feat: Made it clear that we stand with Ukraine · terraform-aws-modules/terraform-aws-eks@fad350d

2 min read Original article ↗
11

data "aws_partition" "current" {}

223+

locals {

4+

create = var.create && var.putin_khuylo

5+

}

6+37

################################################################################

48

# Cluster

59

################################################################################

610711

resource "aws_eks_cluster" "this" {

8-

count = var.create ? 1 : 0

12+

count = local.create ? 1 : 0

9131014

name = var.cluster_name

1115

role_arn = try(aws_iam_role.this[0].arn, var.iam_role_arn)

@@ -56,7 +60,7 @@ resource "aws_eks_cluster" "this" {

5660

}

57615862

resource "aws_cloudwatch_log_group" "this" {

59-

count = var.create && var.create_cloudwatch_log_group ? 1 : 0

63+

count = local.create && var.create_cloudwatch_log_group ? 1 : 0

60646165

name = "/aws/eks/${var.cluster_name}/cluster"

6266

retention_in_days = var.cloudwatch_log_group_retention_in_days

@@ -72,7 +76,7 @@ resource "aws_cloudwatch_log_group" "this" {

72767377

locals {

7478

cluster_sg_name = coalesce(var.cluster_security_group_name, "${var.cluster_name}-cluster")

75-

create_cluster_sg = var.create && var.create_cluster_security_group

79+

create_cluster_sg = local.create && var.create_cluster_security_group

76807781

cluster_security_group_id = local.create_cluster_sg ? aws_security_group.cluster[0].id : var.cluster_security_group_id

7882

@@ -147,13 +151,13 @@ resource "aws_security_group_rule" "cluster" {

147151

################################################################################

148152149153

data "tls_certificate" "this" {

150-

count = var.create && var.enable_irsa ? 1 : 0

154+

count = local.create && var.enable_irsa ? 1 : 0

151155152156

url = aws_eks_cluster.this[0].identity[0].oidc[0].issuer

153157

}

154158155159

resource "aws_iam_openid_connect_provider" "oidc_provider" {

156-

count = var.create && var.enable_irsa ? 1 : 0

160+

count = local.create && var.enable_irsa ? 1 : 0

157161158162

client_id_list = distinct(compact(concat(["sts.${data.aws_partition.current.dns_suffix}"], var.openid_connect_audiences)))

159163

thumbprint_list = concat([data.tls_certificate.this[0].certificates[0].sha1_fingerprint], var.custom_oidc_thumbprints)

@@ -170,7 +174,7 @@ resource "aws_iam_openid_connect_provider" "oidc_provider" {

170174

################################################################################

171175172176

locals {

173-

create_iam_role = var.create && var.create_iam_role

177+

create_iam_role = local.create && var.create_iam_role

174178

iam_role_name = coalesce(var.iam_role_name, "${var.cluster_name}-cluster")

175179

policy_arn_prefix = "arn:${data.aws_partition.current.partition}:iam::aws:policy"

176180

@@ -182,7 +186,7 @@ locals {

182186

}

183187184188

data "aws_iam_policy_document" "assume_role_policy" {

185-

count = var.create && var.create_iam_role ? 1 : 0

189+

count = local.create && var.create_iam_role ? 1 : 0

186190187191

statement {

188192

sid = "EKSClusterAssumeRole"

@@ -261,7 +265,7 @@ resource "aws_iam_policy" "cluster_encryption" {

261265

################################################################################

262266263267

resource "aws_eks_addon" "this" {

264-

for_each = { for k, v in var.cluster_addons : k => v if var.create }

268+

for_each = { for k, v in var.cluster_addons : k => v if local.create }

265269266270

cluster_name = aws_eks_cluster.this[0].name

267271

addon_name = try(each.value.name, each.key)

@@ -291,7 +295,7 @@ resource "aws_eks_addon" "this" {

291295

################################################################################

292296293297

resource "aws_eks_identity_provider_config" "this" {

294-

for_each = { for k, v in var.cluster_identity_providers : k => v if var.create }

298+

for_each = { for k, v in var.cluster_identity_providers : k => v if local.create }

295299296300

cluster_name = aws_eks_cluster.this[0].name

297301