Commit f22b0d87 authored by Nick White's avatar Nick White

terraform 0.12.30

parent 27782e63
......@@ -8,7 +8,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
replicas = 1
selector {
match_labels {
match_labels = {
name = "aws-alb-ingress-controller"
}
}
......@@ -17,11 +17,11 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
metadata {
name = "aws-alb-ingress-controller"
annotations {
annotations = {
"iam.amazonaws.com/role" = "eks-alb-ingress-controller"
}
labels {
labels = {
name = "aws-alb-ingress-controller"
}
}
......@@ -31,22 +31,22 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
termination_grace_period_seconds = 60
volume {
name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}"
name = kubernetes_service_account.aws_alb_service_account.default_secret_name
secret {
secret_name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}"
secret_name = kubernetes_service_account.aws_alb_service_account.default_secret_name
}
}
container {
image = "amazon/aws-alb-ingress-controller:v1.1.2"
image = " :v1.1.2"
name = "aws-alb-ingress-container"
image_pull_policy = "IfNotPresent"
args = ["--cluster-name=${var.cluster_name}"]
volume_mount {
mount_path = "/var/run/secrets/kubernetes.io/serviceaccount"
name = "${kubernetes_service_account.aws_alb_service_account.default_secret_name}"
name = kubernetes_service_account.aws_alb_service_account.default_secret_name
read_only = true
}
......
......@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "ec2_assume" {
principals {
type = "AWS"
identifiers = ["${var.worker_iam_role_arn}"]
identifiers = [var.worker_iam_role_arn]
}
}
}
......@@ -138,15 +138,15 @@ data "aws_iam_policy_document" "ingress" {
}
resource "aws_iam_policy" "this" {
policy = "${data.aws_iam_policy_document.ingress.json}"
policy = data.aws_iam_policy_document.ingress.json
}
resource "aws_iam_role" "this" {
name = "eks-alb-ingress-controller"
assume_role_policy = "${data.aws_iam_policy_document.ec2_assume.json}"
assume_role_policy = data.aws_iam_policy_document.ec2_assume.json
}
resource "aws_iam_role_policy_attachment" "this" {
role = "${aws_iam_role.this.name}"
policy_arn = "${aws_iam_policy.this.arn}"
role = aws_iam_role.this.name
policy_arn = aws_iam_policy.this.arn
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment