Merge pull request #294 from billyoung/master

Add IAM profiles for Kubernetes nodes
This commit is contained in:
Smaine Kahlouch 2016-06-18 11:03:24 +02:00 committed by GitHub
commit a889910677

View file

@ -81,6 +81,112 @@ provider "aws" {
region = "${var.awsRegion}" region = "${var.awsRegion}"
} }
variable "iam_prefix" {
type = "string"
description = "Prefix name for IAM profiles"
}
resource "aws_iam_instance_profile" "kubernetes_master_profile" {
name = "${var.iam_prefix}_kubernetes_master_profile"
roles = ["${aws_iam_role.kubernetes_master_role.name}"]
}
resource "aws_iam_role" "kubernetes_master_role" {
name = "${var.iam_prefix}_kubernetes_master_role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": { "Service": "ec2.amazonaws.com"},
"Action": "sts:AssumeRole"
}
]
}
EOF
}
resource "aws_iam_role_policy" "kubernetes_master_policy" {
name = "${var.iam_prefix}_kubernetes_master_policy"
role = "${aws_iam_role.kubernetes_master_role.id}"
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["ec2:*"],
"Resource": ["*"]
},
{
"Effect": "Allow",
"Action": ["elasticloadbalancing:*"],
"Resource": ["*"]
},
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": "*"
}
]
}
EOF
}
resource "aws_iam_instance_profile" "kubernetes_node_profile" {
name = "${var.iam_prefix}_kubernetes_node_profile"
roles = ["${aws_iam_role.kubernetes_node_role.name}"]
}
resource "aws_iam_role" "kubernetes_node_role" {
name = "${var.iam_prefix}_kubernetes_node_role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": { "Service": "ec2.amazonaws.com"},
"Action": "sts:AssumeRole"
}
]
}
EOF
}
resource "aws_iam_role_policy" "kubernetes_node_policy" {
name = "${var.iam_prefix}_kubernetes_node_policy"
role = "${aws_iam_role.kubernetes_node_role.id}"
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "ec2:Describe*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "ec2:AttachVolume",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "ec2:DetachVolume",
"Resource": "*"
}
]
}
EOF
}
resource "aws_instance" "master" { resource "aws_instance" "master" {
count = "${var.numControllers}" count = "${var.numControllers}"
ami = "${var.ami}" ami = "${var.ami}"
@ -89,6 +195,7 @@ resource "aws_instance" "master" {
vpc_security_group_ids = ["${var.securityGroups}"] vpc_security_group_ids = ["${var.securityGroups}"]
key_name = "${var.SSHKey}" key_name = "${var.SSHKey}"
disable_api_termination = "${var.terminate_protect}" disable_api_termination = "${var.terminate_protect}"
iam_instance_profile = "${aws_iam_instance_profile.kubernetes_master_profile.id}"
root_block_device { root_block_device {
volume_size = "${var.volSizeController}" volume_size = "${var.volSizeController}"
} }
@ -122,6 +229,7 @@ resource "aws_instance" "minion" {
vpc_security_group_ids = ["${var.securityGroups}"] vpc_security_group_ids = ["${var.securityGroups}"]
key_name = "${var.SSHKey}" key_name = "${var.SSHKey}"
disable_api_termination = "${var.terminate_protect}" disable_api_termination = "${var.terminate_protect}"
iam_instance_profile = "${aws_iam_instance_profile.kubernetes_node_profile.id}"
root_block_device { root_block_device {
volume_size = "${var.volSizeNodes}" volume_size = "${var.volSizeNodes}"
} }
@ -130,6 +238,14 @@ resource "aws_instance" "minion" {
} }
} }
output "kubernetes_master_profile" {
value = "${aws_iam_instance_profile.kubernetes_master_profile.id}"
}
output "kubernetes_node_profile" {
value = "${aws_iam_instance_profile.kubernetes_node_profile.id}"
}
output "master-ip" { output "master-ip" {
value = "${join(", ", aws_instance.master.*.private_ip)}" value = "${join(", ", aws_instance.master.*.private_ip)}"
} }
@ -141,3 +257,5 @@ output "etcd-ip" {
output "minion-ip" { output "minion-ip" {
value = "${join(", ", aws_instance.minion.*.private_ip)}" value = "${join(", ", aws_instance.minion.*.private_ip)}"
} }