diff --git a/examples/main.tf b/examples/main.tf index 8ba2ea1..7f5fc4e 100644 --- a/examples/main.tf +++ b/examples/main.tf @@ -2,6 +2,8 @@ module "kubernetes" { source = "scholzj/kubernetes/aws" aws_region = "eu-central-1" + aws_role_arn = "arn:aws:iam::12345678900:role/terraform" + cluster_name = "aws-kubernetes" master_instance_type = "t2.medium" worker_instance_type = "t2.medium" diff --git a/main.tf b/main.tf index 29f6e38..517dd90 100644 --- a/main.tf +++ b/main.tf @@ -4,7 +4,13 @@ # Retrieve AWS credentials from env variables AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY provider "aws" { + alias = "kubernetes" region = "${var.aws_region}" + + assume_role { + session_name = "Terraform" + role_arn = "${var.aws_role_arn}" + } } ##### @@ -28,6 +34,7 @@ data "template_file" "master_policy_json" { } resource "aws_iam_policy" "master_policy" { + provider = "aws.kubernetes" name = "${var.cluster_name}-master" path = "/" description = "Policy for role ${var.cluster_name}-master" @@ -35,8 +42,8 @@ resource "aws_iam_policy" "master_policy" { } resource "aws_iam_role" "master_role" { - name = "${var.cluster_name}-master" - + provider = "aws.kubernetes" + name = "${var.cluster_name}-master" assume_role_policy = <