-
Notifications
You must be signed in to change notification settings - Fork 976
/
Copy pathmain.tf
129 lines (121 loc) · 4.83 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
/**
* Copyright 2024 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
locals {
pool_id = try(
var.ca_pool_config.use_pool.id,
google_privateca_ca_pool.default[0].id
)
pool_name = reverse(split("/", local.pool_id))[0]
}
moved {
from = google_privateca_ca_pool.ca_pool
to = google_privateca_ca_pool.default
}
resource "google_privateca_ca_pool" "default" {
# setting existing pool id overrides creation
count = try(var.ca_pool_config.use_pool.id, null) != null ? 0 : 1
name = var.ca_pool_config.create_pool.name
project = var.project_id
location = var.location
tier = var.ca_pool_config.create_pool.tier
}
moved {
from = google_privateca_certificate_authority.cas
to = google_privateca_certificate_authority.default
}
resource "google_privateca_certificate_authority" "default" {
for_each = var.ca_configs
pool = local.pool_name
certificate_authority_id = each.key
project = var.project_id
location = var.location
type = each.value.type
deletion_protection = each.value.deletion_protection
lifetime = each.value.lifetime
pem_ca_certificate = each.value.pem_ca_certificate
ignore_active_certificates_on_deletion = each.value.ignore_active_certificates_on_deletion
skip_grace_period = each.value.skip_grace_period
gcs_bucket = each.value.gcs_bucket
labels = each.value.labels
config {
subject_config {
subject {
common_name = each.value.subject.common_name
country_code = each.value.subject.country_code
organizational_unit = each.value.subject.organizational_unit
locality = each.value.subject.locality
organization = each.value.subject.organization
province = each.value.subject.province
street_address = each.value.subject.street_address
postal_code = each.value.subject.postal_code
}
dynamic "subject_alt_name" {
for_each = each.value.subject_alt_name != null ? [1] : []
content {
dns_names = each.value.subject_alt_name.dns_names
email_addresses = each.value.subject_alt_name.email_addresses
ip_addresses = each.value.subject_alt_name.ip_addresses
uris = each.value.subject_alt_name.uris
}
}
}
x509_config {
ca_options {
is_ca = each.value.is_ca
}
key_usage {
base_key_usage {
cert_sign = each.value.key_usage.cert_sign
content_commitment = each.value.key_usage.content_commitment
crl_sign = each.value.key_usage.crl_sign
data_encipherment = each.value.key_usage.data_encipherment
decipher_only = each.value.key_usage.decipher_only
digital_signature = each.value.key_usage.digital_signature
encipher_only = each.value.key_usage.encipher_only
key_agreement = each.value.key_usage.key_agreement
key_encipherment = each.value.key_usage.key_encipherment
}
extended_key_usage {
client_auth = each.value.key_usage.client_auth
code_signing = each.value.key_usage.code_signing
email_protection = each.value.key_usage.email_protection
ocsp_signing = each.value.key_usage.ocsp_signing
server_auth = each.value.key_usage.server_auth
time_stamping = each.value.key_usage.time_stamping
}
}
}
}
key_spec {
algorithm = each.value.key_spec.algorithm
cloud_kms_key_version = each.value.key_spec.kms_key_id
}
dynamic "subordinate_config" {
for_each = each.value.subordinate_config != null ? [1] : []
content {
certificate_authority = each.value.subordinate_config.root_ca_id
dynamic "pem_issuer_chain" {
for_each = (
each.value.subordinate_config.pem_issuer_certificates != null
? [1] : []
)
content {
pem_certificates = each.value.subordinate_config.pem_issuer_certificates
}
}
}
}
}