-
-
Notifications
You must be signed in to change notification settings - Fork 415
/
Copy pathkubeconfig.tf
40 lines (37 loc) · 1.64 KB
/
kubeconfig.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
data "remote_file" "kubeconfig" {
conn {
host = local.first_control_plane_ip
port = var.ssh_port
user = "root"
private_key = var.ssh_private_key
agent = var.ssh_private_key == null
}
path = "/etc/rancher/k3s/k3s.yaml"
depends_on = [null_resource.control_planes[0]]
}
locals {
kubeconfig_server_address = var.kubeconfig_server_address != "" ? var.kubeconfig_server_address : (var.use_control_plane_lb ?
(
var.control_plane_lb_enable_public_interface ?
hcloud_load_balancer.control_plane.*.ipv4[0]
: hcloud_load_balancer.control_plane.*.network_ip[0]
)
:
(can(local.first_control_plane_ip) ? local.first_control_plane_ip : "unknown")
)
kubeconfig_external = replace(replace(data.remote_file.kubeconfig.content, "127.0.0.1", local.kubeconfig_server_address), "default", var.cluster_name)
kubeconfig_parsed = yamldecode(local.kubeconfig_external)
kubeconfig_data = {
host = local.kubeconfig_parsed["clusters"][0]["cluster"]["server"]
client_certificate = base64decode(local.kubeconfig_parsed["users"][0]["user"]["client-certificate-data"])
client_key = base64decode(local.kubeconfig_parsed["users"][0]["user"]["client-key-data"])
cluster_ca_certificate = base64decode(local.kubeconfig_parsed["clusters"][0]["cluster"]["certificate-authority-data"])
cluster_name = var.cluster_name
}
}
resource "local_sensitive_file" "kubeconfig" {
count = var.create_kubeconfig ? 1 : 0
content = local.kubeconfig_external
filename = "${var.cluster_name}_kubeconfig.yaml"
file_permission = "600"
}