@@ -5,20 +5,19 @@ locals {
55 iam_policy_name = var. create_iam_resources_per_cluster ? " CastEKSPolicy-${ local . resource_name_postfix } " : " CastEKSPolicy-tf"
66 iam_role_policy_name = " castai-user-policy-${ substr (local. resource_name_postfix , 0 , 45 )} "
77 instance_profile_role_name = " castai-eks-instance-${ substr (local. resource_name_postfix , 0 , 44 )} "
8- iam_policy_prefix = " arn:${ data . aws_partition . current . partition } :iam::aws:policy"
8+ iam_policy_prefix = " arn:aws :iam::aws:policy"
99 ipv6_policy_name = " CastEC2AssignIPv6Policy-${ local . resource_name_postfix } "
1010
11- castai_instance_profile_policy_list = flatten ([
11+ castai_instance_profile_policy_list = compact ( flatten ([
1212 " ${ local . iam_policy_prefix } /AmazonEKSWorkerNodePolicy" ,
1313 " ${ local . iam_policy_prefix } /AmazonEC2ContainerRegistryReadOnly" ,
1414 var . attach_worker_cni_policy ? [" ${ local . iam_policy_prefix } /AmazonEKS_CNI_Policy" ] : [],
1515 var . attach_ebs_csi_driver_policy ? [" ${ local . iam_policy_prefix } /service-role/AmazonEBSCSIDriverPolicy" ] : [],
16- var . attach_ssm_managed_instance_core ? [" ${ local . iam_policy_prefix } /AmazonSSMManagedInstanceCore" ] : []
17- ])
16+ var . attach_ssm_managed_instance_core ? [" ${ local . iam_policy_prefix } /AmazonSSMManagedInstanceCore" ] : [],
17+ var . attach_custom_instance_policy ? [var . custom_instance_policy_arn ] : []
18+ ]))
1819}
1920
20- data "aws_partition" "current" {}
21-
2221# castai eks settings (provides required iam policies)
2322
2423data "castai_eks_settings" "eks" {
@@ -60,8 +59,8 @@ resource "aws_iam_role_policy" "castai_role_iam_policy" {
6059# iam - instance profile role
6160
6261resource "aws_iam_role" "instance_profile_role" {
63- name = local. instance_profile_role_name
64- max_session_duration = var. max_session_duration
62+ name = local. instance_profile_role_name
63+ max_session_duration = var. max_session_duration
6564 assume_role_policy = jsonencode ({
6665 Version : " 2012-10-17"
6766 Statement : [
@@ -71,9 +70,9 @@ resource "aws_iam_role" "instance_profile_role" {
7170 Principal = {
7271 Service = " ec2.amazonaws.com"
7372 }
74- " Action" : [
75- " sts:AssumeRole" ,
76- " sts:TagSession"
73+ " Action" : [
74+ " sts:AssumeRole" ,
75+ " sts:TagSession"
7776 ]
7877 }
7978 ]
@@ -127,7 +126,7 @@ data "aws_iam_policy_document" "cast_assume_role_policy" {
127126 }
128127
129128 dynamic "condition" {
130- for_each = var. castai_user_external_id != null ? [1 ] : []
129+ for_each = var. castai_user_external_id != null ? [1 ] : []
131130 content {
132131 test = " StringEquals"
133132 variable = " sts:ExternalId"
0 commit comments