-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add certificates and sha1_fingerprint as exported attributes to aws_eks_cluster module #2227
Comments
what are you doing differently than what we provide here https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/main.tf#L201-L218 |
Hi @bryantbiggs , I just want to avoid from using the data, and get the
If this is not the scope of |
we can absolutely support this since the data source is already used in the codebase - adding in #2249 |
This issue has been resolved in version 18.30.0 🎉 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Today, in order to create
aws_iam_openid_connect_provider
to my EKS cluster I need to providethumbprint_list
.In order to retrieve the
thumbprint_list
I'll have to use the data sourcetls_certificate
for that.Example:
From: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster#enabling-iam-roles-for-service-accounts
There is any way to avoid from using the data source
tls_certificate
by adding thetls_certificate
data (like certificates and sha1_fingerprint) as part of theaws_eks_cluster
module attributes?The text was updated successfully, but these errors were encountered: