mirror of
https://github.com/Aviortheking/Blog_IMIE.git
synced 2025-04-23 19:32:15 +00:00
delete ops files
This commit is contained in:
parent
9d00e22df2
commit
013e14b1ed
@ -1,31 +0,0 @@
|
||||
---
|
||||
- hosts: hifive
|
||||
become: yes
|
||||
become_user: root
|
||||
|
||||
tasks:
|
||||
|
||||
- name: Delete last deploy
|
||||
file:
|
||||
path: /var/www/html/
|
||||
state: absent
|
||||
|
||||
- name: Copy all files to web server
|
||||
synchronize:
|
||||
src: /builds/aviortheking/blog_imie/project/
|
||||
dest: /var/www/html
|
||||
rsync_opts:
|
||||
- --exclude=.htaccess
|
||||
|
||||
- name: Change ownership and group
|
||||
file:
|
||||
path: /var/www/html
|
||||
owner: apache
|
||||
group: apache
|
||||
recurse: yes
|
||||
|
||||
- name: Change file chmod 640
|
||||
command: find /var/www/html -type f -exec chmod 640 {} \;
|
||||
|
||||
- name: Change directory chmod 750
|
||||
command: find /var/www/html -type d -exec chmod 750 {} \;
|
@ -1,29 +0,0 @@
|
||||
image: ansible/centos7-ansible
|
||||
|
||||
before_script:
|
||||
# Run ssh-agent (inside the build environment)
|
||||
- eval $(ssh-agent -s)
|
||||
|
||||
# Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent
|
||||
- echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null
|
||||
|
||||
#Create the SSH directory
|
||||
- mkdir -p ~/.ssh
|
||||
- chmod 700 ~/.ssh
|
||||
|
||||
#Verifying the SSH host keys
|
||||
- echo "$SSH_KNOWN_HOSTS" > ~/.ssh/known_hosts
|
||||
- chmod 644 ~/.ssh/known_hosts
|
||||
|
||||
deploy_to_webserver:
|
||||
stage: deploy
|
||||
|
||||
only:
|
||||
- master
|
||||
|
||||
script:
|
||||
- pwd
|
||||
- echo -e "$ANSIBLE_HIFIVE_HOSTS" > /etc/ansible/hosts
|
||||
- ansible-playbook .ansible-ci.yml
|
||||
|
||||
when: manual
|
@ -1,53 +0,0 @@
|
||||
---
|
||||
- hosts: hifive
|
||||
become: yes
|
||||
become_user: root
|
||||
|
||||
tasks:
|
||||
- name: Yum update
|
||||
yum:
|
||||
name: '*'
|
||||
state: latest
|
||||
|
||||
- name: Install httpd
|
||||
yum:
|
||||
name: httpd
|
||||
state: latest
|
||||
|
||||
- name: Systemd enable httpd
|
||||
systemd:
|
||||
name: httpd
|
||||
enabled: yes
|
||||
masked: no
|
||||
|
||||
- name: Change file ownership, group and mode
|
||||
file:
|
||||
path: /var/www
|
||||
owner: apache
|
||||
group: apache
|
||||
mode: 0750
|
||||
recurse: yes
|
||||
|
||||
- name: Install python-passlib
|
||||
yum:
|
||||
name: python-passlib
|
||||
state: latest
|
||||
|
||||
- htpasswd:
|
||||
path: /etc/httpd/passwords
|
||||
name: hifive
|
||||
password: hifive
|
||||
owner: apache
|
||||
group: apache
|
||||
mode: 0640
|
||||
|
||||
- name: Create httpd.conf
|
||||
template:
|
||||
src: httpd.j2
|
||||
dest: /etc/httpd/conf/httpd.conf
|
||||
force: yes
|
||||
|
||||
- name: Systemd start httpd
|
||||
systemd:
|
||||
name: httpd
|
||||
state: started
|
@ -1,32 +0,0 @@
|
||||
---
|
||||
- hosts: hifive
|
||||
become: yes
|
||||
become_user: root
|
||||
|
||||
tasks:
|
||||
- name: Install mariadb client
|
||||
yum:
|
||||
name: mariadb
|
||||
state: latest
|
||||
|
||||
- name: Install mariadb server
|
||||
yum:
|
||||
name: mariadb-server
|
||||
state: latest
|
||||
|
||||
- name: Systemd enable mariadb
|
||||
systemd:
|
||||
name: mariadb
|
||||
enabled: yes
|
||||
masked: no
|
||||
|
||||
#- name: Create phpMyAdmin.conf
|
||||
#template:
|
||||
#src: phpMyAdmin.j2
|
||||
#dest: /etc/httpd/conf.d/phpMyAdmin.conf
|
||||
#force: yes
|
||||
|
||||
- name: Systemd start mariadb
|
||||
systemd:
|
||||
name: mariadb
|
||||
state: started
|
@ -1,19 +0,0 @@
|
||||
---
|
||||
- hosts: hifive
|
||||
become: yes
|
||||
become_user: root
|
||||
|
||||
tasks:
|
||||
- name: Install amazon epel
|
||||
command: amazon-linux-extras install epel -y
|
||||
|
||||
- name: Install phpMyAdmin
|
||||
yum:
|
||||
name: phpmyadmin
|
||||
state: latest
|
||||
|
||||
- name: Create phpMyAdmin.conf
|
||||
template:
|
||||
src: phpMyAdmin.j2
|
||||
dest: /etc/httpd/conf.d/phpMyAdmin.conf
|
||||
force: yes
|
@ -1,371 +0,0 @@
|
||||
#
|
||||
# This is the main Apache HTTP server configuration file. It contains the
|
||||
# configuration directives that give the server its instructions.
|
||||
# See <URL:http://httpd.apache.org/docs/2.4/> for detailed information.
|
||||
# In particular, see
|
||||
# <URL:http://httpd.apache.org/docs/2.4/mod/directives.html>
|
||||
# for a discussion of each configuration directive.
|
||||
#
|
||||
# Do NOT simply read the instructions in here without understanding
|
||||
# what they do. They're here only as hints or reminders. If you are unsure
|
||||
# consult the online docs. You have been warned.
|
||||
#
|
||||
# Configuration and logfile names: If the filenames you specify for many
|
||||
# of the server's control files begin with "/" (or "drive:/" for Win32), the
|
||||
# server will use that explicit path. If the filenames do *not* begin
|
||||
# with "/", the value of ServerRoot is prepended -- so 'log/access_log'
|
||||
# with ServerRoot set to '/www' will be interpreted by the
|
||||
# server as '/www/log/access_log', where as '/log/access_log' will be
|
||||
# interpreted as '/log/access_log'.
|
||||
|
||||
#
|
||||
# ServerRoot: The top of the directory tree under which the server's
|
||||
# configuration, error, and log files are kept.
|
||||
#
|
||||
# Do not add a slash at the end of the directory path. If you point
|
||||
# ServerRoot at a non-local disk, be sure to specify a local disk on the
|
||||
# Mutex directive, if file-based mutexes are used. If you wish to share the
|
||||
# same ServerRoot for multiple httpd daemons, you will need to change at
|
||||
# least PidFile.
|
||||
#
|
||||
ServerRoot "/etc/httpd"
|
||||
|
||||
#
|
||||
# Listen: Allows you to bind Apache to specific IP addresses and/or
|
||||
# ports, instead of the default. See also the <VirtualHost>
|
||||
# directive.
|
||||
#
|
||||
# Change this to Listen on specific IP addresses as shown below to
|
||||
# prevent Apache from glomming onto all bound IP addresses.
|
||||
#
|
||||
#Listen 12.34.56.78:80
|
||||
Listen 80
|
||||
|
||||
#
|
||||
# Dynamic Shared Object (DSO) Support
|
||||
#
|
||||
# To be able to use the functionality of a module which was built as a DSO you
|
||||
# have to place corresponding `LoadModule' lines at this location so the
|
||||
# directives contained in it are actually available _before_ they are used.
|
||||
# Statically compiled modules (those listed by `httpd -l') do not need
|
||||
# to be loaded here.
|
||||
#
|
||||
# Example:
|
||||
# LoadModule foo_module modules/mod_foo.so
|
||||
#
|
||||
Include conf.modules.d/*.conf
|
||||
|
||||
#
|
||||
# If you wish httpd to run as a different user or group, you must run
|
||||
# httpd as root initially and it will switch.
|
||||
#
|
||||
# User/Group: The name (or #number) of the user/group to run httpd as.
|
||||
# It is usually good practice to create a dedicated user and group for
|
||||
# running httpd, as with most system services.
|
||||
#
|
||||
User apache
|
||||
Group apache
|
||||
|
||||
# 'Main' server configuration
|
||||
#
|
||||
# The directives in this section set up the values used by the 'main'
|
||||
# server, which responds to any requests that aren't handled by a
|
||||
# <VirtualHost> definition. These values also provide defaults for
|
||||
# any <VirtualHost> containers you may define later in the file.
|
||||
#
|
||||
# All of these directives may appear inside <VirtualHost> containers,
|
||||
# in which case these default settings will be overridden for the
|
||||
# virtual host being defined.
|
||||
#
|
||||
|
||||
#
|
||||
# ServerAdmin: Your address, where problems with the server should be
|
||||
# e-mailed. This address appears on some server-generated pages, such
|
||||
# as error documents. e.g. admin@your-domain.com
|
||||
#
|
||||
ServerAdmin root@localhost
|
||||
|
||||
#
|
||||
# ServerName gives the name and port that the server uses to identify itself.
|
||||
# This can often be determined automatically, but we recommend you specify
|
||||
# it explicitly to prevent problems during startup.
|
||||
#
|
||||
# If your host doesn't have a registered DNS name, enter its IP address here.
|
||||
#
|
||||
#ServerName www.example.com:80
|
||||
|
||||
#
|
||||
# Deny access to the entirety of your server's filesystem. You must
|
||||
# explicitly permit access to web content directories in other
|
||||
# <Directory> blocks below.
|
||||
#
|
||||
<Directory />
|
||||
AllowOverride none
|
||||
Require all denied
|
||||
</Directory>
|
||||
|
||||
#
|
||||
# Note that from this point forward you must specifically allow
|
||||
# particular features to be enabled - so if something's not working as
|
||||
# you might expect, make sure that you have specifically enabled it
|
||||
# below.
|
||||
#
|
||||
|
||||
#
|
||||
# DocumentRoot: The directory out of which you will serve your
|
||||
# documents. By default, all requests are taken from this directory, but
|
||||
# symbolic links and aliases may be used to point to other locations.
|
||||
#
|
||||
|
||||
DocumentRoot "/var/www/html"
|
||||
|
||||
#
|
||||
# Relax access to content within /var/www.
|
||||
#
|
||||
<Directory "/var/www">
|
||||
AllowOverride None
|
||||
# Allow open access:
|
||||
Require all granted
|
||||
</Directory>
|
||||
|
||||
# Further relax access to the default document root:
|
||||
<Directory "/var/www/html">
|
||||
|
||||
#
|
||||
# Possible values for the Options directive are "None", "All",
|
||||
# or any combination of:
|
||||
# Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
|
||||
#
|
||||
# Note that "MultiViews" must be named *explicitly* --- "Options All"
|
||||
# doesn't give it to you.
|
||||
#
|
||||
# The Options directive is both complicated and important. Please see
|
||||
# http://httpd.apache.org/docs/2.4/mod/core.html#options
|
||||
# for more information.
|
||||
#
|
||||
Options Indexes FollowSymLinks
|
||||
|
||||
#
|
||||
# AllowOverride controls what directives may be placed in .htaccess files.
|
||||
# It can be "All", "None", or any combination of the keywords:
|
||||
# Options FileInfo AuthConfig Limit
|
||||
#
|
||||
AllowOverride None
|
||||
|
||||
#
|
||||
# Controls who can get stuff from this server.
|
||||
#
|
||||
# Require all granted
|
||||
|
||||
#AuthType Basic
|
||||
#AuthName "Restricted Content"
|
||||
#AuthBasicProvider file
|
||||
#AuthUserFile /etc/httpd/passwords
|
||||
#Require valid-user
|
||||
|
||||
</Directory>
|
||||
|
||||
#
|
||||
# DirectoryIndex: sets the file that Apache will serve if a directory
|
||||
# is requested.
|
||||
#
|
||||
<IfModule dir_module>
|
||||
DirectoryIndex index.html
|
||||
</IfModule>
|
||||
|
||||
#
|
||||
# The following lines prevent .htaccess and .htpasswd files from being
|
||||
# viewed by Web clients.
|
||||
#
|
||||
<Files ".ht*">
|
||||
Require all denied
|
||||
</Files>
|
||||
|
||||
#
|
||||
# ErrorLog: The location of the error log file.
|
||||
# If you do not specify an ErrorLog directive within a <VirtualHost>
|
||||
# container, error messages relating to that virtual host will be
|
||||
# logged here. If you *do* define an error logfile for a <VirtualHost>
|
||||
# container, that host's errors will be logged there and not here.
|
||||
#
|
||||
ErrorLog "logs/error_log"
|
||||
|
||||
#
|
||||
# LogLevel: Control the number of messages logged to the error_log.
|
||||
# Possible values include: debug, info, notice, warn, error, crit,
|
||||
# alert, emerg.
|
||||
#
|
||||
LogLevel warn
|
||||
|
||||
<IfModule log_config_module>
|
||||
#
|
||||
# The following directives define some format nicknames for use with
|
||||
# a CustomLog directive (see below).
|
||||
#
|
||||
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
|
||||
LogFormat "%h %l %u %t \"%r\" %>s %b" common
|
||||
|
||||
<IfModule logio_module>
|
||||
# You need to enable mod_logio.c to use %I and %O
|
||||
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
|
||||
</IfModule>
|
||||
|
||||
#
|
||||
# The location and format of the access logfile (Common Logfile Format).
|
||||
# If you do not define any access logfiles within a <VirtualHost>
|
||||
# container, they will be logged here. Contrariwise, if you *do*
|
||||
# define per-<VirtualHost> access logfiles, transactions will be
|
||||
# logged therein and *not* in this file.
|
||||
#
|
||||
#CustomLog "logs/access_log" common
|
||||
|
||||
#
|
||||
# If you prefer a logfile with access, agent, and referer information
|
||||
# (Combined Logfile Format) you can use the following directive.
|
||||
#
|
||||
CustomLog "logs/access_log" combined
|
||||
</IfModule>
|
||||
|
||||
<IfModule alias_module>
|
||||
#
|
||||
# Redirect: Allows you to tell clients about documents that used to
|
||||
# exist in your server's namespace, but do not anymore. The client
|
||||
# will make a new request for the document at its new location.
|
||||
# Example:
|
||||
# Redirect permanent /foo http://www.example.com/bar
|
||||
|
||||
#
|
||||
# Alias: Maps web paths into filesystem paths and is used to
|
||||
# access content that does not live under the DocumentRoot.
|
||||
# Example:
|
||||
# Alias /webpath /full/filesystem/path
|
||||
#
|
||||
# If you include a trailing / on /webpath then the server will
|
||||
# require it to be present in the URL. You will also likely
|
||||
# need to provide a <Directory> section to allow access to
|
||||
# the filesystem path.
|
||||
|
||||
#
|
||||
# ScriptAlias: This controls which directories contain server scripts.
|
||||
# ScriptAliases are essentially the same as Aliases, except that
|
||||
# documents in the target directory are treated as applications and
|
||||
# run by the server when requested rather than as documents sent to the
|
||||
# client. The same rules about trailing "/" apply to ScriptAlias
|
||||
# directives as to Alias.
|
||||
#
|
||||
ScriptAlias /cgi-bin/ "/var/www/cgi-bin/"
|
||||
|
||||
</IfModule>
|
||||
|
||||
#
|
||||
# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased
|
||||
# CGI directory exists, if you have that configured.
|
||||
#
|
||||
<Directory "/var/www/cgi-bin">
|
||||
AllowOverride None
|
||||
Options None
|
||||
Require all granted
|
||||
</Directory>
|
||||
|
||||
<IfModule mime_module>
|
||||
#
|
||||
# TypesConfig points to the file containing the list of mappings from
|
||||
# filename extension to MIME-type.
|
||||
#
|
||||
TypesConfig /etc/mime.types
|
||||
|
||||
#
|
||||
# AddType allows you to add to or override the MIME configuration
|
||||
# file specified in TypesConfig for specific file types.
|
||||
#
|
||||
#AddType application/x-gzip .tgz
|
||||
#
|
||||
# AddEncoding allows you to have certain browsers uncompress
|
||||
# information on the fly. Note: Not all browsers support this.
|
||||
#
|
||||
#AddEncoding x-compress .Z
|
||||
#AddEncoding x-gzip .gz .tgz
|
||||
#
|
||||
# If the AddEncoding directives above are commented-out, then you
|
||||
# probably should define those extensions to indicate media types:
|
||||
#
|
||||
AddType application/x-compress .Z
|
||||
AddType application/x-gzip .gz .tgz
|
||||
|
||||
#
|
||||
# AddHandler allows you to map certain file extensions to "handlers":
|
||||
# actions unrelated to filetype. These can be either built into the server
|
||||
# or added with the Action directive (see below)
|
||||
#
|
||||
# To use CGI scripts outside of ScriptAliased directories:
|
||||
# (You will also need to add "ExecCGI" to the "Options" directive.)
|
||||
#
|
||||
#AddHandler cgi-script .cgi
|
||||
|
||||
# For type maps (negotiated resources):
|
||||
#AddHandler type-map var
|
||||
|
||||
#
|
||||
# Filters allow you to process content before it is sent to the client.
|
||||
#
|
||||
# To parse .shtml files for server-side includes (SSI):
|
||||
# (You will also need to add "Includes" to the "Options" directive.)
|
||||
#
|
||||
AddType text/html .shtml
|
||||
AddOutputFilter INCLUDES .shtml
|
||||
</IfModule>
|
||||
|
||||
#
|
||||
# Specify a default charset for all content served; this enables
|
||||
# interpretation of all content as UTF-8 by default. To use the
|
||||
# default browser choice (ISO-8859-1), or to allow the META tags
|
||||
# in HTML content to override this choice, comment out this
|
||||
# directive:
|
||||
#
|
||||
AddDefaultCharset UTF-8
|
||||
|
||||
<IfModule mime_magic_module>
|
||||
#
|
||||
# The mod_mime_magic module allows the server to use various hints from the
|
||||
# contents of the file itself to determine its type. The MIMEMagicFile
|
||||
# directive tells the module where the hint definitions are located.
|
||||
#
|
||||
MIMEMagicFile conf/magic
|
||||
</IfModule>
|
||||
|
||||
#
|
||||
# Customizable error responses come in three flavors:
|
||||
# 1) plain text 2) local redirects 3) external redirects
|
||||
#
|
||||
# Some examples:
|
||||
#ErrorDocument 500 "The server made a boo boo."
|
||||
#ErrorDocument 404 /missing.html
|
||||
#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
|
||||
#ErrorDocument 402 http://www.example.com/subscription_info.html
|
||||
#
|
||||
|
||||
#
|
||||
# EnableMMAP and EnableSendfile: On systems that support it,
|
||||
# memory-mapping or the sendfile syscall may be used to deliver
|
||||
# files. This usually improves server performance, but must
|
||||
# be turned off when serving from networked-mounted
|
||||
# filesystems or if support for these functions is otherwise
|
||||
# broken on your system.
|
||||
# Defaults if commented: EnableMMAP On, EnableSendfile Off
|
||||
#
|
||||
#EnableMMAP off
|
||||
EnableSendfile on
|
||||
|
||||
# Enable HTTP/2 by default
|
||||
#
|
||||
# https://httpd.apache.org/docs/2.4/mod/core.html#protocols
|
||||
|
||||
<IfModule mod_http2.c>
|
||||
Protocols h2 h2c http/1.1
|
||||
</IfModule>
|
||||
|
||||
|
||||
# Supplemental configuration
|
||||
#
|
||||
# Load config files in the "/etc/httpd/conf.d" directory, if any.
|
||||
IncludeOptional conf.d/*.conf
|
@ -1,77 +0,0 @@
|
||||
# phpMyAdmin - Web based MySQL browser written in php
|
||||
#
|
||||
# Allows only localhost by default
|
||||
#
|
||||
# But allowing phpMyAdmin to anyone other than localhost should be considered
|
||||
# dangerous unless properly secured by SSL
|
||||
|
||||
Alias /phpMyAdmin /usr/share/phpMyAdmin
|
||||
Alias /phpmyadmin /usr/share/phpMyAdmin
|
||||
|
||||
<Directory /usr/share/phpMyAdmin/>
|
||||
AddDefaultCharset UTF-8
|
||||
|
||||
<IfModule mod_authz_core.c>
|
||||
# Apache 2.4
|
||||
<RequireAny>
|
||||
Require all granted
|
||||
#Require ip 127.0.0.1
|
||||
#Require ip ::1
|
||||
</RequireAny>
|
||||
</IfModule>
|
||||
<IfModule !mod_authz_core.c>
|
||||
# Apache 2.2
|
||||
Order Deny,Allow
|
||||
Deny from All
|
||||
Allow from 127.0.0.1
|
||||
Allow from ::1
|
||||
</IfModule>
|
||||
</Directory>
|
||||
|
||||
<Directory /usr/share/phpMyAdmin/setup/>
|
||||
<IfModule mod_authz_core.c>
|
||||
# Apache 2.4
|
||||
<RequireAny>
|
||||
Require all granted
|
||||
#Require ip 127.0.0.1
|
||||
#Require ip ::1
|
||||
</RequireAny>
|
||||
</IfModule>
|
||||
<IfModule !mod_authz_core.c>
|
||||
# Apache 2.2
|
||||
Order Deny,Allow
|
||||
Deny from All
|
||||
Allow from 127.0.0.1
|
||||
Allow from ::1
|
||||
</IfModule>
|
||||
</Directory>
|
||||
|
||||
# These directories do not require access over HTTP - taken from the original
|
||||
# phpMyAdmin upstream tarball
|
||||
#
|
||||
<Directory /usr/share/phpMyAdmin/libraries/>
|
||||
Order Deny,Allow
|
||||
Deny from All
|
||||
Allow from None
|
||||
</Directory>
|
||||
|
||||
<Directory /usr/share/phpMyAdmin/setup/lib/>
|
||||
Order Deny,Allow
|
||||
Deny from All
|
||||
Allow from None
|
||||
</Directory>
|
||||
|
||||
<Directory /usr/share/phpMyAdmin/setup/frames/>
|
||||
Order Deny,Allow
|
||||
Deny from All
|
||||
Allow from None
|
||||
</Directory>
|
||||
|
||||
# This configuration prevents mod_security at phpMyAdmin directories from
|
||||
# filtering SQL etc. This may break your mod_security implementation.
|
||||
#
|
||||
#<IfModule mod_security.c>
|
||||
# <Directory /usr/share/phpMyAdmin/>
|
||||
# SecRuleInheritance Off
|
||||
# </Directory>
|
||||
#</IfModule>
|
@ -1,49 +0,0 @@
|
||||
###########################
|
||||
# PROVIDER
|
||||
###########################
|
||||
|
||||
provider "aws" {
|
||||
access_key = "${var.aws_access_key_id}"
|
||||
secret_key = "${var.aws_secret_access_key}"
|
||||
region = "${var.aws_region}"
|
||||
}
|
||||
|
||||
###########################
|
||||
# ELASTIC IP
|
||||
###########################
|
||||
|
||||
data "aws_eip" "webserver-ip" {
|
||||
public_ip = "35.180.10.123"
|
||||
}
|
||||
|
||||
resource "aws_eip_association" "webserver-eip" {
|
||||
instance_id = "${aws_instance.webserver.id}"
|
||||
allocation_id = "${data.aws_eip.webserver-ip.id}"
|
||||
}
|
||||
|
||||
###########################
|
||||
# ADD SSH KEY
|
||||
###########################
|
||||
|
||||
resource "aws_key_pair" "terraform_ec2_key" {
|
||||
key_name = "terraform_ec2_key"
|
||||
public_key = "${var.aws_ssh_key}"
|
||||
}
|
||||
|
||||
###########################
|
||||
# INSTANCE
|
||||
###########################
|
||||
|
||||
resource "aws_instance" "webserver" {
|
||||
ami = "ami-04992646d54c69ef4"
|
||||
instance_type = "t2.micro"
|
||||
key_name = "${aws_key_pair.terraform_ec2_key.id}"
|
||||
vpc_security_group_ids = [
|
||||
"${aws_security_group.allow_ssh.id}",
|
||||
"${aws_security_group.allow_http.id}"
|
||||
]
|
||||
|
||||
tags {
|
||||
Name = "hifive-webserver"
|
||||
}
|
||||
}
|
@ -1,58 +0,0 @@
|
||||
###########################
|
||||
# ALLOW SSH
|
||||
###########################
|
||||
|
||||
resource "aws_security_group" "allow_ssh" {
|
||||
name = "allow ssh"
|
||||
|
||||
ingress {
|
||||
from_port = 22
|
||||
to_port = 22
|
||||
protocol = "tcp"
|
||||
cidr_blocks = ["0.0.0.0/0"]
|
||||
}
|
||||
|
||||
lifecycle {
|
||||
create_before_destroy = true
|
||||
}
|
||||
}
|
||||
|
||||
###########################
|
||||
# ALLOW HTTP
|
||||
###########################
|
||||
|
||||
resource "aws_security_group" "allow_http" {
|
||||
name = "allow http"
|
||||
|
||||
ingress {
|
||||
from_port = 80
|
||||
to_port = 80
|
||||
protocol = "tcp"
|
||||
cidr_blocks = ["0.0.0.0/0"]
|
||||
}
|
||||
|
||||
ingress {
|
||||
from_port = 443
|
||||
to_port = 443
|
||||
protocol = "tcp"
|
||||
cidr_blocks = ["0.0.0.0/0"]
|
||||
}
|
||||
|
||||
egress {
|
||||
from_port = 80
|
||||
to_port = 80
|
||||
protocol = "tcp"
|
||||
cidr_blocks = ["0.0.0.0/0"]
|
||||
}
|
||||
|
||||
egress {
|
||||
from_port = 443
|
||||
to_port = 443
|
||||
protocol = "tcp"
|
||||
cidr_blocks = ["0.0.0.0/0"]
|
||||
}
|
||||
|
||||
lifecycle {
|
||||
create_before_destroy = true
|
||||
}
|
||||
}
|
@ -1,252 +0,0 @@
|
||||
{
|
||||
"version": 3,
|
||||
"terraform_version": "0.11.10",
|
||||
"serial": 8,
|
||||
"lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22",
|
||||
"modules": [
|
||||
{
|
||||
"path": [
|
||||
"root"
|
||||
],
|
||||
"outputs": {},
|
||||
"resources": {
|
||||
"aws_eip_association.webserver-eip": {
|
||||
"type": "aws_eip_association",
|
||||
"depends_on": [
|
||||
"aws_instance.webserver",
|
||||
"data.aws_eip.webserver-ip"
|
||||
],
|
||||
"primary": {
|
||||
"id": "eipassoc-0826b0b47141924ba",
|
||||
"attributes": {
|
||||
"allocation_id": "eipalloc-0f61e902f5f680dc0",
|
||||
"id": "eipassoc-0826b0b47141924ba",
|
||||
"instance_id": "i-09f2de73feb5c3e7a",
|
||||
"network_interface_id": "eni-02d855d56e40967d0",
|
||||
"private_ip_address": "172.31.36.68",
|
||||
"public_ip": "35.180.10.123"
|
||||
},
|
||||
"meta": {},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_instance.webserver": {
|
||||
"type": "aws_instance",
|
||||
"depends_on": [
|
||||
"aws_key_pair.terraform_ec2_key",
|
||||
"aws_security_group.allow_http",
|
||||
"aws_security_group.allow_ssh"
|
||||
],
|
||||
"primary": {
|
||||
"id": "i-09f2de73feb5c3e7a",
|
||||
"attributes": {
|
||||
"ami": "ami-04992646d54c69ef4",
|
||||
"arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a",
|
||||
"associate_public_ip_address": "true",
|
||||
"availability_zone": "eu-west-3c",
|
||||
"cpu_core_count": "1",
|
||||
"cpu_threads_per_core": "1",
|
||||
"credit_specification.#": "1",
|
||||
"credit_specification.0.cpu_credits": "standard",
|
||||
"disable_api_termination": "false",
|
||||
"ebs_block_device.#": "0",
|
||||
"ebs_optimized": "false",
|
||||
"ephemeral_block_device.#": "0",
|
||||
"get_password_data": "false",
|
||||
"iam_instance_profile": "",
|
||||
"id": "i-09f2de73feb5c3e7a",
|
||||
"instance_state": "running",
|
||||
"instance_type": "t2.micro",
|
||||
"ipv6_addresses.#": "0",
|
||||
"key_name": "terraform_ec2_key",
|
||||
"monitoring": "false",
|
||||
"network_interface.#": "0",
|
||||
"network_interface_id": "eni-02d855d56e40967d0",
|
||||
"password_data": "",
|
||||
"placement_group": "",
|
||||
"primary_network_interface_id": "eni-02d855d56e40967d0",
|
||||
"private_dns": "ip-172-31-36-68.eu-west-3.compute.internal",
|
||||
"private_ip": "172.31.36.68",
|
||||
"public_dns": "ec2-35-180-10-123.eu-west-3.compute.amazonaws.com",
|
||||
"public_ip": "35.180.10.123",
|
||||
"root_block_device.#": "1",
|
||||
"root_block_device.0.delete_on_termination": "true",
|
||||
"root_block_device.0.iops": "100",
|
||||
"root_block_device.0.volume_id": "vol-0b1da0548cc9c546e",
|
||||
"root_block_device.0.volume_size": "8",
|
||||
"root_block_device.0.volume_type": "gp2",
|
||||
"security_groups.#": "2",
|
||||
"security_groups.1710041364": "allow ssh",
|
||||
"security_groups.4237835427": "allow http",
|
||||
"source_dest_check": "true",
|
||||
"subnet_id": "subnet-6308d02e",
|
||||
"tags.%": "1",
|
||||
"tags.Name": "hifive-webserver",
|
||||
"tenancy": "default",
|
||||
"volume_tags.%": "0",
|
||||
"vpc_security_group_ids.#": "2",
|
||||
"vpc_security_group_ids.1821931549": "sg-059fe679d9db32397",
|
||||
"vpc_security_group_ids.2822979855": "sg-082897f758ada2701"
|
||||
},
|
||||
"meta": {
|
||||
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
|
||||
"create": 600000000000,
|
||||
"delete": 1200000000000,
|
||||
"update": 600000000000
|
||||
},
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_key_pair.terraform_ec2_key": {
|
||||
"type": "aws_key_pair",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "terraform_ec2_key",
|
||||
"attributes": {
|
||||
"fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74",
|
||||
"id": "terraform_ec2_key",
|
||||
"key_name": "terraform_ec2_key",
|
||||
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad"
|
||||
},
|
||||
"meta": {
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_security_group.allow_http": {
|
||||
"type": "aws_security_group",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "sg-082897f758ada2701",
|
||||
"attributes": {
|
||||
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701",
|
||||
"description": "Managed by Terraform",
|
||||
"egress.#": "2",
|
||||
"egress.2214680975.cidr_blocks.#": "1",
|
||||
"egress.2214680975.cidr_blocks.0": "0.0.0.0/0",
|
||||
"egress.2214680975.description": "",
|
||||
"egress.2214680975.from_port": "80",
|
||||
"egress.2214680975.ipv6_cidr_blocks.#": "0",
|
||||
"egress.2214680975.prefix_list_ids.#": "0",
|
||||
"egress.2214680975.protocol": "tcp",
|
||||
"egress.2214680975.security_groups.#": "0",
|
||||
"egress.2214680975.self": "false",
|
||||
"egress.2214680975.to_port": "80",
|
||||
"egress.2617001939.cidr_blocks.#": "1",
|
||||
"egress.2617001939.cidr_blocks.0": "0.0.0.0/0",
|
||||
"egress.2617001939.description": "",
|
||||
"egress.2617001939.from_port": "443",
|
||||
"egress.2617001939.ipv6_cidr_blocks.#": "0",
|
||||
"egress.2617001939.prefix_list_ids.#": "0",
|
||||
"egress.2617001939.protocol": "tcp",
|
||||
"egress.2617001939.security_groups.#": "0",
|
||||
"egress.2617001939.self": "false",
|
||||
"egress.2617001939.to_port": "443",
|
||||
"id": "sg-082897f758ada2701",
|
||||
"ingress.#": "2",
|
||||
"ingress.2214680975.cidr_blocks.#": "1",
|
||||
"ingress.2214680975.cidr_blocks.0": "0.0.0.0/0",
|
||||
"ingress.2214680975.description": "",
|
||||
"ingress.2214680975.from_port": "80",
|
||||
"ingress.2214680975.ipv6_cidr_blocks.#": "0",
|
||||
"ingress.2214680975.prefix_list_ids.#": "0",
|
||||
"ingress.2214680975.protocol": "tcp",
|
||||
"ingress.2214680975.security_groups.#": "0",
|
||||
"ingress.2214680975.self": "false",
|
||||
"ingress.2214680975.to_port": "80",
|
||||
"ingress.2617001939.cidr_blocks.#": "1",
|
||||
"ingress.2617001939.cidr_blocks.0": "0.0.0.0/0",
|
||||
"ingress.2617001939.description": "",
|
||||
"ingress.2617001939.from_port": "443",
|
||||
"ingress.2617001939.ipv6_cidr_blocks.#": "0",
|
||||
"ingress.2617001939.prefix_list_ids.#": "0",
|
||||
"ingress.2617001939.protocol": "tcp",
|
||||
"ingress.2617001939.security_groups.#": "0",
|
||||
"ingress.2617001939.self": "false",
|
||||
"ingress.2617001939.to_port": "443",
|
||||
"name": "allow http",
|
||||
"owner_id": "116854918046",
|
||||
"revoke_rules_on_delete": "false",
|
||||
"tags.%": "0",
|
||||
"vpc_id": "vpc-8a4b1ae3"
|
||||
},
|
||||
"meta": {
|
||||
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
|
||||
"create": 600000000000,
|
||||
"delete": 600000000000
|
||||
},
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_security_group.allow_ssh": {
|
||||
"type": "aws_security_group",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "sg-059fe679d9db32397",
|
||||
"attributes": {
|
||||
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397",
|
||||
"description": "Managed by Terraform",
|
||||
"egress.#": "0",
|
||||
"id": "sg-059fe679d9db32397",
|
||||
"ingress.#": "1",
|
||||
"ingress.2541437006.cidr_blocks.#": "1",
|
||||
"ingress.2541437006.cidr_blocks.0": "0.0.0.0/0",
|
||||
"ingress.2541437006.description": "",
|
||||
"ingress.2541437006.from_port": "22",
|
||||
"ingress.2541437006.ipv6_cidr_blocks.#": "0",
|
||||
"ingress.2541437006.prefix_list_ids.#": "0",
|
||||
"ingress.2541437006.protocol": "tcp",
|
||||
"ingress.2541437006.security_groups.#": "0",
|
||||
"ingress.2541437006.self": "false",
|
||||
"ingress.2541437006.to_port": "22",
|
||||
"name": "allow ssh",
|
||||
"owner_id": "116854918046",
|
||||
"revoke_rules_on_delete": "false",
|
||||
"tags.%": "0",
|
||||
"vpc_id": "vpc-8a4b1ae3"
|
||||
},
|
||||
"meta": {
|
||||
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
|
||||
"create": 600000000000,
|
||||
"delete": 600000000000
|
||||
},
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"data.aws_eip.webserver-ip": {
|
||||
"type": "aws_eip",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "eipalloc-0f61e902f5f680dc0",
|
||||
"attributes": {
|
||||
"id": "eipalloc-0f61e902f5f680dc0",
|
||||
"public_ip": "35.180.10.123"
|
||||
},
|
||||
"meta": {},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
}
|
||||
},
|
||||
"depends_on": []
|
||||
}
|
||||
]
|
||||
}
|
@ -1,232 +0,0 @@
|
||||
{
|
||||
"version": 3,
|
||||
"terraform_version": "0.11.10",
|
||||
"serial": 8,
|
||||
"lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22",
|
||||
"modules": [
|
||||
{
|
||||
"path": [
|
||||
"root"
|
||||
],
|
||||
"outputs": {},
|
||||
"resources": {
|
||||
"aws_eip_association.webserver-eip": {
|
||||
"type": "aws_eip_association",
|
||||
"depends_on": [
|
||||
"aws_instance.webserver",
|
||||
"data.aws_eip.webserver-ip"
|
||||
],
|
||||
"primary": {
|
||||
"id": "eipassoc-0826b0b47141924ba",
|
||||
"attributes": {
|
||||
"allocation_id": "eipalloc-0f61e902f5f680dc0",
|
||||
"id": "eipassoc-0826b0b47141924ba",
|
||||
"instance_id": "i-09f2de73feb5c3e7a",
|
||||
"network_interface_id": "eni-02d855d56e40967d0",
|
||||
"private_ip_address": "172.31.36.68",
|
||||
"public_ip": "35.180.10.123"
|
||||
},
|
||||
"meta": {},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_instance.webserver": {
|
||||
"type": "aws_instance",
|
||||
"depends_on": [
|
||||
"aws_key_pair.terraform_ec2_key",
|
||||
"aws_security_group.allow_http",
|
||||
"aws_security_group.allow_ssh"
|
||||
],
|
||||
"primary": {
|
||||
"id": "i-09f2de73feb5c3e7a",
|
||||
"attributes": {
|
||||
"ami": "ami-04992646d54c69ef4",
|
||||
"arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a",
|
||||
"associate_public_ip_address": "true",
|
||||
"availability_zone": "eu-west-3c",
|
||||
"cpu_core_count": "1",
|
||||
"cpu_threads_per_core": "1",
|
||||
"credit_specification.#": "1",
|
||||
"credit_specification.0.cpu_credits": "standard",
|
||||
"disable_api_termination": "false",
|
||||
"ebs_block_device.#": "0",
|
||||
"ebs_optimized": "false",
|
||||
"ephemeral_block_device.#": "0",
|
||||
"get_password_data": "false",
|
||||
"iam_instance_profile": "",
|
||||
"id": "i-09f2de73feb5c3e7a",
|
||||
"instance_state": "running",
|
||||
"instance_type": "t2.micro",
|
||||
"ipv6_addresses.#": "0",
|
||||
"key_name": "terraform_ec2_key",
|
||||
"monitoring": "false",
|
||||
"network_interface.#": "0",
|
||||
"network_interface_id": "eni-02d855d56e40967d0",
|
||||
"password_data": "",
|
||||
"placement_group": "",
|
||||
"primary_network_interface_id": "eni-02d855d56e40967d0",
|
||||
"private_dns": "ip-172-31-36-68.eu-west-3.compute.internal",
|
||||
"private_ip": "172.31.36.68",
|
||||
"public_dns": "ec2-35-180-74-87.eu-west-3.compute.amazonaws.com",
|
||||
"public_ip": "35.180.74.87",
|
||||
"root_block_device.#": "1",
|
||||
"root_block_device.0.delete_on_termination": "true",
|
||||
"root_block_device.0.iops": "100",
|
||||
"root_block_device.0.volume_id": "vol-0b1da0548cc9c546e",
|
||||
"root_block_device.0.volume_size": "8",
|
||||
"root_block_device.0.volume_type": "gp2",
|
||||
"security_groups.#": "2",
|
||||
"security_groups.1710041364": "allow ssh",
|
||||
"security_groups.4237835427": "allow http",
|
||||
"source_dest_check": "true",
|
||||
"subnet_id": "subnet-6308d02e",
|
||||
"tags.%": "1",
|
||||
"tags.Name": "hifive-webserver",
|
||||
"tenancy": "default",
|
||||
"volume_tags.%": "0",
|
||||
"vpc_security_group_ids.#": "2",
|
||||
"vpc_security_group_ids.1821931549": "sg-059fe679d9db32397",
|
||||
"vpc_security_group_ids.2822979855": "sg-082897f758ada2701"
|
||||
},
|
||||
"meta": {
|
||||
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
|
||||
"create": 600000000000,
|
||||
"delete": 1200000000000,
|
||||
"update": 600000000000
|
||||
},
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_key_pair.terraform_ec2_key": {
|
||||
"type": "aws_key_pair",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "terraform_ec2_key",
|
||||
"attributes": {
|
||||
"fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74",
|
||||
"id": "terraform_ec2_key",
|
||||
"key_name": "terraform_ec2_key",
|
||||
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad"
|
||||
},
|
||||
"meta": {
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_security_group.allow_http": {
|
||||
"type": "aws_security_group",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "sg-082897f758ada2701",
|
||||
"attributes": {
|
||||
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701",
|
||||
"description": "Managed by Terraform",
|
||||
"egress.#": "2",
|
||||
"egress.2214680975.cidr_blocks.#": "1",
|
||||
"egress.2214680975.cidr_blocks.0": "0.0.0.0/0",
|
||||
"egress.2214680975.description": "",
|
||||
"egress.2214680975.from_port": "80",
|
||||
"egress.2214680975.ipv6_cidr_blocks.#": "0",
|
||||
"egress.2214680975.prefix_list_ids.#": "0",
|
||||
"egress.2214680975.protocol": "tcp",
|
||||
"egress.2214680975.security_groups.#": "0",
|
||||
"egress.2214680975.self": "false",
|
||||
"egress.2214680975.to_port": "80",
|
||||
"egress.2617001939.cidr_blocks.#": "1",
|
||||
"egress.2617001939.cidr_blocks.0": "0.0.0.0/0",
|
||||
"egress.2617001939.description": "",
|
||||
"egress.2617001939.from_port": "443",
|
||||
"egress.2617001939.ipv6_cidr_blocks.#": "0",
|
||||
"egress.2617001939.prefix_list_ids.#": "0",
|
||||
"egress.2617001939.protocol": "tcp",
|
||||
"egress.2617001939.security_groups.#": "0",
|
||||
"egress.2617001939.self": "false",
|
||||
"egress.2617001939.to_port": "443",
|
||||
"id": "sg-082897f758ada2701",
|
||||
"ingress.#": "0",
|
||||
"name": "allow http",
|
||||
"owner_id": "116854918046",
|
||||
"revoke_rules_on_delete": "false",
|
||||
"tags.%": "0",
|
||||
"vpc_id": "vpc-8a4b1ae3"
|
||||
},
|
||||
"meta": {
|
||||
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
|
||||
"create": 600000000000,
|
||||
"delete": 600000000000
|
||||
},
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"aws_security_group.allow_ssh": {
|
||||
"type": "aws_security_group",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "sg-059fe679d9db32397",
|
||||
"attributes": {
|
||||
"arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397",
|
||||
"description": "Managed by Terraform",
|
||||
"egress.#": "0",
|
||||
"id": "sg-059fe679d9db32397",
|
||||
"ingress.#": "1",
|
||||
"ingress.2541437006.cidr_blocks.#": "1",
|
||||
"ingress.2541437006.cidr_blocks.0": "0.0.0.0/0",
|
||||
"ingress.2541437006.description": "",
|
||||
"ingress.2541437006.from_port": "22",
|
||||
"ingress.2541437006.ipv6_cidr_blocks.#": "0",
|
||||
"ingress.2541437006.prefix_list_ids.#": "0",
|
||||
"ingress.2541437006.protocol": "tcp",
|
||||
"ingress.2541437006.security_groups.#": "0",
|
||||
"ingress.2541437006.self": "false",
|
||||
"ingress.2541437006.to_port": "22",
|
||||
"name": "allow ssh",
|
||||
"owner_id": "116854918046",
|
||||
"revoke_rules_on_delete": "false",
|
||||
"tags.%": "0",
|
||||
"vpc_id": "vpc-8a4b1ae3"
|
||||
},
|
||||
"meta": {
|
||||
"e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
|
||||
"create": 600000000000,
|
||||
"delete": 600000000000
|
||||
},
|
||||
"schema_version": "1"
|
||||
},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
},
|
||||
"data.aws_eip.webserver-ip": {
|
||||
"type": "aws_eip",
|
||||
"depends_on": [],
|
||||
"primary": {
|
||||
"id": "eipalloc-0f61e902f5f680dc0",
|
||||
"attributes": {
|
||||
"id": "eipalloc-0f61e902f5f680dc0",
|
||||
"public_ip": "35.180.10.123"
|
||||
},
|
||||
"meta": {},
|
||||
"tainted": false
|
||||
},
|
||||
"deposed": [],
|
||||
"provider": "provider.aws"
|
||||
}
|
||||
},
|
||||
"depends_on": []
|
||||
}
|
||||
]
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user