mirror of
https://github.com/outbackdingo/terraform-render-bootstrap.git
synced 2026-01-27 10:20:45 +00:00
* Remove uses of `key_algorithm` on `tls_self_signed_cert` and `tls_cert_request` resources. The field is deprecated and inferred from the `private_key_pem` * Remove uses of `ca_key_algorithm` on `tls_locally_signed_cert` resources. The field is deprecated and inferred from the `ca_private_key_pem` * Require at least hashicorp/tls provider v3.2 Rel: https://github.com/hashicorp/terraform-provider-tls/blob/main/CHANGELOG.md#320-april-04-2022
151 lines
3.3 KiB
HCL
151 lines
3.3 KiB
HCL
locals {
|
|
# etcd TLS assets map
|
|
etcd_tls = {
|
|
"tls/etcd/etcd-client-ca.crt" = tls_self_signed_cert.etcd-ca.cert_pem,
|
|
"tls/etcd/etcd-client.crt" = tls_locally_signed_cert.client.cert_pem,
|
|
"tls/etcd/etcd-client.key" = tls_private_key.client.private_key_pem
|
|
"tls/etcd/server-ca.crt" = tls_self_signed_cert.etcd-ca.cert_pem,
|
|
"tls/etcd/server.crt" = tls_locally_signed_cert.server.cert_pem
|
|
"tls/etcd/server.key" = tls_private_key.server.private_key_pem
|
|
"tls/etcd/peer-ca.crt" = tls_self_signed_cert.etcd-ca.cert_pem,
|
|
"tls/etcd/peer.crt" = tls_locally_signed_cert.peer.cert_pem
|
|
"tls/etcd/peer.key" = tls_private_key.peer.private_key_pem
|
|
}
|
|
}
|
|
|
|
# etcd CA
|
|
|
|
resource "tls_private_key" "etcd-ca" {
|
|
algorithm = "RSA"
|
|
rsa_bits = "2048"
|
|
}
|
|
|
|
resource "tls_self_signed_cert" "etcd-ca" {
|
|
private_key_pem = tls_private_key.etcd-ca.private_key_pem
|
|
|
|
subject {
|
|
common_name = "etcd-ca"
|
|
organization = "etcd"
|
|
}
|
|
|
|
is_ca_certificate = true
|
|
validity_period_hours = 8760
|
|
|
|
allowed_uses = [
|
|
"key_encipherment",
|
|
"digital_signature",
|
|
"cert_signing",
|
|
]
|
|
}
|
|
|
|
# etcd Client (apiserver to etcd communication)
|
|
|
|
resource "tls_private_key" "client" {
|
|
algorithm = "RSA"
|
|
rsa_bits = "2048"
|
|
}
|
|
|
|
resource "tls_cert_request" "client" {
|
|
private_key_pem = tls_private_key.client.private_key_pem
|
|
|
|
subject {
|
|
common_name = "etcd-client"
|
|
organization = "etcd"
|
|
}
|
|
|
|
ip_addresses = [
|
|
"127.0.0.1",
|
|
]
|
|
|
|
dns_names = concat(var.etcd_servers, ["localhost"])
|
|
}
|
|
|
|
resource "tls_locally_signed_cert" "client" {
|
|
cert_request_pem = tls_cert_request.client.cert_request_pem
|
|
|
|
ca_private_key_pem = tls_private_key.etcd-ca.private_key_pem
|
|
ca_cert_pem = tls_self_signed_cert.etcd-ca.cert_pem
|
|
|
|
validity_period_hours = 8760
|
|
|
|
allowed_uses = [
|
|
"key_encipherment",
|
|
"digital_signature",
|
|
"server_auth",
|
|
"client_auth",
|
|
]
|
|
}
|
|
|
|
# etcd Server
|
|
|
|
resource "tls_private_key" "server" {
|
|
algorithm = "RSA"
|
|
rsa_bits = "2048"
|
|
}
|
|
|
|
resource "tls_cert_request" "server" {
|
|
private_key_pem = tls_private_key.server.private_key_pem
|
|
|
|
subject {
|
|
common_name = "etcd-server"
|
|
organization = "etcd"
|
|
}
|
|
|
|
ip_addresses = [
|
|
"127.0.0.1",
|
|
]
|
|
|
|
dns_names = concat(var.etcd_servers, ["localhost"])
|
|
}
|
|
|
|
resource "tls_locally_signed_cert" "server" {
|
|
cert_request_pem = tls_cert_request.server.cert_request_pem
|
|
|
|
ca_private_key_pem = tls_private_key.etcd-ca.private_key_pem
|
|
ca_cert_pem = tls_self_signed_cert.etcd-ca.cert_pem
|
|
|
|
validity_period_hours = 8760
|
|
|
|
allowed_uses = [
|
|
"key_encipherment",
|
|
"digital_signature",
|
|
"server_auth",
|
|
"client_auth",
|
|
]
|
|
}
|
|
|
|
# etcd Peer
|
|
|
|
resource "tls_private_key" "peer" {
|
|
algorithm = "RSA"
|
|
rsa_bits = "2048"
|
|
}
|
|
|
|
resource "tls_cert_request" "peer" {
|
|
private_key_pem = tls_private_key.peer.private_key_pem
|
|
|
|
subject {
|
|
common_name = "etcd-peer"
|
|
organization = "etcd"
|
|
}
|
|
|
|
dns_names = var.etcd_servers
|
|
}
|
|
|
|
resource "tls_locally_signed_cert" "peer" {
|
|
cert_request_pem = tls_cert_request.peer.cert_request_pem
|
|
|
|
ca_private_key_pem = tls_private_key.etcd-ca.private_key_pem
|
|
ca_cert_pem = tls_self_signed_cert.etcd-ca.cert_pem
|
|
|
|
validity_period_hours = 8760
|
|
|
|
allowed_uses = [
|
|
"key_encipherment",
|
|
"digital_signature",
|
|
"server_auth",
|
|
"client_auth",
|
|
]
|
|
}
|
|
|