From 2557dc4c53c278b0eba6d0a396e273cec95ccb6f Mon Sep 17 00:00:00 2001
From: Nicolas Dandrimont <nicolas@dandrimont.eu>
Date: Fri, 11 Oct 2019 15:02:49 +0200
Subject: [PATCH] Port to terraform 0.12

---
 azure/terraform/init.tf     |  2 +-
 azure/terraform/vault.tf    | 37 +++++++++++++++++++------------------
 azure/terraform/versions.tf |  3 +++
 3 files changed, 23 insertions(+), 19 deletions(-)
 create mode 100644 azure/terraform/versions.tf

diff --git a/azure/terraform/init.tf b/azure/terraform/init.tf
index ec215b2..e43c978 100644
--- a/azure/terraform/init.tf
+++ b/azure/terraform/init.tf
@@ -6,7 +6,7 @@
 # Configure the Microsoft Azure Provider
 # Empty if using the `az login` tool
 provider "azurerm" {
-  version             = "~> 1.27"
+  version = "~> 1.27"
 }
 
 # Reuse the network security group as defined currently
diff --git a/azure/terraform/vault.tf b/azure/terraform/vault.tf
index 372452f..71a3656 100644
--- a/azure/terraform/vault.tf
+++ b/azure/terraform/vault.tf
@@ -5,20 +5,20 @@ resource "azurerm_resource_group" "euwest-vault" {
   name     = "euwest-vault"
   location = "westeurope"
 
-  tags {
-      environment = "SWH Vault"
+  tags = {
+    environment = "SWH Vault"
   }
 }
 
 resource "azurerm_network_interface" "vangogh-interface" {
-  name                = "vangogh-interface"
-  location            = "westeurope"
-  resource_group_name = "euwest-vault"
-  network_security_group_id = "${data.azurerm_network_security_group.worker-nsg.id}"
+  name                      = "vangogh-interface"
+  location                  = "westeurope"
+  resource_group_name       = "euwest-vault"
+  network_security_group_id = data.azurerm_network_security_group.worker-nsg.id
 
   ip_configuration {
     name                          = "vaultNicConfiguration"
-    subnet_id                     = "${data.azurerm_subnet.default.id}"
+    subnet_id                     = data.azurerm_subnet.default.id
     public_ip_address_id          = ""
     private_ip_address_allocation = "Dynamic"
   }
@@ -27,22 +27,22 @@ resource "azurerm_network_interface" "vangogh-interface" {
 # Blobstorage as defined in task
 resource "azurerm_storage_account" "vault-storage" {
   name                     = "swhvaultstorage"
-  resource_group_name      = "${azurerm_resource_group.euwest-vault.name}"
+  resource_group_name      = azurerm_resource_group.euwest-vault.name
   location                 = "westeurope"
   account_tier             = "Standard"
   account_replication_type = "LRS"
   account_kind             = "BlobStorage"
   access_tier              = "Cool"
-  tags {
-      environment = "SWH Vault"
+  tags = {
+    environment = "SWH Vault"
   }
 }
 
 # A container for the blob storage named 'contents' (as other blob storages)
 resource "azurerm_storage_container" "contents" {
   name                  = "contents"
-  resource_group_name   = "${azurerm_resource_group.euwest-vault.name}"
-  storage_account_name  = "${azurerm_storage_account.vault-storage.name}"
+  resource_group_name   = azurerm_resource_group.euwest-vault.name
+  storage_account_name  = azurerm_storage_account.vault-storage.name
   container_access_type = "private"
 }
 
@@ -50,7 +50,7 @@ resource "azurerm_virtual_machine" "vault-server" {
   name                  = "vangogh"
   location              = "westeurope"
   resource_group_name   = "euwest-vault"
-  network_interface_ids = ["${azurerm_network_interface.vangogh-interface.id}"]
+  network_interface_ids = [azurerm_network_interface.vangogh-interface.id]
   vm_size               = "Standard_B2ms"
 
   storage_os_disk {
@@ -70,18 +70,19 @@ resource "azurerm_virtual_machine" "vault-server" {
   # (Va)ngogh <-> (Va)ult
   os_profile {
     computer_name  = "vangogh"
-    admin_username = "${var.user_admin}"
+    admin_username = "ardumont"
   }
 
   os_profile_linux_config {
     disable_password_authentication = true
     ssh_keys {
-      path = "/home/${var.user_admin}/.ssh/authorized_keys"
-      key_data = "${var.ssh_key_data}"
+      path     = "/home/${var.user_admin}/.ssh/authorized_keys"
+      key_data = var.ssh_key_data
     }
   }
 
-  tags {
-      environment = "SWH Vault"
+  tags = {
+    environment = "SWH Vault"
   }
 }
+
diff --git a/azure/terraform/versions.tf b/azure/terraform/versions.tf
new file mode 100644
index 0000000..d9b6f79
--- /dev/null
+++ b/azure/terraform/versions.tf
@@ -0,0 +1,3 @@
+terraform {
+  required_version = ">= 0.12"
+}
-- 
GitLab