mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-15 16:23:58 +01:00
Broke use case of passing in custom template content. Reverts most of the following PRs: - #865 - #863 - #854
174 lines
5.1 KiB
HCL
174 lines
5.1 KiB
HCL
data "aws_iam_policy_document" "workers_assume_role_policy" {
|
|
statement {
|
|
sid = "EKSWorkerAssumeRole"
|
|
|
|
actions = [
|
|
"sts:AssumeRole",
|
|
]
|
|
|
|
principals {
|
|
type = "Service"
|
|
identifiers = [local.ec2_principal]
|
|
}
|
|
}
|
|
}
|
|
|
|
data "aws_ami" "eks_worker" {
|
|
filter {
|
|
name = "name"
|
|
values = [local.worker_ami_name_filter]
|
|
}
|
|
|
|
most_recent = true
|
|
|
|
owners = [var.worker_ami_owner_id]
|
|
}
|
|
|
|
data "aws_ami" "eks_worker_windows" {
|
|
filter {
|
|
name = "name"
|
|
values = [local.worker_ami_name_filter_windows]
|
|
}
|
|
|
|
filter {
|
|
name = "platform"
|
|
values = ["windows"]
|
|
}
|
|
|
|
most_recent = true
|
|
|
|
owners = [var.worker_ami_owner_id_windows]
|
|
}
|
|
|
|
data "aws_iam_policy_document" "cluster_assume_role_policy" {
|
|
statement {
|
|
sid = "EKSClusterAssumeRole"
|
|
|
|
actions = [
|
|
"sts:AssumeRole",
|
|
]
|
|
|
|
principals {
|
|
type = "Service"
|
|
identifiers = ["eks.amazonaws.com"]
|
|
}
|
|
}
|
|
}
|
|
|
|
data "template_file" "userdata" {
|
|
count = var.create_eks ? local.worker_group_count : 0
|
|
template = lookup(
|
|
var.worker_groups[count.index],
|
|
"userdata_template_file",
|
|
file(
|
|
lookup(var.worker_groups[count.index], "platform", local.workers_group_defaults["platform"]) == "windows"
|
|
? "${path.module}/templates/userdata_windows.tpl"
|
|
: "${path.module}/templates/userdata.sh.tpl"
|
|
)
|
|
)
|
|
|
|
vars = merge({
|
|
platform = lookup(var.worker_groups[count.index], "platform", local.workers_group_defaults["platform"])
|
|
cluster_name = coalescelist(aws_eks_cluster.this[*].name, [""])[0]
|
|
endpoint = coalescelist(aws_eks_cluster.this[*].endpoint, [""])[0]
|
|
cluster_auth_base64 = coalescelist(aws_eks_cluster.this[*].certificate_authority[0].data, [""])[0]
|
|
pre_userdata = lookup(
|
|
var.worker_groups[count.index],
|
|
"pre_userdata",
|
|
local.workers_group_defaults["pre_userdata"],
|
|
)
|
|
additional_userdata = lookup(
|
|
var.worker_groups[count.index],
|
|
"additional_userdata",
|
|
local.workers_group_defaults["additional_userdata"],
|
|
)
|
|
bootstrap_extra_args = lookup(
|
|
var.worker_groups[count.index],
|
|
"bootstrap_extra_args",
|
|
local.workers_group_defaults["bootstrap_extra_args"],
|
|
)
|
|
kubelet_extra_args = lookup(
|
|
var.worker_groups[count.index],
|
|
"kubelet_extra_args",
|
|
local.workers_group_defaults["kubelet_extra_args"],
|
|
)
|
|
},
|
|
lookup(
|
|
var.worker_groups[count.index],
|
|
"userdata_template_extra_args",
|
|
local.workers_group_defaults["userdata_template_extra_args"]
|
|
)
|
|
)
|
|
}
|
|
|
|
data "template_file" "launch_template_userdata" {
|
|
count = var.create_eks ? local.worker_group_launch_template_count : 0
|
|
template = lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"userdata_template_file",
|
|
file(
|
|
lookup(var.worker_groups_launch_template[count.index], "platform", local.workers_group_defaults["platform"]) == "windows"
|
|
? "${path.module}/templates/userdata_windows.tpl"
|
|
: "${path.module}/templates/userdata.sh.tpl"
|
|
)
|
|
)
|
|
|
|
vars = merge({
|
|
platform = lookup(var.worker_groups_launch_template[count.index], "platform", local.workers_group_defaults["platform"])
|
|
cluster_name = coalescelist(aws_eks_cluster.this[*].name, [""])[0]
|
|
endpoint = coalescelist(aws_eks_cluster.this[*].endpoint, [""])[0]
|
|
cluster_auth_base64 = coalescelist(aws_eks_cluster.this[*].certificate_authority[0].data, [""])[0]
|
|
pre_userdata = lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"pre_userdata",
|
|
local.workers_group_defaults["pre_userdata"],
|
|
)
|
|
additional_userdata = lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"additional_userdata",
|
|
local.workers_group_defaults["additional_userdata"],
|
|
)
|
|
bootstrap_extra_args = lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"bootstrap_extra_args",
|
|
local.workers_group_defaults["bootstrap_extra_args"],
|
|
)
|
|
kubelet_extra_args = lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"kubelet_extra_args",
|
|
local.workers_group_defaults["kubelet_extra_args"],
|
|
)
|
|
},
|
|
lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"userdata_template_extra_args",
|
|
local.workers_group_defaults["userdata_template_extra_args"]
|
|
)
|
|
)
|
|
}
|
|
|
|
data "aws_iam_role" "custom_cluster_iam_role" {
|
|
count = var.manage_cluster_iam_resources ? 0 : 1
|
|
name = var.cluster_iam_role_name
|
|
}
|
|
|
|
data "aws_iam_instance_profile" "custom_worker_group_iam_instance_profile" {
|
|
count = var.manage_worker_iam_resources ? 0 : local.worker_group_count
|
|
name = lookup(
|
|
var.worker_groups[count.index],
|
|
"iam_instance_profile_name",
|
|
local.workers_group_defaults["iam_instance_profile_name"],
|
|
)
|
|
}
|
|
|
|
data "aws_iam_instance_profile" "custom_worker_group_launch_template_iam_instance_profile" {
|
|
count = var.manage_worker_iam_resources ? 0 : local.worker_group_launch_template_count
|
|
name = lookup(
|
|
var.worker_groups_launch_template[count.index],
|
|
"iam_instance_profile_name",
|
|
local.workers_group_defaults["iam_instance_profile_name"],
|
|
)
|
|
}
|
|
|
|
data "aws_partition" "current" {}
|