mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
fd3c93660e
* deps: update Terraform google to v4.65.1 * deps: tidy all modules --------- Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: edgelessci <edgelessci@users.noreply.github.com>
293 lines
10 KiB
HCL
293 lines
10 KiB
HCL
terraform {
|
|
required_providers {
|
|
google = {
|
|
source = "hashicorp/google"
|
|
version = "4.65.1"
|
|
}
|
|
random = {
|
|
source = "hashicorp/random"
|
|
version = "3.5.1"
|
|
}
|
|
google-beta = {
|
|
source = "hashicorp/google-beta"
|
|
version = "4.64.0"
|
|
}
|
|
}
|
|
}
|
|
|
|
provider "google" {
|
|
project = var.project
|
|
region = var.region
|
|
zone = var.zone
|
|
}
|
|
|
|
provider "google-beta" {
|
|
project = var.project
|
|
region = var.region
|
|
zone = var.zone
|
|
}
|
|
|
|
locals {
|
|
uid = random_id.uid.hex
|
|
name = "${var.name}-${local.uid}"
|
|
initSecretHash = random_password.initSecret.bcrypt_hash
|
|
labels = { constellation-uid = local.uid }
|
|
ports_node_range = "30000-32767"
|
|
ports_kubernetes = "6443"
|
|
ports_bootstrapper = "9000"
|
|
ports_konnectivity = "8132"
|
|
ports_verify = "30081"
|
|
ports_recovery = "9999"
|
|
ports_debugd = "4000"
|
|
cidr_vpc_subnet_nodes = "192.168.178.0/24"
|
|
cidr_vpc_subnet_pods = "10.10.0.0/16"
|
|
cidr_vpc_subnet_public = "10.11.0.0/16"
|
|
cidr_vpc_subnet_ilb = "10.12.0.0/16"
|
|
kube_env = "AUTOSCALER_ENV_VARS: kube_reserved=cpu=1060m,memory=1019Mi,ephemeral-storage=41Gi;node_labels=;os=linux;os_distribution=cos;evictionHard="
|
|
}
|
|
|
|
resource "random_id" "uid" {
|
|
byte_length = 4
|
|
}
|
|
|
|
resource "random_password" "initSecret" {
|
|
length = 32
|
|
special = true
|
|
override_special = "_%@"
|
|
}
|
|
|
|
resource "google_compute_network" "vpc_network" {
|
|
name = local.name
|
|
description = "Constellation VPC network"
|
|
auto_create_subnetworks = false
|
|
mtu = 8896
|
|
}
|
|
|
|
|
|
resource "google_compute_subnetwork" "vpc_subnetwork_backend" {
|
|
name = "${local.name}-be"
|
|
description = "Constellation backend VPC subnetwork"
|
|
network = google_compute_network.vpc_network.id
|
|
ip_cidr_range = local.cidr_vpc_subnet_nodes
|
|
secondary_ip_range = [
|
|
{
|
|
range_name = local.name,
|
|
ip_cidr_range = local.cidr_vpc_subnet_pods,
|
|
}
|
|
]
|
|
}
|
|
|
|
# backed subnet
|
|
resource "google_compute_subnetwork" "ilb_subnet" {
|
|
name = "${local.name}-ilb"
|
|
ip_cidr_range = local.cidr_vpc_subnet_ilb
|
|
region = var.region
|
|
purpose = "REGIONAL_MANAGED_PROXY"
|
|
role = "ACTIVE"
|
|
network = google_compute_network.vpc_network.id
|
|
}
|
|
|
|
resource "google_compute_subnetwork" "vpc_subnetwork_public" {
|
|
name = "${local.name}-pub"
|
|
description = "Constellation public VPC subnetwork"
|
|
network = google_compute_network.vpc_network.id
|
|
ip_cidr_range = local.cidr_vpc_subnet_public
|
|
}
|
|
|
|
resource "google_compute_router" "vpc_router" {
|
|
name = local.name
|
|
description = "Constellation VPC router"
|
|
network = google_compute_network.vpc_network.id
|
|
}
|
|
|
|
resource "google_compute_router_nat" "vpc_router_nat" {
|
|
name = local.name
|
|
router = google_compute_router.vpc_router.name
|
|
nat_ip_allocate_option = "AUTO_ONLY"
|
|
source_subnetwork_ip_ranges_to_nat = "ALL_SUBNETWORKS_ALL_IP_RANGES"
|
|
}
|
|
|
|
resource "google_compute_firewall" "firewall_external" {
|
|
name = local.name
|
|
description = "Constellation VPC firewall"
|
|
network = google_compute_network.vpc_network.id
|
|
source_ranges = ["0.0.0.0/0"]
|
|
direction = "INGRESS"
|
|
|
|
allow {
|
|
protocol = "tcp"
|
|
ports = flatten([
|
|
local.ports_node_range,
|
|
local.ports_bootstrapper,
|
|
local.ports_kubernetes,
|
|
local.ports_konnectivity,
|
|
local.ports_recovery,
|
|
var.debug ? [local.ports_debugd] : [],
|
|
])
|
|
}
|
|
|
|
}
|
|
|
|
resource "google_compute_firewall" "firewall_internal_nodes" {
|
|
name = "${local.name}-nodes"
|
|
description = "Constellation VPC firewall"
|
|
network = google_compute_network.vpc_network.id
|
|
source_ranges = [local.cidr_vpc_subnet_nodes]
|
|
direction = "INGRESS"
|
|
|
|
allow { protocol = "tcp" }
|
|
allow { protocol = "udp" }
|
|
allow { protocol = "icmp" }
|
|
}
|
|
|
|
resource "google_compute_firewall" "firewall_internal_pods" {
|
|
name = "${local.name}-pods"
|
|
description = "Constellation VPC firewall"
|
|
network = google_compute_network.vpc_network.id
|
|
source_ranges = [local.cidr_vpc_subnet_pods]
|
|
direction = "INGRESS"
|
|
|
|
allow { protocol = "tcp" }
|
|
allow { protocol = "udp" }
|
|
allow { protocol = "icmp" }
|
|
}
|
|
|
|
module "instance_group_control_plane" {
|
|
source = "./modules/instance_group"
|
|
name = local.name
|
|
role = "ControlPlane"
|
|
uid = local.uid
|
|
instance_type = var.instance_type
|
|
instance_count = var.control_plane_count
|
|
image_id = var.image_id
|
|
disk_size = var.state_disk_size
|
|
disk_type = var.state_disk_type
|
|
network = google_compute_network.vpc_network.id
|
|
subnetwork = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
alias_ip_range_name = google_compute_subnetwork.vpc_subnetwork.secondary_ip_range[0].range_name
|
|
kube_env = local.kube_env
|
|
debug = var.debug
|
|
named_ports = flatten([
|
|
{ name = "kubernetes", port = local.ports_kubernetes },
|
|
{ name = "bootstrapper", port = local.ports_bootstrapper },
|
|
{ name = "verify", port = local.ports_verify },
|
|
{ name = "konnectivity", port = local.ports_konnectivity },
|
|
{ name = "recovery", port = local.ports_recovery },
|
|
var.debug ? [{ name = "debugd", port = local.ports_debugd }] : [],
|
|
])
|
|
labels = local.labels
|
|
init_secret_hash = local.initSecretHash
|
|
}
|
|
|
|
module "instance_group_worker" {
|
|
source = "./modules/instance_group"
|
|
name = "${local.name}-1"
|
|
role = "Worker"
|
|
uid = local.uid
|
|
instance_type = var.instance_type
|
|
instance_count = var.worker_count
|
|
image_id = var.image_id
|
|
disk_size = var.state_disk_size
|
|
disk_type = var.state_disk_type
|
|
network = google_compute_network.vpc_network.id
|
|
subnetwork = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
alias_ip_range_name = google_compute_subnetwork.vpc_subnetwork.secondary_ip_range[0].range_name
|
|
kube_env = local.kube_env
|
|
debug = var.debug
|
|
labels = local.labels
|
|
init_secret_hash = local.initSecretHash
|
|
}
|
|
|
|
resource "google_compute_address" "loadbalancer_ip" {
|
|
name = local.name
|
|
region = var.region
|
|
subnetwork = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
purpose = "SHARED_LOADBALANCER_VIP"
|
|
address_type = "INTERNAL"
|
|
}
|
|
|
|
module "loadbalancer_kube" {
|
|
source = "./modules/internal_loadbalancer"
|
|
name = local.name
|
|
port_name = "kubernetes"
|
|
region = var.region
|
|
network = google_compute_network.vpc_network.id
|
|
backend_subnet = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
health_check = "HTTPS"
|
|
backend_instance_group = module.instance_group_control_plane.instance_group
|
|
ip_address = google_compute_address.loadbalancer_ip.self_link
|
|
port = local.ports_kubernetes
|
|
frontend_labels = merge(local.labels, { constellation-use = "kubernetes" })
|
|
}
|
|
|
|
module "loadbalancer_boot" {
|
|
source = "./modules/internal_loadbalancer"
|
|
name = local.name
|
|
port_name = "bootstrapper"
|
|
region = var.region
|
|
network = google_compute_network.vpc_network.id
|
|
backend_subnet = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
health_check = "TCP"
|
|
backend_instance_group = module.instance_group_control_plane.instance_group
|
|
ip_address = google_compute_address.loadbalancer_ip.self_link
|
|
port = local.ports_bootstrapper
|
|
frontend_labels = merge(local.labels, { constellation-use = "bootstrapper" })
|
|
}
|
|
|
|
module "loadbalancer_verify" {
|
|
source = "./modules/internal_loadbalancer"
|
|
name = local.name
|
|
port_name = "verify"
|
|
region = var.region
|
|
network = google_compute_network.vpc_network.id
|
|
backend_subnet = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
health_check = "TCP"
|
|
backend_instance_group = module.instance_group_control_plane.instance_group
|
|
ip_address = google_compute_address.loadbalancer_ip.self_link
|
|
port = local.ports_verify
|
|
frontend_labels = merge(local.labels, { constellation-use = "verify" })
|
|
}
|
|
|
|
module "loadbalancer_konnectivity" {
|
|
source = "./modules/internal_loadbalancer"
|
|
name = local.name
|
|
port_name = "konnectivity"
|
|
region = var.region
|
|
network = google_compute_network.vpc_network.id
|
|
backend_subnet = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
health_check = "TCP"
|
|
backend_instance_group = module.instance_group_control_plane.instance_group
|
|
ip_address = google_compute_address.loadbalancer_ip.self_link
|
|
port = local.ports_konnectivity
|
|
frontend_labels = merge(local.labels, { constellation-use = "konnectivity" })
|
|
}
|
|
|
|
module "loadbalancer_recovery" {
|
|
source = "./modules/internal_loadbalancer"
|
|
name = local.name
|
|
port_name = "recovery"
|
|
region = var.region
|
|
network = google_compute_network.vpc_network.id
|
|
backend_subnet = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
health_check = "TCP"
|
|
backend_instance_group = module.instance_group_control_plane.instance_group
|
|
ip_address = google_compute_address.loadbalancer_ip.self_link
|
|
port = local.ports_recovery
|
|
frontend_labels = merge(local.labels, { constellation-use = "recovery" })
|
|
}
|
|
|
|
module "loadbalancer_debugd" {
|
|
count = var.debug ? 1 : 0 // only deploy debugd in debug mode
|
|
source = "./modules/internal_loadbalancer"
|
|
name = local.name
|
|
port_name = "debugd"
|
|
region = var.region
|
|
network = google_compute_network.vpc_network.id
|
|
backend_subnet = google_compute_subnetwork.vpc_subnetwork_backend.id
|
|
health_check = "TCP"
|
|
backend_instance_group = module.instance_group_control_plane.instance_group
|
|
ip_address = google_compute_address.loadbalancer_ip.self_link
|
|
port = local.ports_debugd
|
|
frontend_labels = merge(local.labels, { constellation-use = "debugd" })
|
|
}
|