generated from ministryofjustice/template-repository
-
Notifications
You must be signed in to change notification settings - Fork 1
/
outputs.tf
64 lines (57 loc) · 2.36 KB
/
outputs.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
output "application_name" {
value = var.application_name
}
output "terraform_workspace" {
value = terraform.workspace
}
output "enabled" {
value = var.enabled
}
output "aws_region" {
value = var.aws_region
}
output "assume_role" {
value = var.assume_role
sensitive = true
}
output "vpc" {
value = var.enabled ? {
vpc_id = module.vpc[0].vpc_id
private_subnets = module.vpc[0].private_subnets_cidr_blocks
public_subnets = module.vpc[0].public_subnets_cidr_blocks
} : null
sensitive = false
}
output "certificate" {
value = var.enabled ? {
certificate_domain = module.acm[0].distinct_domain_names[0]
certificate_arn = module.acm[0].acm_certificate_arn
} : null
sensitive = true
}
output "eks_cluster" {
value = var.enabled ? {
issuer = module.eks[0].issuer
name = module.eks[0].cluster_name
endpoint = module.eks[0].endpoint
aws_load_balancer_controller_iam_role_arn = module.eks[0].aws_load_balancer_controller_iam_role_arn
external_dns_iam_role_arn = module.eks[0].external_dns_iam_role_arn
aws_efs_csi_driver_iam_role_arn = module.eks[0].aws_efs_csi_driver_iam_role_arn
aws_ebs_csi_driver_iam_role_arn = module.eks[0].aws_ebs_csi_driver_iam_role_arn
efs_file_system_id = module.eks[0].efs_file_system_id
thanos_iam_role_arn = module.eks[0].thanos_iam_role_arn
thanos_storage_s3_bucket_name = module.eks[0].thanos_storage_s3_bucket_name
cloudwatch_exporter_iam_role_arn = module.eks[0].cloudwatch_exporter_iam_role_arn
cloudwatch_exporter_development_iam_role_arn = module.eks[0].cloudwatch_exporter_development_iam_role_arn
cloudwatch_exporter_pre_production_iam_role_arn = module.eks[0].cloudwatch_exporter_pre_production_iam_role_arn
db_endpoint = module.eks[0].db_endpoint
} : null
sensitive = true
}
output "kubeconfig_certificate_authority_data" {
value = var.enabled ? base64decode(module.eks[0].kubeconfig_certificate_authority_data) : null
sensitive = true
}
output "tags" {
value = join("\\,", [for key, value in module.label.tags : "${key}=${value}"])
}