mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-04-20 15:51:19 +02:00
feat: Add kubernetes standard labels to avoid manual mistakes on the managed aws-auth configmap (#989)
This commit is contained in:
@@ -168,6 +168,7 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
|||||||
| Name | Description | Type | Default | Required |
|
| Name | Description | Type | Default | Required |
|
||||||
|------|-------------|------|---------|:--------:|
|
|------|-------------|------|---------|:--------:|
|
||||||
| attach\_worker\_cni\_policy | Whether to attach the Amazon managed `AmazonEKS_CNI_Policy` IAM policy to the default worker IAM role. WARNING: If set `false` the permissions must be assigned to the `aws-node` DaemonSet pods via another method or nodes will not be able to join the cluster. | `bool` | `true` | no |
|
| attach\_worker\_cni\_policy | Whether to attach the Amazon managed `AmazonEKS_CNI_Policy` IAM policy to the default worker IAM role. WARNING: If set `false` the permissions must be assigned to the `aws-node` DaemonSet pods via another method or nodes will not be able to join the cluster. | `bool` | `true` | no |
|
||||||
|
| aws\_auth\_additional\_labels | Additionnal kubernetes labels applied on aws-auth ConfigMap | `map(string)` | `{}` | no |
|
||||||
| cluster\_create\_endpoint\_private\_access\_sg\_rule | Whether to create security group rules for the access to the Amazon EKS private API server endpoint. | `bool` | `false` | no |
|
| cluster\_create\_endpoint\_private\_access\_sg\_rule | Whether to create security group rules for the access to the Amazon EKS private API server endpoint. | `bool` | `false` | no |
|
||||||
| cluster\_create\_security\_group | Whether to create a security group for the cluster or attach the cluster to `cluster_security_group_id`. | `bool` | `true` | no |
|
| cluster\_create\_security\_group | Whether to create a security group for the cluster or attach the cluster to `cluster_security_group_id`. | `bool` | `true` | no |
|
||||||
| cluster\_create\_timeout | Timeout value when creating the EKS cluster. | `string` | `"30m"` | no |
|
| cluster\_create\_timeout | Timeout value when creating the EKS cluster. | `string` | `"30m"` | no |
|
||||||
|
|||||||
@@ -67,6 +67,15 @@ resource "kubernetes_config_map" "aws_auth" {
|
|||||||
metadata {
|
metadata {
|
||||||
name = "aws-auth"
|
name = "aws-auth"
|
||||||
namespace = "kube-system"
|
namespace = "kube-system"
|
||||||
|
labels = merge(
|
||||||
|
{
|
||||||
|
"app.kubernetes.io/managed-by" = "Terraform"
|
||||||
|
# / are replaced by . because label validator fails in this lib
|
||||||
|
# https://github.com/kubernetes/apimachinery/blob/1bdd76d09076d4dc0362456e59c8f551f5f24a72/pkg/util/validation/validation.go#L166
|
||||||
|
"terraform.io/module" = "terraform-aws-modules.eks.aws"
|
||||||
|
},
|
||||||
|
var.aws_auth_additional_labels
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
data = {
|
data = {
|
||||||
|
|||||||
@@ -47,6 +47,12 @@ variable "manage_aws_auth" {
|
|||||||
default = true
|
default = true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
variable "aws_auth_additional_labels" {
|
||||||
|
description = "Additionnal kubernetes labels applied on aws-auth ConfigMap"
|
||||||
|
default = {}
|
||||||
|
type = map(string)
|
||||||
|
}
|
||||||
|
|
||||||
variable "map_accounts" {
|
variable "map_accounts" {
|
||||||
description = "Additional AWS account numbers to add to the aws-auth configmap. See examples/basic/variables.tf for example format."
|
description = "Additional AWS account numbers to add to the aws-auth configmap. See examples/basic/variables.tf for example format."
|
||||||
type = list(string)
|
type = list(string)
|
||||||
|
|||||||
Reference in New Issue
Block a user