This repository has been archived by the owner on Jun 19, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathvariables.tf
84 lines (71 loc) · 1.76 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
variable "tags" {
type = map
default = {}
}
variable "aws_profile" {
type = string
default = "default"
description = "Valid AWS Profile in local config that has access to the cluster. This to avoid Unauthorized error when local-exec runs"
}
variable "cluster_name" {
type = string
default = ""
}
variable "eks_cluster_version" {
type = string
default = "1.14"
}
variable "vpc_id" {
type = string
default = ""
}
variable "public_subnets" {
type = list(string)
default = []
}
variable "private_subnets" {
type = list(string)
default = []
}
variable "default_security_group_id" {
type = string
default = ""
}
variable "eks_worker_ami_name_filter" {
type = string
default = ""
}
variable "eks_cluster_enabled_log_types" {
default = []
}
variable "eks_worker_groups" {
type = any
default = []
}
variable "eks_worker_groups_launch_template" {
type = any
default = []
}
variable "eks_map_users" {
type = list(object({
userarn = string
username = string
groups = list(string)
}))
default = []
description = "IAM users to add to the aws-auth configmap, see example here: https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/examples/eks_test_fixture/variables.tf"
}
variable "eks_map_roles" {
type = list(object({
rolearn = string
username = string
groups = list(string)
}))
default = []
description = "IAM roles to add to the aws-auth configmap, see example here: https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/examples/eks_test_fixture/variables.tf"
}
variable "eks_extra_policies" {
type = list(string)
default = []
description = "The list of extra IAM policies to create for cluster nodes"
}