File tree Expand file tree Collapse file tree 2 files changed +4
-1
lines changed Expand file tree Collapse file tree 2 files changed +4
-1
lines changed Original file line number Diff line number Diff line change @@ -5,6 +5,8 @@ resource "local_file" "config_map_aws_auth" {
5
5
}
6
6
7
7
resource "null_resource" "update_config_map_aws_auth" {
8
+ depends_on = [" aws_eks_cluster.this" ]
9
+
8
10
provisioner "local-exec" {
9
11
command = " kubectl apply -f ${ var . config_output_path } config-map-aws-auth_${ var . cluster_name } .yaml --kubeconfig ${ var . config_output_path } kubeconfig_${ var . cluster_name } "
10
12
}
Original file line number Diff line number Diff line change 6
6
cluster_security_group_id = " ${ coalesce (join (" " , aws_security_group. cluster . * . id ), var. cluster_security_group_id )} "
7
7
8
8
worker_security_group_id = " ${ coalesce (join (" " , aws_security_group. workers . * . id ), var. worker_security_group_id )} "
9
+ default_iam_role_id = " ${ element (concat (aws_iam_role. workers . * . id , list (" " )), 0 )} "
9
10
kubeconfig_name = " ${ var . kubeconfig_name == " " ? " eks_${ var . cluster_name } " : var . kubeconfig_name } "
10
11
11
12
workers_group_defaults_defaults = {
@@ -30,7 +31,7 @@ locals {
30
31
autoscaling_enabled = false # Sets whether policy and matching tags will be added to allow autoscaling.
31
32
additional_security_group_ids = " " # A comman delimited list of additional security group ids to include in worker launch config
32
33
protect_from_scale_in = false # Prevent AWS from scaling in, so that cluster-autoscaler is solely responsible.
33
- iam_role_id = " ${ aws_iam_role . workers . id } " # Use the specified IAM role if set.
34
+ iam_role_id = " ${ local . default_iam_role_id } " # Use the specified IAM role if set.
34
35
}
35
36
36
37
workers_group_defaults = " ${ merge (local. workers_group_defaults_defaults , var. workers_group_defaults )} "
You can’t perform that action at this time.
0 commit comments