Skip to content

Commit 65caf02

Browse files
authored
helm provider fixes (#399)
fixes for helm provider - thanks @ajaymare
1 parent ff5f35f commit 65caf02

File tree

5 files changed

+57
-52
lines changed

5 files changed

+57
-52
lines changed

modules/addons/cert-manager/main.tf

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
provider "helm" {
2-
kubernetes {
2+
kubernetes = {
33
host = var.k8s_host
44
cluster_ca_certificate = base64decode(var.k8s_cluster_ca_certificate)
55
token = var.k8s_client_token
@@ -29,15 +29,16 @@ resource "helm_release" "cert_manager" {
2929
namespace = "cert-manager"
3030
timeout = 900
3131

32-
set {
33-
name = "installCRDs"
34-
value = "true"
35-
}
36-
set {
37-
name = "featureGates"
38-
value = "ExperimentalCertificateSigningRequestControllers=true"
39-
}
40-
32+
set = [
33+
{
34+
name = "installCRDs"
35+
value = "true"
36+
},
37+
{
38+
name = "featureGates"
39+
value = "ExperimentalCertificateSigningRequestControllers=true"
40+
}
41+
]
4142
}
4243

4344
resource "time_sleep" "wait_90_seconds" {

modules/addons/ratelimit/main.tf

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
provider "helm" {
2-
kubernetes {
2+
kubernetes = {
33
host = var.k8s_host
44
cluster_ca_certificate = base64decode(var.k8s_cluster_ca_certificate)
55
token = var.k8s_client_token
@@ -21,12 +21,14 @@ resource "helm_release" "redis" {
2121
namespace = var.namespace
2222
timeout = 900
2323

24-
set {
25-
name = "auth.password"
26-
value = random_password.redis.result
27-
}
28-
set {
29-
name = "architecture"
30-
value = "standalone"
31-
}
24+
set = [
25+
{
26+
name = "auth.password"
27+
value = random_password.redis.result
28+
},
29+
{
30+
name = "architecture"
31+
value = "standalone"
32+
}
33+
]
3234
}

modules/tsb/cp/main.tf

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
provider "helm" {
2-
kubernetes {
2+
kubernetes ={
33
host = var.k8s_host
44
cluster_ca_certificate = base64decode(var.k8s_cluster_ca_certificate)
55
token = var.k8s_client_token
@@ -97,19 +97,20 @@ resource "helm_release" "controlplane" {
9797
ratelimit_namespace = var.ratelimit_namespace
9898
})]
9999

100-
set {
101-
name = "secrets.tsb.cacert"
102-
value = var.tsb_cacert
103-
}
104-
set {
105-
name = "secrets.xcp.rootca"
106-
value = var.tsb_cacert
107-
}
108-
109-
set {
110-
name = "secrets.elasticsearch.cacert"
111-
value = var.es_cacert
112-
}
100+
set = [
101+
{
102+
name = "secrets.tsb.cacert"
103+
value = var.tsb_cacert
104+
},
105+
{
106+
name = "secrets.xcp.rootca"
107+
value = var.tsb_cacert
108+
},
109+
{
110+
name = "secrets.elasticsearch.cacert"
111+
value = var.es_cacert
112+
}
113+
]
113114
depends_on = [ kubernetes_namespace.istio-system ]
114115
}
115116

modules/tsb/mp/main.tf

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
provider "helm" {
2-
kubernetes {
2+
kubernetes = {
33
host = var.k8s_host
44
cluster_ca_certificate = base64decode(var.k8s_cluster_ca_certificate)
55
token = var.k8s_client_token
@@ -83,23 +83,24 @@ resource "helm_release" "managementplane" {
8383
tsb_fqdn = var.tsb_fqdn
8484
cloud = can(regex("eks", var.k8s_host)) ? "aws" : "none"
8585
})]
86-
set {
87-
name = "secrets.tsb.cert"
88-
value = data.kubernetes_secret.tsb_server_cert.data["tls.crt"]
89-
}
90-
set {
91-
name = "secrets.tsb.key"
92-
value = data.kubernetes_secret.tsb_server_cert.data["tls.key"]
93-
}
94-
95-
set {
96-
name = "secrets.xcp.rootca"
97-
value = data.kubernetes_secret.selfsigned_ca.data["tls.crt"]
98-
}
99-
set {
100-
name = "secrets.xcp.rootcakey"
101-
value = data.kubernetes_secret.selfsigned_ca.data["tls.key"]
102-
}
86+
set = [
87+
{
88+
name = "secrets.tsb.cert"
89+
value = data.kubernetes_secret.tsb_server_cert.data["tls.crt"]
90+
},
91+
{
92+
name = "secrets.tsb.key"
93+
value = data.kubernetes_secret.tsb_server_cert.data["tls.key"]
94+
},
95+
{
96+
name = "secrets.xcp.rootca"
97+
value = data.kubernetes_secret.selfsigned_ca.data["tls.crt"]
98+
},
99+
{
100+
name = "secrets.xcp.rootcakey"
101+
value = data.kubernetes_secret.selfsigned_ca.data["tls.key"]
102+
}
103+
]
103104
}
104105

105106
resource "time_sleep" "wait_240_seconds" {

tsb/mp/providers.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ provider "kubernetes" {
1818
}
1919

2020
provider "helm" {
21-
kubernetes {
21+
kubernetes = {
2222
host = data.terraform_remote_state.infra.outputs.host
2323
cluster_ca_certificate = base64decode(data.terraform_remote_state.infra.outputs.cluster_ca_certificate)
2424
token = data.terraform_remote_state.infra.outputs.token

0 commit comments

Comments
 (0)