Skip to content

Commit 23a6c53

Browse files
committed
fix: formatting. default value for grace eviction default and in example
Signed-off-by: Ali Mukadam <[email protected]>
1 parent 27c618b commit 23a6c53

File tree

8 files changed

+32
-33
lines changed

8 files changed

+32
-33
lines changed

locals.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl
33

44
locals {
5-
tenancy_id = coalesce(var.tenancy_id, var.tenancy_ocid)
5+
tenancy_id = coalesce(var.tenancy_id, var.tenancy_ocid)
66
compartment_id = coalesce(
77
var.compartment_id, var.compartment_ocid,
88
var.tenancy_id, var.tenancy_ocid,
@@ -13,17 +13,17 @@ locals {
1313
var.api_private_key != ""
1414
? try(base64decode(var.api_private_key), var.api_private_key)
1515
: var.api_private_key_path != ""
16-
? file(var.api_private_key_path)
17-
: null)
16+
? file(var.api_private_key_path)
17+
: null)
1818

19-
bastion_public_ip = var.create_bastion_host == true ? module.bastion[0].bastion_public_ip : var.bastion_public_ip != "" ? var.bastion_public_ip: ""
20-
operator_private_ip = var.create_operator == true ? module.operator[0].operator_private_ip : var.operator_private_ip !="" ? var.operator_private_ip: ""
19+
bastion_public_ip = var.create_bastion_host == true ? module.bastion[0].bastion_public_ip : var.bastion_public_ip != "" ? var.bastion_public_ip : ""
20+
operator_private_ip = var.create_operator == true ? module.operator[0].operator_private_ip : var.operator_private_ip != "" ? var.operator_private_ip : ""
2121
operator_instance_principal_group_name = var.create_operator == true ? module.operator[0].operator_instance_principal_group_name : ""
2222

2323
vcn_id = var.create_vcn == true ? module.vcn[0].vcn_id : coalesce(var.vcn_id, try(data.oci_core_vcns.vcns[0].virtual_networks[0].id, ""))
2424
ig_route_id = var.create_vcn == true ? module.vcn[0].ig_route_id : coalesce(var.ig_route_table_id, try(data.oci_core_route_tables.ig[0].route_tables[0].id, ""))
2525
nat_route_id = var.create_vcn == true ? module.vcn[0].nat_route_id : coalesce(var.nat_route_table_id, try(data.oci_core_route_tables.nat[0].route_tables[0].id, ""))
2626

27-
ssh_key_arg = var.ssh_private_key_path == "none" ? "" : " -i ${var.ssh_private_key_path}"
27+
ssh_key_arg = var.ssh_private_key_path == "none" ? "" : " -i ${var.ssh_private_key_path}"
2828
validate_drg_input = var.create_drg && (var.drg_id != null) ? tobool("[ERROR]: create_drg variable can not be true if drg_id is provided.]") : true
2929
}

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ module "extensions" {
403403
vpa_version = var.vpa_version
404404

405405
#Gatekeeper
406-
enable_gatekeeper = var.enable_gatekeeper
406+
enable_gatekeeper = var.enable_gatekeeper
407407
gatekeeper_version = var.gatekeeper_version
408408

409409
# service account

modules/oke/cluster.tf

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ resource "oci_containerengine_cluster" "k8s_cluster" {
1313
kubernetes_version = var.cluster_kubernetes_version
1414
kms_key_id = var.use_cluster_encryption == true ? var.cluster_kms_key_id : null
1515
name = var.label_prefix == "none" ? var.cluster_name : "${var.label_prefix}-${var.cluster_name}"
16-
16+
1717
depends_on = [time_sleep.wait_30_seconds]
1818

1919
cluster_pod_network_options {
@@ -43,17 +43,18 @@ resource "oci_containerengine_cluster" "k8s_cluster" {
4343
}
4444
}
4545

46-
freeform_tags = lookup(var.freeform_tags,"cluster",{})
47-
defined_tags = lookup(var.defined_tags,"cluster",{})
46+
freeform_tags = lookup(var.freeform_tags, "cluster", {})
47+
defined_tags = lookup(var.defined_tags, "cluster", {})
4848

4949
options {
5050
add_ons {
5151
is_kubernetes_dashboard_enabled = var.cluster_options_add_ons_is_kubernetes_dashboard_enabled
5252
is_tiller_enabled = false
5353
}
5454

55+
//TODO: remove this option when the relevant Kubernetes version (v1.25) is no longer supported by OKE
5556
admission_controller_options {
56-
is_pod_security_policy_enabled = lookup(var.admission_controller_options,"PodSecurityPolicy",false)
57+
is_pod_security_policy_enabled = lookup(var.admission_controller_options, "PodSecurityPolicy", false)
5758
}
5859

5960
kubernetes_network_config {
@@ -62,13 +63,13 @@ resource "oci_containerengine_cluster" "k8s_cluster" {
6263
}
6364

6465
persistent_volume_config {
65-
freeform_tags = lookup(var.freeform_tags,"persistent_volume",{})
66-
defined_tags = lookup(var.defined_tags,"persistent_volume",{})
66+
freeform_tags = lookup(var.freeform_tags, "persistent_volume", {})
67+
defined_tags = lookup(var.defined_tags, "persistent_volume", {})
6768
}
6869

6970
service_lb_config {
70-
freeform_tags = lookup(var.freeform_tags,"service_lb",{})
71-
defined_tags = lookup(var.defined_tags,"service_lb",{})
71+
freeform_tags = lookup(var.freeform_tags, "service_lb", {})
72+
defined_tags = lookup(var.defined_tags, "service_lb", {})
7273
}
7374

7475
service_lb_subnet_ids = [var.cluster_subnets[local.lb_subnet]]

modules/oke/iam.tf

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,9 @@ resource "oci_identity_policy" "oke_kms" {
3333
description = "policy to allow dynamic group ${var.label_prefix}-oke-kms-cluster to use KMS to encrypt etcd"
3434
depends_on = [oci_identity_dynamic_group.oke_kms_cluster]
3535
name = var.label_prefix == "none" ? "oke-kms" : "${var.label_prefix}-oke-kms"
36+
statements = [local.cluster_kms_policy_statement]
3637

37-
38-
statements = [local.cluster_kms_policy_statement]
39-
40-
count = var.use_cluster_encryption == true && var.create_policies == true ? 1 : 0
38+
count = var.use_cluster_encryption == true && var.create_policies == true ? 1 : 0
4139

4240
}
4341

@@ -48,6 +46,6 @@ resource "oci_identity_policy" "oke_volume_kms" {
4846
name = var.label_prefix == "none" ? "oke-volume-kms" : "${var.label_prefix}-oke-volume-kms"
4947
statements = local.oke_volume_kms_policy_statements
5048

51-
count = var.use_node_pool_volume_encryption == true && var.create_policies == true ? 1 : 0
49+
count = var.use_node_pool_volume_encryption == true && var.create_policies == true ? 1 : 0
5250

5351
}

modules/oke/locals.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,11 @@ locals {
3636
# build a list of nodepools to autoscale in the format expected by cluster autoscaler:
3737
# - --nodes:min:max:nodepool_id
3838
autoscaling_nodepools = [
39-
for nodepool_name, nodepool_parameters in var.node_pools : {
40-
"name" = "${nodepool_name}",
41-
"node_pool_size" = "${nodepool_parameters.node_pool_size}",
42-
"max_node_pool_size" = "${lookup(nodepool_parameters,"max_node_pool_size",lookup(nodepool_parameters,"node_pool_size"))}",
43-
"id" = "${lookup(lookup(oci_containerengine_node_pool.nodepools, nodepool_name), "id")}"
39+
for nodepool_name, nodepool_parameters in var.node_pools : {
40+
"name" = "${nodepool_name}",
41+
"node_pool_size" = "${nodepool_parameters.node_pool_size}",
42+
"max_node_pool_size" = "${lookup(nodepool_parameters, "max_node_pool_size", lookup(nodepool_parameters, "node_pool_size"))}",
43+
"id" = "${lookup(lookup(oci_containerengine_node_pool.nodepools, nodepool_name), "id")}"
4444
} if !tobool(lookup(nodepool_parameters, "autoscale", false))
4545
]
4646
}

modules/oke/nodepools.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,8 @@ resource "oci_containerengine_node_pool" "nodepools" {
6666

6767
node_eviction_node_pool_settings {
6868
#Optional
69-
eviction_grace_duration = format("PT%sM",lookup(each.value, "eviction_grace_duration", 0))
70-
is_force_delete_after_grace_duration = lookup(each.value, "force_node_delete", true)
69+
eviction_grace_duration = format("PT%sM", lookup(each.value, "eviction_grace_duration", 0))
70+
is_force_delete_after_grace_duration = tobool(lookup(each.value, "force_node_delete", true))
7171
}
7272

7373
# setting shape

terraform.tfvars.example

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ node_pools = {
198198
# memory = 32,
199199
# node_pool_size = 1,
200200
# boot_volume_size = 150,
201-
# eviction_grace_duration = 2,
201+
# eviction_grace_duration = 0, //Grade duration in minutes. Service default is 60.
202202
# force_node_delete = true
203203
#}
204204
# # node pool with initial node labels

variables.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ variable "drg_display_name" {
174174
default = "drg"
175175
}
176176

177-
variable "drg_id" {
177+
variable "drg_id" {
178178
description = "ID of an external created Dynamic Routing Gateway to be attached to the VCN"
179179
type = string
180180
default = null
@@ -694,7 +694,7 @@ variable "kubeproxy_mode" {
694694
}
695695
}
696696
variable "node_pools" {
697-
default = {}
697+
default = {}
698698
description = "Tuple of node pools. Each key maps to a node pool. Each value is a tuple of shape (string),ocpus(number) , node_pool_size(number) and boot_volume_size(number)"
699699
type = any
700700
}
@@ -936,7 +936,7 @@ variable "calico_mode" {
936936
validation {
937937
condition = contains(["policy-only", "canal", "vxlan", "ipip", "flannel-migration"], var.calico_mode)
938938
error_message = "Accepted values are policy-only, canal, vxlan, ipip, or flannel-migration."
939-
}
939+
}
940940
}
941941

942942
variable "calico_mtu" {
@@ -965,8 +965,8 @@ variable "typha_enabled" {
965965

966966
variable "typha_replicas" {
967967
description = "The number of replicas for the Typha deployment (0 = auto)"
968-
default = 0
969-
type = number
968+
default = 0
969+
type = number
970970
}
971971

972972
variable "calico_staging_dir" {

0 commit comments

Comments
 (0)