@@ -2,6 +2,7 @@ data "aws_partition" "current" {}
2
2
data "aws_caller_identity" "current" {}
3
3
4
4
data "aws_iam_session_context" "current" {
5
+ count = (var. create && var. enable_cluster_creator_admin_permissions ) || (var. create && var. create_kms_key && local. enable_cluster_encryption_config ) ? 1 : 0
5
6
# This data source provides information on the IAM source role of an STS assumed role
6
7
# For non-role ARNs, this data source simply passes the ARN through issuer ARN
7
8
# Ref https://github.com/terraform-aws-modules/terraform-aws-eks/issues/2327#issuecomment-1355581682
@@ -147,7 +148,7 @@ locals {
147
148
# better controlled by users through Terraform
148
149
bootstrap_cluster_creator_admin_permissions = {
149
150
cluster_creator = {
150
- principal_arn = data.aws_iam_session_context.current.issuer_arn
151
+ principal_arn = data.aws_iam_session_context.current[ 0 ] .issuer_arn
151
152
type = " STANDARD"
152
153
153
154
policy_associations = {
@@ -236,7 +237,7 @@ module "kms" {
236
237
# Policy
237
238
enable_default_policy = var. kms_key_enable_default_policy
238
239
key_owners = var. kms_key_owners
239
- key_administrators = coalescelist (var. kms_key_administrators , [data . aws_iam_session_context . current . issuer_arn ])
240
+ key_administrators = coalescelist (var. kms_key_administrators , [data . aws_iam_session_context . current [ 0 ] . issuer_arn ])
240
241
key_users = concat ([local . cluster_role ], var. kms_key_users )
241
242
key_service_users = var. kms_key_service_users
242
243
source_policy_documents = var. kms_key_source_policy_documents
0 commit comments