Adding node group iam role arns to outputs (#641)

This commit is contained in:
Mukesh Gupta
2019-12-20 21:20:29 +05:30
committed by Max Williams
parent b7ffc1b591
commit 7c8bcc967b
3 changed files with 10 additions and 0 deletions

View File

@@ -21,6 +21,7 @@ project adheres to [Semantic Versioning](http://semver.org/).
- Fix cluster_oidc_issuer_url output from list to string (by @chewvader) - Fix cluster_oidc_issuer_url output from list to string (by @chewvader)
- Fix idempotency issues for node groups with no remote_access configuration (by @jeffmhastings) - Fix idempotency issues for node groups with no remote_access configuration (by @jeffmhastings)
- Added support to create IAM OpenID Connect Identity Provider to enable EKS Identity Roles for Service Accounts (IRSA). (by @alaa) - Added support to create IAM OpenID Connect Identity Provider to enable EKS Identity Roles for Service Accounts (IRSA). (by @alaa)
- Adding node group iam role arns to outputs. (by @mukgupta)
- **Breaking:** Change logic of security group whitelisting. Will always whitelist worker security group on control plane security group either provide one or create new one. See Important notes below for upgrade notes (by @ryanooi) - **Breaking:** Change logic of security group whitelisting. Will always whitelist worker security group on control plane security group either provide one or create new one. See Important notes below for upgrade notes (by @ryanooi)
#### Important notes #### Important notes

View File

@@ -218,6 +218,7 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
| config\_map\_aws\_auth | A kubernetes configuration to authenticate to this EKS cluster. | | config\_map\_aws\_auth | A kubernetes configuration to authenticate to this EKS cluster. |
| kubeconfig | kubectl config file contents for this EKS cluster. | | kubeconfig | kubectl config file contents for this EKS cluster. |
| kubeconfig\_filename | The filename of the generated kubectl config. | | kubeconfig\_filename | The filename of the generated kubectl config. |
| node\_groups\_iam\_role\_arns | IAM role ARNs for EKS node groups |
| worker\_autoscaling\_policy\_arn | ARN of the worker autoscaling IAM policy if `manage_worker_autoscaling_policy = true` | | worker\_autoscaling\_policy\_arn | ARN of the worker autoscaling IAM policy if `manage_worker_autoscaling_policy = true` |
| worker\_autoscaling\_policy\_name | Name of the worker autoscaling IAM policy if `manage_worker_autoscaling_policy = true` | | worker\_autoscaling\_policy\_name | Name of the worker autoscaling IAM policy if `manage_worker_autoscaling_policy = true` |
| worker\_iam\_instance\_profile\_arns | default IAM instance profile ARN for EKS worker groups | | worker\_iam\_instance\_profile\_arns | default IAM instance profile ARN for EKS worker groups |

View File

@@ -157,3 +157,11 @@ output "worker_autoscaling_policy_arn" {
description = "ARN of the worker autoscaling IAM policy if `manage_worker_autoscaling_policy = true`" description = "ARN of the worker autoscaling IAM policy if `manage_worker_autoscaling_policy = true`"
value = concat(aws_iam_policy.worker_autoscaling[*].arn, [""])[0] value = concat(aws_iam_policy.worker_autoscaling[*].arn, [""])[0]
} }
output "node_groups_iam_role_arns" {
description = "IAM role ARNs for EKS node groups"
value = {
for node_group in aws_eks_node_group.workers :
node_group.node_group_name => node_group.node_role_arn
}
}