-
-
Save javierguzman/a51f131e526e7e91dfa0bbe4221c9f45 to your computer and use it in GitHub Desktop.
PKI Engine and Cert-Manager
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resource "kubernetes_namespace_v1" "issuer_namespace" { | |
metadata { | |
name = "${var.environment}-issuer" | |
} | |
} | |
resource "kubernetes_service_account_v1" "issuer_sa" { | |
metadata { | |
name = "${var.environment}-issuer-sa" | |
namespace = kubernetes_namespace_v1.issuer_namespace.metadata[0].name | |
} | |
} | |
resource "kubernetes_secret_v1" "issuer_sa_secret" { | |
metadata { | |
annotations = { | |
"kubernetes.io/service-account.name" = kubernetes_service_account_v1.issuer_sa.metadata.0.name | |
"kubernetes.io/service-account.namespace" = kubernetes_namespace_v1.issuer_namespace.metadata[0].name | |
} | |
name = "${var.environment}-issuer-sa-secret" | |
namespace = kubernetes_namespace_v1.issuer_namespace.metadata[0].name | |
} | |
type = "kubernetes.io/service-account-token" | |
wait_for_service_account_token = true | |
} | |
resource "kubernetes_role_v1" "issuer_role" { | |
metadata { | |
name = "${kubernetes_service_account_v1.issuer_sa.metadata[0].name}-sa-token-role" | |
namespace = kubernetes_namespace_v1.issuer_namespace.metadata[0].name | |
} | |
rule { | |
api_groups = [""] | |
resources = ["serviceaccounts/token"] | |
resource_names = [kubernetes_service_account_v1.issuer_sa.metadata[0].name] | |
verbs = ["create"] | |
} | |
} | |
resource "kubernetes_role_binding_v1" "issuer_sa_rb" { | |
metadata { | |
name = "${var.environment}-issuer-sa-rb-token-create-role" | |
namespace = kubernetes_namespace_v1.issuer_namespace.metadata[0].name | |
} | |
role_ref { | |
api_group = "rbac.authorization.k8s.io" | |
kind = "Role" | |
name = "${kubernetes_service_account_v1.issuer_sa.metadata[0].name}-sa-token-role" | |
} | |
subject { | |
kind = "ServiceAccount" | |
name = "${var.environment}-cert-manager" | |
namespace = "${var.environment}-cert-manager" | |
} | |
} | |
resource "kubernetes_cluster_role_binding_v1" "issuer_sa_auth_delegator" { | |
metadata { | |
name = "${var.environment}-issuer-sa-rb-auth-delegator" | |
} | |
role_ref { | |
api_group = "rbac.authorization.k8s.io" | |
kind = "ClusterRole" | |
name = "system:auth-delegator" | |
} | |
subject { | |
kind = "ServiceAccount" | |
name = kubernetes_service_account_v1.issuer_sa.metadata[0].name | |
namespace = kubernetes_namespace_v1.issuer_namespace.metadata[0].name | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resource "helm_release" "cert_manager" { | |
name = "${var.environment}-cert-manager" | |
namespace = "${var.environment}-cert-manager" | |
repository = "https://charts.jetstack.io" | |
chart = "cert-manager" | |
version = "v1.14.5" | |
create_namespace = true | |
set { | |
name = "installCRDs" | |
value = "true" | |
} | |
set { | |
name = "clusterResourceNamespace" | |
value = "${var.environment}-cert-manager" | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resource "kubectl_manifest" "issuer" { | |
yaml_body = <<YAML | |
apiVersion: cert-manager.io/v1 | |
kind: Issuer | |
metadata: | |
name: ${var.environment}-issuer | |
namespace: ${kubernetes_namespace_v1.issuer_namespace.metadata[0].name} | |
spec: | |
vault: | |
server: ${var.vault_address} | |
path: "${vault_mount.pki_engine.path}/sign/${local.raw_domain}" | |
auth: | |
kubernetes: | |
mountPath: /v1/auth/kubernetes-pki | |
role: ${vault_kubernetes_auth_backend_role.sa_issuer_role.role_name} | |
serviceAccountRef: | |
name: "${var.environment}-issuer-sa" | |
YAML | |
depends_on = [helm_release.cert_manager, vault_pki_secret_backend_root_cert.root_cert] | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resource "vault_mount" "pki_engine" { | |
description = "Enable PKI Engine" | |
path = "pki" | |
type = "pki" | |
default_lease_ttl_seconds = 3600 # 1 hour | |
max_lease_ttl_seconds = 86400 # 1 day | |
} | |
resource "vault_auth_backend" "kubernetes" { | |
type = "kubernetes" | |
path = "kubernetes-pki" | |
} | |
resource "vault_kubernetes_auth_backend_config" "connect_sa_with_vault" { | |
backend = vault_auth_backend.kubernetes.path | |
kubernetes_host = data.aws_eks_cluster.eks_cluster.endpoint | |
token_reviewer_jwt = kubernetes_secret_v1.issuer_sa_secret.data["token"] | |
kubernetes_ca_cert = kubernetes_secret_v1.issuer_sa_secret.data["ca.crt"] | |
disable_iss_validation = "true" | |
} | |
resource "vault_pki_secret_backend_root_cert" "root_cert" { | |
depends_on = [vault_mount.pki_engine] | |
backend = vault_mount.pki_engine.path | |
type = "internal" | |
common_name = local.domain | |
ttl = "8760h" | |
format = "pem" | |
private_key_format = "der" | |
key_type = "rsa" | |
key_bits = 4096 | |
exclude_cn_from_sans = true | |
organization = local.organization | |
} | |
resource "vault_pki_secret_backend_config_urls" "pki_urls" { | |
backend = vault_mount.pki_engine.path | |
issuing_certificates = ["${var.vault_address}/v1/${vault_mount.pki_engine.path}/ca"] | |
crl_distribution_points = ["${var.vault_address}/v1/${vault_mount.pki_engine.path}/crl"] | |
} | |
resource "vault_pki_secret_backend_role" "pki_role" { | |
backend = vault_mount.pki_engine.path | |
name = local.raw_domain | |
ttl = 3600 | |
max_ttl = 259200 #72h | |
allow_ip_sans = true | |
key_type = "rsa" | |
key_bits = 4096 | |
allowed_domains = [local.domain] | |
allow_subdomains = true | |
allow_localhost = false | |
} | |
resource "vault_policy" "pki_policy" { | |
name = "pki-policy" | |
policy = <<EOT | |
path "${vault_mount.pki_engine.path}*" { capabilities = ["read", "list"] } | |
path "${vault_mount.pki_engine.path}/sign/${local.raw_domain}" { capabilities = ["create", "update"] } | |
path "${vault_mount.pki_engine.path}/roles/${local.raw_domain}" { capabilities = ["create", "update"] } | |
path "${vault_mount.pki_engine.path}/issue/${local.raw_domain}" { capabilities = ["create"] } | |
EOT | |
} | |
resource "vault_kubernetes_auth_backend_role" "sa_issuer_role" { | |
backend = vault_auth_backend.kubernetes.path | |
role_name = "${kubernetes_service_account_v1.issuer_sa.metadata[0].name}-role" | |
bound_service_account_names = [kubernetes_service_account_v1.issuer_sa.metadata[0].name] | |
bound_service_account_namespaces = [kubernetes_namespace_v1.issuer_namespace.metadata[0].name] | |
#audience = "vault://${kubernetes_namespace_v1.issuer_namespace.metadata[0].name}/${var.environment}-issuer" | |
token_ttl = 3600 # seconds | |
token_policies = [vault_policy.pki_policy.name, "default"] | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment