forked from oracle-terraform-modules/terraform-oci-oke
-
Notifications
You must be signed in to change notification settings - Fork 1
/
module-network.tf
255 lines (233 loc) · 9.7 KB
/
module-network.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
# Copyright (c) 2017, 2023 Oracle Corporation and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl
data "oci_core_vcn" "oke" {
count = var.create_vcn ? 0 : 1
vcn_id = coalesce(var.vcn_id, "none")
}
locals {
# Created VCN if enabled, else var.vcn_id
vcn_id = var.create_vcn ? try(one(module.vcn[*].vcn_id), var.vcn_id) : var.vcn_id
# Configured VCN CIDRs if creating, else from provided vcn_id
vcn_lookup = coalesce(one(data.oci_core_vcn.oke[*].cidr_blocks), [])
vcn_lookup_cidr_blocks = flatten(local.vcn_lookup)
vcn_cidrs = var.create_vcn ? var.vcn_cidrs : local.vcn_lookup_cidr_blocks
# Created route table if enabled, else var.ig_route_table_id
ig_route_table_id = var.create_vcn ? try(one(module.vcn[*].ig_route_id), var.ig_route_table_id) : var.ig_route_table_id
# Created route table if enabled, else var.nat_route_table_id
nat_route_table_id = var.create_vcn ? try(one(module.vcn[*].nat_route_id), var.ig_route_table_id) : var.nat_route_table_id
}
module "vcn" {
count = var.create_vcn ? 1 : 0
source = "oracle-terraform-modules/vcn/oci"
version = "3.6.0"
compartment_id = coalesce(var.network_compartment_id, local.compartment_id)
# Standard tags as defined if enabled for use, or freeform
# User-provided tags are merged last and take precedence
defined_tags = merge(var.use_defined_tags ? {
"${var.tag_namespace}.state_id" = local.state_id,
"${var.tag_namespace}.role" = "network",
} : {},
local.network_defined_tags,
)
freeform_tags = merge(var.use_defined_tags ? {} : {
"state_id" = local.state_id,
"role" = "network",
},
local.network_freeform_tags,
)
attached_drg_id = var.drg_id != null ? var.drg_id : (tobool(var.create_drg) ? module.drg[0].drg_id : null)
create_internet_gateway = alltrue([
var.vcn_create_internet_gateway != "never", # always disable
anytrue([ # enable for configurations that generally utilize it
var.vcn_create_internet_gateway == "always", # always enable
var.create_bastion && var.bastion_is_public, # enable for public bastion
var.control_plane_is_public, # enable for cluster w/ public endpoint
var.load_balancers != "internal", # enable for cluster w/ public load balancers
])
])
create_nat_gateway = alltrue([
var.vcn_create_nat_gateway != "never", # always disable
anytrue([ # enable for configurations that generally utilize it
var.vcn_create_nat_gateway == "always", # always enable
!var.worker_is_public, # enable for private workers
var.create_operator, # enable for operator
!var.control_plane_is_public, # enable for cluster w/ private endpoint
contains(["internal", "both"], var.load_balancers), # enable for cluster w/ private load balancers
])
])
create_service_gateway = var.vcn_create_service_gateway != "never"
internet_gateway_route_rules = var.internet_gateway_route_rules
local_peering_gateways = var.local_peering_gateways
lockdown_default_seclist = var.lockdown_default_seclist
nat_gateway_public_ip_id = var.nat_gateway_public_ip_id
nat_gateway_route_rules = var.nat_gateway_route_rules
vcn_cidrs = local.vcn_cidrs
vcn_dns_label = var.assign_dns ? coalesce(var.vcn_dns_label, local.state_id) : null
vcn_name = coalesce(var.vcn_name, "oke-${local.state_id}")
}
module "drg" {
count = tobool(var.create_drg) || var.drg_id != null ? 1 : 0
source = "oracle-terraform-modules/drg/oci"
version = "1.0.6"
compartment_id = coalesce(var.network_compartment_id, local.compartment_id)
drg_compartment_id = var.drg_compartment_id
drg_id = one([var.drg_id]) # existing DRG ID or null
drg_display_name = coalesce(var.drg_display_name, "oke-${local.state_id}")
drg_vcn_attachments = tobool(var.create_drg) || var.drg_id != null ? { for k, v in module.vcn : k => {
# gets the vcn_id values dynamically from the vcn module
vcn_id : v.vcn_id
vcn_transit_routing_rt_id : null
drg_route_table_id : null
}
} : var.drg_attachments
# rpc parameters
remote_peering_connections = { for k, v in var.remote_peering_connections : k => {
"rpc_acceptor_id" = try(v.rpc_acceptor_id, null),
"rpc_acceptor_region" = try(v.rpc_acceptor_region, null)
}
}
}
module "network" {
source = "./modules/network"
state_id = local.state_id
compartment_id = coalesce(var.network_compartment_id, local.compartment_id)
defined_tags = local.network_defined_tags
freeform_tags = local.network_freeform_tags
tag_namespace = var.tag_namespace
use_defined_tags = var.use_defined_tags
allow_node_port_access = var.allow_node_port_access
allow_pod_internet_access = var.allow_pod_internet_access
allow_rules_internal_lb = var.allow_rules_internal_lb
allow_rules_public_lb = var.allow_rules_public_lb
allow_rules_workers = var.allow_rules_workers
allow_worker_internet_access = var.allow_worker_internet_access
allow_worker_ssh_access = var.allow_worker_ssh_access
allow_bastion_cluster_access = var.allow_bastion_cluster_access
assign_dns = var.assign_dns
bastion_allowed_cidrs = var.bastion_allowed_cidrs
bastion_is_public = var.bastion_is_public
cni_type = var.cni_type
control_plane_allowed_cidrs = var.control_plane_allowed_cidrs
control_plane_is_public = var.control_plane_is_public
create_cluster = var.create_cluster
create_bastion = var.create_bastion
nsgs = var.nsgs
create_operator = local.operator_enabled
drg_attachments = var.drg_attachments
enable_waf = var.enable_waf
ig_route_table_id = local.ig_route_table_id
load_balancers = var.load_balancers
nat_route_table_id = local.nat_route_table_id
subnets = var.subnets
vcn_cidrs = local.vcn_cidrs
vcn_id = local.vcn_id
worker_is_public = var.worker_is_public
}
# VCN
output "vcn_id" {
description = "VCN ID"
value = try(local.vcn_id, null)
}
output "ig_route_table_id" {
description = "Internet gateway route table ID"
value = try(local.ig_route_table_id, null)
}
output "nat_route_table_id" {
description = "NAT gateway route table ID"
value = try(local.nat_route_table_id, null)
}
# Subnets
output "bastion_subnet_id" {
value = try(module.network.bastion_subnet_id, null)
}
output "bastion_subnet_cidr" {
value = try(module.network.bastion_subnet_cidr, null)
}
output "operator_subnet_id" {
value = try(module.network.operator_subnet_id, null)
}
output "operator_subnet_cidr" {
value = try(module.network.operator_subnet_cidr, null)
}
output "control_plane_subnet_id" {
value = try(module.network.control_plane_subnet_id, null)
}
output "control_plane_subnet_cidr" {
value = try(module.network.control_plane_subnet_cidr, null)
}
output "worker_subnet_id" {
value = try(module.network.worker_subnet_id, null)
}
output "worker_subnet_cidr" {
value = try(module.network.worker_subnet_cidr, null)
}
output "pod_subnet_id" {
value = try(module.network.pod_subnet_id, null)
}
output "pod_subnet_cidr" {
value = try(module.network.pod_subnet_cidr, null)
}
output "int_lb_subnet_id" {
value = try(module.network.int_lb_subnet_id, null)
}
output "int_lb_subnet_cidr" {
value = try(module.network.int_lb_subnet_cidr, null)
}
output "pub_lb_subnet_id" {
value = try(module.network.pub_lb_subnet_id, null)
}
output "pub_lb_subnet_cidr" {
value = try(module.network.pub_lb_subnet_cidr, null)
}
output "fss_subnet_id" {
value = try(module.network.fss_subnet_id, null)
}
output "fss_subnet_cidr" {
value = try(module.network.fss_subnet_cidr, null)
}
# NSGs
output "bastion_nsg_id" {
description = "Network Security Group for bastion host(s)."
value = try(module.network.bastion_nsg_id, null)
}
output "operator_nsg_id" {
description = "Network Security Group for operator host(s)."
value = try(module.network.operator_nsg_id, null)
}
output "control_plane_nsg_id" {
description = "Network Security Group for Kubernetes control plane(s)."
value = try(module.network.control_plane_nsg_id, null)
}
output "int_lb_nsg_id" {
description = "Network Security Group for internal load balancers."
value = try(module.network.int_lb_nsg_id, null)
}
output "pub_lb_nsg_id" {
description = "Network Security Group for public load balancers."
value = try(module.network.pub_lb_nsg_id, null)
}
output "worker_nsg_id" {
description = "Network Security Group for worker nodes."
value = try(module.network.worker_nsg_id, null)
}
output "pod_nsg_id" {
description = "Network Security Group for pods."
value = try(module.network.pod_nsg_id, null)
}
output "fss_nsg_id" {
description = "Network Security Group for File Storage Service resources."
value = try(module.network.fss_nsg_id, null)
}
output "network_security_rules" {
value = var.output_detail ? try(module.network.network_security_rules, null) : null
}
# DRG
# output "drg_id" {
# description = "Dynamic routing gateway ID"
# value = try(one(module.drg[*].drg_id), null)
# }
# LPG
output "lpg_all_attributes" {
description = "all attributes of created lpg"
value = try(one(module.vcn[*].lpg_all_attributes), null)
}