-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtls-control-plane.tf
101 lines (88 loc) · 2.47 KB
/
tls-control-plane.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
resource "tls_private_key" "linkerd_private_key" {
algorithm = "ECDSA"
ecdsa_curve = "P256"
}
resource "tls_self_signed_cert" "linkerd_root_ca" {
private_key_pem = tls_private_key.linkerd_private_key.private_key_pem
is_ca_certificate = true
set_subject_key_id = true
validity_period_hours = var.control_plane_ca_validity
dns_names = ["root.linkerd.cluster.local"]
subject {
common_name = "root.linkerd.cluster.local"
}
allowed_uses = [
"cert_signing",
"crl_signing"
]
}
resource "kubernetes_secret" "linkerd_root_ca" {
metadata {
name = "linkerd-trust-anchor"
namespace = kubernetes_namespace.linkerd.id
}
data = {
"tls.crt" = tls_self_signed_cert.linkerd_root_ca.cert_pem
"tls.key" = tls_self_signed_cert.linkerd_root_ca.private_key_pem
}
type = "kubernetes.io/tls"
}
resource "kubernetes_manifest" "linkerd_root_ca_issuer" {
manifest = {
"apiVersion" = "cert-manager.io/v1"
"kind" = "Issuer"
"metadata" = {
"name" = "linkerd-trust-anchor"
"namespace" = "${kubernetes_namespace.linkerd.id}"
}
"spec" = {
"ca" = {
"secretName" : "${kubernetes_secret.linkerd_root_ca.metadata[0].name}"
}
}
}
}
resource "kubernetes_manifest" "linkerd_identity_issuer_certificate" {
computed_fields = ["spec.duration", "spec.renewBefore", "spec.isCA"]
manifest = {
"apiVersion" = "cert-manager.io/v1"
"kind" = "Certificate"
"metadata" = {
"name" = "linkerd-identity-issuer"
"namespace" = "${kubernetes_namespace.linkerd.id}"
}
"spec" = {
"secretName" = "linkerd-identity-issuer"
"duration" = "${var.control_plane_cert_duration}"
"renewBefore" = "${var.control_plane_cert_renew_before}"
"issuerRef" = {
"name" = "linkerd-trust-anchor"
"kind" = "Issuer"
}
"commonName" = "identity.linkerd.cluster.local"
"dnsNames" = [
"identity.linkerd.cluster.local"
]
"isCA" = "true"
"privateKey" = {
"algorithm" = "ECDSA"
}
"usages" = [
"cert sign",
"crl sign",
"server auth",
"client auth"
]
}
}
depends_on = [kubernetes_manifest.linkerd_root_ca_issuer]
}
resource "time_sleep" "wait_control_plane_certificate_provisioning" {
depends_on = [
kubernetes_manifest.linkerd_identity_issuer_certificate,
]
create_duration = "60s"
triggers = {
always_run = "${timestamp()}"
}
}