mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-15 16:23:58 +01:00
BREAKING CHANGES: We now decided to remove `random_pet` resources in Managed Node Groups (MNG). Those were used to recreate MNG if something change and also simulate the newly added argument `node_group_name_prefix`. But they were causing a lot of troubles. To upgrade the module without recreating your MNG, you will need to explicitly reuse their previous name and set them in your MNG `name` argument. Please see [upgrade docs](https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/docs/upgrades.md#upgrade-module-to-v1700-for-managed-node-groups) for more details.
92 lines
3.0 KiB
HCL
92 lines
3.0 KiB
HCL
locals {
|
|
auth_launch_template_worker_roles = [
|
|
for index in range(0, var.create_eks ? local.worker_group_launch_template_count : 0) : {
|
|
worker_role_arn = "arn:${data.aws_partition.current.partition}:iam::${data.aws_caller_identity.current.account_id}:role/${element(
|
|
coalescelist(
|
|
aws_iam_instance_profile.workers_launch_template.*.role,
|
|
data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile.*.role_name,
|
|
[""]
|
|
),
|
|
index
|
|
)}"
|
|
platform = lookup(
|
|
var.worker_groups_launch_template[index],
|
|
"platform",
|
|
local.workers_group_defaults["platform"]
|
|
)
|
|
}
|
|
]
|
|
|
|
auth_worker_roles = [
|
|
for index in range(0, var.create_eks ? local.worker_group_count : 0) : {
|
|
worker_role_arn = "arn:${data.aws_partition.current.partition}:iam::${data.aws_caller_identity.current.account_id}:role/${element(
|
|
coalescelist(
|
|
aws_iam_instance_profile.workers.*.role,
|
|
data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile.*.role_name,
|
|
[""]
|
|
),
|
|
index,
|
|
)}"
|
|
platform = lookup(
|
|
var.worker_groups[index],
|
|
"platform",
|
|
local.workers_group_defaults["platform"]
|
|
)
|
|
}
|
|
]
|
|
|
|
# Convert to format needed by aws-auth ConfigMap
|
|
configmap_roles = [
|
|
for role in concat(
|
|
local.auth_launch_template_worker_roles,
|
|
local.auth_worker_roles,
|
|
module.node_groups.aws_auth_roles,
|
|
module.fargate.aws_auth_roles,
|
|
) :
|
|
{
|
|
# Work around https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/153
|
|
# Strip the leading slash off so that Terraform doesn't think it's a regex
|
|
rolearn = replace(role["worker_role_arn"], replace(var.iam_path, "/^//", ""), "")
|
|
username = role["platform"] == "fargate" ? "system:node:{{SessionName}}" : "system:node:{{EC2PrivateDNSName}}"
|
|
groups = tolist(concat(
|
|
[
|
|
"system:bootstrappers",
|
|
"system:nodes",
|
|
],
|
|
role["platform"] == "windows" ? ["eks:kube-proxy-windows"] : [],
|
|
role["platform"] == "fargate" ? ["system:node-proxier"] : [],
|
|
))
|
|
}
|
|
]
|
|
}
|
|
|
|
resource "kubernetes_config_map" "aws_auth" {
|
|
count = var.create_eks && var.manage_aws_auth ? 1 : 0
|
|
depends_on = [data.http.wait_for_cluster[0]]
|
|
|
|
metadata {
|
|
name = "aws-auth"
|
|
namespace = "kube-system"
|
|
labels = merge(
|
|
{
|
|
"app.kubernetes.io/managed-by" = "Terraform"
|
|
# / are replaced by . because label validator fails in this lib
|
|
# https://github.com/kubernetes/apimachinery/blob/1bdd76d09076d4dc0362456e59c8f551f5f24a72/pkg/util/validation/validation.go#L166
|
|
"terraform.io/module" = "terraform-aws-modules.eks.aws"
|
|
},
|
|
var.aws_auth_additional_labels
|
|
)
|
|
}
|
|
|
|
data = {
|
|
mapRoles = yamlencode(
|
|
distinct(concat(
|
|
local.configmap_roles,
|
|
var.map_roles,
|
|
))
|
|
)
|
|
mapUsers = yamlencode(var.map_users)
|
|
mapAccounts = yamlencode(var.map_accounts)
|
|
}
|
|
}
|