This issue is almost the inverse of #175. The role-arn annotation in the external-dns service account does not match the ARN of the IAM role created for external-dns. The ARN in the annotation is something like arn:aws:iam::<ACCOUNT ID>:role/<CLUSTER NAME>-jx-external-dns whereas the actual ARN is more like arn:aws:iam::<ACCOUNT ID>:role/tf-<CLUSTER NAME>-sa-role-external_dns-baghXAqy. The last bit is a random seed.
Steps to reproduce the behavior
Set enable_external_dns = true in the main.tf file when terraforming the cluster, this will create the appropriate IAM role
Add the bitnami/external-dns chart in the helmfile.yaml and set externalDNS: true in the jx-requirements.yml for boot
Observe that the created service account in the cluster has a role-arn annotation that does match the role ARN of the IAM role created in step 1.
Expected behavior
The role-arn annotation match the actual IAM role's ARN.
Actual behavior
The role-arn annotation does not match the actual IAM role's ARN.
Summary
This issue is almost the inverse of #175. The
role-arn
annotation in the external-dns service account does not match the ARN of the IAM role created for external-dns. The ARN in the annotation is something likearn:aws:iam::<ACCOUNT ID>:role/<CLUSTER NAME>-jx-external-dns
whereas the actual ARN is more likearn:aws:iam::<ACCOUNT ID>:role/tf-<CLUSTER NAME>-sa-role-external_dns-baghXAqy
. The last bit is a random seed.Steps to reproduce the behavior
enable_external_dns = true
in the main.tf file when terraforming the cluster, this will create the appropriate IAM roleexternalDNS: true
in the jx-requirements.yml for bootExpected behavior
The role-arn annotation match the actual IAM role's ARN.
Actual behavior
The role-arn annotation does not match the actual IAM role's ARN.
Module version
v1.8.1