mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-02-22 10:37:42 +01:00
staging the 1.3.0 release. Will revisit the changelog
This commit is contained in:
21
CHANGELOG.md
21
CHANGELOG.md
@@ -5,23 +5,24 @@ All notable changes to this project will be documented in this file.
|
||||
The format is based on [Keep a Changelog](http://keepachangelog.com/) and this
|
||||
project adheres to [Semantic Versioning](http://semver.org/).
|
||||
|
||||
## [[v1.4.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.3.0...v1.4.0)] - 2018-07-12]
|
||||
## [[v1.4.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.3.0...HEAD)] - 2018-07-??]
|
||||
|
||||
### Added
|
||||
|
||||
- Some excellent feature. (you're on fire, @me 🔥)
|
||||
|
||||
### Changed
|
||||
|
||||
- A very thoughtful change. (Boomshakalaka, @self 🏀)
|
||||
|
||||
## [[v1.3.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.2.0...v1.3.0)] - 2018-07-11]
|
||||
|
||||
### Added
|
||||
|
||||
- New variables `map_accounts`, `map_roles` and `map_users` in order to manage additional entries in the `aws-auth` configmap. (by @max-rocket-internet)
|
||||
|
||||
## [[v1.3.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.2.0...v1.3.0)] - 2018-07-??]
|
||||
|
||||
### Added
|
||||
|
||||
- kubelet_node_labels worker group option allows setting --node-labels= in kubelet. (Hat-tip, @bshelton229 👒)
|
||||
- `worker_iam_role_arn` added to outputs. Sweet, @hatemosphere 🔥
|
||||
|
||||
### Changed
|
||||
|
||||
- your excellent change. (Boomshakalaka, @self 🏀)
|
||||
|
||||
## [[v1.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.1.0...v1.2.0)] - 2018-07-01]
|
||||
|
||||
### Added
|
||||
|
||||
@@ -98,9 +98,9 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
| cluster_security_group_id | If provided, the EKS cluster will be attached to this security group. If not given, a security group will be created with necessary ingres/egress to work with the workers and provide API access to your current IP/32. | string | `` | no |
|
||||
| cluster_version | Kubernetes version to use for the EKS cluster. | string | `1.10` | no |
|
||||
| config_output_path | Determines where config files are placed if using configure_kubectl_session and you want config files to land outside the current working directory. | string | `./` | no |
|
||||
| kubeconfig_aws_authenticator_additional_args | Any additional arguments to pass to the authenticator such as the role to assume ["-r", "MyEksRole"] | list | `<list>` | no |
|
||||
| kubeconfig_aws_authenticator_command | Command to use to to fetch AWS EKS credentials | string | `heptio-authenticator-aws` | no |
|
||||
| kubeconfig_aws_authenticator_env_variables | Environment variables that should be used when executing the authenticator i.e. { AWS_PROFILE = "eks"} | map | `<map>` | no |
|
||||
| kubeconfig_aws_authenticator_additional_args | Any additional arguments to pass to the authenticator such as the role to assume. e.g. ["-r", "MyEksRole"]. | list | `<list>` | no |
|
||||
| kubeconfig_aws_authenticator_command | Command to use to to fetch AWS EKS credentials. | string | `aws-iam-authenticator` | no |
|
||||
| kubeconfig_aws_authenticator_env_variables | Environment variables that should be used when executing the authenticator. e.g. { AWS_PROFILE = "eks"}. | map | `<map>` | no |
|
||||
| kubeconfig_name | Override the default name used for items kubeconfig. | string | `` | no |
|
||||
| manage_aws_auth | Whether to write and apply the aws-auth configmap file. | string | `true` | no |
|
||||
| map_accounts | Additional AWS account numbers to add to the aws-auth configmap. See examples/eks_test_fixture/variables.tf for example format. | list | `<list>` | no |
|
||||
@@ -127,7 +127,7 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
| cluster_version | The Kubernetes server version for the EKS cluster. |
|
||||
| config_map_aws_auth | A kubernetes configuration to authenticate to this EKS cluster. |
|
||||
| kubeconfig | kubectl config file contents for this EKS cluster. |
|
||||
| worker_iam_role_name | IAM role name attached to EKS workers |
|
||||
| worker_iam_role_arn | IAM role ID attached to EKS workers |
|
||||
| worker_iam_role_name | IAM role name attached to EKS workers |
|
||||
| worker_security_group_id | Security group ID attached to the EKS workers. |
|
||||
| workers_asg_arns | IDs of the autoscaling groups containing workers. |
|
||||
|
||||
3
local.tf
3
local.tf
@@ -8,8 +8,7 @@ locals {
|
||||
worker_security_group_id = "${coalesce(join("", aws_security_group.workers.*.id), var.worker_security_group_id)}"
|
||||
workstation_external_cidr = "${chomp(data.http.workstation_external_ip.body)}/32"
|
||||
workstation_cidr = "${coalesce(var.workstation_cidr, local.workstation_external_cidr)}"
|
||||
|
||||
kubeconfig_name = "${var.kubeconfig_name == "" ? "eks_${var.cluster_name}" : var.kubeconfig_name}"
|
||||
kubeconfig_name = "${var.kubeconfig_name == "" ? "eks_${var.cluster_name}" : var.kubeconfig_name}"
|
||||
|
||||
# Mapping from the node type that we selected and the max number of pods that it can run
|
||||
# Taken from https://amazon-eks.s3-us-west-2.amazonaws.com/1.10.3/2018-06-05/amazon-eks-nodegroup.yaml
|
||||
|
||||
@@ -8,7 +8,7 @@ variable "cluster_security_group_id" {
|
||||
}
|
||||
|
||||
variable "workstation_cidr" {
|
||||
description = "Override the default ingress rule that allows communication with the EKS cluster API. If not given, will use current IP/32. "
|
||||
description = "Override the default ingress rule that allows communication with the EKS cluster API. If not given, will use current IP/32. "
|
||||
default = ""
|
||||
}
|
||||
|
||||
@@ -105,18 +105,18 @@ variable "worker_sg_ingress_from_port" {
|
||||
}
|
||||
|
||||
variable "kubeconfig_aws_authenticator_command" {
|
||||
description = "Command to use to to fetch AWS EKS credentials"
|
||||
description = "Command to use to to fetch AWS EKS credentials."
|
||||
default = "aws-iam-authenticator"
|
||||
}
|
||||
|
||||
variable "kubeconfig_aws_authenticator_additional_args" {
|
||||
description = "Any additional arguments to pass to the authenticator such as the role to assume [\"-r\", \"MyEksRole\"]"
|
||||
description = "Any additional arguments to pass to the authenticator such as the role to assume. e.g. [\"-r\", \"MyEksRole\"]."
|
||||
type = "list"
|
||||
default = []
|
||||
}
|
||||
|
||||
variable "kubeconfig_aws_authenticator_env_variables" {
|
||||
description = "Environment variables that should be used when executing the authenticator i.e. { AWS_PROFILE = \"eks\"}"
|
||||
description = "Environment variables that should be used when executing the authenticator. e.g. { AWS_PROFILE = \"eks\"}."
|
||||
type = "map"
|
||||
default = {}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user