-
Notifications
You must be signed in to change notification settings - Fork 8
/
version.tf
114 lines (104 loc) · 2.89 KB
/
version.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
terraform {
required_version = ">= 1.6.0"
required_providers {
docker = {
source = "kreuzwerker/docker"
version = "3.0.2"
}
tls = {
source = "hashicorp/tls"
version = "4.0.5"
}
vault = {
source = "hashicorp/vault"
version = "4.3.0"
}
local = {
source = "hashicorp/local"
version = "2.5.1"
}
terracurl = {
source = "devops-rob/terracurl"
version = "1.2.1"
}
minikube = {
source = "scott-the-programmer/minikube"
version = "0.3.10"
}
kubernetes = {
source = "hashicorp/kubernetes"
version = "2.31.0"
}
helm = {
source = "hashicorp/helm"
version = "2.14.0"
}
kubectl = {
source = "gavinbunney/kubectl"
version = "1.14.0"
}
time = {
source = "hashicorp/time"
version = "0.11.2"
}
http = {
source = "hashicorp/http"
version = "3.4.2"
}
boundary = {
source = "hashicorp/boundary"
version = "1.1.14"
}
}
}
provider "terracurl" {}
provider "local" {}
provider "tls" {}
provider "time" {}
provider "minikube" {}
provider "docker" {
host = "unix:///var/run/docker.sock"
}
provider "vault" {
address = "https://127.0.0.1"
token = module.vault.root_token
ca_cert_file = "${path.root}/vault-tls/output/ca.crt"
}
provider "kubernetes" {
host = try(module.minikube[0].kubeconfig.host, null)
client_certificate = try(module.minikube[0].kubeconfig.client_certificate, null)
client_key = try(module.minikube[0].kubeconfig.client_key, null)
cluster_ca_certificate = try(module.minikube[0].kubeconfig.cluster_ca_certificate, null)
}
provider "kubectl" {
apply_retry_count = 3
host = try(module.minikube[0].kubeconfig.host, null)
client_certificate = try(module.minikube[0].kubeconfig.client_certificate, null)
client_key = try(module.minikube[0].kubeconfig.client_key, null)
cluster_ca_certificate = try(module.minikube[0].kubeconfig.cluster_ca_certificate, null)
load_config_file = false
}
provider "helm" {
kubernetes {
host = try(module.minikube[0].kubeconfig.host, null)
client_certificate = try(module.minikube[0].kubeconfig.client_certificate, null)
client_key = try(module.minikube[0].kubeconfig.client_key, null)
cluster_ca_certificate = try(module.minikube[0].kubeconfig.cluster_ca_certificate, null)
}
}
provider "boundary" {
addr = "http://127.0.0.1:9200"
recovery_kms_hcl = try(<<EOT
kms "transit" {
purpose = "recovery"
address = "https://127.0.0.1:443"
disable_renewal = "false"
token = "${module.vault.root_token}"
key_name = "boundary_recovery"
mount_path = "boundary/"
tls_skip_verify = "false"
tls_ca_cert = "${path.root}/vault-tls/output/ca.crt"
}
EOT
, null)
}