Skip to content

Commit f776bd3

Browse files
authored
feat: renamed kms_key_id to cluster_kms_key_id to avoid confusion. Closes #458 (#487)
1 parent d2f2d31 commit f776bd3

File tree

13 files changed

+22
-23
lines changed

13 files changed

+22
-23
lines changed

docs/configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ OKE Variables:-
260260

261261
----
262262
use_encryption = true
263-
kms_key_id = <kms_key_id>
263+
cluster_kms_key_id = <cluster_kms_key_id>
264264
use_node_pool_volume_encryption = true
265265
node_pool_volume_kms_key_id = <node_pool_volume_kms_key_id>
266266
----

docs/instructions.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ If you wish to use {uri-oci-kms}[OCI KMS] to encrypt Kubernetes secrets, the fol
7575
* link:#enabling-instance_principal-on-the-operator-host[operator instance_principal must be enabled]
7676

7777
* use_encryption must be set to _true_
78-
* kms_key_id must be provided
78+
* cluster_kms_key_id must be provided
7979

8080
If you wish to use {uri-oci-kms}[OCI KMS] to encrypt OKE nodepool boot/block volume, the following is required:
8181

docs/terraformoptions.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -616,8 +616,8 @@ EOT
616616
|true/false
617617
|false
618618

619-
|kms_key_id
620-
|The id of the OCI KMS key to be used as the master encryption key for Kubernetes secrets encryption.. *Required* if _use_encryption_ is set to *true*
619+
|cluster_kms_key_id
620+
|The id of the OCI KMS key to be used as the master encryption key for encrypting Kubernetes' etcd . *Required* if _use_encryption_ is set to *true*
621621
|`ocid1.key.oc1....`
622622
|
623623

main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ module "oke" {
222222
cluster_subnets = module.network.subnet_ids
223223
vcn_id = module.vcn.vcn_id
224224
use_encryption = var.use_encryption
225-
kms_key_id = var.kms_key_id
225+
cluster_kms_key_id = var.cluster_kms_key_id
226226
use_signed_images = var.use_signed_images
227227
image_signing_keys = var.image_signing_keys
228228
admission_controller_options = var.admission_controller_options
@@ -290,11 +290,11 @@ module "extensions" {
290290
operator_os_version = var.operator_os_version
291291

292292
# oke cluster parameters
293-
cluster_id = module.oke.cluster_id
294-
pods_cidr = var.pods_cidr
295-
use_encryption = var.use_encryption
296-
kms_key_id = var.kms_key_id
297-
kms_dynamic_group_id = module.oke.kms_dynamic_group_id
293+
cluster_id = module.oke.cluster_id
294+
pods_cidr = var.pods_cidr
295+
use_encryption = var.use_encryption
296+
cluster_kms_key_id = var.cluster_kms_key_id
297+
cluster_kms_dynamic_group_id = module.oke.cluster_kms_dynamic_group_id
298298

299299
# ocir parameters
300300
email_address = var.email_address

modules/extensions/templates.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ locals {
7474
region = var.region
7575

7676
email_address = var.email_address
77-
region_registry = join("",[var.region,".ocir.io"])
77+
region_registry = join("", [var.region, ".ocir.io"])
7878
secret_id = var.secret_id
7979
secret_name = var.secret_name
8080
secret_namespace = var.secret_namespace
@@ -100,7 +100,7 @@ locals {
100100

101101
update_dynamic_group_template = templatefile("${path.module}/scripts/update_dynamic_group.template.sh",
102102
{
103-
dynamic_group_id = var.use_encryption == true ? var.kms_dynamic_group_id : "null"
103+
dynamic_group_id = var.use_encryption == true ? var.cluster_kms_dynamic_group_id : "null"
104104
dynamic_group_rule = local.dynamic_group_rule_this_cluster
105105
home_region = data.oci_identity_regions.home_region.regions[0].name
106106
}

modules/extensions/variables.tf

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,7 @@ variable "enable_operator_instance_principal" {
4848
}
4949
variable "operator_os_version" {}
5050

51-
52-
51+
# oke
5352
variable "cluster_id" {}
5453

5554
variable "pods_cidr" {}
@@ -59,9 +58,9 @@ variable "use_encryption" {
5958
type = bool
6059
}
6160

62-
variable "kms_key_id" {}
61+
variable "cluster_kms_key_id" {}
6362

64-
variable "kms_dynamic_group_id" {}
63+
variable "cluster_kms_dynamic_group_id" {}
6564
# ocir
6665
variable "email_address" {}
6766

modules/oke/cluster.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ resource "time_sleep" "wait_30_seconds" {
1111
resource "oci_containerengine_cluster" "k8s_cluster" {
1212
compartment_id = var.compartment_id
1313
kubernetes_version = var.cluster_kubernetes_version
14-
kms_key_id = var.use_encryption == true ? var.kms_key_id : null
14+
kms_key_id = var.use_encryption == true ? var.cluster_kms_key_id : null
1515
name = var.label_prefix == "none" ? var.cluster_name : "${var.label_prefix}-${var.cluster_name}"
1616

1717
depends_on = [time_sleep.wait_30_seconds]

modules/oke/iam.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ resource "oci_identity_policy" "oke_kms" {
3131
description = "policy to allow dynamic group ${var.label_prefix}-oke-kms-cluster to use KMS to encrypt etcd"
3232
depends_on = [oci_identity_dynamic_group.oke_kms_cluster]
3333
name = var.label_prefix == "none" ? "oke-kms" : "${var.label_prefix}-oke-kms"
34-
statements = [local.policy_statement]
34+
statements = [local.cluster_kms_policy_statement]
3535
count = var.use_encryption == true ? 1 : 0
3636
}
3737

modules/oke/locals.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ locals {
1515
dynamic_group_rule_all_clusters = "ALL {resource.type = 'cluster', resource.compartment.id = '${var.compartment_id}'}"
1616

1717
# policy to allow dynamic group of all clusters to use kms
18-
policy_statement = (var.use_encryption == true) ? "Allow dynamic-group ${oci_identity_dynamic_group.oke_kms_cluster[0].name} to use keys in compartment id ${var.compartment_id} where target.key.id = '${var.kms_key_id}'" : ""
18+
cluster_kms_policy_statement = (var.use_encryption == true) ? "Allow dynamic-group ${oci_identity_dynamic_group.oke_kms_cluster[0].name} to use keys in compartment id ${var.compartment_id} where target.key.id = '${var.cluster_kms_key_id}'" : ""
1919

2020
# policy to allow block volumes inside oke to use kms
2121
oke_volume_kms_policy_statements = (var.use_node_pool_volume_encryption == true) ? [

modules/oke/outputs.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ output "cluster_id" {
55
value = oci_containerengine_cluster.k8s_cluster.id
66
}
77

8-
output "kms_dynamic_group_id" {
8+
output "cluster_kms_dynamic_group_id" {
99
value = var.use_encryption == true ? oci_identity_dynamic_group.oke_kms_cluster[0].id : "null"
1010
}
1111

0 commit comments

Comments
 (0)