Skip to content

Commit 95e671a

Browse files
committed
refactor pwd pol special char option
1 parent 03a60d5 commit 95e671a

File tree

3 files changed

+18
-6
lines changed

3 files changed

+18
-6
lines changed

gitlab_templates/switch-iac/workbench-config-15.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,7 @@
6767
"ttksims_enabled": "true",
6868
"quoting_service_simple_routing_mode_enabled": "false",
6969
"vault_config_operator_helm_chart_version": "0.8.13",
70+
"password_policy_use_special_chars": "true",
7071
"internal_pm4ml_configs": [
7172
{
7273
"DFSP_NAME": "pm4mlreceiverfsp",

terraform/k8s-apps-setup/state-setup/stateful-resources-config.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,10 @@ resource "helm_release" "vault_cr_pwdpolicy" {
88
auth_path = "kubernetes_op"
99
auth_role = "policy-admin"
1010
resource_type = each.value.resource_type
11+
resource_name = each.value.resource_name
1112
namespace = kubernetes_namespace.stateful_namespace[each.value.resource_namespace].metadata[0].name
12-
secret_password_policy = templatefile("${path.module}/templates/password-policy.hcl.tpl", { password_length = 20, use_special_chars = false, special_char_list = "!@#$%^&*"})
13+
secret_password_policy = templatefile("${path.module}/templates/password-policy.hcl.tpl", { password_length = 20, use_special_chars = var.password_policy_use_special_chars, special_char_list = var.password_policy_special_chars})
1314
vault_base_path = each.value.generate_secret_vault_base_path
14-
resource_name = each.value.resource_name
1515
secret_name = each.value.generate_secret_name
1616
secret_keys_map = { for key in each.value.generate_secret_keys : key => "'{{ .dynamicsecret_${replace(key, "-", "_")}.password }}'" }
1717
secret_namespaces = "[${join(",", local.total_secret_namespaces[each.key])}]"
@@ -29,10 +29,10 @@ resource "helm_release" "vault_cr_randomsecret" {
2929
auth_path = "kubernetes_op"
3030
auth_role = "policy-admin"
3131
resource_type = each.value.resource_type
32+
resource_name = each.value.resource_name
3233
namespace = kubernetes_namespace.stateful_namespace[each.value.resource_namespace].metadata[0].name
33-
secret_password_policy = templatefile("${path.module}/templates/password-policy.hcl.tpl", { password_length = 20, use_special_chars = false, special_char_list = "!@#$%^&*"})
34+
secret_password_policy = templatefile("${path.module}/templates/password-policy.hcl.tpl", { password_length = 20, use_special_chars = var.password_policy_use_special_chars, special_char_list = var.password_policy_special_chars})
3435
vault_base_path = each.value.generate_secret_vault_base_path
35-
resource_name = each.value.resource_name
3636
secret_name = each.value.generate_secret_name
3737
secret_keys_map = { for key in each.value.generate_secret_keys : key => "'{{ .dynamicsecret_${replace(key, "-", "_")}.password }}'" }
3838
secret_namespaces = "[${join(",", local.total_secret_namespaces[each.key])}]"
@@ -53,10 +53,10 @@ resource "helm_release" "vault_cr_vaultsecret" {
5353
auth_path = "kubernetes_op"
5454
auth_role = "policy-admin"
5555
resource_type = each.value.resource_type
56+
resource_name = each.value.resource_name
5657
namespace = kubernetes_namespace.stateful_namespace[each.value.resource_namespace].metadata[0].name
57-
secret_password_policy = templatefile("${path.module}/templates/password-policy.hcl.tpl", { password_length = 20, use_special_chars = false, special_char_list = "!@#$%^&*"})
58+
secret_password_policy = templatefile("${path.module}/templates/password-policy.hcl.tpl", { password_length = 20, use_special_chars = var.password_policy_use_special_chars, special_char_list = var.password_policy_special_chars})
5859
vault_base_path = each.value.generate_secret_vault_base_path
59-
resource_name = each.value.resource_name
6060
secret_name = each.value.generate_secret_name
6161
secret_keys_map = { for key in each.value.generate_secret_keys : key => "'{{ .dynamicsecret_${replace(key, "-", "_")}.password }}'" }
6262
secret_namespaces = "[${join(",", local.total_secret_namespaces[each.key])}]"

terraform/k8s-apps-setup/state-setup/variables.tf

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,17 @@ variable "storage_class_name" {
1616
default = "longhorn"
1717
}
1818

19+
variable "password_policy_special_chars" {
20+
description = "special chars for password policies"
21+
type = string
22+
default = "!@#$%^&*"
23+
}
24+
25+
variable "password_policy_use_special_chars" {
26+
description = "use special chars for password policies?"
27+
type = bool
28+
default = true
29+
}
1930

2031
variable "stateful_resources" {
2132
description = "stateful resource config data"

0 commit comments

Comments
 (0)