File tree Expand file tree Collapse file tree 2 files changed +2
-2
lines changed
modules/iam-role-for-service-accounts-eks Expand file tree Collapse file tree 2 files changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ Creates an IAM role which can be assumed by AWS EKS `ServiceAccount`s with optio
7
7
- [ EBS CSI Driver] ( https://github.com/kubernetes-sigs/aws-ebs-csi-driver/blob/master/docs/example-iam-policy.json )
8
8
- [ EFS CSI Driver] ( https://github.com/kubernetes-sigs/aws-efs-csi-driver/blob/master/docs/iam-policy-example.json )
9
9
- [ External DNS] ( https://github.com/kubernetes-sigs/external-dns/blob/master/docs/tutorials/aws.md#iam-policy )
10
- - [ External Secrets] ( https://github.com/external-secrets/kubernetes- external-secrets#add-a-secret )
10
+ - [ External Secrets] ( https://github.com/external-secrets/external-secrets#add-a-secret )
11
11
- [ FSx for Lustre CSI Driver] ( https://github.com/kubernetes-sigs/aws-fsx-csi-driver/blob/master/docs/README.md )
12
12
- [ Karpenter] ( https://github.com/aws/karpenter/blob/main/website/content/en/preview/getting-started/getting-started-with-karpenter/cloudformation.yaml )
13
13
- [ Load Balancer Controller] ( https://github.com/kubernetes-sigs/aws-load-balancer-controller/blob/main/docs/install/iam_policy.json )
Original file line number Diff line number Diff line change @@ -530,7 +530,7 @@ resource "aws_iam_role_policy_attachment" "external_dns" {
530
530
# External Secrets Policy
531
531
# ###############################################################################
532
532
533
- # https://github.com/external-secrets/kubernetes- external-secrets#add-a-secret
533
+ # https://github.com/external-secrets/external-secrets#add-a-secret
534
534
data "aws_iam_policy_document" "external_secrets" {
535
535
count = var. create_role && var. attach_external_secrets_policy ? 1 : 0
536
536
You can’t perform that action at this time.
0 commit comments