# Secure copy etcd TLS assets and kubeconfig to all nodes. Activates kubelet.service resource "null_resource" "copy-secrets" { count = "${length(var.controller_names) + length(var.worker_names)}" connection { type = "ssh" host = "${element(concat(var.controller_domains, var.worker_domains), count.index)}" user = "core" timeout = "60m" } provisioner "file" { content = "${module.bootkube.kubeconfig}" destination = "$HOME/kubeconfig" } provisioner "file" { content = "${module.bootkube.etcd_ca_cert}" destination = "$HOME/etcd-client-ca.crt" } provisioner "file" { content = "${module.bootkube.etcd_client_cert}" destination = "$HOME/etcd-client.crt" } provisioner "file" { content = "${module.bootkube.etcd_client_key}" destination = "$HOME/etcd-client.key" } provisioner "file" { content = "${module.bootkube.etcd_server_cert}" destination = "$HOME/etcd-server.crt" } provisioner "file" { content = "${module.bootkube.etcd_server_key}" destination = "$HOME/etcd-server.key" } provisioner "file" { content = "${module.bootkube.etcd_peer_cert}" destination = "$HOME/etcd-peer.crt" } provisioner "file" { content = "${module.bootkube.etcd_peer_key}" destination = "$HOME/etcd-peer.key" } provisioner "remote-exec" { inline = [ "sudo mkdir -p /etc/ssl/etcd/etcd", "sudo mv etcd-client* /etc/ssl/etcd/", "sudo cp /etc/ssl/etcd/etcd-client-ca.crt /etc/ssl/etcd/etcd/server-ca.crt", "sudo mv etcd-server.crt /etc/ssl/etcd/etcd/server.crt", "sudo mv etcd-server.key /etc/ssl/etcd/etcd/server.key", "sudo cp /etc/ssl/etcd/etcd-client-ca.crt /etc/ssl/etcd/etcd/peer-ca.crt", "sudo mv etcd-peer.crt /etc/ssl/etcd/etcd/peer.crt", "sudo mv etcd-peer.key /etc/ssl/etcd/etcd/peer.key", "sudo chown -R etcd:etcd /etc/ssl/etcd", "sudo chmod -R 500 /etc/ssl/etcd", "sudo mv /home/core/kubeconfig /etc/kubernetes/kubeconfig", ] } } # Secure copy bootkube assets to ONE controller and start bootkube to perform # one-time self-hosted cluster bootstrapping. resource "null_resource" "bootkube-start" { # Without depends_on, this remote-exec may start before the kubeconfig copy. # Terraform only does one task at a time, so it would try to bootstrap # Kubernetes and Tectonic while no Kubelets are running. Ensure all nodes # receive a kubeconfig before proceeding with bootkube. depends_on = ["null_resource.copy-secrets"] connection { type = "ssh" host = "${element(var.controller_domains, 0)}" user = "core" timeout = "60m" } provisioner "file" { source = "${var.asset_dir}" destination = "$HOME/assets" } provisioner "remote-exec" { inline = [ "sudo mv /home/core/assets /opt/bootkube", "sudo systemctl start bootkube", ] } }