kite 0.0.7 → 0.0.8
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +61 -0
- data/lib/kite.rb +1 -0
- data/lib/kite/core.rb +7 -11
- data/lib/kite/helpers.rb +28 -0
- data/lib/kite/render.rb +11 -3
- data/lib/kite/version.rb +1 -1
- data/tpl/aws/bosh-install.sh.erb +2 -0
- data/tpl/aws/concourse-deploy.sh.erb +1 -1
- data/tpl/aws/deployments/{concourse/cloud-config.yml.erb → bosh/cloud-config.yml.tt} +2 -2
- data/tpl/gcp/README.md +6 -2
- data/tpl/gcp/bosh-install.sh.erb +5 -0
- data/tpl/gcp/concourse-deploy.sh.erb +14 -0
- data/tpl/gcp/deployments/{concourse/cloud-config.yml.erb → bosh/cloud-config.yml.tt} +1 -1
- data/tpl/gcp/deployments/vault/vault.yml +37 -0
- data/tpl/gcp/terraform/gcs.tf.tt +18 -0
- data/tpl/gcp/terraform/network.tf +1 -1
- data/tpl/gcp/terraform/{terraform.tfvars.erb → terraform.tfvars.tt} +1 -0
- data/tpl/gcp/terraform/variables.tf +5 -0
- data/tpl/gcp/vault-deploy.sh.erb +13 -0
- data/tpl/gcp/vault.md +26 -0
- data/tpl/skel/config/cloud.yml +1 -0
- metadata +11 -6
- data/tpl/gcp/deployments/bosh/cloud-config.yml +0 -51
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d029f893bc9f787beff2681b15c0b6ab31371b70
|
4
|
+
data.tar.gz: 406a1dc3d0a397bba6e2dae0983d464a9ce7b791
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4247ff2253a5ff7d392b820cd3cd8c329f8a23159017ca4359072102e2bf57bb2fee91b28401371eb4c658f7cbc390faede99486323b2485b7944f456b54ccd3
|
7
|
+
data.tar.gz: 1e4593d77af49accd33e8e6341d250e919034da2358610f9c0ddc08bd3b136cbb2180333776aa35d24c797a55131046d18c34dc84f923a6ce8e37782ebe475b8
|
data/CHANGELOG.md
ADDED
@@ -0,0 +1,61 @@
|
|
1
|
+
# Change Log
|
2
|
+
|
3
|
+
## [Unreleased](https://github.com/helios-technologies/kite/tree/HEAD)
|
4
|
+
|
5
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...HEAD)
|
6
|
+
|
7
|
+
**Closed issues:**
|
8
|
+
|
9
|
+
- GCP Reserved ip problem [\#27](https://github.com/helios-technologies/kite/issues/27)
|
10
|
+
|
11
|
+
**Merged pull requests:**
|
12
|
+
|
13
|
+
- Added GCS backend for remote .tfstate storage [\#30](https://github.com/helios-technologies/kite/pull/30) ([vshatravenko](https://github.com/vshatravenko))
|
14
|
+
- Fixed reserved ip problem for GCP [\#29](https://github.com/helios-technologies/kite/pull/29) ([vshatravenko](https://github.com/vshatravenko))
|
15
|
+
- Fixed reserved ip range rendering for AWS [\#26](https://github.com/helios-technologies/kite/pull/26) ([vshatravenko](https://github.com/vshatravenko))
|
16
|
+
- Added subnet\_name render in terraform.tfvars [\#25](https://github.com/helios-technologies/kite/pull/25) ([vshatravenko](https://github.com/vshatravenko))
|
17
|
+
- Added Vault manifest [\#24](https://github.com/helios-technologies/kite/pull/24) ([vshatravenko](https://github.com/vshatravenko))
|
18
|
+
- Fix in shell skript template for concourse deployment [\#22](https://github.com/helios-technologies/kite/pull/22) ([n-trace](https://github.com/n-trace))
|
19
|
+
|
20
|
+
## [v0.0.7](https://github.com/helios-technologies/kite/tree/v0.0.7) (2017-09-15)
|
21
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.6...v0.0.7)
|
22
|
+
|
23
|
+
**Merged pull requests:**
|
24
|
+
|
25
|
+
- Updated Concourse manifest for AWS [\#21](https://github.com/helios-technologies/kite/pull/21) ([vshatravenko](https://github.com/vshatravenko))
|
26
|
+
- Fix setup-tunnel.sh on GCP platform [\#20](https://github.com/helios-technologies/kite/pull/20) ([calj](https://github.com/calj))
|
27
|
+
- Added Dockerfile for kitebox [\#19](https://github.com/helios-technologies/kite/pull/19) ([vshatravenko](https://github.com/vshatravenko))
|
28
|
+
- NAT Gateway for AWS [\#18](https://github.com/helios-technologies/kite/pull/18) ([mod](https://github.com/mod))
|
29
|
+
- Updated docs for RDoc [\#17](https://github.com/helios-technologies/kite/pull/17) ([vshatravenko](https://github.com/vshatravenko))
|
30
|
+
- Moved kite render to subcommand [\#16](https://github.com/helios-technologies/kite/pull/16) ([vshatravenko](https://github.com/vshatravenko))
|
31
|
+
- Bugfixes for v0.0.6 [\#14](https://github.com/helios-technologies/kite/pull/14) ([vshatravenko](https://github.com/vshatravenko))
|
32
|
+
- Add cloud config, concourse [\#12](https://github.com/helios-technologies/kite/pull/12) ([nmuzychuk](https://github.com/nmuzychuk))
|
33
|
+
|
34
|
+
## [v0.0.6](https://github.com/helios-technologies/kite/tree/v0.0.6) (2017-09-13)
|
35
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.5...v0.0.6)
|
36
|
+
|
37
|
+
**Merged pull requests:**
|
38
|
+
|
39
|
+
- Lib improvements; simplified kite errors [\#11](https://github.com/helios-technologies/kite/pull/11) ([vshatravenko](https://github.com/vshatravenko))
|
40
|
+
- Added BOSH CLI v2 support for AWS [\#10](https://github.com/helios-technologies/kite/pull/10) ([vshatravenko](https://github.com/vshatravenko))
|
41
|
+
- Lib improvements [\#9](https://github.com/helios-technologies/kite/pull/9) ([vshatravenko](https://github.com/vshatravenko))
|
42
|
+
- Extract bosh vars into a config file [\#8](https://github.com/helios-technologies/kite/pull/8) ([nmuzychuk](https://github.com/nmuzychuk))
|
43
|
+
- Add GCP readme [\#7](https://github.com/helios-technologies/kite/pull/7) ([nmuzychuk](https://github.com/nmuzychuk))
|
44
|
+
|
45
|
+
## [v0.0.5](https://github.com/helios-technologies/kite/tree/v0.0.5) (2017-09-01)
|
46
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.4...v0.0.5)
|
47
|
+
|
48
|
+
**Merged pull requests:**
|
49
|
+
|
50
|
+
- Refactor terraform config [\#5](https://github.com/helios-technologies/kite/pull/5) ([nmuzychuk](https://github.com/nmuzychuk))
|
51
|
+
- Add bosh jumpbox [\#4](https://github.com/helios-technologies/kite/pull/4) ([nmuzychuk](https://github.com/nmuzychuk))
|
52
|
+
- Update bootstrap.sh; Removed .env; Fixed .tfvars [\#3](https://github.com/helios-technologies/kite/pull/3) ([vshatravenko](https://github.com/vshatravenko))
|
53
|
+
- Reorganized templates [\#1](https://github.com/helios-technologies/kite/pull/1) ([vshatravenko](https://github.com/vshatravenko))
|
54
|
+
|
55
|
+
## [v0.0.4](https://github.com/helios-technologies/kite/tree/v0.0.4) (2017-08-25)
|
56
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.3...v0.0.4)
|
57
|
+
|
58
|
+
## [v0.0.3](https://github.com/helios-technologies/kite/tree/v0.0.3) (2017-08-24)
|
59
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.2...v0.0.3)
|
60
|
+
|
61
|
+
## [v0.0.2](https://github.com/helios-technologies/kite/tree/v0.0.2) (2017-08-24)
|
data/lib/kite.rb
CHANGED
data/lib/kite/core.rb
CHANGED
@@ -19,12 +19,8 @@ module Kite
|
|
19
19
|
|
20
20
|
case options[:cloud]
|
21
21
|
when 'aws'
|
22
|
-
|
23
|
-
copy_file('aws/
|
24
|
-
copy_file('aws/terraform/outputs.tf', 'terraform/outputs.tf')
|
25
|
-
copy_file('aws/terraform/variables.tf', 'terraform/variables.tf')
|
26
|
-
template('aws/terraform/terraform.tfvars.erb', 'terraform/terraform.tfvars')
|
27
|
-
copy_file('aws/README.md', 'README.md')
|
22
|
+
directory('aws/terraform', 'terraform')
|
23
|
+
copy_file('aws/README.md', 'README.md', force: true)
|
28
24
|
|
29
25
|
template('aws/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
30
26
|
template('aws/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
@@ -35,18 +31,18 @@ module Kite
|
|
35
31
|
chmod('bin/setup-tunnel.sh', 0755)
|
36
32
|
|
37
33
|
when 'gcp'
|
38
|
-
|
39
|
-
copy_file('gcp/terraform/network.tf', 'terraform/network.tf')
|
40
|
-
copy_file('gcp/terraform/outputs.tf', 'terraform/outputs.tf')
|
41
|
-
copy_file('gcp/terraform/variables.tf', 'terraform/variables.tf')
|
42
|
-
template('gcp/terraform/terraform.tfvars.erb', 'terraform/terraform.tfvars')
|
34
|
+
directory('gcp/terraform', 'terraform')
|
43
35
|
copy_file('gcp/README.md', 'README.md', force: true)
|
44
36
|
|
45
37
|
template('gcp/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
46
38
|
template('gcp/bosh-vars.yml.erb', 'bosh-vars.yml')
|
47
39
|
template('gcp/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
40
|
+
template('gcp/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
|
41
|
+
template('gcp/vault-deploy.sh.erb', 'bin/vault-deploy.sh')
|
48
42
|
template('gcp/set-env.sh.erb', 'bin/set-env.sh')
|
49
43
|
chmod('bin/bosh-install.sh', 0755)
|
44
|
+
chmod('bin/concourse-deploy.sh', 0755)
|
45
|
+
chmod('bin/vault-deploy.sh', 0755)
|
50
46
|
chmod('bin/setup-tunnel.sh', 0755)
|
51
47
|
|
52
48
|
else
|
data/lib/kite/helpers.rb
CHANGED
@@ -28,4 +28,32 @@ module Kite::Helpers
|
|
28
28
|
cloud_config
|
29
29
|
end
|
30
30
|
|
31
|
+
# Returns subnet's IP range slice in a BOSH manifest-compatible way
|
32
|
+
def ip_range(subnet, range)
|
33
|
+
|
34
|
+
subnet = subnet.to_a # Turn subnet into array representation to be DRY
|
35
|
+
|
36
|
+
case range
|
37
|
+
when Integer
|
38
|
+
raise Kite::Error, 'Range number less than one in ip_range()' if range < 1
|
39
|
+
|
40
|
+
subnet[0].to_s + '-' + subnet[range].to_s
|
41
|
+
|
42
|
+
when Array
|
43
|
+
raise Kite::Error, 'Invalid number of elements in ip_range()' unless range.length == 2
|
44
|
+
raise Kite::Error, 'Second index is less than the first one in ip_range()' if range.last < range.first
|
45
|
+
|
46
|
+
subnet[range.first].to_s + '-' + subnet[range.last].to_s
|
47
|
+
|
48
|
+
when Range
|
49
|
+
raise Kite::Error, 'Second index is less than the first one in ip_range()' if range.last < range.first
|
50
|
+
|
51
|
+
range = range.to_a
|
52
|
+
subnet[range.first].to_s + '-' + subnet[range.last].to_s
|
53
|
+
|
54
|
+
else
|
55
|
+
raise Kite::Error, 'Unsupported range type for ip_range()'
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
31
59
|
end
|
data/lib/kite/render.rb
CHANGED
@@ -14,12 +14,20 @@ module Kite
|
|
14
14
|
|
15
15
|
case type
|
16
16
|
when "bosh"
|
17
|
-
|
18
|
-
|
17
|
+
if options[:cloud] == 'aws'
|
18
|
+
@private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
|
19
|
+
else
|
20
|
+
@private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
|
21
|
+
end
|
22
|
+
|
23
|
+
directory("#{options[:cloud]}/deployments/bosh", 'deployments/bosh')
|
19
24
|
|
20
25
|
when "concourse"
|
21
26
|
template("#{options[:cloud]}/deployments/concourse/cloud-config.yml.erb", "deployments/concourse/cloud-config.yml")
|
22
|
-
template("#{options[:cloud]}/deployments/concourse/concourse.yml.erb",
|
27
|
+
template("#{options[:cloud]}/deployments/concourse/concourse.yml.erb", "deployments/concourse/concourse.yml")
|
28
|
+
when "vault"
|
29
|
+
copy_file("#{options[:cloud]}/deployments/vault/vault.yml", "deployments/vault/vault.yml")
|
30
|
+
copy_file("#{options[:cloud]}/vault.md", "docs/vault.md")
|
23
31
|
|
24
32
|
else
|
25
33
|
say "Manifest type not specified"
|
data/lib/kite/version.rb
CHANGED
data/tpl/aws/bosh-install.sh.erb
CHANGED
@@ -16,6 +16,8 @@ bosh alias-env <%= @values['bosh']['name'] %> \
|
|
16
16
|
-e <%= @values['bosh']['static_ip'] %> \
|
17
17
|
--ca-cert <(bosh int ./config/creds.yml --path /director_ssl/ca)
|
18
18
|
|
19
|
+
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud_config.yml
|
20
|
+
|
19
21
|
# Get jumpbox user key
|
20
22
|
bosh int config/creds.yml --path /jumpbox_ssh/private_key > config/jumpbox.key
|
21
23
|
chmod 600 config/jumpbox.key
|
@@ -6,7 +6,7 @@ set -xe
|
|
6
6
|
kite render manifest concourse --cloud aws
|
7
7
|
|
8
8
|
# Update BOSH director cloud configuration
|
9
|
-
bosh update-cloud-config deployments/concourse/cloud-config.yml
|
9
|
+
bosh -e <%= @values['bosh']['name'] %> update-cloud-config deployments/concourse/cloud-config.yml
|
10
10
|
|
11
11
|
# Upload necessary stemcells and releases
|
12
12
|
bosh -e <%= @values['bosh']['name'] %> upload-stemcell https://bosh.io/d/stemcells/bosh-aws-xen-hvm-ubuntu-trusty-go_agent
|
@@ -55,8 +55,8 @@ networks:
|
|
55
55
|
- az: z1
|
56
56
|
range: <%= @values['aws']['private_subnet']['network'] %>
|
57
57
|
gateway: <%= @values['aws']['private_subnet']['gateway'] %>
|
58
|
-
reserved: [
|
59
|
-
dns: [
|
58
|
+
reserved: [<%= ip_range(@private_subnet, (1..10)) %>]
|
59
|
+
dns: [<%= @private_subnet[8].to_s %>]
|
60
60
|
cloud_properties: {subnet: <%= @tf_output['platform_subnet_id'] %>}
|
61
61
|
- name: vip
|
62
62
|
type: vip
|
data/tpl/gcp/README.md
CHANGED
@@ -1,6 +1,12 @@
|
|
1
1
|
## GCP Cloud
|
2
2
|
|
3
3
|
### Usage
|
4
|
+
|
5
|
+
Set path to your service account credentials:
|
6
|
+
```
|
7
|
+
export GOOGLE_CREDENTIALS=*~/credentials/service-account.json*
|
8
|
+
```
|
9
|
+
|
4
10
|
Apply terraform code
|
5
11
|
```
|
6
12
|
pushd terraform && terraform init && terraform apply && popd
|
@@ -25,8 +31,6 @@ Connect to the Director
|
|
25
31
|
```
|
26
32
|
. bin/set-env.sh
|
27
33
|
|
28
|
-
bosh alias-env bosh-1 -e 10.0.0.10 --ca-cert \
|
29
|
-
<(bosh int ./config/creds.yml --path /director_ssl/ca)
|
30
34
|
```
|
31
35
|
|
32
36
|
Render concourse deployment
|
data/tpl/gcp/bosh-install.sh.erb
CHANGED
@@ -10,3 +10,8 @@ bosh create-env deployments/bosh/bosh.yml \
|
|
10
10
|
-v tags='[platform-internal, no-ip]' \
|
11
11
|
-o deployments/bosh/cpi.yml \
|
12
12
|
-o deployments/bosh/jumpbox-user.yml
|
13
|
+
|
14
|
+
bosh alias-env <%= @values['bosh']['name'] %> -e <%= @values['bosh']['static_ip'] %> --ca-cert \
|
15
|
+
<(bosh int ./config/creds.yml --path /director_ssl/ca)
|
16
|
+
|
17
|
+
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud_config.yml
|
@@ -0,0 +1,14 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
set -xe
|
4
|
+
|
5
|
+
# Render Concourse-related files
|
6
|
+
kite render manifest concourse --cloud aws
|
7
|
+
|
8
|
+
# Upload necessary stemcells and releases
|
9
|
+
bosh -e <%= @values['bosh']['name'] %> upload-stemcell https://bosh.io/d/stemcells/bosh-aws-xen-hvm-ubuntu-trusty-go_agent
|
10
|
+
bosh -e <%= @values['bosh']['name'] %> upload-release https://bosh.io/d/github.com/concourse/concourse
|
11
|
+
bosh -e <%= @values['bosh']['name'] %> upload-release https://bosh.io/d/github.com/cloudfoundry-incubator/garden-runc-release
|
12
|
+
|
13
|
+
# Deploy Concourse
|
14
|
+
bosh -e <%= @values['bosh']['name'] %> -d concourse deploy deployments/concourse/concourse.yml
|
@@ -39,7 +39,7 @@ networks:
|
|
39
39
|
- az: z1
|
40
40
|
range: <%= @values['gcp']['subnet_cidr'] %>
|
41
41
|
gateway: <%= @values['gcp']['internal_gw'] %>
|
42
|
-
|
42
|
+
reserved: [<%= ip_range(@private_subnet, (1..10)) %>]
|
43
43
|
cloud_properties:
|
44
44
|
network_name: <%= @values['gcp']['vpc_name'] %>
|
45
45
|
subnetwork_name: <%= @values['gcp']['subnet_name'] %>
|
@@ -0,0 +1,37 @@
|
|
1
|
+
---
|
2
|
+
name: vault
|
3
|
+
|
4
|
+
releases:
|
5
|
+
- name: vault
|
6
|
+
version: latest
|
7
|
+
|
8
|
+
instance_groups:
|
9
|
+
- name: vault
|
10
|
+
instances: 1
|
11
|
+
vm_type: common
|
12
|
+
azs: [z1]
|
13
|
+
stemcell: trusty
|
14
|
+
networks:
|
15
|
+
- name: public
|
16
|
+
|
17
|
+
jobs:
|
18
|
+
- name: vault
|
19
|
+
release: vault
|
20
|
+
properties:
|
21
|
+
vault:
|
22
|
+
ha:
|
23
|
+
redirect: ~
|
24
|
+
storage:
|
25
|
+
use_file: true
|
26
|
+
|
27
|
+
update:
|
28
|
+
canaries: 1
|
29
|
+
max_in_flight: 1
|
30
|
+
serial: false
|
31
|
+
canary_watch_time: 1000-60000
|
32
|
+
update_watch_time: 1000-60000
|
33
|
+
|
34
|
+
stemcells:
|
35
|
+
- alias: trusty
|
36
|
+
name: bosh-google-kvm-ubuntu-trusty-go_agent
|
37
|
+
version: latest
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Setup Terraform GCS backend to be able to store .tfstate remotely
|
2
|
+
terraform {
|
3
|
+
backend "gcs" {
|
4
|
+
bucket = "<%= @values['kite']['bucket_name'] %>"
|
5
|
+
path = "terraform.tfstate"
|
6
|
+
project = "<%= @values['gcp']['project'] %>"
|
7
|
+
}
|
8
|
+
}
|
9
|
+
|
10
|
+
# Store .tfstate in a GCS bucket
|
11
|
+
data "terraform_remote_state" "tfstate" {
|
12
|
+
backend = "gcs"
|
13
|
+
config {
|
14
|
+
bucket = "<%= @values['kite']['bucket_name'] %>"
|
15
|
+
path = "terraform.tfstate"
|
16
|
+
project = "<%= @values['gcp']['project'] %>"
|
17
|
+
}
|
18
|
+
}
|
@@ -4,7 +4,7 @@ resource "google_compute_network" "platform" {
|
|
4
4
|
|
5
5
|
# Subnet for the Platform tools
|
6
6
|
resource "google_compute_subnetwork" "platform_net" {
|
7
|
-
name = "
|
7
|
+
name = "${var.platform_subnet_name}"
|
8
8
|
ip_cidr_range = "${var.subnet_cidr}"
|
9
9
|
network = "${google_compute_network.platform.self_link}"
|
10
10
|
}
|
@@ -0,0 +1,13 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
set -xe
|
4
|
+
|
5
|
+
# Render Concourse-related files
|
6
|
+
kite render manifest concourse --cloud aws
|
7
|
+
|
8
|
+
# Upload necessary stemcells and releases
|
9
|
+
bosh -e <%= @values['bosh']['name'] %> upload-stemcell https://s3.amazonaws.com/bosh-core-stemcells/google/bosh-stemcell-3445.7-google-kvm-ubuntu-trusty-go_agent.tgz
|
10
|
+
bosh -e <%= @values['bosh']['name'] %> upload-release https://bosh.io/d/github.com/cloudfoundry-community/vault-boshrelease
|
11
|
+
|
12
|
+
# Deploy Concourse
|
13
|
+
bosh -e <%= @values['bosh']['name'] %> -d vault deploy deployments/vault/vault.yml
|
data/tpl/gcp/vault.md
ADDED
@@ -0,0 +1,26 @@
|
|
1
|
+
# Vault usage
|
2
|
+
|
3
|
+
## Prerequisites
|
4
|
+
|
5
|
+
Before using Vault, you should have the client installed:
|
6
|
+
|
7
|
+
- Download the binary for your OS
|
8
|
+
- Unzip it and run `chmod +x vault && sudo mv vault /usr/local/bin/vault`
|
9
|
+
- Check if the Vault is installed by running `vault -v`
|
10
|
+
|
11
|
+
## Deployment
|
12
|
+
|
13
|
+
To deploy Vault, use `bin/vault-deploy.sh`
|
14
|
+
|
15
|
+
## Connection
|
16
|
+
|
17
|
+
- Export your Vault's IP using `export VAULT_ADDR=*vault_ip*`
|
18
|
+
- Run `vault init` to initialize the vault
|
19
|
+
- Store the keys displayed after init
|
20
|
+
- Unseal the vault by running `vault unseal` three times using three keys from the previous step
|
21
|
+
|
22
|
+
[Optional]
|
23
|
+
- Try to store a dummy secret: `vault write secret/handshake knock=knock`
|
24
|
+
- Read it: `vault read secret/handshake`
|
25
|
+
|
26
|
+
You're good to go!
|
data/tpl/skel/config/cloud.yml
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: kite
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.8
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Louis Bellet
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2017-09-
|
11
|
+
date: 2017-09-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: thor
|
@@ -79,6 +79,7 @@ files:
|
|
79
79
|
- ".gitignore"
|
80
80
|
- ".rspec"
|
81
81
|
- ".travis.yml"
|
82
|
+
- CHANGELOG.md
|
82
83
|
- Dockerfile
|
83
84
|
- Gemfile
|
84
85
|
- Makefile
|
@@ -101,9 +102,9 @@ files:
|
|
101
102
|
- tpl/aws/concourse-deploy.sh.erb
|
102
103
|
- tpl/aws/deployments/bosh/bosh.yml
|
103
104
|
- tpl/aws/deployments/bosh/bosh_vars.yml.tt
|
105
|
+
- tpl/aws/deployments/bosh/cloud-config.yml.tt
|
104
106
|
- tpl/aws/deployments/bosh/cpi.yml
|
105
107
|
- tpl/aws/deployments/bosh/jumpbox-user.yml
|
106
|
-
- tpl/aws/deployments/concourse/cloud-config.yml.erb
|
107
108
|
- tpl/aws/deployments/concourse/concourse.yml.erb
|
108
109
|
- tpl/aws/set-env.sh.erb
|
109
110
|
- tpl/aws/setup-tunnel.sh.erb
|
@@ -115,19 +116,23 @@ files:
|
|
115
116
|
- tpl/gcp/README.md
|
116
117
|
- tpl/gcp/bosh-install.sh.erb
|
117
118
|
- tpl/gcp/bosh-vars.yml.erb
|
119
|
+
- tpl/gcp/concourse-deploy.sh.erb
|
118
120
|
- tpl/gcp/deployments/bosh/bosh.yml
|
119
|
-
- tpl/gcp/deployments/bosh/cloud-config.yml
|
121
|
+
- tpl/gcp/deployments/bosh/cloud-config.yml.tt
|
120
122
|
- tpl/gcp/deployments/bosh/cpi.yml
|
121
123
|
- tpl/gcp/deployments/bosh/jumpbox-user.yml
|
122
|
-
- tpl/gcp/deployments/concourse/cloud-config.yml.erb
|
123
124
|
- tpl/gcp/deployments/concourse/concourse.yml.erb
|
125
|
+
- tpl/gcp/deployments/vault/vault.yml
|
124
126
|
- tpl/gcp/set-env.sh.erb
|
125
127
|
- tpl/gcp/setup-tunnel.sh.erb
|
128
|
+
- tpl/gcp/terraform/gcs.tf.tt
|
126
129
|
- tpl/gcp/terraform/main.tf
|
127
130
|
- tpl/gcp/terraform/network.tf
|
128
131
|
- tpl/gcp/terraform/outputs.tf
|
129
|
-
- tpl/gcp/terraform/terraform.tfvars.
|
132
|
+
- tpl/gcp/terraform/terraform.tfvars.tt
|
130
133
|
- tpl/gcp/terraform/variables.tf
|
134
|
+
- tpl/gcp/vault-deploy.sh.erb
|
135
|
+
- tpl/gcp/vault.md
|
131
136
|
- tpl/skel/Gemfile.tt
|
132
137
|
- tpl/skel/README.md.tt
|
133
138
|
- tpl/skel/bin/kite
|
@@ -1,51 +0,0 @@
|
|
1
|
-
azs:
|
2
|
-
- name: z1
|
3
|
-
cloud_properties:
|
4
|
-
zone: ((zone))
|
5
|
-
- name: z2
|
6
|
-
cloud_properties:
|
7
|
-
zone: ((zone))
|
8
|
-
- name: z3
|
9
|
-
cloud_properties:
|
10
|
-
zone: ((zone))
|
11
|
-
|
12
|
-
vm_types:
|
13
|
-
- name: default
|
14
|
-
cloud_properties:
|
15
|
-
machine_type: n1-standard-2
|
16
|
-
root_disk_size_gb: 20
|
17
|
-
root_disk_type: pd-ssd
|
18
|
-
- name: large
|
19
|
-
cloud_properties:
|
20
|
-
machine_type: n1-standard-2
|
21
|
-
root_disk_size_gb: 50
|
22
|
-
root_disk_type: pd-ssd
|
23
|
-
|
24
|
-
disk_types:
|
25
|
-
- name: default
|
26
|
-
disk_size: 3000
|
27
|
-
- name: large
|
28
|
-
disk_size: 50_000
|
29
|
-
|
30
|
-
networks:
|
31
|
-
- name: default
|
32
|
-
type: manual
|
33
|
-
subnets:
|
34
|
-
- range: ((internal_cidr))
|
35
|
-
gateway: ((internal_gw))
|
36
|
-
azs: [z1, z2, z3]
|
37
|
-
dns: [8.8.8.8]
|
38
|
-
cloud_properties:
|
39
|
-
network_name: ((network))
|
40
|
-
subnetwork_name: ((subnetwork))
|
41
|
-
ephemeral_external_ip: true
|
42
|
-
tags: ((tags))
|
43
|
-
- name: vip
|
44
|
-
type: vip
|
45
|
-
|
46
|
-
compilation:
|
47
|
-
workers: 5
|
48
|
-
reuse_compilation_vms: true
|
49
|
-
az: z1
|
50
|
-
vm_type: default
|
51
|
-
network: default
|