Improve modules

This commit is contained in:
2024-01-15 09:30:00 +01:00
parent e0baae6132
commit d5e4a06936
4 changed files with 105 additions and 35 deletions

View File

@@ -1,17 +1,36 @@
locals {
name = "${var.instance}${var.component == "" ? "" : "-"}${var.component}"
rules = [for v in var.dns_names : {
"host" = "${v}"
"http" = {
"paths" = [for idx, svc in var.services : {
"path" = "/${var.sub_paths[idx]}"
"pathType" = "Prefix"
"backend" = {
"service" = svc
}
"path" = "/${var.sub_paths[idx]}"
"pathType" = "Prefix"
}]
}
}]
tls = var.enforce_tls ? [
{
secretName = var.cert_name != "" ? var.cert_name : "${local.name}-cert"
hosts = var.dns_names
}
] : []
middlewares = concat(
var.create_redirect ? ["${local.name}-https"] : [],
var.middlewares
)
annotations = merge(
var.entrypoint != "" ? {
"traefik.ingress.kubernetes.io/router.entrypoints" = var.entrypoint
} : {},
length(local.middlewares) > 0 ? {
"traefik.ingress.kubernetes.io/router.middlewares" : "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}"
} : {},
)
}
resource "kubectl_manifest" "prj_certificate" {
@@ -20,15 +39,15 @@ resource "kubectl_manifest" "prj_certificate" {
apiVersion: "cert-manager.io/v1"
kind: "Certificate"
metadata:
name: "${var.instance}${var.component == "" ? "" : "-"}${var.component}"
name: "${local.name}"
namespace: "${var.namespace}"
labels: ${jsonencode(var.labels)}
spec:
secretName: "${var.instance}${var.component == "" ? "" : "-"}${var.component}-cert"
secretName: "${local.name}-cert"
dnsNames: ${jsonencode(var.dns_names)}
issuerRef:
name: "${var.issuer}"
kind: "ClusterIssuer"
name: "${var.issuer}"
group: "cert-manager.io"
EOF
}
@@ -39,7 +58,7 @@ resource "kubectl_manifest" "prj_https_redirect" {
apiVersion: "traefik.containo.us/v1alpha1"
kind: "Middleware"
metadata:
name: "${var.instance}-https"
name: "${local.name}-https"
namespace: "${var.namespace}"
labels: ${jsonencode(var.labels)}
spec:
@@ -55,16 +74,13 @@ resource "kubectl_manifest" "prj_ingress" {
apiVersion: "networking.k8s.io/v1"
kind: "Ingress"
metadata:
name: "${var.instance}${var.component == "" ? "" : "-${var.component}"}"
name: "${local.name}"
namespace: "${var.namespace}"
labels: ${jsonencode(var.labels)}
annotations:
"traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in concat(["${var.instance}-https"], var.middlewares) : format("%s-%s@kubernetescrd", var.namespace, m)])}"
annotations: ${jsonencode(local.annotations)}
spec:
ingressClassName: "${var.ingress_class}"
rules: ${jsonencode(local.rules)}
tls:
- hosts: ${jsonencode(var.dns_names)}
secretName: "${var.instance}${var.secret_component != "" ? "-${var.secret_component}" : var.component == "" ? "" : "-${var.component}"}-cert"
tls: ${jsonencode(local.tls)}
EOF
}

View File

@@ -30,17 +30,29 @@ variable "services" {
variable "create_redirect" {
type = bool
default = false
default = true
}
variable "create_cert" {
type = bool
default = true
}
variable "enforce_tls" {
type = bool
default = true
}
variable "sub_paths" {
type = list(string)
default = [""]
}
variable "secret_component" {
variable "cert_name" {
type = string
default = ""
}
variable "entrypoint" {
type = string
default = ""
validation {
condition = contains(["", "web", "websecure"], var.entrypoint)
error_message = "Only empty \"\", web or websecure is allowed"
}
}