kite 0.0.7 → 0.0.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +61 -0
- data/lib/kite.rb +1 -0
- data/lib/kite/core.rb +7 -11
- data/lib/kite/helpers.rb +28 -0
- data/lib/kite/render.rb +11 -3
- data/lib/kite/version.rb +1 -1
- data/tpl/aws/bosh-install.sh.erb +2 -0
- data/tpl/aws/concourse-deploy.sh.erb +1 -1
- data/tpl/aws/deployments/{concourse/cloud-config.yml.erb → bosh/cloud-config.yml.tt} +2 -2
- data/tpl/gcp/README.md +6 -2
- data/tpl/gcp/bosh-install.sh.erb +5 -0
- data/tpl/gcp/concourse-deploy.sh.erb +14 -0
- data/tpl/gcp/deployments/{concourse/cloud-config.yml.erb → bosh/cloud-config.yml.tt} +1 -1
- data/tpl/gcp/deployments/vault/vault.yml +37 -0
- data/tpl/gcp/terraform/gcs.tf.tt +18 -0
- data/tpl/gcp/terraform/network.tf +1 -1
- data/tpl/gcp/terraform/{terraform.tfvars.erb → terraform.tfvars.tt} +1 -0
- data/tpl/gcp/terraform/variables.tf +5 -0
- data/tpl/gcp/vault-deploy.sh.erb +13 -0
- data/tpl/gcp/vault.md +26 -0
- data/tpl/skel/config/cloud.yml +1 -0
- metadata +11 -6
- data/tpl/gcp/deployments/bosh/cloud-config.yml +0 -51
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d029f893bc9f787beff2681b15c0b6ab31371b70
|
4
|
+
data.tar.gz: 406a1dc3d0a397bba6e2dae0983d464a9ce7b791
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4247ff2253a5ff7d392b820cd3cd8c329f8a23159017ca4359072102e2bf57bb2fee91b28401371eb4c658f7cbc390faede99486323b2485b7944f456b54ccd3
|
7
|
+
data.tar.gz: 1e4593d77af49accd33e8e6341d250e919034da2358610f9c0ddc08bd3b136cbb2180333776aa35d24c797a55131046d18c34dc84f923a6ce8e37782ebe475b8
|
data/CHANGELOG.md
ADDED
@@ -0,0 +1,61 @@
|
|
1
|
+
# Change Log
|
2
|
+
|
3
|
+
## [Unreleased](https://github.com/helios-technologies/kite/tree/HEAD)
|
4
|
+
|
5
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...HEAD)
|
6
|
+
|
7
|
+
**Closed issues:**
|
8
|
+
|
9
|
+
- GCP Reserved ip problem [\#27](https://github.com/helios-technologies/kite/issues/27)
|
10
|
+
|
11
|
+
**Merged pull requests:**
|
12
|
+
|
13
|
+
- Added GCS backend for remote .tfstate storage [\#30](https://github.com/helios-technologies/kite/pull/30) ([vshatravenko](https://github.com/vshatravenko))
|
14
|
+
- Fixed reserved ip problem for GCP [\#29](https://github.com/helios-technologies/kite/pull/29) ([vshatravenko](https://github.com/vshatravenko))
|
15
|
+
- Fixed reserved ip range rendering for AWS [\#26](https://github.com/helios-technologies/kite/pull/26) ([vshatravenko](https://github.com/vshatravenko))
|
16
|
+
- Added subnet\_name render in terraform.tfvars [\#25](https://github.com/helios-technologies/kite/pull/25) ([vshatravenko](https://github.com/vshatravenko))
|
17
|
+
- Added Vault manifest [\#24](https://github.com/helios-technologies/kite/pull/24) ([vshatravenko](https://github.com/vshatravenko))
|
18
|
+
- Fix in shell skript template for concourse deployment [\#22](https://github.com/helios-technologies/kite/pull/22) ([n-trace](https://github.com/n-trace))
|
19
|
+
|
20
|
+
## [v0.0.7](https://github.com/helios-technologies/kite/tree/v0.0.7) (2017-09-15)
|
21
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.6...v0.0.7)
|
22
|
+
|
23
|
+
**Merged pull requests:**
|
24
|
+
|
25
|
+
- Updated Concourse manifest for AWS [\#21](https://github.com/helios-technologies/kite/pull/21) ([vshatravenko](https://github.com/vshatravenko))
|
26
|
+
- Fix setup-tunnel.sh on GCP platform [\#20](https://github.com/helios-technologies/kite/pull/20) ([calj](https://github.com/calj))
|
27
|
+
- Added Dockerfile for kitebox [\#19](https://github.com/helios-technologies/kite/pull/19) ([vshatravenko](https://github.com/vshatravenko))
|
28
|
+
- NAT Gateway for AWS [\#18](https://github.com/helios-technologies/kite/pull/18) ([mod](https://github.com/mod))
|
29
|
+
- Updated docs for RDoc [\#17](https://github.com/helios-technologies/kite/pull/17) ([vshatravenko](https://github.com/vshatravenko))
|
30
|
+
- Moved kite render to subcommand [\#16](https://github.com/helios-technologies/kite/pull/16) ([vshatravenko](https://github.com/vshatravenko))
|
31
|
+
- Bugfixes for v0.0.6 [\#14](https://github.com/helios-technologies/kite/pull/14) ([vshatravenko](https://github.com/vshatravenko))
|
32
|
+
- Add cloud config, concourse [\#12](https://github.com/helios-technologies/kite/pull/12) ([nmuzychuk](https://github.com/nmuzychuk))
|
33
|
+
|
34
|
+
## [v0.0.6](https://github.com/helios-technologies/kite/tree/v0.0.6) (2017-09-13)
|
35
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.5...v0.0.6)
|
36
|
+
|
37
|
+
**Merged pull requests:**
|
38
|
+
|
39
|
+
- Lib improvements; simplified kite errors [\#11](https://github.com/helios-technologies/kite/pull/11) ([vshatravenko](https://github.com/vshatravenko))
|
40
|
+
- Added BOSH CLI v2 support for AWS [\#10](https://github.com/helios-technologies/kite/pull/10) ([vshatravenko](https://github.com/vshatravenko))
|
41
|
+
- Lib improvements [\#9](https://github.com/helios-technologies/kite/pull/9) ([vshatravenko](https://github.com/vshatravenko))
|
42
|
+
- Extract bosh vars into a config file [\#8](https://github.com/helios-technologies/kite/pull/8) ([nmuzychuk](https://github.com/nmuzychuk))
|
43
|
+
- Add GCP readme [\#7](https://github.com/helios-technologies/kite/pull/7) ([nmuzychuk](https://github.com/nmuzychuk))
|
44
|
+
|
45
|
+
## [v0.0.5](https://github.com/helios-technologies/kite/tree/v0.0.5) (2017-09-01)
|
46
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.4...v0.0.5)
|
47
|
+
|
48
|
+
**Merged pull requests:**
|
49
|
+
|
50
|
+
- Refactor terraform config [\#5](https://github.com/helios-technologies/kite/pull/5) ([nmuzychuk](https://github.com/nmuzychuk))
|
51
|
+
- Add bosh jumpbox [\#4](https://github.com/helios-technologies/kite/pull/4) ([nmuzychuk](https://github.com/nmuzychuk))
|
52
|
+
- Update bootstrap.sh; Removed .env; Fixed .tfvars [\#3](https://github.com/helios-technologies/kite/pull/3) ([vshatravenko](https://github.com/vshatravenko))
|
53
|
+
- Reorganized templates [\#1](https://github.com/helios-technologies/kite/pull/1) ([vshatravenko](https://github.com/vshatravenko))
|
54
|
+
|
55
|
+
## [v0.0.4](https://github.com/helios-technologies/kite/tree/v0.0.4) (2017-08-25)
|
56
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.3...v0.0.4)
|
57
|
+
|
58
|
+
## [v0.0.3](https://github.com/helios-technologies/kite/tree/v0.0.3) (2017-08-24)
|
59
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.2...v0.0.3)
|
60
|
+
|
61
|
+
## [v0.0.2](https://github.com/helios-technologies/kite/tree/v0.0.2) (2017-08-24)
|
data/lib/kite.rb
CHANGED
data/lib/kite/core.rb
CHANGED
@@ -19,12 +19,8 @@ module Kite
|
|
19
19
|
|
20
20
|
case options[:cloud]
|
21
21
|
when 'aws'
|
22
|
-
|
23
|
-
copy_file('aws/
|
24
|
-
copy_file('aws/terraform/outputs.tf', 'terraform/outputs.tf')
|
25
|
-
copy_file('aws/terraform/variables.tf', 'terraform/variables.tf')
|
26
|
-
template('aws/terraform/terraform.tfvars.erb', 'terraform/terraform.tfvars')
|
27
|
-
copy_file('aws/README.md', 'README.md')
|
22
|
+
directory('aws/terraform', 'terraform')
|
23
|
+
copy_file('aws/README.md', 'README.md', force: true)
|
28
24
|
|
29
25
|
template('aws/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
30
26
|
template('aws/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
@@ -35,18 +31,18 @@ module Kite
|
|
35
31
|
chmod('bin/setup-tunnel.sh', 0755)
|
36
32
|
|
37
33
|
when 'gcp'
|
38
|
-
|
39
|
-
copy_file('gcp/terraform/network.tf', 'terraform/network.tf')
|
40
|
-
copy_file('gcp/terraform/outputs.tf', 'terraform/outputs.tf')
|
41
|
-
copy_file('gcp/terraform/variables.tf', 'terraform/variables.tf')
|
42
|
-
template('gcp/terraform/terraform.tfvars.erb', 'terraform/terraform.tfvars')
|
34
|
+
directory('gcp/terraform', 'terraform')
|
43
35
|
copy_file('gcp/README.md', 'README.md', force: true)
|
44
36
|
|
45
37
|
template('gcp/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
46
38
|
template('gcp/bosh-vars.yml.erb', 'bosh-vars.yml')
|
47
39
|
template('gcp/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
40
|
+
template('gcp/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
|
41
|
+
template('gcp/vault-deploy.sh.erb', 'bin/vault-deploy.sh')
|
48
42
|
template('gcp/set-env.sh.erb', 'bin/set-env.sh')
|
49
43
|
chmod('bin/bosh-install.sh', 0755)
|
44
|
+
chmod('bin/concourse-deploy.sh', 0755)
|
45
|
+
chmod('bin/vault-deploy.sh', 0755)
|
50
46
|
chmod('bin/setup-tunnel.sh', 0755)
|
51
47
|
|
52
48
|
else
|
data/lib/kite/helpers.rb
CHANGED
@@ -28,4 +28,32 @@ module Kite::Helpers
|
|
28
28
|
cloud_config
|
29
29
|
end
|
30
30
|
|
31
|
+
# Returns subnet's IP range slice in a BOSH manifest-compatible way
|
32
|
+
def ip_range(subnet, range)
|
33
|
+
|
34
|
+
subnet = subnet.to_a # Turn subnet into array representation to be DRY
|
35
|
+
|
36
|
+
case range
|
37
|
+
when Integer
|
38
|
+
raise Kite::Error, 'Range number less than one in ip_range()' if range < 1
|
39
|
+
|
40
|
+
subnet[0].to_s + '-' + subnet[range].to_s
|
41
|
+
|
42
|
+
when Array
|
43
|
+
raise Kite::Error, 'Invalid number of elements in ip_range()' unless range.length == 2
|
44
|
+
raise Kite::Error, 'Second index is less than the first one in ip_range()' if range.last < range.first
|
45
|
+
|
46
|
+
subnet[range.first].to_s + '-' + subnet[range.last].to_s
|
47
|
+
|
48
|
+
when Range
|
49
|
+
raise Kite::Error, 'Second index is less than the first one in ip_range()' if range.last < range.first
|
50
|
+
|
51
|
+
range = range.to_a
|
52
|
+
subnet[range.first].to_s + '-' + subnet[range.last].to_s
|
53
|
+
|
54
|
+
else
|
55
|
+
raise Kite::Error, 'Unsupported range type for ip_range()'
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
31
59
|
end
|
data/lib/kite/render.rb
CHANGED
@@ -14,12 +14,20 @@ module Kite
|
|
14
14
|
|
15
15
|
case type
|
16
16
|
when "bosh"
|
17
|
-
|
18
|
-
|
17
|
+
if options[:cloud] == 'aws'
|
18
|
+
@private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
|
19
|
+
else
|
20
|
+
@private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
|
21
|
+
end
|
22
|
+
|
23
|
+
directory("#{options[:cloud]}/deployments/bosh", 'deployments/bosh')
|
19
24
|
|
20
25
|
when "concourse"
|
21
26
|
template("#{options[:cloud]}/deployments/concourse/cloud-config.yml.erb", "deployments/concourse/cloud-config.yml")
|
22
|
-
template("#{options[:cloud]}/deployments/concourse/concourse.yml.erb",
|
27
|
+
template("#{options[:cloud]}/deployments/concourse/concourse.yml.erb", "deployments/concourse/concourse.yml")
|
28
|
+
when "vault"
|
29
|
+
copy_file("#{options[:cloud]}/deployments/vault/vault.yml", "deployments/vault/vault.yml")
|
30
|
+
copy_file("#{options[:cloud]}/vault.md", "docs/vault.md")
|
23
31
|
|
24
32
|
else
|
25
33
|
say "Manifest type not specified"
|
data/lib/kite/version.rb
CHANGED
data/tpl/aws/bosh-install.sh.erb
CHANGED
@@ -16,6 +16,8 @@ bosh alias-env <%= @values['bosh']['name'] %> \
|
|
16
16
|
-e <%= @values['bosh']['static_ip'] %> \
|
17
17
|
--ca-cert <(bosh int ./config/creds.yml --path /director_ssl/ca)
|
18
18
|
|
19
|
+
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud_config.yml
|
20
|
+
|
19
21
|
# Get jumpbox user key
|
20
22
|
bosh int config/creds.yml --path /jumpbox_ssh/private_key > config/jumpbox.key
|
21
23
|
chmod 600 config/jumpbox.key
|
@@ -6,7 +6,7 @@ set -xe
|
|
6
6
|
kite render manifest concourse --cloud aws
|
7
7
|
|
8
8
|
# Update BOSH director cloud configuration
|
9
|
-
bosh update-cloud-config deployments/concourse/cloud-config.yml
|
9
|
+
bosh -e <%= @values['bosh']['name'] %> update-cloud-config deployments/concourse/cloud-config.yml
|
10
10
|
|
11
11
|
# Upload necessary stemcells and releases
|
12
12
|
bosh -e <%= @values['bosh']['name'] %> upload-stemcell https://bosh.io/d/stemcells/bosh-aws-xen-hvm-ubuntu-trusty-go_agent
|
@@ -55,8 +55,8 @@ networks:
|
|
55
55
|
- az: z1
|
56
56
|
range: <%= @values['aws']['private_subnet']['network'] %>
|
57
57
|
gateway: <%= @values['aws']['private_subnet']['gateway'] %>
|
58
|
-
reserved: [
|
59
|
-
dns: [
|
58
|
+
reserved: [<%= ip_range(@private_subnet, (1..10)) %>]
|
59
|
+
dns: [<%= @private_subnet[8].to_s %>]
|
60
60
|
cloud_properties: {subnet: <%= @tf_output['platform_subnet_id'] %>}
|
61
61
|
- name: vip
|
62
62
|
type: vip
|
data/tpl/gcp/README.md
CHANGED
@@ -1,6 +1,12 @@
|
|
1
1
|
## GCP Cloud
|
2
2
|
|
3
3
|
### Usage
|
4
|
+
|
5
|
+
Set path to your service account credentials:
|
6
|
+
```
|
7
|
+
export GOOGLE_CREDENTIALS=*~/credentials/service-account.json*
|
8
|
+
```
|
9
|
+
|
4
10
|
Apply terraform code
|
5
11
|
```
|
6
12
|
pushd terraform && terraform init && terraform apply && popd
|
@@ -25,8 +31,6 @@ Connect to the Director
|
|
25
31
|
```
|
26
32
|
. bin/set-env.sh
|
27
33
|
|
28
|
-
bosh alias-env bosh-1 -e 10.0.0.10 --ca-cert \
|
29
|
-
<(bosh int ./config/creds.yml --path /director_ssl/ca)
|
30
34
|
```
|
31
35
|
|
32
36
|
Render concourse deployment
|
data/tpl/gcp/bosh-install.sh.erb
CHANGED
@@ -10,3 +10,8 @@ bosh create-env deployments/bosh/bosh.yml \
|
|
10
10
|
-v tags='[platform-internal, no-ip]' \
|
11
11
|
-o deployments/bosh/cpi.yml \
|
12
12
|
-o deployments/bosh/jumpbox-user.yml
|
13
|
+
|
14
|
+
bosh alias-env <%= @values['bosh']['name'] %> -e <%= @values['bosh']['static_ip'] %> --ca-cert \
|
15
|
+
<(bosh int ./config/creds.yml --path /director_ssl/ca)
|
16
|
+
|
17
|
+
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud_config.yml
|
@@ -0,0 +1,14 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
set -xe
|
4
|
+
|
5
|
+
# Render Concourse-related files
|
6
|
+
kite render manifest concourse --cloud aws
|
7
|
+
|
8
|
+
# Upload necessary stemcells and releases
|
9
|
+
bosh -e <%= @values['bosh']['name'] %> upload-stemcell https://bosh.io/d/stemcells/bosh-aws-xen-hvm-ubuntu-trusty-go_agent
|
10
|
+
bosh -e <%= @values['bosh']['name'] %> upload-release https://bosh.io/d/github.com/concourse/concourse
|
11
|
+
bosh -e <%= @values['bosh']['name'] %> upload-release https://bosh.io/d/github.com/cloudfoundry-incubator/garden-runc-release
|
12
|
+
|
13
|
+
# Deploy Concourse
|
14
|
+
bosh -e <%= @values['bosh']['name'] %> -d concourse deploy deployments/concourse/concourse.yml
|
@@ -39,7 +39,7 @@ networks:
|
|
39
39
|
- az: z1
|
40
40
|
range: <%= @values['gcp']['subnet_cidr'] %>
|
41
41
|
gateway: <%= @values['gcp']['internal_gw'] %>
|
42
|
-
|
42
|
+
reserved: [<%= ip_range(@private_subnet, (1..10)) %>]
|
43
43
|
cloud_properties:
|
44
44
|
network_name: <%= @values['gcp']['vpc_name'] %>
|
45
45
|
subnetwork_name: <%= @values['gcp']['subnet_name'] %>
|
@@ -0,0 +1,37 @@
|
|
1
|
+
---
|
2
|
+
name: vault
|
3
|
+
|
4
|
+
releases:
|
5
|
+
- name: vault
|
6
|
+
version: latest
|
7
|
+
|
8
|
+
instance_groups:
|
9
|
+
- name: vault
|
10
|
+
instances: 1
|
11
|
+
vm_type: common
|
12
|
+
azs: [z1]
|
13
|
+
stemcell: trusty
|
14
|
+
networks:
|
15
|
+
- name: public
|
16
|
+
|
17
|
+
jobs:
|
18
|
+
- name: vault
|
19
|
+
release: vault
|
20
|
+
properties:
|
21
|
+
vault:
|
22
|
+
ha:
|
23
|
+
redirect: ~
|
24
|
+
storage:
|
25
|
+
use_file: true
|
26
|
+
|
27
|
+
update:
|
28
|
+
canaries: 1
|
29
|
+
max_in_flight: 1
|
30
|
+
serial: false
|
31
|
+
canary_watch_time: 1000-60000
|
32
|
+
update_watch_time: 1000-60000
|
33
|
+
|
34
|
+
stemcells:
|
35
|
+
- alias: trusty
|
36
|
+
name: bosh-google-kvm-ubuntu-trusty-go_agent
|
37
|
+
version: latest
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Setup Terraform GCS backend to be able to store .tfstate remotely
|
2
|
+
terraform {
|
3
|
+
backend "gcs" {
|
4
|
+
bucket = "<%= @values['kite']['bucket_name'] %>"
|
5
|
+
path = "terraform.tfstate"
|
6
|
+
project = "<%= @values['gcp']['project'] %>"
|
7
|
+
}
|
8
|
+
}
|
9
|
+
|
10
|
+
# Store .tfstate in a GCS bucket
|
11
|
+
data "terraform_remote_state" "tfstate" {
|
12
|
+
backend = "gcs"
|
13
|
+
config {
|
14
|
+
bucket = "<%= @values['kite']['bucket_name'] %>"
|
15
|
+
path = "terraform.tfstate"
|
16
|
+
project = "<%= @values['gcp']['project'] %>"
|
17
|
+
}
|
18
|
+
}
|
@@ -4,7 +4,7 @@ resource "google_compute_network" "platform" {
|
|
4
4
|
|
5
5
|
# Subnet for the Platform tools
|
6
6
|
resource "google_compute_subnetwork" "platform_net" {
|
7
|
-
name = "
|
7
|
+
name = "${var.platform_subnet_name}"
|
8
8
|
ip_cidr_range = "${var.subnet_cidr}"
|
9
9
|
network = "${google_compute_network.platform.self_link}"
|
10
10
|
}
|
@@ -0,0 +1,13 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
set -xe
|
4
|
+
|
5
|
+
# Render Concourse-related files
|
6
|
+
kite render manifest concourse --cloud aws
|
7
|
+
|
8
|
+
# Upload necessary stemcells and releases
|
9
|
+
bosh -e <%= @values['bosh']['name'] %> upload-stemcell https://s3.amazonaws.com/bosh-core-stemcells/google/bosh-stemcell-3445.7-google-kvm-ubuntu-trusty-go_agent.tgz
|
10
|
+
bosh -e <%= @values['bosh']['name'] %> upload-release https://bosh.io/d/github.com/cloudfoundry-community/vault-boshrelease
|
11
|
+
|
12
|
+
# Deploy Concourse
|
13
|
+
bosh -e <%= @values['bosh']['name'] %> -d vault deploy deployments/vault/vault.yml
|
data/tpl/gcp/vault.md
ADDED
@@ -0,0 +1,26 @@
|
|
1
|
+
# Vault usage
|
2
|
+
|
3
|
+
## Prerequisites
|
4
|
+
|
5
|
+
Before using Vault, you should have the client installed:
|
6
|
+
|
7
|
+
- Download the binary for your OS
|
8
|
+
- Unzip it and run `chmod +x vault && sudo mv vault /usr/local/bin/vault`
|
9
|
+
- Check if the Vault is installed by running `vault -v`
|
10
|
+
|
11
|
+
## Deployment
|
12
|
+
|
13
|
+
To deploy Vault, use `bin/vault-deploy.sh`
|
14
|
+
|
15
|
+
## Connection
|
16
|
+
|
17
|
+
- Export your Vault's IP using `export VAULT_ADDR=*vault_ip*`
|
18
|
+
- Run `vault init` to initialize the vault
|
19
|
+
- Store the keys displayed after init
|
20
|
+
- Unseal the vault by running `vault unseal` three times using three keys from the previous step
|
21
|
+
|
22
|
+
[Optional]
|
23
|
+
- Try to store a dummy secret: `vault write secret/handshake knock=knock`
|
24
|
+
- Read it: `vault read secret/handshake`
|
25
|
+
|
26
|
+
You're good to go!
|
data/tpl/skel/config/cloud.yml
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: kite
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.8
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Louis Bellet
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2017-09-
|
11
|
+
date: 2017-09-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: thor
|
@@ -79,6 +79,7 @@ files:
|
|
79
79
|
- ".gitignore"
|
80
80
|
- ".rspec"
|
81
81
|
- ".travis.yml"
|
82
|
+
- CHANGELOG.md
|
82
83
|
- Dockerfile
|
83
84
|
- Gemfile
|
84
85
|
- Makefile
|
@@ -101,9 +102,9 @@ files:
|
|
101
102
|
- tpl/aws/concourse-deploy.sh.erb
|
102
103
|
- tpl/aws/deployments/bosh/bosh.yml
|
103
104
|
- tpl/aws/deployments/bosh/bosh_vars.yml.tt
|
105
|
+
- tpl/aws/deployments/bosh/cloud-config.yml.tt
|
104
106
|
- tpl/aws/deployments/bosh/cpi.yml
|
105
107
|
- tpl/aws/deployments/bosh/jumpbox-user.yml
|
106
|
-
- tpl/aws/deployments/concourse/cloud-config.yml.erb
|
107
108
|
- tpl/aws/deployments/concourse/concourse.yml.erb
|
108
109
|
- tpl/aws/set-env.sh.erb
|
109
110
|
- tpl/aws/setup-tunnel.sh.erb
|
@@ -115,19 +116,23 @@ files:
|
|
115
116
|
- tpl/gcp/README.md
|
116
117
|
- tpl/gcp/bosh-install.sh.erb
|
117
118
|
- tpl/gcp/bosh-vars.yml.erb
|
119
|
+
- tpl/gcp/concourse-deploy.sh.erb
|
118
120
|
- tpl/gcp/deployments/bosh/bosh.yml
|
119
|
-
- tpl/gcp/deployments/bosh/cloud-config.yml
|
121
|
+
- tpl/gcp/deployments/bosh/cloud-config.yml.tt
|
120
122
|
- tpl/gcp/deployments/bosh/cpi.yml
|
121
123
|
- tpl/gcp/deployments/bosh/jumpbox-user.yml
|
122
|
-
- tpl/gcp/deployments/concourse/cloud-config.yml.erb
|
123
124
|
- tpl/gcp/deployments/concourse/concourse.yml.erb
|
125
|
+
- tpl/gcp/deployments/vault/vault.yml
|
124
126
|
- tpl/gcp/set-env.sh.erb
|
125
127
|
- tpl/gcp/setup-tunnel.sh.erb
|
128
|
+
- tpl/gcp/terraform/gcs.tf.tt
|
126
129
|
- tpl/gcp/terraform/main.tf
|
127
130
|
- tpl/gcp/terraform/network.tf
|
128
131
|
- tpl/gcp/terraform/outputs.tf
|
129
|
-
- tpl/gcp/terraform/terraform.tfvars.
|
132
|
+
- tpl/gcp/terraform/terraform.tfvars.tt
|
130
133
|
- tpl/gcp/terraform/variables.tf
|
134
|
+
- tpl/gcp/vault-deploy.sh.erb
|
135
|
+
- tpl/gcp/vault.md
|
131
136
|
- tpl/skel/Gemfile.tt
|
132
137
|
- tpl/skel/README.md.tt
|
133
138
|
- tpl/skel/bin/kite
|
@@ -1,51 +0,0 @@
|
|
1
|
-
azs:
|
2
|
-
- name: z1
|
3
|
-
cloud_properties:
|
4
|
-
zone: ((zone))
|
5
|
-
- name: z2
|
6
|
-
cloud_properties:
|
7
|
-
zone: ((zone))
|
8
|
-
- name: z3
|
9
|
-
cloud_properties:
|
10
|
-
zone: ((zone))
|
11
|
-
|
12
|
-
vm_types:
|
13
|
-
- name: default
|
14
|
-
cloud_properties:
|
15
|
-
machine_type: n1-standard-2
|
16
|
-
root_disk_size_gb: 20
|
17
|
-
root_disk_type: pd-ssd
|
18
|
-
- name: large
|
19
|
-
cloud_properties:
|
20
|
-
machine_type: n1-standard-2
|
21
|
-
root_disk_size_gb: 50
|
22
|
-
root_disk_type: pd-ssd
|
23
|
-
|
24
|
-
disk_types:
|
25
|
-
- name: default
|
26
|
-
disk_size: 3000
|
27
|
-
- name: large
|
28
|
-
disk_size: 50_000
|
29
|
-
|
30
|
-
networks:
|
31
|
-
- name: default
|
32
|
-
type: manual
|
33
|
-
subnets:
|
34
|
-
- range: ((internal_cidr))
|
35
|
-
gateway: ((internal_gw))
|
36
|
-
azs: [z1, z2, z3]
|
37
|
-
dns: [8.8.8.8]
|
38
|
-
cloud_properties:
|
39
|
-
network_name: ((network))
|
40
|
-
subnetwork_name: ((subnetwork))
|
41
|
-
ephemeral_external_ip: true
|
42
|
-
tags: ((tags))
|
43
|
-
- name: vip
|
44
|
-
type: vip
|
45
|
-
|
46
|
-
compilation:
|
47
|
-
workers: 5
|
48
|
-
reuse_compilation_vms: true
|
49
|
-
az: z1
|
50
|
-
vm_type: default
|
51
|
-
network: default
|