@@ -2,7 +2,6 @@ data "aws_partition" "current" {}
2
2
data "aws_caller_identity" "current" {}
3
3
4
4
data "aws_iam_session_context" "current" {
5
- count = (var. create && var. enable_cluster_creator_admin_permissions ) || (var. create && var. create_kms_key && local. enable_cluster_encryption_config ) ? 1 : 0
6
5
# This data source provides information on the IAM source role of an STS assumed role
7
6
# For non-role ARNs, this data source simply passes the ARN through issuer ARN
8
7
# Ref https://github.com/terraform-aws-modules/terraform-aws-eks/issues/2327#issuecomment-1355581682
@@ -148,7 +147,7 @@ locals {
148
147
# better controlled by users through Terraform
149
148
bootstrap_cluster_creator_admin_permissions = {
150
149
cluster_creator = {
151
- principal_arn = data.aws_iam_session_context.current[ 0 ] .issuer_arn
150
+ principal_arn = data.aws_iam_session_context.current.issuer_arn
152
151
type = " STANDARD"
153
152
154
153
policy_associations = {
@@ -237,7 +236,7 @@ module "kms" {
237
236
# Policy
238
237
enable_default_policy = var. kms_key_enable_default_policy
239
238
key_owners = var. kms_key_owners
240
- key_administrators = coalescelist (var. kms_key_administrators , [data . aws_iam_session_context . current [ 0 ] . issuer_arn ])
239
+ key_administrators = coalescelist (var. kms_key_administrators , [data . aws_iam_session_context . current . issuer_arn ])
241
240
key_users = concat ([local . cluster_role ], var. kms_key_users )
242
241
key_service_users = var. kms_key_service_users
243
242
source_policy_documents = var. kms_key_source_policy_documents
0 commit comments