Hearth is the infrastructure home for the letemcook ecosystem. Ported from coherence-mcp/infra: - Terraform modules (VPC, EKS, IAM, NLB, S3, storage) - Kubernetes manifests (Forgejo, ingress, cert-manager, karpenter) - Deployment scripts (phased rollout) Status: Not deployed. EKS cluster needs to be provisioned. Next steps: 1. Bootstrap terraform backend 2. Deploy phase 1 (foundation) 3. Deploy phase 2 (core services including Forgejo) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
88 lines
2.2 KiB
HCL
88 lines
2.2 KiB
HCL
# EKS Module - Outputs
|
|
# RFC 0039: ADR-Compliant Foundation Infrastructure
|
|
|
|
output "cluster_name" {
|
|
description = "EKS cluster name"
|
|
value = aws_eks_cluster.main.name
|
|
}
|
|
|
|
output "cluster_id" {
|
|
description = "EKS cluster ID"
|
|
value = aws_eks_cluster.main.id
|
|
}
|
|
|
|
output "cluster_arn" {
|
|
description = "EKS cluster ARN"
|
|
value = aws_eks_cluster.main.arn
|
|
}
|
|
|
|
output "cluster_endpoint" {
|
|
description = "EKS cluster API endpoint"
|
|
value = aws_eks_cluster.main.endpoint
|
|
}
|
|
|
|
output "cluster_version" {
|
|
description = "EKS cluster Kubernetes version"
|
|
value = aws_eks_cluster.main.version
|
|
}
|
|
|
|
output "cluster_certificate_authority_data" {
|
|
description = "EKS cluster CA certificate (base64)"
|
|
value = aws_eks_cluster.main.certificate_authority[0].data
|
|
sensitive = true
|
|
}
|
|
|
|
output "cluster_oidc_issuer_url" {
|
|
description = "OIDC issuer URL for IRSA"
|
|
value = aws_eks_cluster.main.identity[0].oidc[0].issuer
|
|
}
|
|
|
|
output "oidc_provider_arn" {
|
|
description = "OIDC provider ARN for IRSA"
|
|
value = aws_iam_openid_connect_provider.cluster.arn
|
|
}
|
|
|
|
output "cluster_security_group_id" {
|
|
description = "Cluster security group ID"
|
|
value = aws_security_group.cluster.id
|
|
}
|
|
|
|
output "node_security_group_id" {
|
|
description = "Node security group ID"
|
|
value = aws_security_group.node.id
|
|
}
|
|
|
|
output "node_iam_role_arn" {
|
|
description = "Node IAM role ARN"
|
|
value = aws_iam_role.node.arn
|
|
}
|
|
|
|
output "node_iam_role_name" {
|
|
description = "Node IAM role name"
|
|
value = aws_iam_role.node.name
|
|
}
|
|
|
|
output "node_instance_profile_name" {
|
|
description = "Node instance profile name"
|
|
value = aws_iam_instance_profile.node.name
|
|
}
|
|
|
|
output "fargate_role_arn" {
|
|
description = "Fargate pod execution role ARN"
|
|
value = aws_iam_role.fargate.arn
|
|
}
|
|
|
|
output "cluster_primary_security_group_id" {
|
|
description = "EKS cluster primary security group ID"
|
|
value = aws_eks_cluster.main.vpc_config[0].cluster_security_group_id
|
|
}
|
|
|
|
output "kms_key_arn" {
|
|
description = "KMS key ARN for EKS secrets encryption"
|
|
value = aws_kms_key.eks.arn
|
|
}
|
|
|
|
output "kms_key_id" {
|
|
description = "KMS key ID for EKS secrets encryption"
|
|
value = aws_kms_key.eks.key_id
|
|
}
|