File tree 3 files changed +4
-14
lines changed
3 files changed +4
-14
lines changed Original file line number Diff line number Diff line change @@ -193,7 +193,6 @@ Apache 2 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraf
193
193
| [ aws_security_group_rule.cluster_egress_internet] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
194
194
| [ aws_security_group_rule.cluster_https_worker_ingress] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
195
195
| [ aws_security_group_rule.cluster_primary_ingress_workers] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
196
- | [ aws_security_group_rule.cluster_private_access] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
197
196
| [ aws_security_group_rule.cluster_private_access_cidrs_source] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
198
197
| [ aws_security_group_rule.cluster_private_access_sg_source] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
199
198
| [ aws_security_group_rule.workers_egress_internet] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule ) | resource |
Original file line number Diff line number Diff line change @@ -89,6 +89,7 @@ resource "aws_security_group_rule" "cluster_https_worker_ingress" {
89
89
90
90
resource "aws_security_group_rule" "cluster_private_access_cidrs_source" {
91
91
count = var. create_eks && var. cluster_create_endpoint_private_access_sg_rule && var. cluster_endpoint_private_access && var. cluster_endpoint_private_access_cidrs != null ? 1 : 0
92
+ description = " Allow private K8S API ingress from custom CIDR source."
92
93
type = " ingress"
93
94
from_port = 443
94
95
to_port = 443
@@ -100,6 +101,7 @@ resource "aws_security_group_rule" "cluster_private_access_cidrs_source" {
100
101
101
102
resource "aws_security_group_rule" "cluster_private_access_sg_source" {
102
103
count = var. create_eks && var. cluster_create_endpoint_private_access_sg_rule && var. cluster_endpoint_private_access && var. cluster_endpoint_private_access_sg != null ? length (var. cluster_endpoint_private_access_sg ) : 0
104
+ description = " Allow private K8S API ingress from custom Security Groups source."
103
105
type = " ingress"
104
106
from_port = 443
105
107
to_port = 443
@@ -109,18 +111,6 @@ resource "aws_security_group_rule" "cluster_private_access_sg_source" {
109
111
security_group_id = aws_eks_cluster. this [0 ]. vpc_config [0 ]. cluster_security_group_id
110
112
}
111
113
112
- resource "aws_security_group_rule" "cluster_private_access" {
113
- description = " Allow private K8S API ingress from custom source."
114
- count = var. create_eks && var. cluster_create_endpoint_private_access_sg_rule && var. cluster_endpoint_private_access ? 1 : 0
115
- type = " ingress"
116
- from_port = 443
117
- to_port = 443
118
- protocol = " tcp"
119
- cidr_blocks = var. cluster_endpoint_private_access_cidrs
120
-
121
- security_group_id = aws_eks_cluster. this [0 ]. vpc_config [0 ]. cluster_security_group_id
122
- }
123
-
124
114
resource "aws_iam_role" "cluster" {
125
115
count = var. manage_cluster_iam_resources && var. create_eks ? 1 : 0
126
116
name_prefix = var. cluster_iam_role_name != " " ? null : var. cluster_name
Original file line number Diff line number Diff line change @@ -94,6 +94,7 @@ data "http" "wait_for_cluster" {
94
94
95
95
depends_on = [
96
96
aws_eks_cluster . this ,
97
- aws_security_group_rule . cluster_private_access ,
97
+ aws_security_group_rule . cluster_private_access_sg_source ,
98
+ aws_security_group_rule . cluster_private_access_cidrs_source ,
98
99
]
99
100
}
You can’t perform that action at this time.
0 commit comments