kite 0.0.8 → 0.0.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.travis.yml +2 -0
- data/CHANGELOG.md +28 -1
- data/README.md +33 -4
- data/kite.gemspec +2 -0
- data/lib/kite.rb +1 -0
- data/lib/kite/core.rb +2 -40
- data/lib/kite/generate.rb +43 -0
- data/lib/kite/helpers.rb +27 -0
- data/lib/kite/render.rb +23 -11
- data/lib/kite/version.rb +1 -1
- data/tpl/aws/README.md +21 -21
- data/tpl/aws/bin/base/bootstrap.sh +35 -0
- data/tpl/aws/bin/base/cleanup.sh.tt +19 -0
- data/tpl/aws/{set-env.sh.erb → bin/base/set-env.sh.tt} +0 -0
- data/tpl/aws/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +0 -0
- data/tpl/aws/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +2 -2
- data/tpl/{gcp/concourse-deploy.sh.erb → aws/bin/concourse-deploy.sh.tt} +0 -0
- data/tpl/aws/bin/vault-deploy.sh.tt +10 -0
- data/tpl/aws/{deployments/bosh/bosh_vars.yml.tt → bosh-vars.yml.erb} +0 -0
- data/tpl/aws/deployments/bosh/cloud-config.yml.tt +2 -1
- data/tpl/aws/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +7 -0
- data/tpl/aws/deployments/vault/vault.yml.erb +38 -0
- data/tpl/aws/docs/bosh.md +31 -0
- data/tpl/aws/docs/concourse.md +30 -0
- data/tpl/{gcp → aws/docs}/vault.md +13 -6
- data/tpl/aws/terraform/{main.tf → main.tf.tt} +1 -2
- data/tpl/aws/terraform/{network.tf → network.tf.tt} +40 -23
- data/tpl/aws/terraform/{terraform.tfvars.erb → terraform.tfvars.tt} +2 -0
- data/tpl/aws/terraform/variables.tf +8 -0
- data/tpl/gcp/README.md +10 -31
- data/tpl/gcp/bin/base/bootstrap.sh +35 -0
- data/tpl/gcp/bin/base/cleanup.sh.tt +20 -0
- data/tpl/gcp/{set-env.sh.erb → bin/base/set-env.sh.tt} +3 -1
- data/tpl/gcp/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +3 -1
- data/tpl/gcp/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +3 -2
- data/tpl/gcp/bin/concourse-deploy.sh.tt +11 -0
- data/tpl/gcp/{vault-deploy.sh.erb → bin/vault-deploy.sh.tt} +1 -1
- data/tpl/gcp/deployments/bosh/cloud-config.yml.tt +3 -2
- data/tpl/gcp/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +8 -0
- data/tpl/gcp/deployments/concourse/test/test-credentials.yml +3 -0
- data/tpl/gcp/deployments/concourse/test/test-pipeline.yml +24 -0
- data/tpl/gcp/deployments/nginx/nginx.yml.erb +62 -0
- data/tpl/gcp/deployments/vault/{vault.yml → vault.yml.erb} +1 -1
- data/tpl/gcp/docs/bosh.md +31 -0
- data/tpl/gcp/docs/concourse.md +30 -0
- data/tpl/gcp/docs/vault.md +33 -0
- data/tpl/skel/config/cloud.yml +2 -0
- metadata +62 -19
- data/tpl/aws/concourse-deploy.sh.erb +0 -17
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '0499a1f48e1e1ff191047b0a757469b537cebf0a'
|
4
|
+
data.tar.gz: c562a68c9cf7c851f5088ac6413a2b7d756e0c65
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cd0754e76c673d8001452b1c053d76c2e4053d0ce916b5df8ab18a2dc92212c5d3e359376cd70df6d5e1160ee33a5f9529cc5f626eb2e926747cb452d1421f70
|
7
|
+
data.tar.gz: 071f54533c2228073440213c31145e42668c510de0fe377f15950fd0c93614575a16abc8a69df9b8e1bf88d553f898c7821a3fe4db5f0991c80529fd98a0dd65
|
data/.travis.yml
CHANGED
data/CHANGELOG.md
CHANGED
@@ -2,7 +2,31 @@
|
|
2
2
|
|
3
3
|
## [Unreleased](https://github.com/helios-technologies/kite/tree/HEAD)
|
4
4
|
|
5
|
-
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.
|
5
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.8...HEAD)
|
6
|
+
|
7
|
+
**Closed issues:**
|
8
|
+
|
9
|
+
- Move bosh\_vars into config/ [\#31](https://github.com/helios-technologies/kite/issues/31)
|
10
|
+
|
11
|
+
**Merged pull requests:**
|
12
|
+
|
13
|
+
- Improved documentation and kite render flow [\#47](https://github.com/helios-technologies/kite/pull/47) ([vshatravenko](https://github.com/vshatravenko))
|
14
|
+
- Added Vault manifest for AWS [\#46](https://github.com/helios-technologies/kite/pull/46) ([vshatravenko](https://github.com/vshatravenko))
|
15
|
+
- Added nginx manifest for GCP [\#45](https://github.com/helios-technologies/kite/pull/45) ([vshatravenko](https://github.com/vshatravenko))
|
16
|
+
- Removed public IPs from GCP BOSH deployments [\#44](https://github.com/helios-technologies/kite/pull/44) ([vshatravenko](https://github.com/vshatravenko))
|
17
|
+
- Add codecov report [\#42](https://github.com/helios-technologies/kite/pull/42) ([calj](https://github.com/calj))
|
18
|
+
- Add coverage report [\#41](https://github.com/helios-technologies/kite/pull/41) ([calj](https://github.com/calj))
|
19
|
+
- Fixes for GCP provider [\#40](https://github.com/helios-technologies/kite/pull/40) ([vshatravenko](https://github.com/vshatravenko))
|
20
|
+
- Conditional terraform network resources [\#39](https://github.com/helios-technologies/kite/pull/39) ([vshatravenko](https://github.com/vshatravenko))
|
21
|
+
- Fixed moving scripts to tpl/bin [\#38](https://github.com/helios-technologies/kite/pull/38) ([vshatravenko](https://github.com/vshatravenko))
|
22
|
+
- Add task generate command [\#37](https://github.com/helios-technologies/kite/pull/37) ([nmuzychuk](https://github.com/nmuzychuk))
|
23
|
+
- Added bootstrap and cleanup scripts [\#34](https://github.com/helios-technologies/kite/pull/34) ([vshatravenko](https://github.com/vshatravenko))
|
24
|
+
- Fixed AWS terraform.tfvars rendering [\#33](https://github.com/helios-technologies/kite/pull/33) ([vshatravenko](https://github.com/vshatravenko))
|
25
|
+
- Moved things in proper places [\#32](https://github.com/helios-technologies/kite/pull/32) ([vshatravenko](https://github.com/vshatravenko))
|
26
|
+
- Connected Vault to Concourse [\#23](https://github.com/helios-technologies/kite/pull/23) ([vshatravenko](https://github.com/vshatravenko))
|
27
|
+
|
28
|
+
## [v0.0.8](https://github.com/helios-technologies/kite/tree/v0.0.8) (2017-09-22)
|
29
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...v0.0.8)
|
6
30
|
|
7
31
|
**Closed issues:**
|
8
32
|
|
@@ -59,3 +83,6 @@
|
|
59
83
|
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.2...v0.0.3)
|
60
84
|
|
61
85
|
## [v0.0.2](https://github.com/helios-technologies/kite/tree/v0.0.2) (2017-08-24)
|
86
|
+
|
87
|
+
|
88
|
+
\* *This Change Log was automatically generated by [github_changelog_generator](https://github.com/skywinder/Github-Changelog-Generator)*
|
data/README.md
CHANGED
@@ -1,9 +1,14 @@
|
|
1
1
|
# Kite
|
2
2
|
|
3
3
|
[](https://travis-ci.org/helios-technologies/kite)
|
4
|
+
[](https://codecov.io/gh/helios-technologies/kite)
|
5
|
+
|
4
6
|
|
5
7
|
Kite is a CLI for scaffolding and managing devops modules
|
6
8
|
The main purpose is templating of various tools for devops around terraform, bosh, ansible
|
9
|
+
Currently Kite support one Stack on both AWS and GCP.
|
10
|
+
|
11
|
+
We plan in adding community stack using a simple template repository structure.
|
7
12
|
|
8
13
|
## Installation
|
9
14
|
|
@@ -23,13 +28,37 @@ Or install it yourself as:
|
|
23
28
|
|
24
29
|
## Usage
|
25
30
|
|
26
|
-
To start using kite
|
27
|
-
|
31
|
+
To start using kite for bootstraping your infrastructure
|
32
|
+
follow the steps below :
|
33
|
+
|
34
|
+
### Create your Infrastructure as Code base repository
|
35
|
+
|
36
|
+
Create a new kite project using:
|
37
|
+
|
38
|
+
```
|
39
|
+
$ kite new PROJECT_NAME
|
40
|
+
```
|
41
|
+
|
42
|
+
### Configure your cloud and credentials
|
43
|
+
|
28
44
|
- Fill out the `config/cloud.yml` file with your credentials.
|
29
45
|
- For BOSH you'll need an SSH key, to generate one, use `ssh-keygen -f *path_to_key*`
|
30
|
-
- Generate the cloud IaC needed with `kite generate --cloud=*aws or gcp*`
|
31
|
-
- Continue with instructions from newly generated README.md
|
32
46
|
|
47
|
+
### Generate your infrastructure using terraform
|
48
|
+
|
49
|
+
Generate the cloud IaC needed with
|
50
|
+
|
51
|
+
```
|
52
|
+
$ kite generate --cloud=aws|gcp
|
53
|
+
```
|
54
|
+
|
55
|
+
you can now review and apply your terraform files.
|
56
|
+
|
57
|
+
### Deploy the default stack (BOSH / Concourse / Vault / Kubernetes)
|
58
|
+
|
59
|
+
Continue with instructions from newly generated README.md
|
60
|
+
|
61
|
+
## Getting help
|
33
62
|
|
34
63
|
To list all Kite commands, use
|
35
64
|
|
data/kite.gemspec
CHANGED
@@ -25,4 +25,6 @@ Gem::Specification.new do |spec|
|
|
25
25
|
spec.add_development_dependency "bundler", "~> 1.14"
|
26
26
|
spec.add_development_dependency "rake", "~> 10.0"
|
27
27
|
spec.add_development_dependency "rspec", "~> 3.0"
|
28
|
+
spec.add_development_dependency "simplecov"
|
29
|
+
spec.add_development_dependency "codecov"
|
28
30
|
end
|
data/lib/kite.rb
CHANGED
data/lib/kite/core.rb
CHANGED
@@ -10,46 +10,8 @@ module Kite
|
|
10
10
|
target.prepare
|
11
11
|
end
|
12
12
|
|
13
|
-
|
14
|
-
|
15
|
-
# Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
|
16
|
-
def generate()
|
17
|
-
say "Generating Cloud #{ options[:cloud] } IaC", :green
|
18
|
-
@values = parse_cloud_config
|
19
|
-
|
20
|
-
case options[:cloud]
|
21
|
-
when 'aws'
|
22
|
-
directory('aws/terraform', 'terraform')
|
23
|
-
copy_file('aws/README.md', 'README.md', force: true)
|
24
|
-
|
25
|
-
template('aws/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
26
|
-
template('aws/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
27
|
-
template('aws/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
|
28
|
-
template('aws/set-env.sh.erb', 'bin/set-env.sh')
|
29
|
-
chmod('bin/bosh-install.sh', 0755)
|
30
|
-
chmod('bin/concourse-deploy.sh', 0755)
|
31
|
-
chmod('bin/setup-tunnel.sh', 0755)
|
32
|
-
|
33
|
-
when 'gcp'
|
34
|
-
directory('gcp/terraform', 'terraform')
|
35
|
-
copy_file('gcp/README.md', 'README.md', force: true)
|
36
|
-
|
37
|
-
template('gcp/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
38
|
-
template('gcp/bosh-vars.yml.erb', 'bosh-vars.yml')
|
39
|
-
template('gcp/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
40
|
-
template('gcp/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
|
41
|
-
template('gcp/vault-deploy.sh.erb', 'bin/vault-deploy.sh')
|
42
|
-
template('gcp/set-env.sh.erb', 'bin/set-env.sh')
|
43
|
-
chmod('bin/bosh-install.sh', 0755)
|
44
|
-
chmod('bin/concourse-deploy.sh', 0755)
|
45
|
-
chmod('bin/vault-deploy.sh', 0755)
|
46
|
-
chmod('bin/setup-tunnel.sh', 0755)
|
47
|
-
|
48
|
-
else
|
49
|
-
say 'Cloud provider not specified'
|
50
|
-
|
51
|
-
end
|
52
|
-
end
|
13
|
+
desc "generate", "Generate IaC from configuration"
|
14
|
+
subcommand "generate", Kite::Generate
|
53
15
|
|
54
16
|
desc 'render MANIFEST', 'Render manifest file from configuration and Terraform output'
|
55
17
|
subcommand "render", Kite::Render
|
@@ -0,0 +1,43 @@
|
|
1
|
+
module Kite
|
2
|
+
# Subcommand for rendering manifests, deployments etc.
|
3
|
+
class Generate < Base
|
4
|
+
include Kite::Helpers
|
5
|
+
|
6
|
+
method_option :provider, type: :string, desc: "Cloud provider", enum: %w{aws gcp}, required: true
|
7
|
+
desc "cloud", "Generate cloud IaC from configuration"
|
8
|
+
# Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
|
9
|
+
def cloud()
|
10
|
+
say "Generating cloud #{ options[:provider] } IaC", :green
|
11
|
+
@values = parse_cloud_config
|
12
|
+
|
13
|
+
case options[:provider]
|
14
|
+
when 'aws'
|
15
|
+
directory('aws/terraform', 'terraform')
|
16
|
+
copy_file('aws/README.md', 'README.md', force: true)
|
17
|
+
|
18
|
+
directory('aws/bin/base', 'bin')
|
19
|
+
chmod('bin/bootstrap.sh', 0755)
|
20
|
+
chmod('bin/cleanup.sh', 0755)
|
21
|
+
|
22
|
+
when 'gcp'
|
23
|
+
directory('gcp/terraform', 'terraform')
|
24
|
+
copy_file('gcp/README.md', 'README.md', force: true)
|
25
|
+
|
26
|
+
|
27
|
+
directory('gcp/bin/base', 'bin')
|
28
|
+
chmod('bin/bootstrap.sh', 0755)
|
29
|
+
chmod('bin/cleanup.sh', 0755)
|
30
|
+
|
31
|
+
else
|
32
|
+
say 'Cloud provider not specified'
|
33
|
+
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
method_option :name, type: :string, desc: "Task name", required: true
|
38
|
+
desc "task", "Generate task IaC from configuration"
|
39
|
+
def task()
|
40
|
+
say "Generating task #{ options[:name] } IaC", :green
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
data/lib/kite/helpers.rb
CHANGED
@@ -28,6 +28,33 @@ module Kite::Helpers
|
|
28
28
|
cloud_config
|
29
29
|
end
|
30
30
|
|
31
|
+
# Return public subnet id depending on
|
32
|
+
# whether it's declared in config/cloud.yml or not
|
33
|
+
def conditional_subnet_id(values)
|
34
|
+
subnet_id = values['aws']['public_subnet']['id']
|
35
|
+
|
36
|
+
if subnet_id.empty?
|
37
|
+
'${aws_subnet.platform_dmz.id}'
|
38
|
+
else
|
39
|
+
subnet_id
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
# Return vpc id depending on
|
44
|
+
# whether it's declared in config/cloud.yml or not
|
45
|
+
def conditional_vpc_id(values)
|
46
|
+
vpc_id = values['aws']['vpc_id']
|
47
|
+
|
48
|
+
if vpc_id.empty?
|
49
|
+
'${aws_vpc.platform.id}'
|
50
|
+
else
|
51
|
+
vpc_id
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
|
56
|
+
|
57
|
+
|
31
58
|
# Returns subnet's IP range slice in a BOSH manifest-compatible way
|
32
59
|
def ip_range(subnet, range)
|
33
60
|
|
data/lib/kite/render.rb
CHANGED
@@ -10,24 +10,36 @@ module Kite
|
|
10
10
|
def manifest(type)
|
11
11
|
say "Rendering #{type} manifest", :green
|
12
12
|
@values = parse_cloud_config
|
13
|
-
@tf_output = parse_tf_state('terraform/terraform.tfstate')
|
13
|
+
@tf_output = parse_tf_state('terraform/terraform.tfstate') if options[:cloud] == 'aws'
|
14
|
+
|
15
|
+
if options[:cloud] == 'aws'
|
16
|
+
@private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
|
17
|
+
else
|
18
|
+
@private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
|
19
|
+
end
|
14
20
|
|
15
21
|
case type
|
16
22
|
when "bosh"
|
17
|
-
if options[:cloud] == 'aws'
|
18
|
-
@private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
|
19
|
-
else
|
20
|
-
@private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
|
21
|
-
end
|
22
|
-
|
23
23
|
directory("#{options[:cloud]}/deployments/bosh", 'deployments/bosh')
|
24
|
+
template("#{options[:cloud]}/bosh-vars.yml.erb", 'config/bosh-vars.yml')
|
25
|
+
copy_file("#{options[:cloud]}/docs/bosh.md", "docs/bosh.md")
|
26
|
+
template("#{options[:cloud]}/bin/bosh-install.sh.tt", "bin/bosh-install.sh")
|
27
|
+
chmod('bin/bosh-install.sh', 0755)
|
24
28
|
|
25
29
|
when "concourse"
|
26
|
-
|
27
|
-
|
30
|
+
directory("#{options[:cloud]}/deployments/concourse", "deployments/concourse")
|
31
|
+
copy_file("#{options[:cloud]}/docs/concourse.md", "docs/concourse.md")
|
32
|
+
template("#{options[:cloud]}/bin/concourse-deploy.sh.tt", "bin/concourse-deploy.sh")
|
33
|
+
chmod('bin/concourse-deploy.sh', 0755)
|
34
|
+
|
28
35
|
when "vault"
|
29
|
-
|
30
|
-
copy_file("#{options[:cloud]}/vault.md",
|
36
|
+
template("#{options[:cloud]}/deployments/vault/vault.yml.erb", "deployments/vault/vault.yml")
|
37
|
+
copy_file("#{options[:cloud]}/docs/vault.md", "docs/vault.md")
|
38
|
+
template("#{options[:cloud]}/bin/vault-deploy.sh.tt", "bin/vault-deploy.sh")
|
39
|
+
chmod('bin/vault-deploy.sh', 0755)
|
40
|
+
|
41
|
+
when "nginx"
|
42
|
+
template("#{options[:cloud]}/deployments/nginx/nginx.yml.erb", "deployments/nginx/nginx.yml")
|
31
43
|
|
32
44
|
else
|
33
45
|
say "Manifest type not specified"
|
data/lib/kite/version.rb
CHANGED
data/tpl/aws/README.md
CHANGED
@@ -1,29 +1,29 @@
|
|
1
|
-
|
2
|
-
===================================
|
1
|
+
## AWS Cloud
|
3
2
|
|
4
|
-
|
3
|
+
### Setup
|
5
4
|
|
6
|
-
|
7
|
-
|
8
|
-
|
5
|
+
Apply terraform code
|
6
|
+
```
|
7
|
+
pushd terraform && terraform init && terraform apply && popd
|
8
|
+
```
|
9
9
|
|
10
|
-
|
10
|
+
Render BOSH manifest and related files
|
11
|
+
```
|
12
|
+
kite render manifest bosh --cloud aws
|
13
|
+
```
|
11
14
|
|
12
|
-
|
13
|
-
-----
|
15
|
+
Prepare BOSH environment using instructions from [docs/bosh.md](docs/bosh.md)
|
14
16
|
|
15
|
-
|
16
|
-
|
17
|
+
Render Vault deployment
|
18
|
+
```
|
19
|
+
kite render manifest vault --cloud aws
|
20
|
+
```
|
17
21
|
|
18
|
-
|
19
|
-
-----
|
22
|
+
Follow instructions from [docs/vault.md](docs/vault.md) to deploy Vault
|
20
23
|
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
- Run `bin/bosh-install.sh` to deploy the BOSH Director
|
24
|
+
Render Concourse manifest
|
25
|
+
```
|
26
|
+
kite render manifest concourse --cloud aws
|
27
|
+
```
|
26
28
|
|
27
|
-
|
28
|
-
|
29
|
-
To connect to Bastion over SSH, use ssh jumpbox@*bastion ip* -i jumpbox.key
|
29
|
+
Follow instructions from [docs/concourse.md](docs/concourse.md) to deploy Concourse
|
@@ -0,0 +1,35 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
set -xe
|
4
|
+
|
5
|
+
# Apply Terraform IaC
|
6
|
+
pushd terraform
|
7
|
+
|
8
|
+
terraform init
|
9
|
+
terraform apply
|
10
|
+
|
11
|
+
popd
|
12
|
+
|
13
|
+
# Set up an SSH tunnel to Bastion
|
14
|
+
. bin/setup-tunnel.sh
|
15
|
+
|
16
|
+
# Render BOSH manifest and related files
|
17
|
+
kite render manifest bosh --cloud aws
|
18
|
+
|
19
|
+
# Deploy BOSH Director
|
20
|
+
./bin/bosh-install.sh
|
21
|
+
|
22
|
+
# Set the needed environment variables
|
23
|
+
. bin/set-env.sh
|
24
|
+
|
25
|
+
# Render Vault manifest
|
26
|
+
kite render manifest vault --cloud aws
|
27
|
+
|
28
|
+
# Deploy Vault
|
29
|
+
./bin/vault-deploy.sh
|
30
|
+
|
31
|
+
# Render Concourse manifest and related files
|
32
|
+
kite render manifest concourse --cloud aws
|
33
|
+
|
34
|
+
# Deploy Concourse
|
35
|
+
./bin/concourse-deploy.sh
|
@@ -0,0 +1,19 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
# Remove existing BOSH deployments
|
4
|
+
bosh -e <%= @values['bosh']['name'] %> -d concourse deld
|
5
|
+
|
6
|
+
# Destroy BOSH director
|
7
|
+
bosh delete-env deployments/bosh/bosh.yml \
|
8
|
+
--state=config/state.json \
|
9
|
+
--vars-store=config/creds.yml \
|
10
|
+
--vars-file=config/bosh-vars.yml \
|
11
|
+
--var-file private_key=<%= @values['kite']['private_key_path'] %> \
|
12
|
+
-o deployments/bosh/cpi.yml \
|
13
|
+
-o deployments/bosh/jumpbox-user.yml
|
14
|
+
|
15
|
+
# Destroy Terraform-generated infrastructure
|
16
|
+
pushd terraform && terraform destroy && popd
|
17
|
+
|
18
|
+
# Remove files generated by kite
|
19
|
+
rm -rf terraform deployments config/{creds.yml,bosh_vars.yml,jumpbox.key} bin/*.sh
|
File without changes
|
File without changes
|
@@ -6,7 +6,7 @@ set -xe
|
|
6
6
|
bosh create-env deployments/bosh/bosh.yml \
|
7
7
|
--state=config/state.json \
|
8
8
|
--vars-store=config/creds.yml \
|
9
|
-
--vars-file=
|
9
|
+
--vars-file=config/bosh-vars.yml \
|
10
10
|
--var-file private_key=<%= @values['kite']['private_key_path'] %> \
|
11
11
|
-o deployments/bosh/cpi.yml \
|
12
12
|
-o deployments/bosh/jumpbox-user.yml
|
@@ -16,7 +16,7 @@ bosh alias-env <%= @values['bosh']['name'] %> \
|
|
16
16
|
-e <%= @values['bosh']['static_ip'] %> \
|
17
17
|
--ca-cert <(bosh int ./config/creds.yml --path /director_ssl/ca)
|
18
18
|
|
19
|
-
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/
|
19
|
+
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud-config.yml
|
20
20
|
|
21
21
|
# Get jumpbox user key
|
22
22
|
bosh int config/creds.yml --path /jumpbox_ssh/private_key > config/jumpbox.key
|