mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-14 07:44:09 +01:00
* feat: Replace `resolve_conflicts` with `resolve_conflicts_on_create`/`delete`; raise MSV of AWS provider to `v5.0` to support * fix: Replace dynamic DNS suffix for `sts:AssumeRole` API calls for static suffix * feat: Add module tag * feat: Align Karpenter permissions with Karpenter v1beta1/v0.32 permissions from upstream * refactor: Move `aws-auth` ConfigMap functionality to its own sub-module * chore: Update examples * feat: Add state `moved` block for Karpenter Pod Identity role re-name * fix: Correct variable `create` description * feat: Add support for cluster access entries * chore: Bump MSV of Terraform to `1.3` * fix: Replace defunct kubectl provider with an updated forked equivalent * chore: Update and validate examples for access entry; clean up provider usage * docs: Correct double redundant variable descriptions * feat: Add support for Cloudwatch log group class argument * fix: Update usage tag placement, fix Karpenter event spelling, add upcoming changes section to upgrade guide * feat: Update Karpenter module to generalize naming used and align policy with the upstream Karpenter policy * feat: Add native support for Windows based managed nodegroups similar to AL2 and Bottlerocket * feat: Update self-managed nodegroup module to use latest features of ASG * docs: Update and simplify docs * fix: Correct variable description for AMI types * fix: Update upgrade guide with changes; rename Karpenter controller resource names to support migrating for users * docs: Complete upgrade guide docs for migration and changes applied * Update examples/karpenter/README.md Co-authored-by: Anton Babenko <anton@antonbabenko.com> * Update examples/outposts/README.md Co-authored-by: Anton Babenko <anton@antonbabenko.com> * Update modules/karpenter/README.md Co-authored-by: Anton Babenko <anton@antonbabenko.com> --------- Co-authored-by: Anton Babenko <anton@antonbabenko.com>
40 lines
1.2 KiB
HCL
40 lines
1.2 KiB
HCL
variable "create" {
|
|
description = "Controls if resources should be created (affects all resources)"
|
|
type = bool
|
|
default = true
|
|
}
|
|
|
|
################################################################################
|
|
# aws-auth ConfigMap
|
|
################################################################################
|
|
|
|
variable "create_aws_auth_configmap" {
|
|
description = "Determines whether to create the aws-auth configmap. NOTE - this is only intended for scenarios where the configmap does not exist (i.e. - when using only self-managed node groups). Most users should use `manage_aws_auth_configmap`"
|
|
type = bool
|
|
default = false
|
|
}
|
|
|
|
variable "manage_aws_auth_configmap" {
|
|
description = "Determines whether to manage the aws-auth configmap"
|
|
type = bool
|
|
default = true
|
|
}
|
|
|
|
variable "aws_auth_roles" {
|
|
description = "List of role maps to add to the aws-auth configmap"
|
|
type = list(any)
|
|
default = []
|
|
}
|
|
|
|
variable "aws_auth_users" {
|
|
description = "List of user maps to add to the aws-auth configmap"
|
|
type = list(any)
|
|
default = []
|
|
}
|
|
|
|
variable "aws_auth_accounts" {
|
|
description = "List of account maps to add to the aws-auth configmap"
|
|
type = list(any)
|
|
default = []
|
|
}
|