
311
content {
310
312
actions = [
311
313
" kms:CreateGrant" ,
@@ -325,6 +327,7 @@ data "aws_iam_policy_document" "ebs_csi" {
325
327
326
328
dynamic "statement" {
327
329
for_each = length (var. ebs_csi_kms_cmk_ids ) > 0 ? [1 ] : []
330
+
328
331
content {
329
332
actions = [
330
333
" kms:Encrypt" ,
@@ -455,6 +458,7 @@ data "aws_iam_policy_document" "mountpoint_s3_csi" {
455
458
456
459
dynamic "statement" {
457
460
for_each = length (var. mountpoint_s3_csi_kms_arns ) > 0 ? [1 ] : []
461
+
458
462
content {
459
463
actions = [
460
464
" kms:GenerateDataKey" ,
@@ -539,12 +543,17 @@ data "aws_iam_policy_document" "external_secrets" {
539
543
resources = [" *" ]
540
544
}
541
545
542
- statement {
543
- actions = [
544
- " ssm:GetParameter" ,
545
- " ssm:GetParameters" ,
546
- ]
547
- resources = var. external_secrets_ssm_parameter_arns
546
+ dynamic "statement" {
547
+ for_each = length (var. external_secrets_ssm_parameter_arns ) > 0 ? [1 ] : []
548
+
549
+ content {
550
+ actions = [
551
+ " ssm:GetParameter" ,
552
+ " ssm:GetParameters" ,
553
+ ]
554
+
555
+ resources = var. external_secrets_ssm_parameter_arns
556
+ }
548
557
}
549
558
550
559
statement {
@@ -562,13 +571,18 @@ data "aws_iam_policy_document" "external_secrets" {
562
571
resources = var. external_secrets_secrets_manager_arns
563
572
}
564
573
565
- statement {
566
- actions = [" kms:Decrypt" ]
567
- resources = var. external_secrets_kms_key_arns
574
+ dynamic "statement" {
575
+ for_each = length (var. external_secrets_kms_key_arns ) > 0 ? [1 ] : []
576
+
577
+ content {
578
+ actions = [" kms:Decrypt" ]
579
+ resources = var. external_secrets_kms_key_arns
580
+ }
568
581
}
569
582
570
583
dynamic "statement" {
571
584
for_each = var. external_secrets_secrets_manager_create_permission ? [1 ] : []
585
+
572
586
content {
573
587
actions = [
574
588
" secretsmanager:CreateSecret" ,
@@ -581,9 +595,11 @@ data "aws_iam_policy_document" "external_secrets" {
581
595
582
596
dynamic "statement" {
583
597
for_each = var. external_secrets_secrets_manager_create_permission ? [1 ] : []
598
+
584
599
content {
585
600
actions = [" secretsmanager:DeleteSecret" ]
586
601
resources = var. external_secrets_secrets_manager_arns
602
+
587
603
condition {
588
604
test = " StringEquals"
589
605
variable = " secretsmanager:ResourceTag/managed-by"
@@ -631,6 +647,7 @@ data "aws_iam_policy_document" "fsx_lustre_csi" {
631
647
statement {
632
648
actions = [" iam:CreateServiceLinkedRole" ]
633
649
resources = [" *" ]
650
+
634
651
condition {
635
652
test = " StringLike"
636
653
variable = " iam:AWSServiceName"
@@ -1201,6 +1218,7 @@ data "aws_iam_policy_document" "appmesh_controller" {
1201
1218
" iam:CreateServiceLinkedRole"
1202
1219
]
1203
1220
resources = [" arn:${ local . partition } :iam::*:role/aws-service-role/appmesh.${ local . dns_suffix } /AWSServiceRoleForAppMesh" ]
1221
+
1204
1222
condition {
1205
1223
test = " StringLike"
1206
1224
variable = " iam:AWSServiceName"
@@ -1459,6 +1477,7 @@ data "aws_iam_policy_document" "vpc_cni" {
1459
1477
# arn:${local.partition}:iam::aws:policy/AmazonEKS_CNI_Policy
1460
1478
dynamic "statement" {
1461
1479
for_each = var. vpc_cni_enable_ipv4 ? [1 ] : []
1480
+
1462
1481
content {
1463
1482
sid = " IPV4"
1464
1483
actions = [
@@ -1482,6 +1501,7 @@ data "aws_iam_policy_document" "vpc_cni" {
1482
1501
# https://docs.aws.amazon.com/eks/latest/userguide/cni-iam-role.html#cni-iam-role-create-ipv6-policy
1483
1502
dynamic "statement" {
1484
1503
for_each = var. vpc_cni_enable_ipv6 ? [1 ] : []
1504
+
1485
1505
content {
1486
1506
sid = " IPV6"
1487
1507
actions = [
@@ -1498,6 +1518,7 @@ data "aws_iam_policy_document" "vpc_cni" {
1498
1518
# https://docs.aws.amazon.com/eks/latest/userguide/cni-network-policy.html#cni-network-policy-setup
1499
1519
dynamic "statement" {
1500
1520
for_each = var. vpc_cni_enable_cloudwatch_logs ? [1 ] : []
1521
+
1501
1522
content {
1502
1523
sid = " CloudWatchLogs"
1503
1524
actions = [
0 commit comments