Commit 60efd5e3 authored by Nicky White's avatar Nicky White

Terraform v0.12

parent 27782e63
......@@ -35,3 +35,4 @@ resource "kubernetes_cluster_role_binding" "aws_alb_cluster_role_bind" {
api_group = "rbac.authorization.k8s.io"
}
}
......@@ -8,7 +8,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
replicas = 1
selector {
match_labels {
match_labels = {
name = "aws-alb-ingress-controller"
}
}
......@@ -17,11 +17,11 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
metadata {
name = "aws-alb-ingress-controller"
annotations {
annotations = {
"iam.amazonaws.com/role" = "eks-alb-ingress-controller"
}
labels {
labels = {
name = "aws-alb-ingress-controller"
}
}
......@@ -31,10 +31,10 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
termination_grace_period_seconds = 60
volume {
name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}"
name = kubernetes_service_account.aws_alb_service_account.default_secret_name
secret {
secret_name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}"
secret_name = kubernetes_service_account.aws_alb_service_account.default_secret_name
}
}
......@@ -46,7 +46,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
volume_mount {
mount_path = "/var/run/secrets/kubernetes.io/serviceaccount"
name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}"
name = kubernetes_service_account.aws_alb_service_account.default_secret_name
read_only = true
}
......@@ -60,3 +60,4 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
}
}
}
......@@ -4,3 +4,4 @@ resource "kubernetes_service_account" "aws_alb_service_account" {
namespace = "kube-system"
}
}
......@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "ec2_assume" {
principals {
type = "AWS"
identifiers = ["${var.worker_iam_role_arn}"]
identifiers = [var.worker_iam_role_arn]
}
}
}
......@@ -138,15 +138,16 @@ data "aws_iam_policy_document" "ingress" {
}
resource "aws_iam_policy" "this" {
policy = "${data.aws_iam_policy_document.ingress.json}"
policy = data.aws_iam_policy_document.ingress.json
}
resource "aws_iam_role" "this" {
name = "eks-alb-ingress-controller"
assume_role_policy = "${data.aws_iam_policy_document.ec2_assume.json}"
assume_role_policy = data.aws_iam_policy_document.ec2_assume.json
}
resource "aws_iam_role_policy_attachment" "this" {
role = "${aws_iam_role.this.name}"
policy_arn = "${aws_iam_policy.this.arn}"
role = aws_iam_role.this.name
policy_arn = aws_iam_policy.this.arn
}
variable "worker_iam_role_arn" {}
variable "cluster_name" {}
\ No newline at end of file
variable "worker_iam_role_arn" {
}
variable "cluster_name" {
}
terraform {
required_version = ">= 0.12"
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment