File tree Expand file tree Collapse file tree 5 files changed +57
-52
lines changed Expand file tree Collapse file tree 5 files changed +57
-52
lines changed Original file line number Diff line number Diff line change 11provider "helm" {
2- kubernetes {
2+ kubernetes = {
33 host = var.k8s_host
44 cluster_ca_certificate = base64decode (var. k8s_cluster_ca_certificate )
55 token = var.k8s_client_token
@@ -29,15 +29,16 @@ resource "helm_release" "cert_manager" {
2929 namespace = " cert-manager"
3030 timeout = 900
3131
32- set {
33- name = " installCRDs"
34- value = " true"
35- }
36- set {
37- name = " featureGates"
38- value = " ExperimentalCertificateSigningRequestControllers=true"
39- }
40-
32+ set = [
33+ {
34+ name = " installCRDs"
35+ value = " true"
36+ },
37+ {
38+ name = " featureGates"
39+ value = " ExperimentalCertificateSigningRequestControllers=true"
40+ }
41+ ]
4142}
4243
4344resource "time_sleep" "wait_90_seconds" {
Original file line number Diff line number Diff line change 11provider "helm" {
2- kubernetes {
2+ kubernetes = {
33 host = var.k8s_host
44 cluster_ca_certificate = base64decode (var. k8s_cluster_ca_certificate )
55 token = var.k8s_client_token
@@ -21,12 +21,14 @@ resource "helm_release" "redis" {
2121 namespace = var. namespace
2222 timeout = 900
2323
24- set {
25- name = " auth.password"
26- value = random_password.redis.result
27- }
28- set {
29- name = " architecture"
30- value = " standalone"
31- }
24+ set = [
25+ {
26+ name = " auth.password"
27+ value = random_password.redis.result
28+ },
29+ {
30+ name = " architecture"
31+ value = " standalone"
32+ }
33+ ]
3234}
Original file line number Diff line number Diff line change 11provider "helm" {
2- kubernetes {
2+ kubernetes = {
33 host = var.k8s_host
44 cluster_ca_certificate = base64decode (var. k8s_cluster_ca_certificate )
55 token = var.k8s_client_token
@@ -97,19 +97,20 @@ resource "helm_release" "controlplane" {
9797 ratelimit_namespace = var.ratelimit_namespace
9898 })]
9999
100- set {
101- name = " secrets.tsb.cacert"
102- value = var.tsb_cacert
103- }
104- set {
105- name = " secrets.xcp.rootca"
106- value = var.tsb_cacert
107- }
108-
109- set {
110- name = " secrets.elasticsearch.cacert"
111- value = var.es_cacert
112- }
100+ set = [
101+ {
102+ name = " secrets.tsb.cacert"
103+ value = var.tsb_cacert
104+ },
105+ {
106+ name = " secrets.xcp.rootca"
107+ value = var.tsb_cacert
108+ },
109+ {
110+ name = " secrets.elasticsearch.cacert"
111+ value = var.es_cacert
112+ }
113+ ]
113114 depends_on = [ kubernetes_namespace . istio-system ]
114115}
115116
Original file line number Diff line number Diff line change 11provider "helm" {
2- kubernetes {
2+ kubernetes = {
33 host = var.k8s_host
44 cluster_ca_certificate = base64decode (var. k8s_cluster_ca_certificate )
55 token = var.k8s_client_token
@@ -83,23 +83,24 @@ resource "helm_release" "managementplane" {
8383 tsb_fqdn = var.tsb_fqdn
8484 cloud = can (regex (" eks" , var. k8s_host )) ? " aws" : " none"
8585 })]
86- set {
87- name = " secrets.tsb.cert"
88- value = data.kubernetes_secret.tsb_server_cert.data[" tls.crt" ]
89- }
90- set {
91- name = " secrets.tsb.key"
92- value = data.kubernetes_secret.tsb_server_cert.data[" tls.key" ]
93- }
94-
95- set {
96- name = " secrets.xcp.rootca"
97- value = data.kubernetes_secret.selfsigned_ca.data[" tls.crt" ]
98- }
99- set {
100- name = " secrets.xcp.rootcakey"
101- value = data.kubernetes_secret.selfsigned_ca.data[" tls.key" ]
102- }
86+ set = [
87+ {
88+ name = " secrets.tsb.cert"
89+ value = data.kubernetes_secret.tsb_server_cert.data[" tls.crt" ]
90+ },
91+ {
92+ name = " secrets.tsb.key"
93+ value = data.kubernetes_secret.tsb_server_cert.data[" tls.key" ]
94+ },
95+ {
96+ name = " secrets.xcp.rootca"
97+ value = data.kubernetes_secret.selfsigned_ca.data[" tls.crt" ]
98+ },
99+ {
100+ name = " secrets.xcp.rootcakey"
101+ value = data.kubernetes_secret.selfsigned_ca.data[" tls.key" ]
102+ }
103+ ]
103104}
104105
105106resource "time_sleep" "wait_240_seconds" {
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ provider "kubernetes" {
1818}
1919
2020provider "helm" {
21- kubernetes {
21+ kubernetes = {
2222 host = data.terraform_remote_state.infra.outputs.host
2323 cluster_ca_certificate = base64decode (data. terraform_remote_state . infra . outputs . cluster_ca_certificate )
2424 token = data.terraform_remote_state.infra.outputs.token
You can’t perform that action at this time.
0 commit comments