Use join and splat syntax to access conditional resources (#569)

This commit is contained in:
Miguel Ferreira
2019-10-29 13:55:21 +01:00
committed by Thierno IB. BARRY
parent 4f552891ff
commit a8e54ccf73
4 changed files with 15 additions and 14 deletions

View File

@@ -49,7 +49,7 @@ resource "aws_security_group_rule" "cluster_egress_internet" {
count = var.cluster_create_security_group ? 1 : 0
description = "Allow cluster egress access to the Internet."
protocol = "-1"
security_group_id = aws_security_group.cluster[0].id
security_group_id = local.cluster_security_group_id
cidr_blocks = ["0.0.0.0/0"]
from_port = 0
to_port = 0
@@ -60,7 +60,7 @@ resource "aws_security_group_rule" "cluster_https_worker_ingress" {
count = var.cluster_create_security_group ? 1 : 0
description = "Allow pods to communicate with the EKS cluster API."
protocol = "tcp"
security_group_id = aws_security_group.cluster[0].id
security_group_id = local.cluster_security_group_id
source_security_group_id = local.worker_security_group_id
from_port = 443
to_port = 443
@@ -80,11 +80,11 @@ resource "aws_iam_role" "cluster" {
resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" {
count = var.manage_cluster_iam_resources ? 1 : 0
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.cluster[0].name
role = local.cluster_iam_role_name
}
resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSServicePolicy" {
count = var.manage_cluster_iam_resources ? 1 : 0
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.cluster[0].name
role = local.cluster_iam_role_name
}