diff --git a/helm.tf b/helm.tf index 7af125a..04bed91 100644 --- a/helm.tf +++ b/helm.tf @@ -23,7 +23,7 @@ resource "helm_release" "kubernetes_efs_csi_driver" { } set { - name = "node.serviceAccount.create" + name = "node.serviceAccount.create" # We're using the same service account for both the nodes and controllers, # and we're already creating the service account in the controller config # above. diff --git a/iam.tf b/iam.tf index 9475f49..e6f9ce1 100644 --- a/iam.tf +++ b/iam.tf @@ -3,11 +3,11 @@ data "aws_iam_policy_document" "efs_csi_driver" { statement { actions = [ - "elasticfilesystem:DescribeAccessPoints", - "elasticfilesystem:DescribeFileSystems" + "elasticfilesystem:DescribeAccessPoints", + "elasticfilesystem:DescribeFileSystems" ] resources = ["*"] - effect = "Allow" + effect = "Allow" } statement { @@ -15,11 +15,11 @@ data "aws_iam_policy_document" "efs_csi_driver" { "elasticfilesystem:CreateAccessPoint" ] resources = ["*"] - effect = "Allow" + effect = "Allow" condition { - test = "StringLike" + test = "StringLike" variable = "aws:RequestTag/efs.csi.aws.com/cluster" - values = ["true"] + values = ["true"] } } @@ -28,11 +28,11 @@ data "aws_iam_policy_document" "efs_csi_driver" { "elasticfilesystem:DeleteAccessPoint" ] resources = ["*"] - effect = "Allow" + effect = "Allow" condition { - test = "StringEquals" + test = "StringEquals" variable = "aws:ResourceTag/efs.csi.aws.com/cluster" - values = ["true"] + values = ["true"] } } }