-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: It does not appear possible to refer to an IAM policy managed by the local terraform code in the additional_iam_policies
list
#502
Comments
Hi @spkane - the issue you are running into is a well known issue when a computed value is used as a key hashicorp/terraform#30937 To get around this issue today, your policy should exist prior to provisioning the cluster/node groups |
Thanks @bryantbiggs . I was actually aware of the underlying terraform issue, but am glad to see that it is starting to get some movement. What I was really wondering, was whether the approach in this module to use a However, at this point, I am assuming that the answer is yes. It might be nice to add a column to the Inputs table in the README called Computed (or something that is clearer) that tells you whether you can pass in a pointer to another resource or not (and maybe link to the issue above in the column header). |
Is it by design - yes. However, there is new guidance from Hashi that needs to be implemented (breaking change) - hashicorp/terraform#30327 |
This issue has been automatically marked as stale because it has been open 30 days |
This issue has been automatically marked as stale because it has been open 30 days |
Issue closed due to inactivity. |
Welcome to Amazon EKS Blueprints!
Amazon EKS Blueprints Release version
deec7d5
What is your environment, configuration and the example used?
Terraform v1.1.7
If I have the following
iam.tf
in the same codebase that creates the EKS cluster:and a
locals.tf
file like this:which then gets used in the
terraform-aws-eks-blueprints
like this:The plan will generate an error like this due to the use of
for_each
What did you do and What did you see instead?
It appears like the current module design makes it impossible to pass in IAM policies that are managed in the same Terraform code base.
Is this indeed the case?
And is this by design?
These IAM policies can be created in another terraform code base, and read in via a remote state file, or something, but in this simple use-case, that is overkill.
Additional Information
The text was updated successfully, but these errors were encountered: