nanochat/terraform/modules/iam/outputs.tf
Manmohan Sharma b381933c3b
feat(terraform): provision full AWS stack for samosaChaat (issue #4)
Add reusable Terraform modules and per-environment configs (dev/uat/prod)
in us-west-2 covering: VPC (3 AZ public/private), EKS 1.29 with IRSA and
ALB/EBS/EFS CSI add-ons, RDS PostgreSQL 15, four ECR repos, IAM roles
(EKS node, ALB controller IRSA, GitHub Actions OIDC), Route53 + ACM for
samosachaat.art, and EFS for model weights. State backend on S3
(samosachaat-terraform-state) with DynamoDB lock table.

terraform validate passes for dev, uat, and prod.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-16 11:11:02 -07:00

30 lines
975 B
HCL

output "eks_node_role_arn" {
description = "ARN of the EKS managed-node-group instance role."
value = aws_iam_role.eks_node.arn
}
output "eks_node_role_name" {
description = "Name of the EKS node role."
value = aws_iam_role.eks_node.name
}
output "eks_node_instance_profile_name" {
description = "Instance profile attached to EKS nodes."
value = aws_iam_instance_profile.eks_node.name
}
output "alb_controller_role_arn" {
description = "IAM role to bind to the aws-load-balancer-controller ServiceAccount via IRSA."
value = try(aws_iam_role.alb_controller[0].arn, "")
}
output "github_actions_role_arn" {
description = "Role to assume from GitHub Actions for CI/CD (empty if not enabled)."
value = try(aws_iam_role.github_actions[0].arn, "")
}
output "github_oidc_provider_arn" {
description = "GitHub OIDC provider ARN (empty if not enabled)."
value = try(aws_iam_openid_connect_provider.github[0].arn, "")
}