@@ -40,18 +40,18 @@ locals {
40
40
gitops_addons_path = var. gitops_addons_path
41
41
gitops_addons_revision = var. gitops_addons_revision
42
42
43
- enable_ingress = true
44
- domain_private_zone = false
43
+ enable_ingress = true
44
+ is_route53_private_zone = false
45
45
# change to a valid domain name you created a route53 zone
46
46
# aws route53 create-hosted-zone --name example.com --caller-reference "$(date)"
47
- domain_name = var. domain_name
48
- argocd_subdomain = " argocd"
49
- argocd_host = " ${ local . argocd_subdomain } .${ local . domain_name } "
50
- argocd_domain_arn = try (data. aws_route53_zone . domain_name [0 ]. arn , " " )
47
+ domain_name = var. domain_name
48
+ argocd_subdomain = " argocd"
49
+ argocd_host = " ${ local . argocd_subdomain } .${ local . domain_name } "
50
+ route53_zone_arn = try (data. aws_route53_zone . this [0 ]. arn , " " )
51
51
52
52
53
53
aws_addons = {
54
- enable_cert_manager = true
54
+ # enable_cert_manager = true
55
55
# enable_aws_efs_csi_driver = true
56
56
# enable_aws_fsx_csi_driver = true
57
57
# enable_aws_cloudwatch_metrics = true
@@ -68,10 +68,10 @@ locals {
68
68
# enable_aws_gateway_api_controller = true
69
69
# enable_aws_ebs_csi_resources = true # generate gp2 and gp3 storage classes for ebs-csi
70
70
# enable_aws_secrets_store_csi_driver_provider = true
71
- enable_aws_argocd_ingress = true
71
+ enable_aws_argocd_ingress = true
72
72
}
73
73
oss_addons = {
74
- enable_argocd = false
74
+ enable_argocd = false
75
75
# enable_argo_rollouts = true
76
76
# enable_argo_events = true
77
77
# enable_argo_workflows = true
@@ -170,7 +170,7 @@ module "eks_blueprints_addons" {
170
170
enable_velero = try (local. aws_addons . enable_velero , false )
171
171
enable_aws_gateway_api_controller = try (local. aws_addons . enable_aws_gateway_api_controller , false )
172
172
173
- external_dns_route53_zone_arns = [local . argocd_domain_arn ] # ArgoCD Server and UI domain name is registered in Route 53
173
+ external_dns_route53_zone_arns = [local . route53_zone_arn ] # ArgoCD Server and UI domain name is registered in Route 53
174
174
175
175
tags = local. tags
176
176
}
@@ -252,10 +252,10 @@ module "vpc" {
252
252
# Route 53
253
253
# ###############################################################################
254
254
# To get the hosted zone to be use in argocd domain
255
- data "aws_route53_zone" "domain_name " {
255
+ data "aws_route53_zone" "this " {
256
256
count = local. enable_ingress ? 1 : 0
257
257
name = local. domain_name
258
- private_zone = local. domain_private_zone
258
+ private_zone = local. is_route53_private_zone
259
259
}
260
260
261
261
@@ -269,18 +269,18 @@ resource "aws_acm_certificate" "cert" {
269
269
validation_method = " DNS"
270
270
}
271
271
272
- resource "aws_route53_record" "cert " {
272
+ resource "aws_route53_record" "validation " {
273
273
count = local. enable_ingress ? 1 : 0
274
- zone_id = data. aws_route53_zone . domain_name [0 ]. zone_id
274
+ zone_id = data. aws_route53_zone . this [0 ]. zone_id
275
275
name = tolist (aws_acm_certificate. cert [0 ]. domain_validation_options )[0 ]. resource_record_name
276
276
type = tolist (aws_acm_certificate. cert [0 ]. domain_validation_options )[0 ]. resource_record_type
277
277
records = [tolist (aws_acm_certificate. cert [0 ]. domain_validation_options )[0 ]. resource_record_value ]
278
278
ttl = 60
279
279
allow_overwrite = true
280
280
}
281
281
282
- resource "aws_acm_certificate_validation" "cert " {
282
+ resource "aws_acm_certificate_validation" "this " {
283
283
count = local. enable_ingress ? 1 : 0
284
284
certificate_arn = aws_acm_certificate. cert [0 ]. arn
285
- validation_record_fqdns = [for record in aws_route53_record . cert : record . fqdn ]
285
+ validation_record_fqdns = [for record in aws_route53_record . validation : record . fqdn ]
286
286
}
0 commit comments