# tls_client.tf defines the mTLS certs that'll be used by the E2E test # runner resource "tls_private_key" "api_client" { algorithm = "ECDSA" ecdsa_curve = "P384" } resource "tls_cert_request" "api_client" { key_algorithm = "ECDSA" private_key_pem = tls_private_key.api_client.private_key_pem subject { common_name = "${local.random_name} api client" } } resource "tls_locally_signed_cert" "api_client" { cert_request_pem = tls_cert_request.api_client.cert_request_pem ca_key_algorithm = tls_private_key.ca.algorithm ca_private_key_pem = tls_private_key.ca.private_key_pem ca_cert_pem = tls_self_signed_cert.ca.cert_pem validity_period_hours = 720 # Reasonable set of uses for a server SSL certificate. allowed_uses = [ "key_encipherment", "digital_signature", "client_auth", ] } resource "local_file" "api_client_key" { sensitive_content = tls_private_key.api_client.private_key_pem filename = "keys/tls_api_client.key" } resource "local_file" "api_client_cert" { sensitive_content = tls_locally_signed_cert.api_client.cert_pem filename = "keys/tls_api_client.crt" }