Skip to content

Commit

Permalink
Add basic auth user and password variables
Browse files Browse the repository at this point in the history
  • Loading branch information
jawabuu committed Sep 19, 2020
1 parent eb98929 commit ea262a3
Show file tree
Hide file tree
Showing 12 changed files with 72 additions and 0 deletions.
2 changes: 2 additions & 0 deletions deploy/digitalocean/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,8 @@ module "k3s" {
create_certs = var.create_certs
longhorn_replicas = var.longhorn_replicas
install_app = var.install_app
auth_user = var.auth_user
auth_password = var.auth_password
}

output "private_key" {
Expand Down
10 changes: 10 additions & 0 deletions deploy/digitalocean/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,16 @@ variable "additional_rules" {
description = "add custom firewall rules during provisioning e.g. allow 1194/udp, allow ftp"
}

variable "auth_user" {
default = "kloud-3s"
description = "Traefik basic auth username"
}

variable "auth_password" {
default = ""
description = "Traefik basic auth password"
}

/* digitalocean */
variable "digitalocean_token" {
default = ""
Expand Down
2 changes: 2 additions & 0 deletions deploy/hcloud/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,8 @@ module "k3s" {
create_certs = var.create_certs
longhorn_replicas = var.longhorn_replicas
install_app = var.install_app
auth_user = var.auth_user
auth_password = var.auth_password
}

output "private_key" {
Expand Down
10 changes: 10 additions & 0 deletions deploy/hcloud/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,16 @@ variable "additional_rules" {
description = "add custom firewall rules during provisioning e.g. allow 1194/udp, allow ftp"
}

variable "auth_user" {
default = "kloud-3s"
description = "Traefik basic auth username"
}

variable "auth_password" {
default = ""
description = "Traefik basic auth password"
}

/* hcloud */
variable "hcloud_token" {
default = ""
Expand Down
2 changes: 2 additions & 0 deletions deploy/linode/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -92,6 +92,8 @@ module "k3s" {
create_certs = var.create_certs
longhorn_replicas = var.longhorn_replicas
install_app = var.install_app
auth_user = var.auth_user
auth_password = var.auth_password
}

output "private_key" {
Expand Down
10 changes: 10 additions & 0 deletions deploy/linode/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,16 @@ variable "additional_rules" {
description = "add custom firewall rules during provisioning e.g. allow 1194/udp, allow ftp"
}

variable "auth_user" {
default = "kloud-3s"
description = "Traefik basic auth username"
}

variable "auth_password" {
default = ""
description = "Traefik basic auth password"
}

/* linode */
variable "linode_token" {
default = ""
Expand Down
2 changes: 2 additions & 0 deletions deploy/ovh/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,8 @@ module "k3s" {
create_certs = var.create_certs
longhorn_replicas = var.longhorn_replicas
install_app = var.install_app
auth_user = var.auth_user
auth_password = var.auth_password
}

output "private_key" {
Expand Down
10 changes: 10 additions & 0 deletions deploy/ovh/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,16 @@ variable "additional_rules" {
description = "add custom firewall rules during provisioning e.g. allow 1194/udp, allow ftp"
}

variable "auth_user" {
default = "kloud-3s"
description = "Traefik basic auth username"
}

variable "auth_password" {
default = ""
description = "Traefik basic auth password"
}

/* ovh */
variable "tenant_name" {
type = string
Expand Down
2 changes: 2 additions & 0 deletions deploy/scaleway/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -92,6 +92,8 @@ module "k3s" {
create_certs = var.create_certs
longhorn_replicas = var.longhorn_replicas
install_app = var.install_app
auth_user = var.auth_user
auth_password = var.auth_password
}

output "private_key" {
Expand Down
10 changes: 10 additions & 0 deletions deploy/scaleway/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -102,6 +102,16 @@ variable "additional_rules" {
description = "add custom firewall rules during provisioning e.g. allow 1194/udp, allow ftp"
}

variable "auth_user" {
default = "kloud-3s"
description = "Traefik basic auth username"
}

variable "auth_password" {
default = ""
description = "Traefik basic auth password"
}

/* scaleway */
variable "scaleway_organization_id" {
default = ""
Expand Down
2 changes: 2 additions & 0 deletions deploy/vultr/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,8 @@ module "k3s" {
create_certs = var.create_certs
longhorn_replicas = var.longhorn_replicas
install_app = var.install_app
auth_user = var.auth_user
auth_password = var.auth_password
}

output "private_key" {
Expand Down
10 changes: 10 additions & 0 deletions deploy/vultr/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,16 @@ variable "additional_rules" {
description = "add custom firewall rules during provisioning e.g. allow 1194/udp, allow ftp"
}

variable "auth_user" {
default = "kloud-3s"
description = "Traefik basic auth username"
}

variable "auth_password" {
default = ""
description = "Traefik basic auth password"
}

/* vultr */
variable "vultr_api_key" {
default = ""
Expand Down

0 comments on commit ea262a3

Please sign in to comment.