Skip to content

Commit

Permalink
worked in cicd
Browse files Browse the repository at this point in the history
  • Loading branch information
morga471 committed Dec 18, 2024
1 parent 7cf9fe0 commit f5d13b6
Show file tree
Hide file tree
Showing 16 changed files with 62 additions and 466 deletions.
45 changes: 0 additions & 45 deletions lab/_envcommon/aws-provider.hcl

This file was deleted.

46 changes: 0 additions & 46 deletions lab/_envcommon/helm-provider.hcl

This file was deleted.

40 changes: 0 additions & 40 deletions lab/_envcommon/kubernetes-provider.hcl

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -25,33 +25,6 @@ dependency "eks_config" {
skip_outputs = true
}

locals {
providers = ["aws", "kubernetes", "helm"]
}

generate "other-providers" {
path = "other-providers.tf"
if_exists = "overwrite"
contents = <<-EOF
%{if contains(local.providers, "kubernetes")}
provider "kubernetes" {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
%{endif}
%{if contains(local.providers, "helm")}
provider "helm" {
kubernetes {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
}
%{endif}
EOF
}

inputs = {
cluster_name = dependency.eks.outputs.cluster_name
cluster_mailing_list = dependency.eks.inputs.creator
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,36 +24,33 @@ dependency "eks" {
oidc_provider_arn = "arn:aws-us-gov:iam::111111111111:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/0000000000000000AAAAAAAAAAAAAAAA"
security_group_all_worker_mgmt_id = "sg-00b0000000000000"
subnets = ["subnet-00000000000000001", "subnet-00000000000000002", "subnet-00000000000000003"]
cluster_token = [{ token = "THISISTHETOKENTHATDOESNTEXISTTHEREAREMANYLIKEITBUTHISONEISFORACLUSTER" }]
cluster_token = [{ token = "THISISTHETOKENTHATDOESNTEXISTTHEREAREMANYLIKEITBUTHISONEISFORACLUSTER" }]
vpc_id = "a-vpc-id"
}
}

locals {
providers = ["aws", "kubernetes"]
}

generate "other-providers" {
path = "other-providers.tf"
generate "kubectl-provider" {
path = "kubectl-provider.tf"
if_exists = "overwrite"
contents = <<-EOF
%{if contains(local.providers, "kubernetes")}
provider "kubernetes" {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
%{endif}
%{if contains(local.providers, "helm")}
provider "helm" {
kubernetes {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
%{ if dependency.eks.outputs.cluster_name != "a-cluster-name" ~}
data "aws_eks_cluster" "kubectl" {
name = "${dependency.eks.outputs.cluster_name}"
}
}
%{endif}
EOF
provider "kubectl" {
apply_retry_count = 5
host = data.aws_eks_cluster.kubectl.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.kubectl.certificate_authority[0].data)
load_config_file = false
exec {
api_version = "client.authentication.k8s.io/v1beta1"
command = "aws"
args = ["eks", "get-token", "--cluster-name", "${dependency.eks.outputs.cluster_name}", "--region", "${include.root.inputs.aws_region}"]
}
}
%{ endif ~}
EOF
}

inputs = {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,33 +29,6 @@ dependency "istio" {
}
}

locals {
providers = ["aws", "kubernetes", "helm"]
}

generate "other-providers" {
path = "other-providers.tf"
if_exists = "overwrite"
contents = <<-EOF
%{if contains(local.providers, "kubernetes")}
provider "kubernetes" {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
%{endif}
%{if contains(local.providers, "helm")}
provider "helm" {
kubernetes {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
}
%{endif}
EOF
}

inputs = {
cluster_name = dependency.eks.inputs.cluster_name
istio_ingress_lb = dependency.istio.outputs.istio_ingress_lb
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,33 +26,6 @@ dependency "eks-loki" {
}
}

locals {
providers = ["aws", "kubernetes", "helm"]
}

generate "other-providers" {
path = "other-providers.tf"
if_exists = "overwrite"
contents = <<-EOF
%{if contains(local.providers, "kubernetes")}
provider "kubernetes" {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
%{endif}
%{if contains(local.providers, "helm")}
provider "helm" {
kubernetes {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
}
%{endif}
EOF
}

inputs = {
profile = include.root.inputs.aws_profile
region = include.root.inputs.aws_region
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,38 +18,12 @@ dependency "eks" {
cluster_name = "a-cluster-name"
}
}

dependency "eks-karpenter" {
config_path = "../eks-karpenter"
skip_outputs = true
}

locals {
providers = ["aws", "kubernetes", "helm"]
}

generate "other-providers" {
path = "other-providers.tf"
if_exists = "overwrite"
contents = <<-EOF
%{if contains(local.providers, "kubernetes")}
provider "kubernetes" {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
%{endif}
%{if contains(local.providers, "helm")}
provider "helm" {
kubernetes {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
}
%{endif}
EOF
}

inputs = {
profile = include.root.inputs.aws_profile
region = include.root.inputs.aws_region
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,33 +25,6 @@ dependency "eks-loki" {
skip_outputs = true
}

locals {
providers = ["aws", "kubernetes", "helm"]
}

generate "other-providers" {
path = "other-providers.tf"
if_exists = "overwrite"
contents = <<-EOF
%{if contains(local.providers, "kubernetes")}
provider "kubernetes" {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
%{endif}
%{if contains(local.providers, "helm")}
provider "helm" {
kubernetes {
host = "${dependency.eks.outputs.cluster_endpoint}"
cluster_ca_certificate = base64decode("${dependency.eks.outputs.cluster_certificate_authority_data}")
token = "${dependency.eks.outputs.cluster_token.token}"
}
}
%{endif}
EOF
}

inputs = {
profile = include.root.inputs.aws_profile
region = include.root.inputs.aws_region
Expand Down
Loading

0 comments on commit f5d13b6

Please sign in to comment.