diff --git a/README.md b/README.md index 38fac85..3df5bf3 100644 --- a/README.md +++ b/README.md @@ -98,7 +98,8 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a | cluster_security_group_id | If provided, the EKS cluster will be attached to this security group. If not given, a security group will be created with necessary ingres/egress to work with the workers and provide API access to your current IP/32. | string | `` | no | | cluster_version | Kubernetes version to use for the EKS cluster. | string | `1.10` | no | | config_output_path | Determines where config files are placed if using configure_kubectl_session and you want config files to land outside the current working directory. | string | `./` | no | -| configure_kubectl_session | Configure the current session's kubectl to use the instantiated EKS cluster. | string | `true` | no | +| manage_aws_auth | Whether to write and apply the aws-auth configmap file. | boolean | `true` | no | +| write_kubeconfig | Whether to write a kubeconfig file containing the cluster configuration. | boolean | `true` | no | | kubeconfig_aws_authenticator_additional_args | Any additional arguments to pass to the authenticator such as the role to assume ["-r", "MyEksRole"] | string | `` | no | | kubeconfig_aws_authenticator_command | Command to use to to fetch AWS EKS credentials | string | `heptio-authenticator-aws` | no | | kubeconfig_aws_authenticator_env_variables | Environment variables that should be used when executing the authenticator i.e. { AWS_PROFILE = "eks"} | string | `` | no | diff --git a/aws_auth.tf b/aws_auth.tf new file mode 100644 index 0000000..79e35cc --- /dev/null +++ b/aws_auth.tf @@ -0,0 +1,18 @@ +resource "local_file" "config_map_aws_auth" { + content = "${data.template_file.config_map_aws_auth.rendered}" + filename = "${var.config_output_path}/config-map-aws-auth.yaml" + count = "${var.manage_aws_auth ? 1 : 0}" +} + +resource "null_resource" "configure_kubectl" { + provisioner "local-exec" { + command = "kubectl apply -f ${var.config_output_path}/config-map-aws-auth.yaml --kubeconfig ${var.config_output_path}/kubeconfig" + } + + triggers { + config_map_rendered = "${data.template_file.config_map_aws_auth.rendered}" + kubeconfig_rendered = "${data.template_file.kubeconfig.rendered}" + } + + count = "${var.manage_aws_auth ? 1 : 0}" +} diff --git a/kubectl.tf b/kubectl.tf index 4c56a62..ec39963 100644 --- a/kubectl.tf +++ b/kubectl.tf @@ -1,24 +1,5 @@ resource "local_file" "kubeconfig" { content = "${data.template_file.kubeconfig.rendered}" filename = "${var.config_output_path}/kubeconfig_${var.cluster_name}" - count = "${var.configure_kubectl_session ? 1 : 0}" -} - -resource "local_file" "config_map_aws_auth" { - content = "${data.template_file.config_map_aws_auth.rendered}" - filename = "${var.config_output_path}/config-map-aws-auth_${var.cluster_name}.yaml" - count = "${var.configure_kubectl_session ? 1 : 0}" -} - -resource "null_resource" "configure_kubectl" { - provisioner "local-exec" { - command = "kubectl apply -f ${var.config_output_path}/config-map-aws-auth_${var.cluster_name}.yaml --kubeconfig ${var.config_output_path}/kubeconfig_${var.cluster_name}" - } - - triggers { - config_map_rendered = "${data.template_file.config_map_aws_auth.rendered}" - kubeconfig_rendered = "${data.template_file.kubeconfig.rendered}" - } - - count = "${var.configure_kubectl_session ? 1 : 0}" + count = "${var.write_kubeconfig ? 1 : 0}" } diff --git a/variables.tf b/variables.tf index 1302a48..c6dc071 100644 --- a/variables.tf +++ b/variables.tf @@ -22,8 +22,13 @@ variable "config_output_path" { default = "./" } -variable "configure_kubectl_session" { - description = "Configure the current session's kubectl to use the instantiated EKS cluster." +variable "write_kubeconfig" { + description = "Whether to write a kubeconfig file containing the cluster configuration" + default = true +} + +variable "manage_aws_auth" { + description = "Whether to write and apply the aws-auth configmap file" default = true }