You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
170
+
|[aws_iam_policy_document.infrastructure](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
171
+
|[aws_iam_policy_document.node](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
172
+
|[aws_iam_policy_document.node_assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
162
173
|[aws_iam_policy_document.task_exec](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
163
174
|[aws_iam_policy_document.task_exec_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
175
+
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
176
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
178
191
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
192
+
| <aname="input_create_infrastructure_iam_role"></a> [create\_infrastructure\_iam\_role](#input\_create\_infrastructure\_iam\_role)| Determines whether the ECS infrastructure IAM role should be created |`bool`|`true`| no |
193
+
| <aname="input_create_node_iam_instance_profile"></a> [create\_node\_iam\_instance\_profile](#input\_create\_node\_iam\_instance\_profile)| Determines whether an IAM instance profile is created or to use an existing IAM instance profile |`bool`|`true`| no |
179
194
| <aname="input_create_task_exec_iam_role"></a> [create\_task\_exec\_iam\_role](#input\_create\_task\_exec\_iam\_role)| Determines whether the ECS task definition IAM role should be created |`bool`|`false`| no |
180
195
| <aname="input_create_task_exec_policy"></a> [create\_task\_exec\_policy](#input\_create\_task\_exec\_policy)| Determines whether the ECS task definition IAM policy should be created. This includes permissions included in AmazonECSTaskExecutionRolePolicy as well as access to secrets and SSM parameters |`bool`|`true`| no |
181
196
| <aname="input_default_capacity_provider_strategy"></a> [default\_capacity\_provider\_strategy](#input\_default\_capacity\_provider\_strategy)| Map of default capacity provider strategy definitions to use for the cluster | <pre>map(object({<br/> base = optional(number)<br/> name = optional(string) # Will fall back to use map key if not set<br/> weight = optional(number)<br/> }))</pre> |`{}`| no |
197
+
| <aname="input_infrastructure_iam_role_description"></a> [infrastructure\_iam\_role\_description](#input\_infrastructure\_iam\_role\_description)| Description of the role |`string`|`null`| no |
198
+
| <aname="input_infrastructure_iam_role_name"></a> [infrastructure\_iam\_role\_name](#input\_infrastructure\_iam\_role\_name)| Name to use on IAM role created |`string`|`null`| no |
199
+
| <aname="input_infrastructure_iam_role_path"></a> [infrastructure\_iam\_role\_path](#input\_infrastructure\_iam\_role\_path)| IAM role path |`string`|`null`| no |
200
+
| <aname="input_infrastructure_iam_role_permissions_boundary"></a> [infrastructure\_iam\_role\_permissions\_boundary](#input\_infrastructure\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
201
+
| <aname="input_infrastructure_iam_role_tags"></a> [infrastructure\_iam\_role\_tags](#input\_infrastructure\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
202
+
| <aname="input_infrastructure_iam_role_use_name_prefix"></a> [infrastructure\_iam\_role\_use\_name\_prefix](#input\_infrastructure\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
182
203
| <aname="input_name"></a> [name](#input\_name)| Name of the cluster (up to 255 letters, numbers, hyphens, and underscores) |`string`|`""`| no |
204
+
| <aname="input_node_iam_role_additional_policies"></a> [node\_iam\_role\_additional\_policies](#input\_node\_iam\_role\_additional\_policies)| Additional policies to be added to the IAM role |`map(string)`|`{}`| no |
205
+
| <aname="input_node_iam_role_description"></a> [node\_iam\_role\_description](#input\_node\_iam\_role\_description)| Description of the role |`string`|`"ECS Managed Instances node IAM role"`| no |
206
+
| <aname="input_node_iam_role_name"></a> [node\_iam\_role\_name](#input\_node\_iam\_role\_name)| Name to use on IAM role/instance profile created |`string`|`null`| no |
207
+
| <aname="input_node_iam_role_override_policy_documents"></a> [node\_iam\_role\_override\_policy\_documents](#input\_node\_iam\_role\_override\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid`|`list(string)`|`[]`| no |
208
+
| <aname="input_node_iam_role_path"></a> [node\_iam\_role\_path](#input\_node\_iam\_role\_path)| IAM role/instance profile path |`string`|`null`| no |
209
+
| <aname="input_node_iam_role_permissions_boundary"></a> [node\_iam\_role\_permissions\_boundary](#input\_node\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
210
+
| <aname="input_node_iam_role_source_policy_documents"></a> [node\_iam\_role\_source\_policy\_documents](#input\_node\_iam\_role\_source\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s |`list(string)`|`[]`| no |
211
+
| <aname="input_node_iam_role_statements"></a> [node\_iam\_role\_statements](#input\_node\_iam\_role\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | <pre>map(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string, "Allow")<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> variable = string<br/> values = list(string)<br/> })))<br/> }))</pre> |`null`| no |
212
+
| <aname="input_node_iam_role_tags"></a> [node\_iam\_role\_tags](#input\_node\_iam\_role\_tags)| A map of additional tags to add to the IAM role/instance profile created |`map(string)`|`{}`| no |
213
+
| <aname="input_node_iam_role_use_name_prefix"></a> [node\_iam\_role\_use\_name\_prefix](#input\_node\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role/instance profile name (`node_iam_role_name`) is used as a prefix |`bool`|`true`| no |
183
214
| <aname="input_region"></a> [region](#input\_region)| Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration |`string`|`null`| no |
184
215
| <aname="input_service_connect_defaults"></a> [service\_connect\_defaults](#input\_service\_connect\_defaults)| Configures a default Service Connect namespace | <pre>object({<br/> namespace = string<br/> })</pre> |`null`| no |
185
216
| <aname="input_setting"></a> [setting](#input\_setting)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster | <pre>list(object({<br/> name = string<br/> value = string<br/> }))</pre> | <pre>[<br/> {<br/> "name": "containerInsights",<br/> "value": "enabled"<br/> }<br/>]</pre> | no |
@@ -205,10 +236,19 @@ No modules.
205
236
| <aname="output_cloudwatch_log_group_name"></a> [cloudwatch\_log\_group\_name](#output\_cloudwatch\_log\_group\_name)| Name of CloudWatch log group created |
206
237
| <aname="output_cluster_capacity_providers"></a> [cluster\_capacity\_providers](#output\_cluster\_capacity\_providers)| Map of cluster capacity providers attributes |
207
238
| <aname="output_id"></a> [id](#output\_id)| ID that identifies the cluster |
239
+
| <aname="output_infrastructure_iam_role_arn"></a> [infrastructure\_iam\_role\_arn](#output\_infrastructure\_iam\_role\_arn)| The Amazon Resource Name (ARN) specifying the IAM role |
240
+
| <aname="output_infrastructure_iam_role_name"></a> [infrastructure\_iam\_role\_name](#output\_infrastructure\_iam\_role\_name)| IAM role name |
241
+
| <aname="output_infrastructure_iam_role_unique_id"></a> [infrastructure\_iam\_role\_unique\_id](#output\_infrastructure\_iam\_role\_unique\_id)| Stable and unique string identifying the IAM role |
208
242
| <aname="output_name"></a> [name](#output\_name)| Name that identifies the cluster |
209
-
| <aname="output_task_exec_iam_role_arn"></a> [task\_exec\_iam\_role\_arn](#output\_task\_exec\_iam\_role\_arn)| Task execution IAM role ARN |
210
-
| <aname="output_task_exec_iam_role_name"></a> [task\_exec\_iam\_role\_name](#output\_task\_exec\_iam\_role\_name)| Task execution IAM role name |
211
-
| <aname="output_task_exec_iam_role_unique_id"></a> [task\_exec\_iam\_role\_unique\_id](#output\_task\_exec\_iam\_role\_unique\_id)| Stable and unique string identifying the task execution IAM role |
243
+
| <aname="output_node_iam_instance_profile_arn"></a> [node\_iam\_instance\_profile\_arn](#output\_node\_iam\_instance\_profile\_arn)| ARN assigned by AWS to the instance profile |
244
+
| <aname="output_node_iam_instance_profile_id"></a> [node\_iam\_instance\_profile\_id](#output\_node\_iam\_instance\_profile\_id)| Instance profile's ID |
245
+
| <aname="output_node_iam_instance_profile_unique"></a> [node\_iam\_instance\_profile\_unique](#output\_node\_iam\_instance\_profile\_unique)| Stable and unique string identifying the IAM instance profile |
246
+
| <aname="output_node_iam_role_arn"></a> [node\_iam\_role\_arn](#output\_node\_iam\_role\_arn)| The Amazon Resource Name (ARN) specifying the IAM role |
247
+
| <aname="output_node_iam_role_name"></a> [node\_iam\_role\_name](#output\_node\_iam\_role\_name)| IAM role name |
248
+
| <aname="output_node_iam_role_unique_id"></a> [node\_iam\_role\_unique\_id](#output\_node\_iam\_role\_unique\_id)| Stable and unique string identifying the IAM role |
249
+
| <aname="output_task_exec_iam_role_arn"></a> [task\_exec\_iam\_role\_arn](#output\_task\_exec\_iam\_role\_arn)| The Amazon Resource Name (ARN) specifying the IAM role |
250
+
| <aname="output_task_exec_iam_role_name"></a> [task\_exec\_iam\_role\_name](#output\_task\_exec\_iam\_role\_name)| IAM role name |
251
+
| <aname="output_task_exec_iam_role_unique_id"></a> [task\_exec\_iam\_role\_unique\_id](#output\_task\_exec\_iam\_role\_unique\_id)| Stable and unique string identifying the IAM role |
0 commit comments