forked from jenkins-infra/azure
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcert.ci.jenkins.io.tf
73 lines (67 loc) · 2.84 KB
/
cert.ci.jenkins.io.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
/** Two resources groups: one for the controller, the second for the agents **/
resource "azurerm_resource_group" "cert_ci_jenkins_io_controller" {
name = "prodcertci"
location = "East US 2"
}
resource "azurerm_resource_group" "cert_ci_jenkins_io_agents" {
name = "certci-agents-2"
location = "East US 2"
}
/** Controller Resources **/
// TODO: import prodcertci public IP address
// TODO: import prod-certci network interface
// TODO: import certci-data disk
// TODO: import prodcertci system disk
// TODO: import prod-certci VM
/** Agent Resources **/
resource "azurerm_storage_account" "cert_ci_jenkins_io_agents" {
name = "certciagents2"
resource_group_name = azurerm_resource_group.cert_ci_jenkins_io_agents.name
location = azurerm_resource_group.cert_ci_jenkins_io_agents.location
account_tier = "Standard"
account_replication_type = "LRS"
min_tls_version = "TLS1_2" # default value, needed for tfsec
tags = local.default_tags
}
// TODO: import jenkinsarm-vnet virtual network
# Azure AD resources to allow controller to spawn agents in Azure
resource "azuread_application" "cert_ci_jenkins_io" {
display_name = "cert.ci.jenkins.io"
owners = [
data.azuread_service_principal.terraform_production.id,
]
tags = [for key, value in local.default_tags : "${key}:${value}"]
required_resource_access {
resource_app_id = "00000003-0000-0000-c000-000000000000" # Microsoft Graph
resource_access {
id = "e1fe6dd8-ba31-4d61-89e7-88639da4683d" # User.Read
type = "Scope"
}
}
web {
homepage_url = "https://github.com/jenkins-infra/azure"
}
}
resource "azuread_service_principal" "cert_ci_jenkins_io" {
application_id = azuread_application.cert_ci_jenkins_io.application_id
app_role_assignment_required = false
owners = [
data.azuread_service_principal.terraform_production.id,
]
}
resource "azuread_application_password" "cert_ci_jenkins_io" {
application_object_id = azuread_application.cert_ci_jenkins_io.object_id
display_name = "cert.ci.jenkins.io-tf-managed"
end_date = "2024-03-18T00:00:00Z"
}
# Allow Service Principal to manage AzureRM resources inside the agents resource groups
resource "azurerm_role_assignment" "cert_ci_jenkins_io_allow_azurerm" {
scope = "${data.azurerm_subscription.jenkins.id}/resourceGroups/${azurerm_resource_group.cert_ci_jenkins_io_agents.name}"
role_definition_name = "Contributor"
principal_id = azuread_service_principal.cert_ci_jenkins_io.id
}
resource "azurerm_role_assignment" "cert_ci_jenkins_io_allow_packer" {
scope = "${data.azurerm_subscription.jenkins.id}/resourceGroups/prod-packer-images"
role_definition_name = "Reader"
principal_id = azuread_service_principal.cert_ci_jenkins_io.id
}