forked from oracle-terraform-modules/terraform-oci-oke
-
Notifications
You must be signed in to change notification settings - Fork 0
/
module-cluster.tf
147 lines (128 loc) · 5.3 KB
/
module-cluster.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
# Copyright (c) 2017, 2023 Oracle Corporation and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl
# Used to retrieve cluster CA certificate or configure local kube context
data "oci_containerengine_cluster_kube_config" "public" {
count = local.cluster_enabled && var.control_plane_is_public ? 1 : 0
cluster_id = local.cluster_id
endpoint = "PUBLIC_ENDPOINT"
}
data "oci_containerengine_cluster_kube_config" "private" {
count = local.cluster_enabled ? 1 : 0
cluster_id = local.cluster_id
endpoint = "PRIVATE_ENDPOINT"
}
locals {
cluster_enabled = var.create_cluster || coalesce(var.cluster_id, "none") != "none"
cluster_id = var.create_cluster ? one(module.cluster[*].cluster_id) : var.cluster_id
cluster_name = var.cluster_name
cluster-context = try(format("context-%s", substr(local.cluster_id, -11, -1)), "")
kubeconfig_public = var.control_plane_is_public ? try(yamldecode(replace(lookup(one(data.oci_containerengine_cluster_kube_config.public), "content", ""), local.cluster-context, var.cluster_name)), tomap({})) : null
kubeconfig_private = try(yamldecode(replace(lookup(one(data.oci_containerengine_cluster_kube_config.private), "content", ""), local.cluster-context, var.cluster_name)), tomap({}))
kubeconfig_clusters = try(lookup(local.kubeconfig_private, "clusters", []), [])
apiserver_private_host = (var.create_cluster
? try(split(":", one(module.cluster[*].endpoints.private_endpoint))[0], "")
: split(":", replace(try(lookup(lookup(local.kubeconfig_clusters[0], "cluster", {}), "server", ""), "none"), "https://", ""))[0])
kubeconfig_ca_cert = try(lookup(lookup(local.kubeconfig_clusters[0], "cluster", {}), "certificate-authority-data", ""), "none")
cluster_ca_cert = coalesce(var.cluster_ca_cert, local.kubeconfig_ca_cert)
}
module "cluster" {
count = var.create_cluster ? 1 : 0
source = "./modules/cluster"
compartment_id = local.compartment_id
state_id = local.state_id
# Network
vcn_id = local.vcn_id
cni_type = var.cni_type
control_plane_is_public = var.control_plane_is_public
control_plane_nsg_ids = compact(flatten([var.control_plane_nsg_ids, try(module.network.control_plane_nsg_id, null)]))
control_plane_subnet_id = try(module.network.control_plane_subnet_id, "") # safe destroy; validated in submodule
pods_cidr = var.pods_cidr
services_cidr = var.services_cidr
service_lb_subnet_id = (var.preferred_load_balancer == "public"
? try(module.network.pub_lb_subnet_id, "") # safe destroy; validated in submodule
: try(module.network.int_lb_subnet_id, "")
)
# Cluster
cluster_kms_key_id = var.cluster_kms_key_id
cluster_name = local.cluster_name
cluster_type = lookup({
"basic" = "BASIC_CLUSTER",
"enhanced" = "ENHANCED_CLUSTER"
}, lower(var.cluster_type), "BASIC_CLUSTER")
kubernetes_version = var.kubernetes_version
# KMS
use_signed_images = var.use_signed_images
image_signing_keys = var.image_signing_keys
# Tags
use_defined_tags = var.use_defined_tags
tag_namespace = var.tag_namespace
# Standard tags as defined if enabled for use, or freeform
# User-provided tags are merged last and take precedence
cluster_defined_tags = merge(
var.use_defined_tags ? {
"${var.tag_namespace}.state_id" = local.state_id,
"${var.tag_namespace}.role" = "cluster",
} : {},
local.cluster_defined_tags,
)
cluster_freeform_tags = merge(
var.use_defined_tags ? {} : {
"state_id" = local.state_id,
"role" = "cluster",
},
local.cluster_freeform_tags,
)
persistent_volume_defined_tags = merge(
var.use_defined_tags ? {
"${var.tag_namespace}.state_id" = local.state_id,
"${var.tag_namespace}.role" = "persistent_volume",
} : {},
local.persistent_volume_defined_tags,
)
persistent_volume_freeform_tags = merge(
var.use_defined_tags ? {} : {
"state_id" = local.state_id,
"role" = "persistent_volume",
},
local.persistent_volume_freeform_tags,
)
service_lb_defined_tags = merge(
var.use_defined_tags ? {
"${var.tag_namespace}.state_id" = local.state_id,
"${var.tag_namespace}.role" = "service_lb"
} : {},
local.service_lb_defined_tags,
)
service_lb_freeform_tags = merge(
var.use_defined_tags ? {} : {
"state_id" = local.state_id,
"role" = "service_lb"
},
local.service_lb_freeform_tags,
)
providers = {
oci.home = oci.home
}
}
output "cluster_id" {
description = "ID of the OKE cluster"
value = one(module.cluster[*].cluster_id)
}
output "cluster_endpoints" {
description = "Endpoints for the OKE cluster"
value = var.create_cluster ? one(module.cluster[*].endpoints) : null
}
output "cluster_kubeconfig" {
description = "OKE kubeconfig"
value = var.output_detail ? (
var.control_plane_is_public ? local.kubeconfig_public : local.kubeconfig_private
) : null
}
output "cluster_ca_cert" {
description = "OKE cluster CA certificate"
value = var.output_detail && length(local.cluster_ca_cert) > 0 ? local.cluster_ca_cert : null
}
output "apiserver_private_host" {
description = "Private OKE cluster endpoint address"
value = local.apiserver_private_host
}