mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-26 07:59:37 -05:00
8e4feb7e2a
* add Azure Terraform module * add maa-patching command to cli * refactor release process * factor out image fetching to own action * add CI * generate * fix some unnecessary changes Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * use `constellation maa-patch` in ci * insecure flag when using debug image Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * only update maa url if existing Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * make node group zone optional on aws and gcp Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * [remove] register updated workflow Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * Revert "[remove] register updated workflow" This reverts commit e70b9515b7eabbcbe0d41fa1296c48750cd02ace. * create MAA Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * make maa-patching only run on azure Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add comment Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * require node group zone for GCP and AWS * remove unnecessary bazel action * stamp version to correct file * refer to `maa-patch` command in docs * run Azure test in weekly e2e * comment / naming improvements * remove sa_account resource * disable spellcheck ot use "URL" * `create_maa` variable * don't write maa url to config Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * default to nightly image * use input ref and stream * fix command check * don't set region in weekly e2e call * patch maa if url is not empty Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove `create_maa` variable * remove binaries Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove undefined input * replace invalid attestation URL error message Co-authored-by: Thomas Tendyck <51411342+thomasten@users.noreply.github.com> * fix punctuation Co-authored-by: Thomas Tendyck <51411342+thomasten@users.noreply.github.com> * skip hidden commands in clidocgen Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * enable spellcheck before code block * move spellcheck trigger out of info block Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * fix workflow dependencies * let image default to CLI version --------- Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Thomas Tendyck <51411342+thomasten@users.noreply.github.com>
189 lines
7.4 KiB
HCL
189 lines
7.4 KiB
HCL
locals {
|
|
yq_node_groups = join("\n", flatten([
|
|
for name, group in var.node_groups : [
|
|
"./yq eval '.nodeGroups.${name}.role = \"${group.role}\"' -i constellation-conf.yaml",
|
|
"./yq eval '.nodeGroups.${name}.zone = \"${group.zone}\"' -i constellation-conf.yaml",
|
|
"./yq eval '.nodeGroups.${name}.instanceType = \"${group.instance_type}\"' -i constellation-conf.yaml",
|
|
"./yq eval '.nodeGroups.${name}.stateDiskSizeGB = ${group.disk_size}' -i constellation-conf.yaml",
|
|
"./yq eval '.nodeGroups.${name}.stateDiskType = \"${group.disk_type}\"' -i constellation-conf.yaml",
|
|
"./yq eval '.nodeGroups.${name}.initialCount = ${group.initial_count}' -i constellation-conf.yaml"
|
|
]
|
|
]))
|
|
gcp_sa_file_path = "service_account_file.json"
|
|
}
|
|
|
|
resource "null_resource" "ensure_cli" {
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
${path.module}/install-constellation.sh ${var.constellation_version}
|
|
EOT
|
|
}
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
}
|
|
|
|
// terraform_data resource so that it is run only once
|
|
resource "terraform_data" "config_generate" {
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
./constellation config generate ${var.csp}
|
|
EOT
|
|
}
|
|
depends_on = [
|
|
null_resource.ensure_cli
|
|
]
|
|
}
|
|
|
|
resource "null_resource" "aws_config" {
|
|
count = var.aws_config != null ? 1 : 0
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
./yq eval '.provider.aws.region = "${var.aws_config.region}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.aws.zone = "${var.aws_config.zone}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.aws.iamProfileControlPlane = "${var.aws_config.iam_instance_profile_control_plane}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.aws.iamProfileWorkerNodes = "${var.aws_config.iam_instance_profile_worker_nodes}"' -i constellation-conf.yaml
|
|
EOT
|
|
}
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
depends_on = [
|
|
terraform_data.config_generate
|
|
]
|
|
}
|
|
|
|
resource "null_resource" "azure_config" {
|
|
count = var.azure_config != null ? 1 : 0
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
./yq eval '.provider.azure.subscription = "${var.azure_config.subscription}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.azure.tenant = "${var.azure_config.tenant}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.azure.location = "${var.azure_config.location}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.azure.resourceGroup = "${var.azure_config.resourceGroup}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.azure.userAssignedIdentity = "${var.azure_config.userAssignedIdentity}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.azure.deployCSIDriver = ${var.azure_config.deployCSIDriver}' -i constellation-conf.yaml
|
|
./yq eval '.provider.azure.secureBoot = ${var.azure_config.secureBoot}' -i constellation-conf.yaml
|
|
./yq eval '.infrastructure.azure.resourceGroup = "${var.azure_config.resourceGroup}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.azure.subscriptionID = "${var.azure_config.subscription}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.azure.networkSecurityGroupName = "${var.azure_config.networkSecurityGroupName}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.azure.loadBalancerName = "${var.azure_config.loadBalancerName}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.azure.userAssignedIdentity = "${var.azure_config.userAssignedIdentity}"' -i constellation-state.yaml
|
|
if [ '${var.azure_config.maaURL}' != '' ]; then
|
|
./yq eval '.infrastructure.azure.attestationURL = "${var.azure_config.maaURL}"' -i constellation-state.yaml
|
|
./constellation maa-patch ${var.azure_config.maaURL}
|
|
fi
|
|
EOT
|
|
}
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
depends_on = [
|
|
terraform_data.config_generate
|
|
]
|
|
}
|
|
|
|
resource "null_resource" "service_account_file" {
|
|
count = var.gcp_config != null ? 1 : 0
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
echo ${var.gcp_config.serviceAccountKey} | base64 -d > "${local.gcp_sa_file_path}"
|
|
EOT
|
|
}
|
|
provisioner "local-exec" {
|
|
when = destroy
|
|
command = "rm ${self.triggers.file_path}"
|
|
}
|
|
triggers = {
|
|
always_run = timestamp()
|
|
file_path = local.gcp_sa_file_path
|
|
}
|
|
}
|
|
|
|
resource "null_resource" "gcp_config" {
|
|
count = var.gcp_config != null ? 1 : 0
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
./yq eval '.provider.gcp.project = "${var.gcp_config.project}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.gcp.region = "${var.gcp_config.region}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.gcp.zone = "${var.gcp_config.zone}"' -i constellation-conf.yaml
|
|
./yq eval '.provider.gcp.serviceAccountKeyPath = "${local.gcp_sa_file_path}"' -i constellation-conf.yaml
|
|
./yq eval '.infrastructure.gcp.projectID = "${var.gcp_config.project}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.gcp.ipCidrPod = "${var.gcp_config.ipCidrPod}"' -i constellation-state.yaml
|
|
EOT
|
|
}
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
depends_on = [
|
|
terraform_data.config_generate, null_resource.service_account_file
|
|
]
|
|
}
|
|
|
|
resource "null_resource" "config" {
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
./yq eval '.name = "${var.name}"' -i constellation-conf.yaml
|
|
if [ "${var.image}" != "" ]; then
|
|
./yq eval '.image = "${var.image}"' -i constellation-conf.yaml
|
|
fi
|
|
if [ "${var.kubernetes_version}" != "" ]; then
|
|
./yq eval '.kubernetesVersion = "${var.kubernetes_version}"' -i constellation-conf.yaml
|
|
fi
|
|
if [ "${var.microservice_version}" != "" ]; then
|
|
./yq eval '.microserviceVersion = "${var.microservice_version}"' -i constellation-conf.yaml
|
|
fi
|
|
${local.yq_node_groups}
|
|
./constellation config fetch-measurements ${var.debug == true ? "--insecure" : ""}
|
|
EOT
|
|
}
|
|
|
|
depends_on = [
|
|
null_resource.aws_config, null_resource.gcp_config, null_resource.azure_config
|
|
]
|
|
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
}
|
|
|
|
|
|
resource "null_resource" "infra_state" {
|
|
provisioner "local-exec" {
|
|
command = <<EOT
|
|
./yq eval '.infrastructure.uid = "${var.uid}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.inClusterEndpoint = "${var.inClusterEndpoint}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.clusterEndpoint = "${var.clusterEndpoint}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.initSecret = "'"$(echo "${var.initSecretHash}" | tr -d '\n' | hexdump -ve '/1 "%02x"')"'"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.apiServerCertSANs = ${jsonencode(var.apiServerCertSANs)}' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.name = "${var.name}"' -i constellation-state.yaml
|
|
./yq eval '.infrastructure.ipCidrNode = "${var.ipCidrNode}"' -i constellation-state.yaml
|
|
EOT
|
|
}
|
|
depends_on = [
|
|
terraform_data.config_generate
|
|
]
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
}
|
|
|
|
|
|
resource "null_resource" "apply" {
|
|
provisioner "local-exec" {
|
|
command = "./constellation apply --debug --yes --skip-phases infrastructure"
|
|
}
|
|
|
|
provisioner "local-exec" {
|
|
when = destroy
|
|
command = "./constellation terminate --yes && rm constellation-conf.yaml constellation-mastersecret.json && rm -r constellation-upgrade"
|
|
}
|
|
|
|
depends_on = [
|
|
null_resource.infra_state, null_resource.config, null_resource.ensure_cli
|
|
]
|
|
triggers = {
|
|
always_run = timestamp()
|
|
}
|
|
}
|