delete ops files

This commit is contained in:
s0dy 2018-12-28 14:54:59 +01:00
parent 9d00e22df2
commit 013e14b1ed
12 changed files with 0 additions and 1203 deletions

View File

@ -1,31 +0,0 @@
---
- hosts: hifive
become: yes
become_user: root
tasks:
- name: Delete last deploy
file:
path: /var/www/html/
state: absent
- name: Copy all files to web server
synchronize:
src: /builds/aviortheking/blog_imie/project/
dest: /var/www/html
rsync_opts:
- --exclude=.htaccess
- name: Change ownership and group
file:
path: /var/www/html
owner: apache
group: apache
recurse: yes
- name: Change file chmod 640
command: find /var/www/html -type f -exec chmod 640 {} \;
- name: Change directory chmod 750
command: find /var/www/html -type d -exec chmod 750 {} \;

View File

@ -1,29 +0,0 @@
image: ansible/centos7-ansible
before_script:
# Run ssh-agent (inside the build environment)
- eval $(ssh-agent -s)
# Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent
- echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null
#Create the SSH directory
- mkdir -p ~/.ssh
- chmod 700 ~/.ssh
#Verifying the SSH host keys
- echo "$SSH_KNOWN_HOSTS" > ~/.ssh/known_hosts
- chmod 644 ~/.ssh/known_hosts
deploy_to_webserver:
stage: deploy
only:
- master
script:
- pwd
- echo -e "$ANSIBLE_HIFIVE_HOSTS" > /etc/ansible/hosts
- ansible-playbook .ansible-ci.yml
when: manual

View File

@ -1,53 +0,0 @@
---
- hosts: hifive
become: yes
become_user: root
tasks:
- name: Yum update
yum:
name: '*'
state: latest
- name: Install httpd
yum:
name: httpd
state: latest
- name: Systemd enable httpd
systemd:
name: httpd
enabled: yes
masked: no
- name: Change file ownership, group and mode
file:
path: /var/www
owner: apache
group: apache
mode: 0750
recurse: yes
- name: Install python-passlib
yum:
name: python-passlib
state: latest
- htpasswd:
path: /etc/httpd/passwords
name: hifive
password: hifive
owner: apache
group: apache
mode: 0640
- name: Create httpd.conf
template:
src: httpd.j2
dest: /etc/httpd/conf/httpd.conf
force: yes
- name: Systemd start httpd
systemd:
name: httpd
state: started

View File

@ -1,32 +0,0 @@
---
- hosts: hifive
become: yes
become_user: root
tasks:
- name: Install mariadb client
yum:
name: mariadb
state: latest
- name: Install mariadb server
yum:
name: mariadb-server
state: latest
- name: Systemd enable mariadb
systemd:
name: mariadb
enabled: yes
masked: no
#- name: Create phpMyAdmin.conf
#template:
#src: phpMyAdmin.j2
#dest: /etc/httpd/conf.d/phpMyAdmin.conf
#force: yes
- name: Systemd start mariadb
systemd:
name: mariadb
state: started

View File

@ -1,19 +0,0 @@
---
- hosts: hifive
become: yes
become_user: root
tasks:
- name: Install amazon epel
command: amazon-linux-extras install epel -y
- name: Install phpMyAdmin
yum:
name: phpmyadmin
state: latest
- name: Create phpMyAdmin.conf
template:
src: phpMyAdmin.j2
dest: /etc/httpd/conf.d/phpMyAdmin.conf
force: yes

View File

@ -1,371 +0,0 @@
#
# This is the main Apache HTTP server configuration file. It contains the
# configuration directives that give the server its instructions.
# See <URL:http://httpd.apache.org/docs/2.4/> for detailed information.
# In particular, see
# <URL:http://httpd.apache.org/docs/2.4/mod/directives.html>
# for a discussion of each configuration directive.
#
# Do NOT simply read the instructions in here without understanding
# what they do. They're here only as hints or reminders. If you are unsure
# consult the online docs. You have been warned.
#
# Configuration and logfile names: If the filenames you specify for many
# of the server's control files begin with "/" (or "drive:/" for Win32), the
# server will use that explicit path. If the filenames do *not* begin
# with "/", the value of ServerRoot is prepended -- so 'log/access_log'
# with ServerRoot set to '/www' will be interpreted by the
# server as '/www/log/access_log', where as '/log/access_log' will be
# interpreted as '/log/access_log'.
#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# Do not add a slash at the end of the directory path. If you point
# ServerRoot at a non-local disk, be sure to specify a local disk on the
# Mutex directive, if file-based mutexes are used. If you wish to share the
# same ServerRoot for multiple httpd daemons, you will need to change at
# least PidFile.
#
ServerRoot "/etc/httpd"
#
# Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, instead of the default. See also the <VirtualHost>
# directive.
#
# Change this to Listen on specific IP addresses as shown below to
# prevent Apache from glomming onto all bound IP addresses.
#
#Listen 12.34.56.78:80
Listen 80
#
# Dynamic Shared Object (DSO) Support
#
# To be able to use the functionality of a module which was built as a DSO you
# have to place corresponding `LoadModule' lines at this location so the
# directives contained in it are actually available _before_ they are used.
# Statically compiled modules (those listed by `httpd -l') do not need
# to be loaded here.
#
# Example:
# LoadModule foo_module modules/mod_foo.so
#
Include conf.modules.d/*.conf
#
# If you wish httpd to run as a different user or group, you must run
# httpd as root initially and it will switch.
#
# User/Group: The name (or #number) of the user/group to run httpd as.
# It is usually good practice to create a dedicated user and group for
# running httpd, as with most system services.
#
User apache
Group apache
# 'Main' server configuration
#
# The directives in this section set up the values used by the 'main'
# server, which responds to any requests that aren't handled by a
# <VirtualHost> definition. These values also provide defaults for
# any <VirtualHost> containers you may define later in the file.
#
# All of these directives may appear inside <VirtualHost> containers,
# in which case these default settings will be overridden for the
# virtual host being defined.
#
#
# ServerAdmin: Your address, where problems with the server should be
# e-mailed. This address appears on some server-generated pages, such
# as error documents. e.g. admin@your-domain.com
#
ServerAdmin root@localhost
#
# ServerName gives the name and port that the server uses to identify itself.
# This can often be determined automatically, but we recommend you specify
# it explicitly to prevent problems during startup.
#
# If your host doesn't have a registered DNS name, enter its IP address here.
#
#ServerName www.example.com:80
#
# Deny access to the entirety of your server's filesystem. You must
# explicitly permit access to web content directories in other
# <Directory> blocks below.
#
<Directory />
AllowOverride none
Require all denied
</Directory>
#
# Note that from this point forward you must specifically allow
# particular features to be enabled - so if something's not working as
# you might expect, make sure that you have specifically enabled it
# below.
#
#
# DocumentRoot: The directory out of which you will serve your
# documents. By default, all requests are taken from this directory, but
# symbolic links and aliases may be used to point to other locations.
#
DocumentRoot "/var/www/html"
#
# Relax access to content within /var/www.
#
<Directory "/var/www">
AllowOverride None
# Allow open access:
Require all granted
</Directory>
# Further relax access to the default document root:
<Directory "/var/www/html">
#
# Possible values for the Options directive are "None", "All",
# or any combination of:
# Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
#
# Note that "MultiViews" must be named *explicitly* --- "Options All"
# doesn't give it to you.
#
# The Options directive is both complicated and important. Please see
# http://httpd.apache.org/docs/2.4/mod/core.html#options
# for more information.
#
Options Indexes FollowSymLinks
#
# AllowOverride controls what directives may be placed in .htaccess files.
# It can be "All", "None", or any combination of the keywords:
# Options FileInfo AuthConfig Limit
#
AllowOverride None
#
# Controls who can get stuff from this server.
#
# Require all granted
#AuthType Basic
#AuthName "Restricted Content"
#AuthBasicProvider file
#AuthUserFile /etc/httpd/passwords
#Require valid-user
</Directory>
#
# DirectoryIndex: sets the file that Apache will serve if a directory
# is requested.
#
<IfModule dir_module>
DirectoryIndex index.html
</IfModule>
#
# The following lines prevent .htaccess and .htpasswd files from being
# viewed by Web clients.
#
<Files ".ht*">
Require all denied
</Files>
#
# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a <VirtualHost>
# container, error messages relating to that virtual host will be
# logged here. If you *do* define an error logfile for a <VirtualHost>
# container, that host's errors will be logged there and not here.
#
ErrorLog "logs/error_log"
#
# LogLevel: Control the number of messages logged to the error_log.
# Possible values include: debug, info, notice, warn, error, crit,
# alert, emerg.
#
LogLevel warn
<IfModule log_config_module>
#
# The following directives define some format nicknames for use with
# a CustomLog directive (see below).
#
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
LogFormat "%h %l %u %t \"%r\" %>s %b" common
<IfModule logio_module>
# You need to enable mod_logio.c to use %I and %O
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
</IfModule>
#
# The location and format of the access logfile (Common Logfile Format).
# If you do not define any access logfiles within a <VirtualHost>
# container, they will be logged here. Contrariwise, if you *do*
# define per-<VirtualHost> access logfiles, transactions will be
# logged therein and *not* in this file.
#
#CustomLog "logs/access_log" common
#
# If you prefer a logfile with access, agent, and referer information
# (Combined Logfile Format) you can use the following directive.
#
CustomLog "logs/access_log" combined
</IfModule>
<IfModule alias_module>
#
# Redirect: Allows you to tell clients about documents that used to
# exist in your server's namespace, but do not anymore. The client
# will make a new request for the document at its new location.
# Example:
# Redirect permanent /foo http://www.example.com/bar
#
# Alias: Maps web paths into filesystem paths and is used to
# access content that does not live under the DocumentRoot.
# Example:
# Alias /webpath /full/filesystem/path
#
# If you include a trailing / on /webpath then the server will
# require it to be present in the URL. You will also likely
# need to provide a <Directory> section to allow access to
# the filesystem path.
#
# ScriptAlias: This controls which directories contain server scripts.
# ScriptAliases are essentially the same as Aliases, except that
# documents in the target directory are treated as applications and
# run by the server when requested rather than as documents sent to the
# client. The same rules about trailing "/" apply to ScriptAlias
# directives as to Alias.
#
ScriptAlias /cgi-bin/ "/var/www/cgi-bin/"
</IfModule>
#
# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased
# CGI directory exists, if you have that configured.
#
<Directory "/var/www/cgi-bin">
AllowOverride None
Options None
Require all granted
</Directory>
<IfModule mime_module>
#
# TypesConfig points to the file containing the list of mappings from
# filename extension to MIME-type.
#
TypesConfig /etc/mime.types
#
# AddType allows you to add to or override the MIME configuration
# file specified in TypesConfig for specific file types.
#
#AddType application/x-gzip .tgz
#
# AddEncoding allows you to have certain browsers uncompress
# information on the fly. Note: Not all browsers support this.
#
#AddEncoding x-compress .Z
#AddEncoding x-gzip .gz .tgz
#
# If the AddEncoding directives above are commented-out, then you
# probably should define those extensions to indicate media types:
#
AddType application/x-compress .Z
AddType application/x-gzip .gz .tgz
#
# AddHandler allows you to map certain file extensions to "handlers":
# actions unrelated to filetype. These can be either built into the server
# or added with the Action directive (see below)
#
# To use CGI scripts outside of ScriptAliased directories:
# (You will also need to add "ExecCGI" to the "Options" directive.)
#
#AddHandler cgi-script .cgi
# For type maps (negotiated resources):
#AddHandler type-map var
#
# Filters allow you to process content before it is sent to the client.
#
# To parse .shtml files for server-side includes (SSI):
# (You will also need to add "Includes" to the "Options" directive.)
#
AddType text/html .shtml
AddOutputFilter INCLUDES .shtml
</IfModule>
#
# Specify a default charset for all content served; this enables
# interpretation of all content as UTF-8 by default. To use the
# default browser choice (ISO-8859-1), or to allow the META tags
# in HTML content to override this choice, comment out this
# directive:
#
AddDefaultCharset UTF-8
<IfModule mime_magic_module>
#
# The mod_mime_magic module allows the server to use various hints from the
# contents of the file itself to determine its type. The MIMEMagicFile
# directive tells the module where the hint definitions are located.
#
MIMEMagicFile conf/magic
</IfModule>
#
# Customizable error responses come in three flavors:
# 1) plain text 2) local redirects 3) external redirects
#
# Some examples:
#ErrorDocument 500 "The server made a boo boo."
#ErrorDocument 404 /missing.html
#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
#ErrorDocument 402 http://www.example.com/subscription_info.html
#
#
# EnableMMAP and EnableSendfile: On systems that support it,
# memory-mapping or the sendfile syscall may be used to deliver
# files. This usually improves server performance, but must
# be turned off when serving from networked-mounted
# filesystems or if support for these functions is otherwise
# broken on your system.
# Defaults if commented: EnableMMAP On, EnableSendfile Off
#
#EnableMMAP off
EnableSendfile on
# Enable HTTP/2 by default
#
# https://httpd.apache.org/docs/2.4/mod/core.html#protocols
<IfModule mod_http2.c>
Protocols h2 h2c http/1.1
</IfModule>
# Supplemental configuration
#
# Load config files in the "/etc/httpd/conf.d" directory, if any.
IncludeOptional conf.d/*.conf

View File

@ -1,77 +0,0 @@
# phpMyAdmin - Web based MySQL browser written in php
#
# Allows only localhost by default
#
# But allowing phpMyAdmin to anyone other than localhost should be considered
# dangerous unless properly secured by SSL
Alias /phpMyAdmin /usr/share/phpMyAdmin
Alias /phpmyadmin /usr/share/phpMyAdmin
<Directory /usr/share/phpMyAdmin/>
AddDefaultCharset UTF-8
<IfModule mod_authz_core.c>
# Apache 2.4
<RequireAny>
Require all granted
#Require ip 127.0.0.1
#Require ip ::1
</RequireAny>
</IfModule>
<IfModule !mod_authz_core.c>
# Apache 2.2
Order Deny,Allow
Deny from All
Allow from 127.0.0.1
Allow from ::1
</IfModule>
</Directory>
<Directory /usr/share/phpMyAdmin/setup/>
<IfModule mod_authz_core.c>
# Apache 2.4
<RequireAny>
Require all granted
#Require ip 127.0.0.1
#Require ip ::1
</RequireAny>
</IfModule>
<IfModule !mod_authz_core.c>
# Apache 2.2
Order Deny,Allow
Deny from All
Allow from 127.0.0.1
Allow from ::1
</IfModule>
</Directory>
# These directories do not require access over HTTP - taken from the original
# phpMyAdmin upstream tarball
#
<Directory /usr/share/phpMyAdmin/libraries/>
Order Deny,Allow
Deny from All
Allow from None
</Directory>
<Directory /usr/share/phpMyAdmin/setup/lib/>
Order Deny,Allow
Deny from All
Allow from None
</Directory>
<Directory /usr/share/phpMyAdmin/setup/frames/>
Order Deny,Allow
Deny from All
Allow from None
</Directory>
# This configuration prevents mod_security at phpMyAdmin directories from
# filtering SQL etc. This may break your mod_security implementation.
#
#<IfModule mod_security.c>
# <Directory /usr/share/phpMyAdmin/>
# SecRuleInheritance Off
# </Directory>
#</IfModule>

View File

@ -1,49 +0,0 @@
###########################
# PROVIDER
###########################
provider "aws" {
access_key = "${var.aws_access_key_id}"
secret_key = "${var.aws_secret_access_key}"
region = "${var.aws_region}"
}
###########################
# ELASTIC IP
###########################
data "aws_eip" "webserver-ip" {
public_ip = "35.180.10.123"
}
resource "aws_eip_association" "webserver-eip" {
instance_id = "${aws_instance.webserver.id}"
allocation_id = "${data.aws_eip.webserver-ip.id}"
}
###########################
# ADD SSH KEY
###########################
resource "aws_key_pair" "terraform_ec2_key" {
key_name = "terraform_ec2_key"
public_key = "${var.aws_ssh_key}"
}
###########################
# INSTANCE
###########################
resource "aws_instance" "webserver" {
ami = "ami-04992646d54c69ef4"
instance_type = "t2.micro"
key_name = "${aws_key_pair.terraform_ec2_key.id}"
vpc_security_group_ids = [
"${aws_security_group.allow_ssh.id}",
"${aws_security_group.allow_http.id}"
]
tags {
Name = "hifive-webserver"
}
}

View File

@ -1,58 +0,0 @@
###########################
# ALLOW SSH
###########################
resource "aws_security_group" "allow_ssh" {
name = "allow ssh"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
lifecycle {
create_before_destroy = true
}
}
###########################
# ALLOW HTTP
###########################
resource "aws_security_group" "allow_http" {
name = "allow http"
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 443
to_port = 443
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 443
to_port = 443
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
lifecycle {
create_before_destroy = true
}
}

View File

@ -1,252 +0,0 @@
{
"version": 3,
"terraform_version": "0.11.10",
"serial": 8,
"lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22",
"modules": [
{
"path": [
"root"
],
"outputs": {},
"resources": {
"aws_eip_association.webserver-eip": {
"type": "aws_eip_association",
"depends_on": [
"aws_instance.webserver",
"data.aws_eip.webserver-ip"
],
"primary": {
"id": "eipassoc-0826b0b47141924ba",
"attributes": {
"allocation_id": "eipalloc-0f61e902f5f680dc0",
"id": "eipassoc-0826b0b47141924ba",
"instance_id": "i-09f2de73feb5c3e7a",
"network_interface_id": "eni-02d855d56e40967d0",
"private_ip_address": "172.31.36.68",
"public_ip": "35.180.10.123"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_instance.webserver": {
"type": "aws_instance",
"depends_on": [
"aws_key_pair.terraform_ec2_key",
"aws_security_group.allow_http",
"aws_security_group.allow_ssh"
],
"primary": {
"id": "i-09f2de73feb5c3e7a",
"attributes": {
"ami": "ami-04992646d54c69ef4",
"arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a",
"associate_public_ip_address": "true",
"availability_zone": "eu-west-3c",
"cpu_core_count": "1",
"cpu_threads_per_core": "1",
"credit_specification.#": "1",
"credit_specification.0.cpu_credits": "standard",
"disable_api_termination": "false",
"ebs_block_device.#": "0",
"ebs_optimized": "false",
"ephemeral_block_device.#": "0",
"get_password_data": "false",
"iam_instance_profile": "",
"id": "i-09f2de73feb5c3e7a",
"instance_state": "running",
"instance_type": "t2.micro",
"ipv6_addresses.#": "0",
"key_name": "terraform_ec2_key",
"monitoring": "false",
"network_interface.#": "0",
"network_interface_id": "eni-02d855d56e40967d0",
"password_data": "",
"placement_group": "",
"primary_network_interface_id": "eni-02d855d56e40967d0",
"private_dns": "ip-172-31-36-68.eu-west-3.compute.internal",
"private_ip": "172.31.36.68",
"public_dns": "ec2-35-180-10-123.eu-west-3.compute.amazonaws.com",
"public_ip": "35.180.10.123",
"root_block_device.#": "1",
"root_block_device.0.delete_on_termination": "true",
"root_block_device.0.iops": "100",
"root_block_device.0.volume_id": "vol-0b1da0548cc9c546e",
"root_block_device.0.volume_size": "8",
"root_block_device.0.volume_type": "gp2",
"security_groups.#": "2",
"security_groups.1710041364": "allow ssh",
"security_groups.4237835427": "allow http",
"source_dest_check": "true",
"subnet_id": "subnet-6308d02e",
"tags.%": "1",
"tags.Name": "hifive-webserver",
"tenancy": "default",
"volume_tags.%": "0",
"vpc_security_group_ids.#": "2",
"vpc_security_group_ids.1821931549": "sg-059fe679d9db32397",
"vpc_security_group_ids.2822979855": "sg-082897f758ada2701"
},
"meta": {
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
"create": 600000000000,
"delete": 1200000000000,
"update": 600000000000
},
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_key_pair.terraform_ec2_key": {
"type": "aws_key_pair",
"depends_on": [],
"primary": {
"id": "terraform_ec2_key",
"attributes": {
"fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74",
"id": "terraform_ec2_key",
"key_name": "terraform_ec2_key",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad"
},
"meta": {
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_security_group.allow_http": {
"type": "aws_security_group",
"depends_on": [],
"primary": {
"id": "sg-082897f758ada2701",
"attributes": {
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701",
"description": "Managed by Terraform",
"egress.#": "2",
"egress.2214680975.cidr_blocks.#": "1",
"egress.2214680975.cidr_blocks.0": "0.0.0.0/0",
"egress.2214680975.description": "",
"egress.2214680975.from_port": "80",
"egress.2214680975.ipv6_cidr_blocks.#": "0",
"egress.2214680975.prefix_list_ids.#": "0",
"egress.2214680975.protocol": "tcp",
"egress.2214680975.security_groups.#": "0",
"egress.2214680975.self": "false",
"egress.2214680975.to_port": "80",
"egress.2617001939.cidr_blocks.#": "1",
"egress.2617001939.cidr_blocks.0": "0.0.0.0/0",
"egress.2617001939.description": "",
"egress.2617001939.from_port": "443",
"egress.2617001939.ipv6_cidr_blocks.#": "0",
"egress.2617001939.prefix_list_ids.#": "0",
"egress.2617001939.protocol": "tcp",
"egress.2617001939.security_groups.#": "0",
"egress.2617001939.self": "false",
"egress.2617001939.to_port": "443",
"id": "sg-082897f758ada2701",
"ingress.#": "2",
"ingress.2214680975.cidr_blocks.#": "1",
"ingress.2214680975.cidr_blocks.0": "0.0.0.0/0",
"ingress.2214680975.description": "",
"ingress.2214680975.from_port": "80",
"ingress.2214680975.ipv6_cidr_blocks.#": "0",
"ingress.2214680975.prefix_list_ids.#": "0",
"ingress.2214680975.protocol": "tcp",
"ingress.2214680975.security_groups.#": "0",
"ingress.2214680975.self": "false",
"ingress.2214680975.to_port": "80",
"ingress.2617001939.cidr_blocks.#": "1",
"ingress.2617001939.cidr_blocks.0": "0.0.0.0/0",
"ingress.2617001939.description": "",
"ingress.2617001939.from_port": "443",
"ingress.2617001939.ipv6_cidr_blocks.#": "0",
"ingress.2617001939.prefix_list_ids.#": "0",
"ingress.2617001939.protocol": "tcp",
"ingress.2617001939.security_groups.#": "0",
"ingress.2617001939.self": "false",
"ingress.2617001939.to_port": "443",
"name": "allow http",
"owner_id": "116854918046",
"revoke_rules_on_delete": "false",
"tags.%": "0",
"vpc_id": "vpc-8a4b1ae3"
},
"meta": {
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
"create": 600000000000,
"delete": 600000000000
},
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_security_group.allow_ssh": {
"type": "aws_security_group",
"depends_on": [],
"primary": {
"id": "sg-059fe679d9db32397",
"attributes": {
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397",
"description": "Managed by Terraform",
"egress.#": "0",
"id": "sg-059fe679d9db32397",
"ingress.#": "1",
"ingress.2541437006.cidr_blocks.#": "1",
"ingress.2541437006.cidr_blocks.0": "0.0.0.0/0",
"ingress.2541437006.description": "",
"ingress.2541437006.from_port": "22",
"ingress.2541437006.ipv6_cidr_blocks.#": "0",
"ingress.2541437006.prefix_list_ids.#": "0",
"ingress.2541437006.protocol": "tcp",
"ingress.2541437006.security_groups.#": "0",
"ingress.2541437006.self": "false",
"ingress.2541437006.to_port": "22",
"name": "allow ssh",
"owner_id": "116854918046",
"revoke_rules_on_delete": "false",
"tags.%": "0",
"vpc_id": "vpc-8a4b1ae3"
},
"meta": {
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
"create": 600000000000,
"delete": 600000000000
},
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"data.aws_eip.webserver-ip": {
"type": "aws_eip",
"depends_on": [],
"primary": {
"id": "eipalloc-0f61e902f5f680dc0",
"attributes": {
"id": "eipalloc-0f61e902f5f680dc0",
"public_ip": "35.180.10.123"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
}
},
"depends_on": []
}
]
}

View File

@ -1,232 +0,0 @@
{
"version": 3,
"terraform_version": "0.11.10",
"serial": 8,
"lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22",
"modules": [
{
"path": [
"root"
],
"outputs": {},
"resources": {
"aws_eip_association.webserver-eip": {
"type": "aws_eip_association",
"depends_on": [
"aws_instance.webserver",
"data.aws_eip.webserver-ip"
],
"primary": {
"id": "eipassoc-0826b0b47141924ba",
"attributes": {
"allocation_id": "eipalloc-0f61e902f5f680dc0",
"id": "eipassoc-0826b0b47141924ba",
"instance_id": "i-09f2de73feb5c3e7a",
"network_interface_id": "eni-02d855d56e40967d0",
"private_ip_address": "172.31.36.68",
"public_ip": "35.180.10.123"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_instance.webserver": {
"type": "aws_instance",
"depends_on": [
"aws_key_pair.terraform_ec2_key",
"aws_security_group.allow_http",
"aws_security_group.allow_ssh"
],
"primary": {
"id": "i-09f2de73feb5c3e7a",
"attributes": {
"ami": "ami-04992646d54c69ef4",
"arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a",
"associate_public_ip_address": "true",
"availability_zone": "eu-west-3c",
"cpu_core_count": "1",
"cpu_threads_per_core": "1",
"credit_specification.#": "1",
"credit_specification.0.cpu_credits": "standard",
"disable_api_termination": "false",
"ebs_block_device.#": "0",
"ebs_optimized": "false",
"ephemeral_block_device.#": "0",
"get_password_data": "false",
"iam_instance_profile": "",
"id": "i-09f2de73feb5c3e7a",
"instance_state": "running",
"instance_type": "t2.micro",
"ipv6_addresses.#": "0",
"key_name": "terraform_ec2_key",
"monitoring": "false",
"network_interface.#": "0",
"network_interface_id": "eni-02d855d56e40967d0",
"password_data": "",
"placement_group": "",
"primary_network_interface_id": "eni-02d855d56e40967d0",
"private_dns": "ip-172-31-36-68.eu-west-3.compute.internal",
"private_ip": "172.31.36.68",
"public_dns": "ec2-35-180-74-87.eu-west-3.compute.amazonaws.com",
"public_ip": "35.180.74.87",
"root_block_device.#": "1",
"root_block_device.0.delete_on_termination": "true",
"root_block_device.0.iops": "100",
"root_block_device.0.volume_id": "vol-0b1da0548cc9c546e",
"root_block_device.0.volume_size": "8",
"root_block_device.0.volume_type": "gp2",
"security_groups.#": "2",
"security_groups.1710041364": "allow ssh",
"security_groups.4237835427": "allow http",
"source_dest_check": "true",
"subnet_id": "subnet-6308d02e",
"tags.%": "1",
"tags.Name": "hifive-webserver",
"tenancy": "default",
"volume_tags.%": "0",
"vpc_security_group_ids.#": "2",
"vpc_security_group_ids.1821931549": "sg-059fe679d9db32397",
"vpc_security_group_ids.2822979855": "sg-082897f758ada2701"
},
"meta": {
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
"create": 600000000000,
"delete": 1200000000000,
"update": 600000000000
},
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_key_pair.terraform_ec2_key": {
"type": "aws_key_pair",
"depends_on": [],
"primary": {
"id": "terraform_ec2_key",
"attributes": {
"fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74",
"id": "terraform_ec2_key",
"key_name": "terraform_ec2_key",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad"
},
"meta": {
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_security_group.allow_http": {
"type": "aws_security_group",
"depends_on": [],
"primary": {
"id": "sg-082897f758ada2701",
"attributes": {
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701",
"description": "Managed by Terraform",
"egress.#": "2",
"egress.2214680975.cidr_blocks.#": "1",
"egress.2214680975.cidr_blocks.0": "0.0.0.0/0",
"egress.2214680975.description": "",
"egress.2214680975.from_port": "80",
"egress.2214680975.ipv6_cidr_blocks.#": "0",
"egress.2214680975.prefix_list_ids.#": "0",
"egress.2214680975.protocol": "tcp",
"egress.2214680975.security_groups.#": "0",
"egress.2214680975.self": "false",
"egress.2214680975.to_port": "80",
"egress.2617001939.cidr_blocks.#": "1",
"egress.2617001939.cidr_blocks.0": "0.0.0.0/0",
"egress.2617001939.description": "",
"egress.2617001939.from_port": "443",
"egress.2617001939.ipv6_cidr_blocks.#": "0",
"egress.2617001939.prefix_list_ids.#": "0",
"egress.2617001939.protocol": "tcp",
"egress.2617001939.security_groups.#": "0",
"egress.2617001939.self": "false",
"egress.2617001939.to_port": "443",
"id": "sg-082897f758ada2701",
"ingress.#": "0",
"name": "allow http",
"owner_id": "116854918046",
"revoke_rules_on_delete": "false",
"tags.%": "0",
"vpc_id": "vpc-8a4b1ae3"
},
"meta": {
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
"create": 600000000000,
"delete": 600000000000
},
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_security_group.allow_ssh": {
"type": "aws_security_group",
"depends_on": [],
"primary": {
"id": "sg-059fe679d9db32397",
"attributes": {
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397",
"description": "Managed by Terraform",
"egress.#": "0",
"id": "sg-059fe679d9db32397",
"ingress.#": "1",
"ingress.2541437006.cidr_blocks.#": "1",
"ingress.2541437006.cidr_blocks.0": "0.0.0.0/0",
"ingress.2541437006.description": "",
"ingress.2541437006.from_port": "22",
"ingress.2541437006.ipv6_cidr_blocks.#": "0",
"ingress.2541437006.prefix_list_ids.#": "0",
"ingress.2541437006.protocol": "tcp",
"ingress.2541437006.security_groups.#": "0",
"ingress.2541437006.self": "false",
"ingress.2541437006.to_port": "22",
"name": "allow ssh",
"owner_id": "116854918046",
"revoke_rules_on_delete": "false",
"tags.%": "0",
"vpc_id": "vpc-8a4b1ae3"
},
"meta": {
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
"create": 600000000000,
"delete": 600000000000
},
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"data.aws_eip.webserver-ip": {
"type": "aws_eip",
"depends_on": [],
"primary": {
"id": "eipalloc-0f61e902f5f680dc0",
"attributes": {
"id": "eipalloc-0f61e902f5f680dc0",
"public_ip": "35.180.10.123"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
}
},
"depends_on": []
}
]
}

View File