locals { rules = [for v in var.dns_names : { "host" = "${v}" "http" = { "paths" = [for idx, svc in var.services : { "backend" = { "service" = svc } "path" = "/${var.sub_paths[idx]}" "pathType" = "Prefix" }] } }] } resource "kubectl_manifest" "prj_certificate" { count = var.create_cert ? 1 : 0 yaml_body = <<-EOF apiVersion: "cert-manager.io/v1" kind: "Certificate" metadata: name: "${var.instance}${var.component == "" ? "" : "-"}${var.component}" namespace: "${var.namespace}" labels: ${jsonencode(var.labels)} spec: secretName: "${var.instance}${var.component == "" ? "" : "-"}${var.component}-cert" dnsNames: ${jsonencode(var.dns_names)} issuerRef: name: "${var.issuer}" kind: "ClusterIssuer" group: "cert-manager.io" EOF } resource "kubectl_manifest" "prj_https_redirect" { count = var.create_redirect || var.component == "" ? 1 : 0 yaml_body = <<-EOF apiVersion: "traefik.containo.us/v1alpha1" kind: "Middleware" metadata: name: "${var.instance}-https" namespace: "${var.namespace}" labels: ${jsonencode(var.labels)} spec: redirectScheme: scheme: "https" permanent: true EOF } resource "kubectl_manifest" "prj_ingress" { force_conflicts = true yaml_body = <<-EOF apiVersion: "networking.k8s.io/v1" kind: "Ingress" metadata: name: "${var.instance}${var.component == "" ? "" : "-${var.component}"}" namespace: "${var.namespace}" labels: ${jsonencode(var.labels)} annotations: "traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in concat(["${var.instance}-https"], var.middlewares) : format("%s-%s@kubernetescrd", var.namespace, m)])}" spec: ingressClassName: "${var.ingress_class}" rules: ${jsonencode(local.rules)} tls: - hosts: ${jsonencode(var.dns_names)} secretName: "${var.instance}${var.secret_component != "" ? "-${var.secret_component}" : var.component == "" ? "" : "-${var.component}"}-cert" EOF }