Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-kube2iam
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-kube2iam
Commits
2e1ed24e
Commit
2e1ed24e
authored
Feb 22, 2021
by
Nick White
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Upgraded to tf0.12.30
parent
61a64740
Changes
6
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
29 additions
and
18 deletions
+29
-18
eks-kube2iam-clusterrolebinding.tf
eks-kube2iam-clusterrolebinding.tf
+1
-0
eks-kube2iam-serviceaccount.tf
eks-kube2iam-serviceaccount.tf
+1
-0
eks-kube2iam.tf
eks-kube2iam.tf
+11
-11
iam.tf
iam.tf
+6
-5
variables.tf
variables.tf
+6
-2
versions.tf
versions.tf
+4
-0
No files found.
eks-kube2iam-clusterrolebinding.tf
View file @
2e1ed24e
...
...
@@ -28,3 +28,4 @@ resource "kubernetes_cluster_role_binding" "kube2iam_cluster_role_bind" {
namespace
=
"kube-system"
}
}
eks-kube2iam-serviceaccount.tf
View file @
2e1ed24e
...
...
@@ -6,3 +6,4 @@ resource "kubernetes_service_account" "kube2iam_service_account" {
automount_service_account_token
=
"true"
}
eks-kube2iam.tf
View file @
2e1ed24e
...
...
@@ -3,14 +3,14 @@ resource "kubernetes_daemonset" "kube2iam_daemonset" {
name
=
"kube2iam"
namespace
=
"kube-system"
labels
{
labels
=
{
app
=
"kube2iam"
}
}
spec
{
selector
{
match_labels
{
match_labels
=
{
app
=
"kube2iam"
}
}
...
...
@@ -19,7 +19,7 @@ resource "kubernetes_daemonset" "kube2iam_daemonset" {
metadata
{
name
=
"kube2iam"
labels
{
labels
=
{
app
=
"kube2iam"
}
}
...
...
@@ -29,14 +29,13 @@ resource "kubernetes_daemonset" "kube2iam_daemonset" {
host_network
=
true
volume
{
name
=
"
${
kubernetes_service_account
.
kube2iam_service_account
.
default_secret_name
}
"
name
=
kubernetes_service_account
.
kube2iam_service_account
.
default_secret_name
secret
{
secret_name
=
"
${
kubernetes_service_account
.
kube2iam_service_account
.
default_secret_name
}
"
secret_name
=
kubernetes_service_account
.
kube2iam_service_account
.
default_secret_name
}
}
container
{
image
=
"jtblin/kube2iam:0.10.4"
name
=
"kube2iam-container"
...
...
@@ -46,7 +45,7 @@ resource "kubernetes_daemonset" "kube2iam_daemonset" {
volume_mount
{
mount_path
=
"/var/run/secrets/kubernetes.io/serviceaccount"
name
=
"
${
kubernetes_service_account
.
kube2iam_service_account
.
default_secret_name
}
"
name
=
kubernetes_service_account
.
kube2iam_service_account
.
default_secret_name
read_only
=
true
}
security_context
{
...
...
@@ -56,20 +55,20 @@ resource "kubernetes_daemonset" "kube2iam_daemonset" {
env
{
name
=
"HOST_IP"
value_from
=
{
field_ref
=
{
value_from
{
field_ref
{
field_path
=
"status.podIP"
}
}
}
resources
{
limits
{
limits
=
{
cpu
=
"0.5"
memory
=
"512Mi"
}
requests
{
requests
=
{
cpu
=
"250m"
memory
=
"50Mi"
}
...
...
@@ -79,3 +78,4 @@ resource "kubernetes_daemonset" "kube2iam_daemonset" {
}
}
}
iam.tf
View file @
2e1ed24e
...
...
@@ -9,12 +9,12 @@ data "aws_iam_policy_document" "eks_worker" {
}
resource
"aws_iam_policy"
"eks_worker"
{
policy
=
"
${data
.
aws_iam_policy_document
.
eks_worker
.
json
}
"
policy
=
data
.
aws_iam_policy_document
.
eks_worker
.
json
}
resource
"aws_iam_role_policy_attachment"
"eks_worker"
{
role
=
"
${
var
.
worker_iam_role_name
}
"
policy_arn
=
"
${
aws_iam_policy
.
eks_worker
.
arn
}
"
role
=
var
.
worker_iam_role_name
policy_arn
=
aws_iam_policy
.
eks_worker
.
arn
}
data
"aws_iam_policy_document"
"default"
{
...
...
@@ -36,12 +36,13 @@ data "aws_iam_policy_document" "default" {
principals
{
type
=
"AWS"
identifiers
=
[
"
${
var
.
worker_iam_role_arn
}
"
]
identifiers
=
[
var
.
worker_iam_role_arn
]
}
}
}
resource
"aws_iam_role"
"default"
{
name
=
"eks-kube2iam-default-role"
assume_role_policy
=
"
${data
.
aws_iam_policy_document
.
default
.
json
}
"
assume_role_policy
=
data
.
aws_iam_policy_document
.
default
.
json
}
variables.tf
View file @
2e1ed24e
variable
"worker_iam_role_name"
{}
variable
"worker_iam_role_arn"
{}
variable
"worker_iam_role_name"
{
}
variable
"worker_iam_role_arn"
{
}
versions.tf
0 → 100644
View file @
2e1ed24e
terraform
{
required_version
=
">= 0.12"
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment