@@ -20,11 +20,11 @@ module "eks_custom_ami" {
20
20
source = " github.com/terraform-aws-modules/terraform-aws-eks/modules/_user_data"
21
21
22
22
# https://docs.aws.amazon.com/eks/latest/APIReference/API_Nodegroup.html#AmazonEKS-Type-Nodegroup-amiType
23
- for_each = toset ([
24
- for k , v in var . node_groups : v . ami_type if lookup (v, " node_disk_encrypted" , false ) == true
25
- ])
23
+ for_each = {
24
+ for k , v in var . node_groups : k => v if lookup (v, " node_disk_encrypted" , false ) == true
25
+ }
26
26
27
- ami_type = each. key
27
+ ami_type = each. value . ami_type
28
28
29
29
cluster_name = var. environment_name
30
30
cluster_endpoint = aws_eks_cluster. cluster . endpoint
@@ -33,19 +33,15 @@ module "eks_custom_ami" {
33
33
34
34
enable_bootstrap_user_data = true
35
35
36
- # bootstrap_extra_args = <<-EOT
37
- # # extra args added
38
- # [settings.kernel]
39
- # lockdown = "integrity"
40
- # EOT
36
+ bootstrap_extra_args = lookup (each. value , " ami_bootstrap_extra_args" , " " )
41
37
}
42
38
43
39
resource "aws_launch_template" "encrypted_launch_template" {
44
40
for_each = { for k , v in var . node_groups : k => v if lookup (v, " node_disk_encrypted" , false ) }
45
41
46
42
name_prefix = " ${ var . environment_name } -${ each . key } "
47
43
image_id = data. aws_ssm_parameter . amis [each . value . ami_type ]. value
48
- user_data = module. eks_custom_ami [each . value . ami_type ]. user_data
44
+ user_data = module. eks_custom_ami [each . key ]. user_data
49
45
50
46
metadata_options {
51
47
http_endpoint = " enabled"
0 commit comments