我正在配置一个Windows服务器,以便在AWS中使用terraform进行测试。每次我需要使用PEM文件解密Windows密码来进行连接时。相反,我选择了terraform参数get_password_data
并将我的password_data
存储在tfstate文件中。现在如何使用插值语法rsadecrypt
请在下面找到我的Terraform代码
### Resource for EC2 instance creation ###
resource "aws_instance" "ec2" {
ami = "${var.ami}"
instance_type = "${var.instance_type}"
key_name = "${var.key_name}"
subnet_id = "${var.subnet_id}"
security_groups = ["${var.security_groups}"]
availability_zone = "${var.availability_zone}"
private_ip = "x.x.x.x"
get_password_data = "true"
connection {
password = "${rsadecrypt(self.password_data)}"
}
root_block_device {
volume_type = "${var.volume_type}"
volume_size = "${var.volume_size}"
delete_on_termination = "true"
}
tags {
"Cost Center" = "R1"
"Name" = "AD-test"
"Purpose" = "Task"
"Server Name" = "Active Directory"
"SME Name" = "Ravi"
}
}
output "instance_id" {
value = "${aws_instance.ec2.id}"
}
### Resource for EBS volume creation ###
resource "aws_ebs_volume" "additional_vol" {
availability_zone = "${var.availability_zone}"
size = "${var.size}"
type = "${var.type}"
}
### Output of Volume ID ###
output "vol_id" {
value = "${aws_ebs_volume.additional_vol.id}"
}
### Resource for Volume attachment ###
resource "aws_volume_attachment" "attach_vol" {
device_name = "${var.device_name}"
volume_id = "${aws_ebs_volume.additional_vol.id}"
instance_id = "${aws_instance.ec2.id}"
skip_destroy = "true"
}
答案 0 :(得分:5)
使用启动实例时指定的key_pair对密码进行加密,由于password_data
仍然只是base64编码的已加密密码数据,因此您仍需要使用它来解密。
您应该使用${rsadecrypt(self.password_data,file("/path/to/private_key.pem"))}
这是有充分理由的。您真的不希望只是base64编码的密码在状态中浮动。
短版: 您缺少插值函数中的第二个参数。
答案 1 :(得分:0)
我知道这与实际问题无关,但是如果您不想在公共环境(例如Git)中公开私钥,这可能会很有用
我宁愿打印加密的密码
resource "aws_instance" "ec2" {
ami = .....
instance_type = .....
security_groups = [.....]
subnet_id = .....
iam_instance_profile = .....
key_name = .....
get_password_data = "true"
tags = {
Name = .....
}
}
赞
output "Administrator_Password" {
value = [
aws_instance.ec2.password_data
]
}
然后
获取base64密码并将其放在名为pwdbase64.txt的文件中
运行此命令将base64解码为bin文件
certutil -decode pwdbase64.txt password.bin
运行此命令以解密密码。bin
openssl rsautl -decrypt -inkey privatekey.openssh -in password.bin
如果您不知道如何使用openssl。请检查this帖子
privatekey.openssh应该看起来像:
-----BEGIN RSA PRIVATE KEY-----
MIICXAIBAAKBgQCd+qQbLiSVuNludd67EtepR3g1+VzV6gjsZ+Q+RtuLf88cYQA3
6M4rjVAy......1svfaU/powWKk7WWeE58dnnTZoLvHQ
ZUvFlHE/LUHCQkx8sSECQGatJGiS5fgZhvpzLn4amNwKkozZ3tc02fMzu8IgdEit
jrk5Zq8Vg71vH1Z5OU0kjgrR4ZCjG9ngGdaFV7K7ki0=
-----END RSA PRIVATE KEY-----
公钥应类似于:
ssh-rsa AAAAB3NzaC1yc2EAAAADAQAB......iFZmwQ==
地形密钥对代码应类似于
resource "aws_key_pair" "key_pair_ec2" {
key_name = "key_pair_ec2"
public_key = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQAB......iFZmwQ=="
}
Pd:您可以使用puttygen生成密钥