kite 0.0.8 → 0.0.9
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.travis.yml +2 -0
- data/CHANGELOG.md +28 -1
- data/README.md +33 -4
- data/kite.gemspec +2 -0
- data/lib/kite.rb +1 -0
- data/lib/kite/core.rb +2 -40
- data/lib/kite/generate.rb +43 -0
- data/lib/kite/helpers.rb +27 -0
- data/lib/kite/render.rb +23 -11
- data/lib/kite/version.rb +1 -1
- data/tpl/aws/README.md +21 -21
- data/tpl/aws/bin/base/bootstrap.sh +35 -0
- data/tpl/aws/bin/base/cleanup.sh.tt +19 -0
- data/tpl/aws/{set-env.sh.erb → bin/base/set-env.sh.tt} +0 -0
- data/tpl/aws/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +0 -0
- data/tpl/aws/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +2 -2
- data/tpl/{gcp/concourse-deploy.sh.erb → aws/bin/concourse-deploy.sh.tt} +0 -0
- data/tpl/aws/bin/vault-deploy.sh.tt +10 -0
- data/tpl/aws/{deployments/bosh/bosh_vars.yml.tt → bosh-vars.yml.erb} +0 -0
- data/tpl/aws/deployments/bosh/cloud-config.yml.tt +2 -1
- data/tpl/aws/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +7 -0
- data/tpl/aws/deployments/vault/vault.yml.erb +38 -0
- data/tpl/aws/docs/bosh.md +31 -0
- data/tpl/aws/docs/concourse.md +30 -0
- data/tpl/{gcp → aws/docs}/vault.md +13 -6
- data/tpl/aws/terraform/{main.tf → main.tf.tt} +1 -2
- data/tpl/aws/terraform/{network.tf → network.tf.tt} +40 -23
- data/tpl/aws/terraform/{terraform.tfvars.erb → terraform.tfvars.tt} +2 -0
- data/tpl/aws/terraform/variables.tf +8 -0
- data/tpl/gcp/README.md +10 -31
- data/tpl/gcp/bin/base/bootstrap.sh +35 -0
- data/tpl/gcp/bin/base/cleanup.sh.tt +20 -0
- data/tpl/gcp/{set-env.sh.erb → bin/base/set-env.sh.tt} +3 -1
- data/tpl/gcp/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +3 -1
- data/tpl/gcp/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +3 -2
- data/tpl/gcp/bin/concourse-deploy.sh.tt +11 -0
- data/tpl/gcp/{vault-deploy.sh.erb → bin/vault-deploy.sh.tt} +1 -1
- data/tpl/gcp/deployments/bosh/cloud-config.yml.tt +3 -2
- data/tpl/gcp/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +8 -0
- data/tpl/gcp/deployments/concourse/test/test-credentials.yml +3 -0
- data/tpl/gcp/deployments/concourse/test/test-pipeline.yml +24 -0
- data/tpl/gcp/deployments/nginx/nginx.yml.erb +62 -0
- data/tpl/gcp/deployments/vault/{vault.yml → vault.yml.erb} +1 -1
- data/tpl/gcp/docs/bosh.md +31 -0
- data/tpl/gcp/docs/concourse.md +30 -0
- data/tpl/gcp/docs/vault.md +33 -0
- data/tpl/skel/config/cloud.yml +2 -0
- metadata +62 -19
- data/tpl/aws/concourse-deploy.sh.erb +0 -17
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '0499a1f48e1e1ff191047b0a757469b537cebf0a'
|
4
|
+
data.tar.gz: c562a68c9cf7c851f5088ac6413a2b7d756e0c65
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cd0754e76c673d8001452b1c053d76c2e4053d0ce916b5df8ab18a2dc92212c5d3e359376cd70df6d5e1160ee33a5f9529cc5f626eb2e926747cb452d1421f70
|
7
|
+
data.tar.gz: 071f54533c2228073440213c31145e42668c510de0fe377f15950fd0c93614575a16abc8a69df9b8e1bf88d553f898c7821a3fe4db5f0991c80529fd98a0dd65
|
data/.travis.yml
CHANGED
data/CHANGELOG.md
CHANGED
@@ -2,7 +2,31 @@
|
|
2
2
|
|
3
3
|
## [Unreleased](https://github.com/helios-technologies/kite/tree/HEAD)
|
4
4
|
|
5
|
-
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.
|
5
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.8...HEAD)
|
6
|
+
|
7
|
+
**Closed issues:**
|
8
|
+
|
9
|
+
- Move bosh\_vars into config/ [\#31](https://github.com/helios-technologies/kite/issues/31)
|
10
|
+
|
11
|
+
**Merged pull requests:**
|
12
|
+
|
13
|
+
- Improved documentation and kite render flow [\#47](https://github.com/helios-technologies/kite/pull/47) ([vshatravenko](https://github.com/vshatravenko))
|
14
|
+
- Added Vault manifest for AWS [\#46](https://github.com/helios-technologies/kite/pull/46) ([vshatravenko](https://github.com/vshatravenko))
|
15
|
+
- Added nginx manifest for GCP [\#45](https://github.com/helios-technologies/kite/pull/45) ([vshatravenko](https://github.com/vshatravenko))
|
16
|
+
- Removed public IPs from GCP BOSH deployments [\#44](https://github.com/helios-technologies/kite/pull/44) ([vshatravenko](https://github.com/vshatravenko))
|
17
|
+
- Add codecov report [\#42](https://github.com/helios-technologies/kite/pull/42) ([calj](https://github.com/calj))
|
18
|
+
- Add coverage report [\#41](https://github.com/helios-technologies/kite/pull/41) ([calj](https://github.com/calj))
|
19
|
+
- Fixes for GCP provider [\#40](https://github.com/helios-technologies/kite/pull/40) ([vshatravenko](https://github.com/vshatravenko))
|
20
|
+
- Conditional terraform network resources [\#39](https://github.com/helios-technologies/kite/pull/39) ([vshatravenko](https://github.com/vshatravenko))
|
21
|
+
- Fixed moving scripts to tpl/bin [\#38](https://github.com/helios-technologies/kite/pull/38) ([vshatravenko](https://github.com/vshatravenko))
|
22
|
+
- Add task generate command [\#37](https://github.com/helios-technologies/kite/pull/37) ([nmuzychuk](https://github.com/nmuzychuk))
|
23
|
+
- Added bootstrap and cleanup scripts [\#34](https://github.com/helios-technologies/kite/pull/34) ([vshatravenko](https://github.com/vshatravenko))
|
24
|
+
- Fixed AWS terraform.tfvars rendering [\#33](https://github.com/helios-technologies/kite/pull/33) ([vshatravenko](https://github.com/vshatravenko))
|
25
|
+
- Moved things in proper places [\#32](https://github.com/helios-technologies/kite/pull/32) ([vshatravenko](https://github.com/vshatravenko))
|
26
|
+
- Connected Vault to Concourse [\#23](https://github.com/helios-technologies/kite/pull/23) ([vshatravenko](https://github.com/vshatravenko))
|
27
|
+
|
28
|
+
## [v0.0.8](https://github.com/helios-technologies/kite/tree/v0.0.8) (2017-09-22)
|
29
|
+
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...v0.0.8)
|
6
30
|
|
7
31
|
**Closed issues:**
|
8
32
|
|
@@ -59,3 +83,6 @@
|
|
59
83
|
[Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.2...v0.0.3)
|
60
84
|
|
61
85
|
## [v0.0.2](https://github.com/helios-technologies/kite/tree/v0.0.2) (2017-08-24)
|
86
|
+
|
87
|
+
|
88
|
+
\* *This Change Log was automatically generated by [github_changelog_generator](https://github.com/skywinder/Github-Changelog-Generator)*
|
data/README.md
CHANGED
@@ -1,9 +1,14 @@
|
|
1
1
|
# Kite
|
2
2
|
|
3
3
|
[![Build Status](https://travis-ci.org/helios-technologies/kite.svg?branch=master)](https://travis-ci.org/helios-technologies/kite)
|
4
|
+
[![codecov](https://codecov.io/gh/helios-technologies/kite/branch/master/graph/badge.svg)](https://codecov.io/gh/helios-technologies/kite)
|
5
|
+
|
4
6
|
|
5
7
|
Kite is a CLI for scaffolding and managing devops modules
|
6
8
|
The main purpose is templating of various tools for devops around terraform, bosh, ansible
|
9
|
+
Currently Kite support one Stack on both AWS and GCP.
|
10
|
+
|
11
|
+
We plan in adding community stack using a simple template repository structure.
|
7
12
|
|
8
13
|
## Installation
|
9
14
|
|
@@ -23,13 +28,37 @@ Or install it yourself as:
|
|
23
28
|
|
24
29
|
## Usage
|
25
30
|
|
26
|
-
To start using kite
|
27
|
-
|
31
|
+
To start using kite for bootstraping your infrastructure
|
32
|
+
follow the steps below :
|
33
|
+
|
34
|
+
### Create your Infrastructure as Code base repository
|
35
|
+
|
36
|
+
Create a new kite project using:
|
37
|
+
|
38
|
+
```
|
39
|
+
$ kite new PROJECT_NAME
|
40
|
+
```
|
41
|
+
|
42
|
+
### Configure your cloud and credentials
|
43
|
+
|
28
44
|
- Fill out the `config/cloud.yml` file with your credentials.
|
29
45
|
- For BOSH you'll need an SSH key, to generate one, use `ssh-keygen -f *path_to_key*`
|
30
|
-
- Generate the cloud IaC needed with `kite generate --cloud=*aws or gcp*`
|
31
|
-
- Continue with instructions from newly generated README.md
|
32
46
|
|
47
|
+
### Generate your infrastructure using terraform
|
48
|
+
|
49
|
+
Generate the cloud IaC needed with
|
50
|
+
|
51
|
+
```
|
52
|
+
$ kite generate --cloud=aws|gcp
|
53
|
+
```
|
54
|
+
|
55
|
+
you can now review and apply your terraform files.
|
56
|
+
|
57
|
+
### Deploy the default stack (BOSH / Concourse / Vault / Kubernetes)
|
58
|
+
|
59
|
+
Continue with instructions from newly generated README.md
|
60
|
+
|
61
|
+
## Getting help
|
33
62
|
|
34
63
|
To list all Kite commands, use
|
35
64
|
|
data/kite.gemspec
CHANGED
@@ -25,4 +25,6 @@ Gem::Specification.new do |spec|
|
|
25
25
|
spec.add_development_dependency "bundler", "~> 1.14"
|
26
26
|
spec.add_development_dependency "rake", "~> 10.0"
|
27
27
|
spec.add_development_dependency "rspec", "~> 3.0"
|
28
|
+
spec.add_development_dependency "simplecov"
|
29
|
+
spec.add_development_dependency "codecov"
|
28
30
|
end
|
data/lib/kite.rb
CHANGED
data/lib/kite/core.rb
CHANGED
@@ -10,46 +10,8 @@ module Kite
|
|
10
10
|
target.prepare
|
11
11
|
end
|
12
12
|
|
13
|
-
|
14
|
-
|
15
|
-
# Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
|
16
|
-
def generate()
|
17
|
-
say "Generating Cloud #{ options[:cloud] } IaC", :green
|
18
|
-
@values = parse_cloud_config
|
19
|
-
|
20
|
-
case options[:cloud]
|
21
|
-
when 'aws'
|
22
|
-
directory('aws/terraform', 'terraform')
|
23
|
-
copy_file('aws/README.md', 'README.md', force: true)
|
24
|
-
|
25
|
-
template('aws/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
26
|
-
template('aws/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
27
|
-
template('aws/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
|
28
|
-
template('aws/set-env.sh.erb', 'bin/set-env.sh')
|
29
|
-
chmod('bin/bosh-install.sh', 0755)
|
30
|
-
chmod('bin/concourse-deploy.sh', 0755)
|
31
|
-
chmod('bin/setup-tunnel.sh', 0755)
|
32
|
-
|
33
|
-
when 'gcp'
|
34
|
-
directory('gcp/terraform', 'terraform')
|
35
|
-
copy_file('gcp/README.md', 'README.md', force: true)
|
36
|
-
|
37
|
-
template('gcp/bosh-install.sh.erb', 'bin/bosh-install.sh')
|
38
|
-
template('gcp/bosh-vars.yml.erb', 'bosh-vars.yml')
|
39
|
-
template('gcp/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
|
40
|
-
template('gcp/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
|
41
|
-
template('gcp/vault-deploy.sh.erb', 'bin/vault-deploy.sh')
|
42
|
-
template('gcp/set-env.sh.erb', 'bin/set-env.sh')
|
43
|
-
chmod('bin/bosh-install.sh', 0755)
|
44
|
-
chmod('bin/concourse-deploy.sh', 0755)
|
45
|
-
chmod('bin/vault-deploy.sh', 0755)
|
46
|
-
chmod('bin/setup-tunnel.sh', 0755)
|
47
|
-
|
48
|
-
else
|
49
|
-
say 'Cloud provider not specified'
|
50
|
-
|
51
|
-
end
|
52
|
-
end
|
13
|
+
desc "generate", "Generate IaC from configuration"
|
14
|
+
subcommand "generate", Kite::Generate
|
53
15
|
|
54
16
|
desc 'render MANIFEST', 'Render manifest file from configuration and Terraform output'
|
55
17
|
subcommand "render", Kite::Render
|
@@ -0,0 +1,43 @@
|
|
1
|
+
module Kite
|
2
|
+
# Subcommand for rendering manifests, deployments etc.
|
3
|
+
class Generate < Base
|
4
|
+
include Kite::Helpers
|
5
|
+
|
6
|
+
method_option :provider, type: :string, desc: "Cloud provider", enum: %w{aws gcp}, required: true
|
7
|
+
desc "cloud", "Generate cloud IaC from configuration"
|
8
|
+
# Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
|
9
|
+
def cloud()
|
10
|
+
say "Generating cloud #{ options[:provider] } IaC", :green
|
11
|
+
@values = parse_cloud_config
|
12
|
+
|
13
|
+
case options[:provider]
|
14
|
+
when 'aws'
|
15
|
+
directory('aws/terraform', 'terraform')
|
16
|
+
copy_file('aws/README.md', 'README.md', force: true)
|
17
|
+
|
18
|
+
directory('aws/bin/base', 'bin')
|
19
|
+
chmod('bin/bootstrap.sh', 0755)
|
20
|
+
chmod('bin/cleanup.sh', 0755)
|
21
|
+
|
22
|
+
when 'gcp'
|
23
|
+
directory('gcp/terraform', 'terraform')
|
24
|
+
copy_file('gcp/README.md', 'README.md', force: true)
|
25
|
+
|
26
|
+
|
27
|
+
directory('gcp/bin/base', 'bin')
|
28
|
+
chmod('bin/bootstrap.sh', 0755)
|
29
|
+
chmod('bin/cleanup.sh', 0755)
|
30
|
+
|
31
|
+
else
|
32
|
+
say 'Cloud provider not specified'
|
33
|
+
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
method_option :name, type: :string, desc: "Task name", required: true
|
38
|
+
desc "task", "Generate task IaC from configuration"
|
39
|
+
def task()
|
40
|
+
say "Generating task #{ options[:name] } IaC", :green
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
data/lib/kite/helpers.rb
CHANGED
@@ -28,6 +28,33 @@ module Kite::Helpers
|
|
28
28
|
cloud_config
|
29
29
|
end
|
30
30
|
|
31
|
+
# Return public subnet id depending on
|
32
|
+
# whether it's declared in config/cloud.yml or not
|
33
|
+
def conditional_subnet_id(values)
|
34
|
+
subnet_id = values['aws']['public_subnet']['id']
|
35
|
+
|
36
|
+
if subnet_id.empty?
|
37
|
+
'${aws_subnet.platform_dmz.id}'
|
38
|
+
else
|
39
|
+
subnet_id
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
# Return vpc id depending on
|
44
|
+
# whether it's declared in config/cloud.yml or not
|
45
|
+
def conditional_vpc_id(values)
|
46
|
+
vpc_id = values['aws']['vpc_id']
|
47
|
+
|
48
|
+
if vpc_id.empty?
|
49
|
+
'${aws_vpc.platform.id}'
|
50
|
+
else
|
51
|
+
vpc_id
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
|
56
|
+
|
57
|
+
|
31
58
|
# Returns subnet's IP range slice in a BOSH manifest-compatible way
|
32
59
|
def ip_range(subnet, range)
|
33
60
|
|
data/lib/kite/render.rb
CHANGED
@@ -10,24 +10,36 @@ module Kite
|
|
10
10
|
def manifest(type)
|
11
11
|
say "Rendering #{type} manifest", :green
|
12
12
|
@values = parse_cloud_config
|
13
|
-
@tf_output = parse_tf_state('terraform/terraform.tfstate')
|
13
|
+
@tf_output = parse_tf_state('terraform/terraform.tfstate') if options[:cloud] == 'aws'
|
14
|
+
|
15
|
+
if options[:cloud] == 'aws'
|
16
|
+
@private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
|
17
|
+
else
|
18
|
+
@private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
|
19
|
+
end
|
14
20
|
|
15
21
|
case type
|
16
22
|
when "bosh"
|
17
|
-
if options[:cloud] == 'aws'
|
18
|
-
@private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
|
19
|
-
else
|
20
|
-
@private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
|
21
|
-
end
|
22
|
-
|
23
23
|
directory("#{options[:cloud]}/deployments/bosh", 'deployments/bosh')
|
24
|
+
template("#{options[:cloud]}/bosh-vars.yml.erb", 'config/bosh-vars.yml')
|
25
|
+
copy_file("#{options[:cloud]}/docs/bosh.md", "docs/bosh.md")
|
26
|
+
template("#{options[:cloud]}/bin/bosh-install.sh.tt", "bin/bosh-install.sh")
|
27
|
+
chmod('bin/bosh-install.sh', 0755)
|
24
28
|
|
25
29
|
when "concourse"
|
26
|
-
|
27
|
-
|
30
|
+
directory("#{options[:cloud]}/deployments/concourse", "deployments/concourse")
|
31
|
+
copy_file("#{options[:cloud]}/docs/concourse.md", "docs/concourse.md")
|
32
|
+
template("#{options[:cloud]}/bin/concourse-deploy.sh.tt", "bin/concourse-deploy.sh")
|
33
|
+
chmod('bin/concourse-deploy.sh', 0755)
|
34
|
+
|
28
35
|
when "vault"
|
29
|
-
|
30
|
-
copy_file("#{options[:cloud]}/vault.md",
|
36
|
+
template("#{options[:cloud]}/deployments/vault/vault.yml.erb", "deployments/vault/vault.yml")
|
37
|
+
copy_file("#{options[:cloud]}/docs/vault.md", "docs/vault.md")
|
38
|
+
template("#{options[:cloud]}/bin/vault-deploy.sh.tt", "bin/vault-deploy.sh")
|
39
|
+
chmod('bin/vault-deploy.sh', 0755)
|
40
|
+
|
41
|
+
when "nginx"
|
42
|
+
template("#{options[:cloud]}/deployments/nginx/nginx.yml.erb", "deployments/nginx/nginx.yml")
|
31
43
|
|
32
44
|
else
|
33
45
|
say "Manifest type not specified"
|
data/lib/kite/version.rb
CHANGED
data/tpl/aws/README.md
CHANGED
@@ -1,29 +1,29 @@
|
|
1
|
-
|
2
|
-
===================================
|
1
|
+
## AWS Cloud
|
3
2
|
|
4
|
-
|
3
|
+
### Setup
|
5
4
|
|
6
|
-
|
7
|
-
|
8
|
-
|
5
|
+
Apply terraform code
|
6
|
+
```
|
7
|
+
pushd terraform && terraform init && terraform apply && popd
|
8
|
+
```
|
9
9
|
|
10
|
-
|
10
|
+
Render BOSH manifest and related files
|
11
|
+
```
|
12
|
+
kite render manifest bosh --cloud aws
|
13
|
+
```
|
11
14
|
|
12
|
-
|
13
|
-
-----
|
15
|
+
Prepare BOSH environment using instructions from [docs/bosh.md](docs/bosh.md)
|
14
16
|
|
15
|
-
|
16
|
-
|
17
|
+
Render Vault deployment
|
18
|
+
```
|
19
|
+
kite render manifest vault --cloud aws
|
20
|
+
```
|
17
21
|
|
18
|
-
|
19
|
-
-----
|
22
|
+
Follow instructions from [docs/vault.md](docs/vault.md) to deploy Vault
|
20
23
|
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
- Run `bin/bosh-install.sh` to deploy the BOSH Director
|
24
|
+
Render Concourse manifest
|
25
|
+
```
|
26
|
+
kite render manifest concourse --cloud aws
|
27
|
+
```
|
26
28
|
|
27
|
-
|
28
|
-
|
29
|
-
To connect to Bastion over SSH, use ssh jumpbox@*bastion ip* -i jumpbox.key
|
29
|
+
Follow instructions from [docs/concourse.md](docs/concourse.md) to deploy Concourse
|
@@ -0,0 +1,35 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
set -xe
|
4
|
+
|
5
|
+
# Apply Terraform IaC
|
6
|
+
pushd terraform
|
7
|
+
|
8
|
+
terraform init
|
9
|
+
terraform apply
|
10
|
+
|
11
|
+
popd
|
12
|
+
|
13
|
+
# Set up an SSH tunnel to Bastion
|
14
|
+
. bin/setup-tunnel.sh
|
15
|
+
|
16
|
+
# Render BOSH manifest and related files
|
17
|
+
kite render manifest bosh --cloud aws
|
18
|
+
|
19
|
+
# Deploy BOSH Director
|
20
|
+
./bin/bosh-install.sh
|
21
|
+
|
22
|
+
# Set the needed environment variables
|
23
|
+
. bin/set-env.sh
|
24
|
+
|
25
|
+
# Render Vault manifest
|
26
|
+
kite render manifest vault --cloud aws
|
27
|
+
|
28
|
+
# Deploy Vault
|
29
|
+
./bin/vault-deploy.sh
|
30
|
+
|
31
|
+
# Render Concourse manifest and related files
|
32
|
+
kite render manifest concourse --cloud aws
|
33
|
+
|
34
|
+
# Deploy Concourse
|
35
|
+
./bin/concourse-deploy.sh
|
@@ -0,0 +1,19 @@
|
|
1
|
+
#!/usr/bin/env bash
|
2
|
+
|
3
|
+
# Remove existing BOSH deployments
|
4
|
+
bosh -e <%= @values['bosh']['name'] %> -d concourse deld
|
5
|
+
|
6
|
+
# Destroy BOSH director
|
7
|
+
bosh delete-env deployments/bosh/bosh.yml \
|
8
|
+
--state=config/state.json \
|
9
|
+
--vars-store=config/creds.yml \
|
10
|
+
--vars-file=config/bosh-vars.yml \
|
11
|
+
--var-file private_key=<%= @values['kite']['private_key_path'] %> \
|
12
|
+
-o deployments/bosh/cpi.yml \
|
13
|
+
-o deployments/bosh/jumpbox-user.yml
|
14
|
+
|
15
|
+
# Destroy Terraform-generated infrastructure
|
16
|
+
pushd terraform && terraform destroy && popd
|
17
|
+
|
18
|
+
# Remove files generated by kite
|
19
|
+
rm -rf terraform deployments config/{creds.yml,bosh_vars.yml,jumpbox.key} bin/*.sh
|
File without changes
|
File without changes
|
@@ -6,7 +6,7 @@ set -xe
|
|
6
6
|
bosh create-env deployments/bosh/bosh.yml \
|
7
7
|
--state=config/state.json \
|
8
8
|
--vars-store=config/creds.yml \
|
9
|
-
--vars-file=
|
9
|
+
--vars-file=config/bosh-vars.yml \
|
10
10
|
--var-file private_key=<%= @values['kite']['private_key_path'] %> \
|
11
11
|
-o deployments/bosh/cpi.yml \
|
12
12
|
-o deployments/bosh/jumpbox-user.yml
|
@@ -16,7 +16,7 @@ bosh alias-env <%= @values['bosh']['name'] %> \
|
|
16
16
|
-e <%= @values['bosh']['static_ip'] %> \
|
17
17
|
--ca-cert <(bosh int ./config/creds.yml --path /director_ssl/ca)
|
18
18
|
|
19
|
-
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/
|
19
|
+
bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud-config.yml
|
20
20
|
|
21
21
|
# Get jumpbox user key
|
22
22
|
bosh int config/creds.yml --path /jumpbox_ssh/private_key > config/jumpbox.key
|