kite 0.0.8 → 0.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. checksums.yaml +4 -4
  2. data/.travis.yml +2 -0
  3. data/CHANGELOG.md +28 -1
  4. data/README.md +33 -4
  5. data/kite.gemspec +2 -0
  6. data/lib/kite.rb +1 -0
  7. data/lib/kite/core.rb +2 -40
  8. data/lib/kite/generate.rb +43 -0
  9. data/lib/kite/helpers.rb +27 -0
  10. data/lib/kite/render.rb +23 -11
  11. data/lib/kite/version.rb +1 -1
  12. data/tpl/aws/README.md +21 -21
  13. data/tpl/aws/bin/base/bootstrap.sh +35 -0
  14. data/tpl/aws/bin/base/cleanup.sh.tt +19 -0
  15. data/tpl/aws/{set-env.sh.erb → bin/base/set-env.sh.tt} +0 -0
  16. data/tpl/aws/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +0 -0
  17. data/tpl/aws/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +2 -2
  18. data/tpl/{gcp/concourse-deploy.sh.erb → aws/bin/concourse-deploy.sh.tt} +0 -0
  19. data/tpl/aws/bin/vault-deploy.sh.tt +10 -0
  20. data/tpl/aws/{deployments/bosh/bosh_vars.yml.tt → bosh-vars.yml.erb} +0 -0
  21. data/tpl/aws/deployments/bosh/cloud-config.yml.tt +2 -1
  22. data/tpl/aws/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +7 -0
  23. data/tpl/aws/deployments/vault/vault.yml.erb +38 -0
  24. data/tpl/aws/docs/bosh.md +31 -0
  25. data/tpl/aws/docs/concourse.md +30 -0
  26. data/tpl/{gcp → aws/docs}/vault.md +13 -6
  27. data/tpl/aws/terraform/{main.tf → main.tf.tt} +1 -2
  28. data/tpl/aws/terraform/{network.tf → network.tf.tt} +40 -23
  29. data/tpl/aws/terraform/{terraform.tfvars.erb → terraform.tfvars.tt} +2 -0
  30. data/tpl/aws/terraform/variables.tf +8 -0
  31. data/tpl/gcp/README.md +10 -31
  32. data/tpl/gcp/bin/base/bootstrap.sh +35 -0
  33. data/tpl/gcp/bin/base/cleanup.sh.tt +20 -0
  34. data/tpl/gcp/{set-env.sh.erb → bin/base/set-env.sh.tt} +3 -1
  35. data/tpl/gcp/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +3 -1
  36. data/tpl/gcp/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +3 -2
  37. data/tpl/gcp/bin/concourse-deploy.sh.tt +11 -0
  38. data/tpl/gcp/{vault-deploy.sh.erb → bin/vault-deploy.sh.tt} +1 -1
  39. data/tpl/gcp/deployments/bosh/cloud-config.yml.tt +3 -2
  40. data/tpl/gcp/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +8 -0
  41. data/tpl/gcp/deployments/concourse/test/test-credentials.yml +3 -0
  42. data/tpl/gcp/deployments/concourse/test/test-pipeline.yml +24 -0
  43. data/tpl/gcp/deployments/nginx/nginx.yml.erb +62 -0
  44. data/tpl/gcp/deployments/vault/{vault.yml → vault.yml.erb} +1 -1
  45. data/tpl/gcp/docs/bosh.md +31 -0
  46. data/tpl/gcp/docs/concourse.md +30 -0
  47. data/tpl/gcp/docs/vault.md +33 -0
  48. data/tpl/skel/config/cloud.yml +2 -0
  49. metadata +62 -19
  50. data/tpl/aws/concourse-deploy.sh.erb +0 -17
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: d029f893bc9f787beff2681b15c0b6ab31371b70
4
- data.tar.gz: 406a1dc3d0a397bba6e2dae0983d464a9ce7b791
3
+ metadata.gz: '0499a1f48e1e1ff191047b0a757469b537cebf0a'
4
+ data.tar.gz: c562a68c9cf7c851f5088ac6413a2b7d756e0c65
5
5
  SHA512:
6
- metadata.gz: 4247ff2253a5ff7d392b820cd3cd8c329f8a23159017ca4359072102e2bf57bb2fee91b28401371eb4c658f7cbc390faede99486323b2485b7944f456b54ccd3
7
- data.tar.gz: 1e4593d77af49accd33e8e6341d250e919034da2358610f9c0ddc08bd3b136cbb2180333776aa35d24c797a55131046d18c34dc84f923a6ce8e37782ebe475b8
6
+ metadata.gz: cd0754e76c673d8001452b1c053d76c2e4053d0ce916b5df8ab18a2dc92212c5d3e359376cd70df6d5e1160ee33a5f9529cc5f626eb2e926747cb452d1421f70
7
+ data.tar.gz: 071f54533c2228073440213c31145e42668c510de0fe377f15950fd0c93614575a16abc8a69df9b8e1bf88d553f898c7821a3fe4db5f0991c80529fd98a0dd65
data/.travis.yml CHANGED
@@ -3,3 +3,5 @@ language: ruby
3
3
  rvm:
4
4
  - 2.4.0
5
5
  before_install: gem install bundler -v 1.14.6
6
+ env:
7
+ COVERAGE: true
data/CHANGELOG.md CHANGED
@@ -2,7 +2,31 @@
2
2
 
3
3
  ## [Unreleased](https://github.com/helios-technologies/kite/tree/HEAD)
4
4
 
5
- [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...HEAD)
5
+ [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.8...HEAD)
6
+
7
+ **Closed issues:**
8
+
9
+ - Move bosh\_vars into config/ [\#31](https://github.com/helios-technologies/kite/issues/31)
10
+
11
+ **Merged pull requests:**
12
+
13
+ - Improved documentation and kite render flow [\#47](https://github.com/helios-technologies/kite/pull/47) ([vshatravenko](https://github.com/vshatravenko))
14
+ - Added Vault manifest for AWS [\#46](https://github.com/helios-technologies/kite/pull/46) ([vshatravenko](https://github.com/vshatravenko))
15
+ - Added nginx manifest for GCP [\#45](https://github.com/helios-technologies/kite/pull/45) ([vshatravenko](https://github.com/vshatravenko))
16
+ - Removed public IPs from GCP BOSH deployments [\#44](https://github.com/helios-technologies/kite/pull/44) ([vshatravenko](https://github.com/vshatravenko))
17
+ - Add codecov report [\#42](https://github.com/helios-technologies/kite/pull/42) ([calj](https://github.com/calj))
18
+ - Add coverage report [\#41](https://github.com/helios-technologies/kite/pull/41) ([calj](https://github.com/calj))
19
+ - Fixes for GCP provider [\#40](https://github.com/helios-technologies/kite/pull/40) ([vshatravenko](https://github.com/vshatravenko))
20
+ - Conditional terraform network resources [\#39](https://github.com/helios-technologies/kite/pull/39) ([vshatravenko](https://github.com/vshatravenko))
21
+ - Fixed moving scripts to tpl/bin [\#38](https://github.com/helios-technologies/kite/pull/38) ([vshatravenko](https://github.com/vshatravenko))
22
+ - Add task generate command [\#37](https://github.com/helios-technologies/kite/pull/37) ([nmuzychuk](https://github.com/nmuzychuk))
23
+ - Added bootstrap and cleanup scripts [\#34](https://github.com/helios-technologies/kite/pull/34) ([vshatravenko](https://github.com/vshatravenko))
24
+ - Fixed AWS terraform.tfvars rendering [\#33](https://github.com/helios-technologies/kite/pull/33) ([vshatravenko](https://github.com/vshatravenko))
25
+ - Moved things in proper places [\#32](https://github.com/helios-technologies/kite/pull/32) ([vshatravenko](https://github.com/vshatravenko))
26
+ - Connected Vault to Concourse [\#23](https://github.com/helios-technologies/kite/pull/23) ([vshatravenko](https://github.com/vshatravenko))
27
+
28
+ ## [v0.0.8](https://github.com/helios-technologies/kite/tree/v0.0.8) (2017-09-22)
29
+ [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...v0.0.8)
6
30
 
7
31
  **Closed issues:**
8
32
 
@@ -59,3 +83,6 @@
59
83
  [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.2...v0.0.3)
60
84
 
61
85
  ## [v0.0.2](https://github.com/helios-technologies/kite/tree/v0.0.2) (2017-08-24)
86
+
87
+
88
+ \* *This Change Log was automatically generated by [github_changelog_generator](https://github.com/skywinder/Github-Changelog-Generator)*
data/README.md CHANGED
@@ -1,9 +1,14 @@
1
1
  # Kite
2
2
 
3
3
  [![Build Status](https://travis-ci.org/helios-technologies/kite.svg?branch=master)](https://travis-ci.org/helios-technologies/kite)
4
+ [![codecov](https://codecov.io/gh/helios-technologies/kite/branch/master/graph/badge.svg)](https://codecov.io/gh/helios-technologies/kite)
5
+
4
6
 
5
7
  Kite is a CLI for scaffolding and managing devops modules
6
8
  The main purpose is templating of various tools for devops around terraform, bosh, ansible
9
+ Currently Kite support one Stack on both AWS and GCP.
10
+
11
+ We plan in adding community stack using a simple template repository structure.
7
12
 
8
13
  ## Installation
9
14
 
@@ -23,13 +28,37 @@ Or install it yourself as:
23
28
 
24
29
  ## Usage
25
30
 
26
- To start using kite from scratch:
27
- - Create a new kite project, use `kite new`
31
+ To start using kite for bootstraping your infrastructure
32
+ follow the steps below :
33
+
34
+ ### Create your Infrastructure as Code base repository
35
+
36
+ Create a new kite project using:
37
+
38
+ ```
39
+ $ kite new PROJECT_NAME
40
+ ```
41
+
42
+ ### Configure your cloud and credentials
43
+
28
44
  - Fill out the `config/cloud.yml` file with your credentials.
29
45
  - For BOSH you'll need an SSH key, to generate one, use `ssh-keygen -f *path_to_key*`
30
- - Generate the cloud IaC needed with `kite generate --cloud=*aws or gcp*`
31
- - Continue with instructions from newly generated README.md
32
46
 
47
+ ### Generate your infrastructure using terraform
48
+
49
+ Generate the cloud IaC needed with
50
+
51
+ ```
52
+ $ kite generate --cloud=aws|gcp
53
+ ```
54
+
55
+ you can now review and apply your terraform files.
56
+
57
+ ### Deploy the default stack (BOSH / Concourse / Vault / Kubernetes)
58
+
59
+ Continue with instructions from newly generated README.md
60
+
61
+ ## Getting help
33
62
 
34
63
  To list all Kite commands, use
35
64
 
data/kite.gemspec CHANGED
@@ -25,4 +25,6 @@ Gem::Specification.new do |spec|
25
25
  spec.add_development_dependency "bundler", "~> 1.14"
26
26
  spec.add_development_dependency "rake", "~> 10.0"
27
27
  spec.add_development_dependency "rspec", "~> 3.0"
28
+ spec.add_development_dependency "simplecov"
29
+ spec.add_development_dependency "codecov"
28
30
  end
data/lib/kite.rb CHANGED
@@ -9,5 +9,6 @@ require 'kite/error'
9
9
 
10
10
  require 'kite/base'
11
11
  require 'kite/render'
12
+ require 'kite/generate'
12
13
  require 'kite/core'
13
14
  require 'kite/cloud'
data/lib/kite/core.rb CHANGED
@@ -10,46 +10,8 @@ module Kite
10
10
  target.prepare
11
11
  end
12
12
 
13
- method_option :cloud, type: :string, desc: "Cloud provider", enum: %w{aws gcp}, required: true
14
- desc "generate", "Generate Cloud IaC from configuration"
15
- # Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
16
- def generate()
17
- say "Generating Cloud #{ options[:cloud] } IaC", :green
18
- @values = parse_cloud_config
19
-
20
- case options[:cloud]
21
- when 'aws'
22
- directory('aws/terraform', 'terraform')
23
- copy_file('aws/README.md', 'README.md', force: true)
24
-
25
- template('aws/bosh-install.sh.erb', 'bin/bosh-install.sh')
26
- template('aws/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
27
- template('aws/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
28
- template('aws/set-env.sh.erb', 'bin/set-env.sh')
29
- chmod('bin/bosh-install.sh', 0755)
30
- chmod('bin/concourse-deploy.sh', 0755)
31
- chmod('bin/setup-tunnel.sh', 0755)
32
-
33
- when 'gcp'
34
- directory('gcp/terraform', 'terraform')
35
- copy_file('gcp/README.md', 'README.md', force: true)
36
-
37
- template('gcp/bosh-install.sh.erb', 'bin/bosh-install.sh')
38
- template('gcp/bosh-vars.yml.erb', 'bosh-vars.yml')
39
- template('gcp/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
40
- template('gcp/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
41
- template('gcp/vault-deploy.sh.erb', 'bin/vault-deploy.sh')
42
- template('gcp/set-env.sh.erb', 'bin/set-env.sh')
43
- chmod('bin/bosh-install.sh', 0755)
44
- chmod('bin/concourse-deploy.sh', 0755)
45
- chmod('bin/vault-deploy.sh', 0755)
46
- chmod('bin/setup-tunnel.sh', 0755)
47
-
48
- else
49
- say 'Cloud provider not specified'
50
-
51
- end
52
- end
13
+ desc "generate", "Generate IaC from configuration"
14
+ subcommand "generate", Kite::Generate
53
15
 
54
16
  desc 'render MANIFEST', 'Render manifest file from configuration and Terraform output'
55
17
  subcommand "render", Kite::Render
@@ -0,0 +1,43 @@
1
+ module Kite
2
+ # Subcommand for rendering manifests, deployments etc.
3
+ class Generate < Base
4
+ include Kite::Helpers
5
+
6
+ method_option :provider, type: :string, desc: "Cloud provider", enum: %w{aws gcp}, required: true
7
+ desc "cloud", "Generate cloud IaC from configuration"
8
+ # Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
9
+ def cloud()
10
+ say "Generating cloud #{ options[:provider] } IaC", :green
11
+ @values = parse_cloud_config
12
+
13
+ case options[:provider]
14
+ when 'aws'
15
+ directory('aws/terraform', 'terraform')
16
+ copy_file('aws/README.md', 'README.md', force: true)
17
+
18
+ directory('aws/bin/base', 'bin')
19
+ chmod('bin/bootstrap.sh', 0755)
20
+ chmod('bin/cleanup.sh', 0755)
21
+
22
+ when 'gcp'
23
+ directory('gcp/terraform', 'terraform')
24
+ copy_file('gcp/README.md', 'README.md', force: true)
25
+
26
+
27
+ directory('gcp/bin/base', 'bin')
28
+ chmod('bin/bootstrap.sh', 0755)
29
+ chmod('bin/cleanup.sh', 0755)
30
+
31
+ else
32
+ say 'Cloud provider not specified'
33
+
34
+ end
35
+ end
36
+
37
+ method_option :name, type: :string, desc: "Task name", required: true
38
+ desc "task", "Generate task IaC from configuration"
39
+ def task()
40
+ say "Generating task #{ options[:name] } IaC", :green
41
+ end
42
+ end
43
+ end
data/lib/kite/helpers.rb CHANGED
@@ -28,6 +28,33 @@ module Kite::Helpers
28
28
  cloud_config
29
29
  end
30
30
 
31
+ # Return public subnet id depending on
32
+ # whether it's declared in config/cloud.yml or not
33
+ def conditional_subnet_id(values)
34
+ subnet_id = values['aws']['public_subnet']['id']
35
+
36
+ if subnet_id.empty?
37
+ '${aws_subnet.platform_dmz.id}'
38
+ else
39
+ subnet_id
40
+ end
41
+ end
42
+
43
+ # Return vpc id depending on
44
+ # whether it's declared in config/cloud.yml or not
45
+ def conditional_vpc_id(values)
46
+ vpc_id = values['aws']['vpc_id']
47
+
48
+ if vpc_id.empty?
49
+ '${aws_vpc.platform.id}'
50
+ else
51
+ vpc_id
52
+ end
53
+ end
54
+
55
+
56
+
57
+
31
58
  # Returns subnet's IP range slice in a BOSH manifest-compatible way
32
59
  def ip_range(subnet, range)
33
60
 
data/lib/kite/render.rb CHANGED
@@ -10,24 +10,36 @@ module Kite
10
10
  def manifest(type)
11
11
  say "Rendering #{type} manifest", :green
12
12
  @values = parse_cloud_config
13
- @tf_output = parse_tf_state('terraform/terraform.tfstate')
13
+ @tf_output = parse_tf_state('terraform/terraform.tfstate') if options[:cloud] == 'aws'
14
+
15
+ if options[:cloud] == 'aws'
16
+ @private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
17
+ else
18
+ @private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
19
+ end
14
20
 
15
21
  case type
16
22
  when "bosh"
17
- if options[:cloud] == 'aws'
18
- @private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
19
- else
20
- @private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
21
- end
22
-
23
23
  directory("#{options[:cloud]}/deployments/bosh", 'deployments/bosh')
24
+ template("#{options[:cloud]}/bosh-vars.yml.erb", 'config/bosh-vars.yml')
25
+ copy_file("#{options[:cloud]}/docs/bosh.md", "docs/bosh.md")
26
+ template("#{options[:cloud]}/bin/bosh-install.sh.tt", "bin/bosh-install.sh")
27
+ chmod('bin/bosh-install.sh', 0755)
24
28
 
25
29
  when "concourse"
26
- template("#{options[:cloud]}/deployments/concourse/cloud-config.yml.erb", "deployments/concourse/cloud-config.yml")
27
- template("#{options[:cloud]}/deployments/concourse/concourse.yml.erb", "deployments/concourse/concourse.yml")
30
+ directory("#{options[:cloud]}/deployments/concourse", "deployments/concourse")
31
+ copy_file("#{options[:cloud]}/docs/concourse.md", "docs/concourse.md")
32
+ template("#{options[:cloud]}/bin/concourse-deploy.sh.tt", "bin/concourse-deploy.sh")
33
+ chmod('bin/concourse-deploy.sh', 0755)
34
+
28
35
  when "vault"
29
- copy_file("#{options[:cloud]}/deployments/vault/vault.yml", "deployments/vault/vault.yml")
30
- copy_file("#{options[:cloud]}/vault.md", "docs/vault.md")
36
+ template("#{options[:cloud]}/deployments/vault/vault.yml.erb", "deployments/vault/vault.yml")
37
+ copy_file("#{options[:cloud]}/docs/vault.md", "docs/vault.md")
38
+ template("#{options[:cloud]}/bin/vault-deploy.sh.tt", "bin/vault-deploy.sh")
39
+ chmod('bin/vault-deploy.sh', 0755)
40
+
41
+ when "nginx"
42
+ template("#{options[:cloud]}/deployments/nginx/nginx.yml.erb", "deployments/nginx/nginx.yml")
31
43
 
32
44
  else
33
45
  say "Manifest type not specified"
data/lib/kite/version.rb CHANGED
@@ -1,3 +1,3 @@
1
1
  module Kite
2
- VERSION = "0.0.8"
2
+ VERSION = "0.0.9"
3
3
  end
data/tpl/aws/README.md CHANGED
@@ -1,29 +1,29 @@
1
- BOSH Director & Concourse Bootstrap
2
- ===================================
1
+ ## AWS Cloud
3
2
 
4
- This project achieves the following:
3
+ ### Setup
5
4
 
6
- - Preparation of an AWS environment for BOSH & Concourse
7
- - Deployment of a new BOSH Director using bosh-init
8
- - Deployment of a new Concourse cluster, or standalone server
5
+ Apply terraform code
6
+ ```
7
+ pushd terraform && terraform init && terraform apply && popd
8
+ ```
9
9
 
10
- Terraform is used to setup the base network and security infrastructure, including an ELB for Concourse.
10
+ Render BOSH manifest and related files
11
+ ```
12
+ kite render manifest bosh --cloud aws
13
+ ```
11
14
 
12
- Requirements
13
- -----
15
+ Prepare BOSH environment using instructions from [docs/bosh.md](docs/bosh.md)
14
16
 
15
- - Install [terraform](https://www.terraform.io/intro/getting-started/install.html)
16
- - Install [bosh](https://bosh.io/docs/cli-v2.html#install)
17
+ Render Vault deployment
18
+ ```
19
+ kite render manifest vault --cloud aws
20
+ ```
17
21
 
18
- Usage
19
- -----
22
+ Follow instructions from [docs/vault.md](docs/vault.md) to deploy Vault
20
23
 
21
- To deploy a BOSH Director:
22
- - Apply the terraform IaC from `terraform` folder
23
- - Run `source bin/setup-tunnel.sh` to create an SSH CLI tunnel
24
- - Run `kite render manifest bosh --cloud=aws` to render BOSH deployment files
25
- - Run `bin/bosh-install.sh` to deploy the BOSH Director
24
+ Render Concourse manifest
25
+ ```
26
+ kite render manifest concourse --cloud aws
27
+ ```
26
28
 
27
- To access BOSH Director information, use bosh -e *bosh_name* env
28
-
29
- To connect to Bastion over SSH, use ssh jumpbox@*bastion ip* -i jumpbox.key
29
+ Follow instructions from [docs/concourse.md](docs/concourse.md) to deploy Concourse
@@ -0,0 +1,35 @@
1
+ #!/usr/bin/env bash
2
+
3
+ set -xe
4
+
5
+ # Apply Terraform IaC
6
+ pushd terraform
7
+
8
+ terraform init
9
+ terraform apply
10
+
11
+ popd
12
+
13
+ # Set up an SSH tunnel to Bastion
14
+ . bin/setup-tunnel.sh
15
+
16
+ # Render BOSH manifest and related files
17
+ kite render manifest bosh --cloud aws
18
+
19
+ # Deploy BOSH Director
20
+ ./bin/bosh-install.sh
21
+
22
+ # Set the needed environment variables
23
+ . bin/set-env.sh
24
+
25
+ # Render Vault manifest
26
+ kite render manifest vault --cloud aws
27
+
28
+ # Deploy Vault
29
+ ./bin/vault-deploy.sh
30
+
31
+ # Render Concourse manifest and related files
32
+ kite render manifest concourse --cloud aws
33
+
34
+ # Deploy Concourse
35
+ ./bin/concourse-deploy.sh
@@ -0,0 +1,19 @@
1
+ #!/usr/bin/env bash
2
+
3
+ # Remove existing BOSH deployments
4
+ bosh -e <%= @values['bosh']['name'] %> -d concourse deld
5
+
6
+ # Destroy BOSH director
7
+ bosh delete-env deployments/bosh/bosh.yml \
8
+ --state=config/state.json \
9
+ --vars-store=config/creds.yml \
10
+ --vars-file=config/bosh-vars.yml \
11
+ --var-file private_key=<%= @values['kite']['private_key_path'] %> \
12
+ -o deployments/bosh/cpi.yml \
13
+ -o deployments/bosh/jumpbox-user.yml
14
+
15
+ # Destroy Terraform-generated infrastructure
16
+ pushd terraform && terraform destroy && popd
17
+
18
+ # Remove files generated by kite
19
+ rm -rf terraform deployments config/{creds.yml,bosh_vars.yml,jumpbox.key} bin/*.sh
File without changes
@@ -6,7 +6,7 @@ set -xe
6
6
  bosh create-env deployments/bosh/bosh.yml \
7
7
  --state=config/state.json \
8
8
  --vars-store=config/creds.yml \
9
- --vars-file=deployments/bosh/bosh_vars.yml \
9
+ --vars-file=config/bosh-vars.yml \
10
10
  --var-file private_key=<%= @values['kite']['private_key_path'] %> \
11
11
  -o deployments/bosh/cpi.yml \
12
12
  -o deployments/bosh/jumpbox-user.yml
@@ -16,7 +16,7 @@ bosh alias-env <%= @values['bosh']['name'] %> \
16
16
  -e <%= @values['bosh']['static_ip'] %> \
17
17
  --ca-cert <(bosh int ./config/creds.yml --path /director_ssl/ca)
18
18
 
19
- bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud_config.yml
19
+ bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud-config.yml
20
20
 
21
21
  # Get jumpbox user key
22
22
  bosh int config/creds.yml --path /jumpbox_ssh/private_key > config/jumpbox.key