diff --git a/README.md b/README.md index 96bc999..41442c3 100644 --- a/README.md +++ b/README.md @@ -15,10 +15,10 @@ | Name | Version | |------|---------| -| [aws](#provider\_aws) | 4.18.0 | -| [helm](#provider\_helm) | 2.5.1 | -| [http](#provider\_http) | 2.2.0 | -| [kubernetes](#provider\_kubernetes) | 2.11.0 | +| [aws](#provider\_aws) | >= 4.18 | +| [helm](#provider\_helm) | >= 2.5 | +| [http](#provider\_http) | >= 2.2.0 | +| [kubernetes](#provider\_kubernetes) | >= 2.11 | ## Modules @@ -47,7 +47,7 @@ | [chart\_timeout](#input\_chart\_timeout) | Timeout to wait for the Chart to be deployed. | `number` | `300` | no | | [chart\_version](#input\_chart\_version) | Version of Chart to install. Set to empty to install the latest version | `string` | `"1.1.2"` | no | | [cluster\_name](#input\_cluster\_name) | Name of Kubernetes Cluster | `string` | n/a | yes | -| [create\_default\_irsa](#input\_create\_default\_irsa) | Create default IRSA for service account | `bool` | `false` | no | +| [create\_default\_irsa](#input\_create\_default\_irsa) | Create default IRSA for service account | `bool` | `true` | no | | [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns) | List of Secrets Manager ARNs that contain secrets to mount using External Secrets | `list(string)` |
[| no | | [external\_secrets\_ssm\_parameter\_arns](#input\_external\_secrets\_ssm\_parameter\_arns) | List of Systems Manager Parameter ARNs that contain secrets to mount using External Secrets | `list(string)` |
"arn:aws:secretsmanager:*:*:secret:*"
]
[| no | | [iam\_role\_description](#input\_iam\_role\_description) | Description for IAM role for controller | `string` | `"Used by AWS Load Balancer Controller for EKS"` | no | diff --git a/outputs.tf b/outputs.tf index 258baf7..3f13da0 100644 --- a/outputs.tf +++ b/outputs.tf @@ -1,19 +1,19 @@ output "iam_role_arn" { description = "ARN of IAM role" - value = module.secrets_manager_role[0].iam_role_arn + value = try(module.secrets_manager_role[0].iam_role_arn, "") } output "iam_role_name" { description = "Name of IAM role" - value = module.secrets_manager_role[0].iam_role_name + value = try(module.secrets_manager_role[0].iam_role_name, "") } output "iam_role_path" { description = "Path of IAM role" - value = module.secrets_manager_role[0].iam_role_path + value = try(module.secrets_manager_role[0].iam_role_path, "") } output "iam_role_unique_id" { description = "Unique ID of IAM role" - value = module.secrets_manager_role[0].iam_role_unique_id + value = try(module.secrets_manager_role[0].iam_role_unique_id, "") } diff --git a/variables.tf b/variables.tf index 357668c..3d1b415 100644 --- a/variables.tf +++ b/variables.tf @@ -190,7 +190,7 @@ variable "external_secrets_secrets_manager_arns" { variable "create_default_irsa" { description = "Create default IRSA for service account" type = bool - default = false + default = true } variable "namespace" {
"arn:aws:ssm:*:*:parameter/*"
]