Skip to content

Commit

Permalink
Merge branch 'main' into release
Browse files Browse the repository at this point in the history
  • Loading branch information
ArchiFleKs committed Jul 26, 2022
2 parents 7a7ef0f + aed29e0 commit d579d7d
Show file tree
Hide file tree
Showing 19 changed files with 15 additions and 38 deletions.
6 changes: 3 additions & 3 deletions .github/workflows/pre-commit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:
directories: ${{ steps.dirs.outputs.directories }}
steps:
- name: Checkout
uses: actions/checkout@v2
uses: actions/checkout@v3

- name: Get root directories
id: dirs
Expand All @@ -33,7 +33,7 @@ jobs:
directory: ${{ fromJson(needs.collectInputs.outputs.directories) }}
steps:
- name: Checkout
uses: actions/checkout@v2
uses: actions/checkout@v3

- name: Terraform min/max versions
id: minMax
Expand Down Expand Up @@ -63,7 +63,7 @@ jobs:
needs: collectInputs
steps:
- name: Checkout
uses: actions/checkout@v2
uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.ref }}
repository: ${{github.event.pull_request.head.repo.full_name}}
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ here](https://github.com/particuleio/terraform-kubernetes-addons/blob/master/.gi
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | ~> 2.0 |
| <a name="requirement_kubectl"></a> [kubectl](#requirement\_kubectl) | ~> 1.0 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 4.0 |

## Providers

Expand All @@ -106,7 +106,7 @@ here](https://github.com/particuleio/terraform-kubernetes-addons/blob/master/.gi
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="provider_random"></a> [random](#provider\_random) | n/a |
| <a name="provider_time"></a> [time](#provider\_time) | n/a |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 4.0 |

## Modules

Expand Down
2 changes: 0 additions & 2 deletions linkerd2.tf
Original file line number Diff line number Diff line change
Expand Up @@ -193,7 +193,6 @@ resource "tls_private_key" "linkerd_trust_anchor" {

resource "tls_self_signed_cert" "linkerd_trust_anchor" {
count = local.linkerd2["enabled"] && local.linkerd2["trust_anchor_pem"] == null ? 1 : 0
key_algorithm = tls_private_key.linkerd_trust_anchor.0.algorithm
private_key_pem = tls_private_key.linkerd_trust_anchor.0.private_key_pem
validity_period_hours = 87600
early_renewal_hours = 78840
Expand Down Expand Up @@ -232,7 +231,6 @@ resource "tls_private_key" "webhook_issuer_tls" {

resource "tls_self_signed_cert" "webhook_issuer_tls" {
count = local.linkerd2["enabled"] ? 1 : 0
key_algorithm = tls_private_key.webhook_issuer_tls.0.algorithm
private_key_pem = tls_private_key.webhook_issuer_tls.0.private_key_pem
validity_period_hours = 87600
early_renewal_hours = 78840
Expand Down
3 changes: 0 additions & 3 deletions loki-stack.tf
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,6 @@ resource "tls_private_key" "loki-stack-ca-key" {

resource "tls_self_signed_cert" "loki-stack-ca-cert" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.loki-stack-ca-key[0].private_key_pem
is_ca_certificate = true

Expand Down Expand Up @@ -206,7 +205,6 @@ resource "tls_private_key" "promtail-key" {

resource "tls_cert_request" "promtail-csr" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] && local.loki-stack["create_promtail_cert"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.promtail-key[count.index].private_key_pem

subject {
Expand All @@ -221,7 +219,6 @@ resource "tls_cert_request" "promtail-csr" {
resource "tls_locally_signed_cert" "promtail-cert" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] && local.loki-stack["create_promtail_cert"] ? 1 : 0
cert_request_pem = tls_cert_request.promtail-csr[count.index].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.loki-stack-ca-key[count.index].private_key_pem
ca_cert_pem = tls_self_signed_cert.loki-stack-ca-cert[count.index].cert_pem

Expand Down
4 changes: 2 additions & 2 deletions modules/aws/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ This module can uses [IRSA](https://aws.amazon.com/blogs/opensource/introducing-
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | ~> 2.0 |
| <a name="requirement_kubectl"></a> [kubectl](#requirement\_kubectl) | ~> 1.0 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 4.0 |

## Providers

Expand All @@ -42,7 +42,7 @@ This module can uses [IRSA](https://aws.amazon.com/blogs/opensource/introducing-
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="provider_random"></a> [random](#provider\_random) | n/a |
| <a name="provider_time"></a> [time](#provider\_time) | n/a |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 4.0 |

## Modules

Expand Down
3 changes: 0 additions & 3 deletions modules/aws/loki-stack.tf
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,6 @@ resource "tls_private_key" "loki-stack-ca-key" {

resource "tls_self_signed_cert" "loki-stack-ca-cert" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.loki-stack-ca-key[0].private_key_pem
is_ca_certificate = true

Expand Down Expand Up @@ -305,7 +304,6 @@ resource "tls_private_key" "promtail-key" {

resource "tls_cert_request" "promtail-csr" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] && local.loki-stack["create_promtail_cert"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.promtail-key[count.index].private_key_pem

subject {
Expand All @@ -320,7 +318,6 @@ resource "tls_cert_request" "promtail-csr" {
resource "tls_locally_signed_cert" "promtail-cert" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] && local.loki-stack["create_promtail_cert"] ? 1 : 0
cert_request_pem = tls_cert_request.promtail-csr[count.index].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.loki-stack-ca-key[count.index].private_key_pem
ca_cert_pem = tls_self_signed_cert.loki-stack-ca-cert[count.index].cert_pem

Expand Down
2 changes: 0 additions & 2 deletions modules/aws/thanos-tls-querier.tf
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,6 @@ resource "tls_private_key" "thanos-tls-querier-cert-key" {

resource "tls_cert_request" "thanos-tls-querier-cert-csr" {
for_each = { for k, v in local.thanos-tls-querier : k => v if v["enabled"] && v["generate_cert"] }
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.thanos-tls-querier-cert-key[each.key].private_key_pem

subject {
Expand All @@ -150,7 +149,6 @@ resource "tls_cert_request" "thanos-tls-querier-cert-csr" {
resource "tls_locally_signed_cert" "thanos-tls-querier-cert" {
for_each = { for k, v in local.thanos-tls-querier : k => v if v["enabled"] && v["generate_cert"] }
cert_request_pem = tls_cert_request.thanos-tls-querier-cert-csr[each.key].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.thanos-tls-querier-ca-key[0].private_key_pem
ca_cert_pem = tls_self_signed_cert.thanos-tls-querier-ca-cert[0].cert_pem

Expand Down
1 change: 0 additions & 1 deletion modules/aws/thanos.tf
Original file line number Diff line number Diff line change
Expand Up @@ -347,7 +347,6 @@ resource "tls_private_key" "thanos-tls-querier-ca-key" {

resource "tls_self_signed_cert" "thanos-tls-querier-ca-cert" {
count = local.thanos["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.thanos-tls-querier-ca-key[0].private_key_pem
is_ca_certificate = true

Expand Down
3 changes: 0 additions & 3 deletions modules/aws/vault.tf
Original file line number Diff line number Diff line change
Expand Up @@ -264,7 +264,6 @@ resource "tls_private_key" "vault-tls-ca-key" {

resource "tls_self_signed_cert" "vault-tls-ca-cert" {
count = local.vault["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.vault-tls-ca-key[0].private_key_pem
is_ca_certificate = true

Expand All @@ -288,7 +287,6 @@ resource "tls_private_key" "vault-tls-client-key" {

resource "tls_cert_request" "vault-tls-client-csr" {
count = local.vault["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.vault-tls-client-key[count.index].private_key_pem

subject {
Expand All @@ -303,7 +301,6 @@ resource "tls_cert_request" "vault-tls-client-csr" {
resource "tls_locally_signed_cert" "vault-tls-client-cert" {
count = local.vault["generate_ca"] ? 1 : 0
cert_request_pem = tls_cert_request.vault-tls-client-csr[count.index].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.vault-tls-ca-key[count.index].private_key_pem
ca_cert_pem = tls_self_signed_cert.vault-tls-ca-cert[count.index].cert_pem

Expand Down
2 changes: 1 addition & 1 deletion modules/aws/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = "~> 3.0"
version = "~> 4.0"
}
}
}
4 changes: 2 additions & 2 deletions modules/azure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Provides various Kubernetes addons that are often used on Kubernetes with Azure
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | ~> 2.0 |
| <a name="requirement_kubectl"></a> [kubectl](#requirement\_kubectl) | ~> 1.0 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 4.0 |

## Providers

Expand All @@ -28,7 +28,7 @@ Provides various Kubernetes addons that are often used on Kubernetes with Azure
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="provider_random"></a> [random](#provider\_random) | n/a |
| <a name="provider_time"></a> [time](#provider\_time) | n/a |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 4.0 |

## Modules

Expand Down
2 changes: 1 addition & 1 deletion modules/azure/version.tf
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = "~> 3.0"
version = "~> 4.0"
}
}
}
4 changes: 2 additions & 2 deletions modules/scaleway/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ User guides, feature documentation and examples are available [here](https://git
| <a name="requirement_kubectl"></a> [kubectl](#requirement\_kubectl) | ~> 1.0 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | ~> 2.0, != 2.12 |
| <a name="requirement_scaleway"></a> [scaleway](#requirement\_scaleway) | >= 2.2.0 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 4.0 |

## Providers

Expand All @@ -41,7 +41,7 @@ User guides, feature documentation and examples are available [here](https://git
| <a name="provider_random"></a> [random](#provider\_random) | n/a |
| <a name="provider_scaleway"></a> [scaleway](#provider\_scaleway) | >= 2.2.0 |
| <a name="provider_time"></a> [time](#provider\_time) | n/a |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 4.0 |

## Modules

Expand Down
3 changes: 0 additions & 3 deletions modules/scaleway/loki-stack.tf
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,6 @@ resource "tls_private_key" "loki-stack-ca-key" {

resource "tls_self_signed_cert" "loki-stack-ca-cert" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.loki-stack-ca-key[0].private_key_pem
is_ca_certificate = true

Expand Down Expand Up @@ -239,7 +238,6 @@ resource "tls_private_key" "promtail-key" {

resource "tls_cert_request" "promtail-csr" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] && local.loki-stack["create_promtail_cert"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.promtail-key[count.index].private_key_pem

subject {
Expand All @@ -254,7 +252,6 @@ resource "tls_cert_request" "promtail-csr" {
resource "tls_locally_signed_cert" "promtail-cert" {
count = local.loki-stack["enabled"] && local.loki-stack["generate_ca"] && local.loki-stack["create_promtail_cert"] ? 1 : 0
cert_request_pem = tls_cert_request.promtail-csr[count.index].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.loki-stack-ca-key[count.index].private_key_pem
ca_cert_pem = tls_self_signed_cert.loki-stack-ca-cert[count.index].cert_pem

Expand Down
2 changes: 0 additions & 2 deletions modules/scaleway/thanos-tls-querier.tf
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,6 @@ resource "tls_private_key" "thanos-tls-querier-cert-key" {

resource "tls_cert_request" "thanos-tls-querier-cert-csr" {
for_each = { for k, v in local.thanos-tls-querier : k => v if v["enabled"] && v["generate_cert"] }
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.thanos-tls-querier-cert-key[each.key].private_key_pem

subject {
Expand All @@ -150,7 +149,6 @@ resource "tls_cert_request" "thanos-tls-querier-cert-csr" {
resource "tls_locally_signed_cert" "thanos-tls-querier-cert" {
for_each = { for k, v in local.thanos-tls-querier : k => v if v["enabled"] && v["generate_cert"] }
cert_request_pem = tls_cert_request.thanos-tls-querier-cert-csr[each.key].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.thanos-tls-querier-ca-key[0].private_key_pem
ca_cert_pem = tls_self_signed_cert.thanos-tls-querier-ca-cert[0].cert_pem

Expand Down
1 change: 0 additions & 1 deletion modules/scaleway/thanos.tf
Original file line number Diff line number Diff line change
Expand Up @@ -272,7 +272,6 @@ resource "tls_private_key" "thanos-tls-querier-ca-key" {

resource "tls_self_signed_cert" "thanos-tls-querier-ca-cert" {
count = local.thanos["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.thanos-tls-querier-ca-key[0].private_key_pem
is_ca_certificate = true

Expand Down
2 changes: 1 addition & 1 deletion modules/scaleway/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = "~> 3.0"
version = "~> 4.0"
}
}
}
3 changes: 0 additions & 3 deletions vault.tf
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,6 @@ resource "tls_private_key" "vault-tls-ca-key" {

resource "tls_self_signed_cert" "vault-tls-ca-cert" {
count = local.vault["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.vault-tls-ca-key[0].private_key_pem
is_ca_certificate = true

Expand All @@ -176,7 +175,6 @@ resource "tls_private_key" "vault-tls-client-key" {

resource "tls_cert_request" "vault-tls-client-csr" {
count = local.vault["generate_ca"] ? 1 : 0
key_algorithm = "ECDSA"
private_key_pem = tls_private_key.vault-tls-client-key[count.index].private_key_pem

subject {
Expand All @@ -191,7 +189,6 @@ resource "tls_cert_request" "vault-tls-client-csr" {
resource "tls_locally_signed_cert" "vault-tls-client-cert" {
count = local.vault["generate_ca"] ? 1 : 0
cert_request_pem = tls_cert_request.vault-tls-client-csr[count.index].cert_request_pem
ca_key_algorithm = "ECDSA"
ca_private_key_pem = tls_private_key.vault-tls-ca-key[count.index].private_key_pem
ca_cert_pem = tls_self_signed_cert.vault-tls-ca-cert[count.index].cert_pem

Expand Down
2 changes: 1 addition & 1 deletion versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = "~> 3.0"
version = "~> 4.0"
}
}
}

0 comments on commit d579d7d

Please sign in to comment.