Commit 60efd5e3 authored by Nicky White's avatar Nicky White

Terraform v0.12

parent 27782e63
...@@ -35,3 +35,4 @@ resource "kubernetes_cluster_role_binding" "aws_alb_cluster_role_bind" { ...@@ -35,3 +35,4 @@ resource "kubernetes_cluster_role_binding" "aws_alb_cluster_role_bind" {
api_group = "rbac.authorization.k8s.io" api_group = "rbac.authorization.k8s.io"
} }
} }
...@@ -8,7 +8,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" { ...@@ -8,7 +8,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
replicas = 1 replicas = 1
selector { selector {
match_labels { match_labels = {
name = "aws-alb-ingress-controller" name = "aws-alb-ingress-controller"
} }
} }
...@@ -17,11 +17,11 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" { ...@@ -17,11 +17,11 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
metadata { metadata {
name = "aws-alb-ingress-controller" name = "aws-alb-ingress-controller"
annotations { annotations = {
"iam.amazonaws.com/role" = "eks-alb-ingress-controller" "iam.amazonaws.com/role" = "eks-alb-ingress-controller"
} }
labels { labels = {
name = "aws-alb-ingress-controller" name = "aws-alb-ingress-controller"
} }
} }
...@@ -31,10 +31,10 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" { ...@@ -31,10 +31,10 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
termination_grace_period_seconds = 60 termination_grace_period_seconds = 60
volume { volume {
name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}" name = kubernetes_service_account.aws_alb_service_account.default_secret_name
secret { secret {
secret_name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}" secret_name = kubernetes_service_account.aws_alb_service_account.default_secret_name
} }
} }
...@@ -46,7 +46,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" { ...@@ -46,7 +46,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
volume_mount { volume_mount {
mount_path = "/var/run/secrets/kubernetes.io/serviceaccount" mount_path = "/var/run/secrets/kubernetes.io/serviceaccount"
name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}" name = kubernetes_service_account.aws_alb_service_account.default_secret_name
read_only = true read_only = true
} }
...@@ -60,3 +60,4 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" { ...@@ -60,3 +60,4 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
} }
} }
} }
...@@ -4,3 +4,4 @@ resource "kubernetes_service_account" "aws_alb_service_account" { ...@@ -4,3 +4,4 @@ resource "kubernetes_service_account" "aws_alb_service_account" {
namespace = "kube-system" namespace = "kube-system"
} }
} }
...@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "ec2_assume" { ...@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "ec2_assume" {
principals { principals {
type = "AWS" type = "AWS"
identifiers = ["${var.worker_iam_role_arn}"] identifiers = [var.worker_iam_role_arn]
} }
} }
} }
...@@ -138,15 +138,16 @@ data "aws_iam_policy_document" "ingress" { ...@@ -138,15 +138,16 @@ data "aws_iam_policy_document" "ingress" {
} }
resource "aws_iam_policy" "this" { resource "aws_iam_policy" "this" {
policy = "${data.aws_iam_policy_document.ingress.json}" policy = data.aws_iam_policy_document.ingress.json
} }
resource "aws_iam_role" "this" { resource "aws_iam_role" "this" {
name = "eks-alb-ingress-controller" name = "eks-alb-ingress-controller"
assume_role_policy = "${data.aws_iam_policy_document.ec2_assume.json}" assume_role_policy = data.aws_iam_policy_document.ec2_assume.json
} }
resource "aws_iam_role_policy_attachment" "this" { resource "aws_iam_role_policy_attachment" "this" {
role = "${aws_iam_role.this.name}" role = aws_iam_role.this.name
policy_arn = "${aws_iam_policy.this.arn}" policy_arn = aws_iam_policy.this.arn
} }
variable "worker_iam_role_arn" {} variable "worker_iam_role_arn" {
variable "cluster_name" {} }
\ No newline at end of file
variable "cluster_name" {
}
terraform {
required_version = ">= 0.12"
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment