@@ -569,12 +569,8 @@ locals {
569569 iam_role_name = coalesce (var. iam_role_name , " ${ var . name } -eks-node-group" )
570570 iam_role_policy_prefix = " arn:${ local . partition } :iam::aws:policy"
571571
572- ipv4_cni_policy = { for k , v in {
573- AmazonEKS_CNI_Policy = " ${ local . iam_role_policy_prefix } /AmazonEKS_CNI_Policy"
574- } : k => v if var . iam_role_attach_cni_policy && var . cluster_ip_family == " ipv4" }
575- ipv6_cni_policy = { for k , v in {
576- AmazonEKS_CNI_IPv6_Policy = " arn:${ local . partition } :iam::${ local . account_id } :policy/AmazonEKS_CNI_IPv6_Policy"
577- } : k => v if var . iam_role_attach_cni_policy && var . cluster_ip_family == " ipv6" }
572+ base_cni_policy = " ${ local . iam_role_policy_prefix } /AmazonEKS_CNI_Policy"
573+ ipv6_cni_policy = " arn:${ local . partition } :iam::${ local . account_id } :policy/AmazonEKS_CNI_IPv6_Policy"
578574}
579575
580576data "aws_iam_policy_document" "assume_role_policy" {
@@ -613,8 +609,12 @@ resource "aws_iam_role_policy_attachment" "this" {
613609 AmazonEKSWorkerNodePolicy = " ${ local . iam_role_policy_prefix } /AmazonEKSWorkerNodePolicy"
614610 AmazonEC2ContainerRegistryReadOnly = " ${ local . iam_role_policy_prefix } /AmazonEC2ContainerRegistryReadOnly"
615611 },
616- local. ipv4_cni_policy ,
617- local. ipv6_cni_policy
612+ var. iam_role_attach_cni_policy ? {
613+ AmazonEKS_CNI_Policy = local.base_cni_policy,
614+ } : {},
615+ (var. iam_role_attach_cni_policy && var. cluster_ip_family == " ipv6" ) ? {
616+ AmazonEKS_CNI_IPv6_Policy = local.ipv6_cni_policy,
617+ } : {},
618618 ) : k => v if local . create_iam_role }
619619
620620 policy_arn = each. value
0 commit comments