44 " kubernetes.io/cluster/${var.cluster_name}" = " owned"
55 }
66
7- workers_role_arn = var. use_existing_aws_iam_instance_profile ? join (" " , data. aws_iam_instance_profile . default . * . role_arn ) : join (" " , aws_iam_role. default . * . arn )
8- workers_role_name = var. use_existing_aws_iam_instance_profile ? join (" " , data. aws_iam_instance_profile . default . * . role_name ) : join (" " , aws_iam_role. default . * . name )
7+ workers_role_arn = var. use_existing_aws_iam_instance_profile ? join (" " , data. aws_iam_instance_profile . default [ * ] . role_arn ) : join (" " , aws_iam_role. default [ * ] . arn )
8+ workers_role_name = var. use_existing_aws_iam_instance_profile ? join (" " , data. aws_iam_instance_profile . default [ * ] . role_name ) : join (" " , aws_iam_role. default [ * ] . name )
99
1010 userdata = templatefile (" ${ path . module } /userdata.tpl" , {
1111 cluster_endpoint = var.cluster_endpoint
@@ -47,38 +47,38 @@ data "aws_iam_policy_document" "assume_role" {
4747resource "aws_iam_role" "default" {
4848 count = local. enabled && var. use_existing_aws_iam_instance_profile == false ? 1 : 0
4949 name = module. label . id
50- assume_role_policy = join (" " , data. aws_iam_policy_document . assume_role . * . json )
50+ assume_role_policy = join (" " , data. aws_iam_policy_document . assume_role [ * ] . json )
5151 tags = module. label . tags
5252}
5353
5454resource "aws_iam_role_policy_attachment" "amazon_eks_worker_node_policy" {
5555 count = local. enabled && var. use_existing_aws_iam_instance_profile == false ? 1 : 0
5656 policy_arn = " arn:${ data . aws_partition . current . partition } :iam::aws:policy/AmazonEKSWorkerNodePolicy"
57- role = join (" " , aws_iam_role. default . * . name )
57+ role = join (" " , aws_iam_role. default [ * ] . name )
5858}
5959
6060resource "aws_iam_role_policy_attachment" "amazon_eks_cni_policy" {
6161 count = local. enabled && var. use_existing_aws_iam_instance_profile == false ? 1 : 0
6262 policy_arn = " arn:${ data . aws_partition . current . partition } :iam::aws:policy/AmazonEKS_CNI_Policy"
63- role = join (" " , aws_iam_role. default . * . name )
63+ role = join (" " , aws_iam_role. default [ * ] . name )
6464}
6565
6666resource "aws_iam_role_policy_attachment" "amazon_ec2_container_registry_read_only" {
6767 count = local. enabled && var. use_existing_aws_iam_instance_profile == false ? 1 : 0
6868 policy_arn = " arn:${ data . aws_partition . current . partition } :iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
69- role = join (" " , aws_iam_role. default . * . name )
69+ role = join (" " , aws_iam_role. default [ * ] . name )
7070}
7171
7272resource "aws_iam_role_policy_attachment" "existing_policies_attach_to_eks_workers_role" {
7373 count = local. enabled && var. use_existing_aws_iam_instance_profile == false ? var. workers_role_policy_arns_count : 0
7474 policy_arn = var. workers_role_policy_arns [count . index ]
75- role = join (" " , aws_iam_role. default . * . name )
75+ role = join (" " , aws_iam_role. default [ * ] . name )
7676}
7777
7878resource "aws_iam_instance_profile" "default" {
7979 count = local. enabled && var. use_existing_aws_iam_instance_profile == false ? 1 : 0
8080 name = module. label . id
81- role = join (" " , aws_iam_role. default . * . name )
81+ role = join (" " , aws_iam_role. default [ * ] . name )
8282}
8383
8484resource "aws_security_group" "default" {
@@ -96,7 +96,7 @@ resource "aws_security_group_rule" "egress" {
9696 to_port = 0
9797 protocol = " -1"
9898 cidr_blocks = [" 0.0.0.0/0" ]
99- security_group_id = join (" " , aws_security_group. default . * . id )
99+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
100100 type = " egress"
101101}
102102
@@ -106,8 +106,8 @@ resource "aws_security_group_rule" "ingress_self" {
106106 from_port = 0
107107 to_port = 65535
108108 protocol = " -1"
109- security_group_id = join (" " , aws_security_group. default . * . id )
110- source_security_group_id = join (" " , aws_security_group. default . * . id )
109+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
110+ source_security_group_id = join (" " , aws_security_group. default [ * ] . id )
111111 type = " ingress"
112112}
113113
@@ -117,7 +117,7 @@ resource "aws_security_group_rule" "ingress_cluster" {
117117 from_port = 0
118118 to_port = 65535
119119 protocol = " -1"
120- security_group_id = join (" " , aws_security_group. default . * . id )
120+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
121121 source_security_group_id = var. cluster_security_group_id
122122 type = " ingress"
123123}
@@ -129,7 +129,7 @@ resource "aws_security_group_rule" "ingress_security_groups" {
129129 to_port = 65535
130130 protocol = " -1"
131131 source_security_group_id = var. allowed_security_groups [count . index ]
132- security_group_id = join (" " , aws_security_group. default . * . id )
132+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
133133 type = " ingress"
134134}
135135
@@ -140,7 +140,7 @@ resource "aws_security_group_rule" "ingress_cidr_blocks" {
140140 to_port = 0
141141 protocol = " -1"
142142 cidr_blocks = var. allowed_cidr_blocks
143- security_group_id = join (" " , aws_security_group. default . * . id )
143+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
144144 type = " ingress"
145145}
146146
@@ -165,18 +165,18 @@ data "aws_iam_instance_profile" "default" {
165165
166166module "autoscale_group" {
167167 source = " cloudposse/ec2-autoscale-group/aws"
168- version = " 0.30 .1"
168+ version = " 0.37 .1"
169169
170170 enabled = local. enabled
171171 tags = merge (local. tags , var. autoscaling_group_tags )
172172
173- image_id = var. use_custom_image_id ? var. image_id : join (" " , data. aws_ami . eks_worker . * . id )
174- iam_instance_profile_name = var. use_existing_aws_iam_instance_profile == false ? join (" " , aws_iam_instance_profile. default . * . name ) : var. aws_iam_instance_profile_name
173+ image_id = var. use_custom_image_id ? var. image_id : join (" " , data. aws_ami . eks_worker [ * ] . id )
174+ iam_instance_profile_name = var. use_existing_aws_iam_instance_profile == false ? join (" " , aws_iam_instance_profile. default [ * ] . name ) : var. aws_iam_instance_profile_name
175175
176176 security_group_ids = compact (
177177 concat (
178178 [
179- var . use_existing_security_group == false ? join (" " , aws_security_group. default . * . id ) : var . workers_security_group_id
179+ var . use_existing_security_group == false ? join (" " , aws_security_group. default [ * ] . id ) : var . workers_security_group_id
180180 ],
181181 var. additional_security_group_ids
182182 )
0 commit comments