File tree Expand file tree Collapse file tree
kubernetes/terraform/modules/kubernetes
terraform/modules/environment Expand file tree Collapse file tree Original file line number Diff line number Diff line change 22# Create a role using oidc to map service accounts
33module "iam_assumable_role_irsa" {
44 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
5- version = " ~> v2.14 .0"
5+ version = " ~> v3.12 .0"
66 create_role = true
77 role_name = " ${ var . project } -k8s-${ var . environment } -${ kubernetes_namespace . metrics . metadata [0 ]. name } -grafana"
88 provider_url = replace (data. aws_eks_cluster . cluster . identity [0 ]. oidc [0 ]. issuer , " https://" , " " )
Original file line number Diff line number Diff line change 1+ terraform {
2+ required_providers {
3+ kubernetes = {
4+ source = " hashicorp/kubernetes"
5+ version = " ~> 1.11"
6+ }
7+ }
8+ }
9+
110locals {
211 k8s_exec_context = " --context ${ data . aws_eks_cluster . cluster . name } --server ${ data . aws_eks_cluster . cluster . endpoint } "
312}
@@ -38,7 +47,6 @@ provider "kubernetes" {
3847 cluster_ca_certificate = base64decode (data. aws_eks_cluster . cluster . certificate_authority . 0 . data )
3948 token = data. aws_eks_cluster_auth . cluster . token
4049 load_config_file = false
41- version = " ~> 1.11"
4250}
4351
4452provider "helm" {
Original file line number Diff line number Diff line change 1+ terraform {
2+ required_providers {
3+ kubernetes = {
4+ source = " hashicorp/kubernetes"
5+ version = " ~> 1.11"
6+ }
7+ }
8+ }
9+
110# Created by bootstrap/secrets
211data "aws_iam_role" "eks_cluster_creator" {
312 name = " ${ var . project } -eks-cluster-creator"
@@ -36,5 +45,4 @@ provider "kubernetes" {
3645 cluster_ca_certificate = base64decode (data. aws_eks_cluster . cluster . certificate_authority . 0 . data )
3746 token = data. aws_eks_cluster_auth . cluster . token
3847 load_config_file = false
39- version = " ~> 1.11"
4048}
You can’t perform that action at this time.
0 commit comments