mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-11 17:04:22 -05:00
913b09aeb8
* terraform: enable creation of SEV-SNP VMs on GCP * variant: add SEV-SNP attestation variant * config: add SEV-SNP config options for GCP * measurements: add GCP SEV-SNP measurements * gcp: separate package for SEV-ES * attestation: add GCP SEV-SNP attestation logic * gcp: factor out common logic * choose: add GCP SEV-SNP * cli: add TF variable passthrough for GCP SEV-SNP variables * cli: support GCP SEV-SNP for `constellation verify` * Adjust usage of GCP SEV-SNP throughout codebase * ci: add GCP SEV-SNP * terraform-provider: support GCP SEV-SNP * docs: add GCP SEV-SNP reference * linter fixes * gcp: only run test with TPM simulator * gcp: remove nonsense test * Update cli/internal/cmd/verify.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update docs/docs/overview/clouds.md Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update terraform-provider-constellation/internal/provider/attestation_data_source_test.go Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * linter fixes * terraform_provider: correctly pass down CC technology * config: mark attestationconfigapi as unimplemented * gcp: fix comments and typos * snp: use nonce and PK hash in SNP report * snp: ensure we never use ARK supplied by Issuer (#3025) * Make sure SNP ARK is always loaded from config, or fetched from AMD KDS * GCP: Set validator `reportData` correctly --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * attestationconfigapi: add GCP to uploading * snp: use correct cert Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * terraform-provider: enable fetching of attestation config values for GCP SEV-SNP * linter fixes --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com>
82 lines
2.3 KiB
HCL
82 lines
2.3 KiB
HCL
variable "name" {
|
|
type = string
|
|
description = "Name of the Constellation cluster."
|
|
}
|
|
|
|
variable "project" {
|
|
type = string
|
|
description = "The project ID to deploy the cluster to."
|
|
}
|
|
|
|
variable "service_account_id" {
|
|
type = string
|
|
description = "The service account ID to use for the cluster."
|
|
}
|
|
|
|
variable "image" {
|
|
type = string
|
|
description = "Node image reference or semantic release version. When not set, the latest default version will be used."
|
|
default = "@@CONSTELLATION_VERSION@@"
|
|
}
|
|
|
|
variable "microservice_version" {
|
|
type = string
|
|
description = "Microservice version. When not set, the latest default version will be used."
|
|
default = ""
|
|
}
|
|
|
|
variable "kubernetes_version" {
|
|
type = string
|
|
description = "Kubernetes version. When not set, the latest default version will be used."
|
|
default = ""
|
|
}
|
|
|
|
variable "node_groups" {
|
|
type = map(object({
|
|
role = string
|
|
initial_count = optional(number)
|
|
instance_type = string
|
|
disk_size = number
|
|
disk_type = string
|
|
zone = string
|
|
}))
|
|
description = "A map of node group names to node group configurations."
|
|
validation {
|
|
condition = can([for group in var.node_groups : group.role == "control-plane" || group.role == "worker"])
|
|
error_message = "The role has to be 'control-plane' or 'worker'."
|
|
}
|
|
}
|
|
|
|
variable "zone" {
|
|
type = string
|
|
description = "The availability zone name to create the cluster in."
|
|
}
|
|
|
|
variable "debug" {
|
|
type = bool
|
|
default = false
|
|
description = "DON'T USE IN PRODUCTION: Enable debug mode and allow the use of debug images."
|
|
}
|
|
|
|
|
|
variable "custom_endpoint" {
|
|
type = string
|
|
default = ""
|
|
description = "Custom endpoint (DNS Name) to use for the Constellation API server. If not set, the default endpoint will be used."
|
|
}
|
|
|
|
variable "internal_load_balancer" {
|
|
type = bool
|
|
default = false
|
|
description = "Use an internal load balancer."
|
|
}
|
|
|
|
variable "cc_technology" {
|
|
type = string
|
|
description = "The confidential computing technology to use for the nodes. One of `SEV`, `SEV_SNP`."
|
|
validation {
|
|
condition = contains(["SEV", "SEV_SNP"], var.cc_technology)
|
|
error_message = "The confidential computing technology has to be 'SEV' or 'SEV_SNP'."
|
|
}
|
|
}
|