diff --git a/.ansible-ci.yml b/.ansible-ci.yml
deleted file mode 100644
index 3068ac1..0000000
--- a/.ansible-ci.yml
+++ /dev/null
@@ -1,31 +0,0 @@
----
-- hosts: hifive
- become: yes
- become_user: root
-
- tasks:
-
- - name: Delete last deploy
- file:
- path: /var/www/html/
- state: absent
-
- - name: Copy all files to web server
- synchronize:
- src: /builds/aviortheking/blog_imie/project/
- dest: /var/www/html
- rsync_opts:
- - --exclude=.htaccess
-
- - name: Change ownership and group
- file:
- path: /var/www/html
- owner: apache
- group: apache
- recurse: yes
-
- - name: Change file chmod 640
- command: find /var/www/html -type f -exec chmod 640 {} \;
-
- - name: Change directory chmod 750
- command: find /var/www/html -type d -exec chmod 750 {} \;
\ No newline at end of file
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
deleted file mode 100644
index 049f353..0000000
--- a/.gitlab-ci.yml
+++ /dev/null
@@ -1,29 +0,0 @@
-image: ansible/centos7-ansible
-
-before_script:
- # Run ssh-agent (inside the build environment)
- - eval $(ssh-agent -s)
-
- # Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent
- - echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null
-
- #Create the SSH directory
- - mkdir -p ~/.ssh
- - chmod 700 ~/.ssh
-
- #Verifying the SSH host keys
- - echo "$SSH_KNOWN_HOSTS" > ~/.ssh/known_hosts
- - chmod 644 ~/.ssh/known_hosts
-
-deploy_to_webserver:
- stage: deploy
-
- only:
- - master
-
- script:
- - pwd
- - echo -e "$ANSIBLE_HIFIVE_HOSTS" > /etc/ansible/hosts
- - ansible-playbook .ansible-ci.yml
-
- when: manual
\ No newline at end of file
diff --git a/ops/ansible/httpd-centos.yml b/ops/ansible/httpd-centos.yml
deleted file mode 100644
index f1ba72f..0000000
--- a/ops/ansible/httpd-centos.yml
+++ /dev/null
@@ -1,53 +0,0 @@
----
-- hosts: hifive
- become: yes
- become_user: root
-
- tasks:
- - name: Yum update
- yum:
- name: '*'
- state: latest
-
- - name: Install httpd
- yum:
- name: httpd
- state: latest
-
- - name: Systemd enable httpd
- systemd:
- name: httpd
- enabled: yes
- masked: no
-
- - name: Change file ownership, group and mode
- file:
- path: /var/www
- owner: apache
- group: apache
- mode: 0750
- recurse: yes
-
- - name: Install python-passlib
- yum:
- name: python-passlib
- state: latest
-
- - htpasswd:
- path: /etc/httpd/passwords
- name: hifive
- password: hifive
- owner: apache
- group: apache
- mode: 0640
-
- - name: Create httpd.conf
- template:
- src: httpd.j2
- dest: /etc/httpd/conf/httpd.conf
- force: yes
-
- - name: Systemd start httpd
- systemd:
- name: httpd
- state: started
diff --git a/ops/ansible/mariadb.yml b/ops/ansible/mariadb.yml
deleted file mode 100644
index 85a121c..0000000
--- a/ops/ansible/mariadb.yml
+++ /dev/null
@@ -1,32 +0,0 @@
----
-- hosts: hifive
- become: yes
- become_user: root
-
- tasks:
- - name: Install mariadb client
- yum:
- name: mariadb
- state: latest
-
- - name: Install mariadb server
- yum:
- name: mariadb-server
- state: latest
-
- - name: Systemd enable mariadb
- systemd:
- name: mariadb
- enabled: yes
- masked: no
-
- #- name: Create phpMyAdmin.conf
- #template:
- #src: phpMyAdmin.j2
- #dest: /etc/httpd/conf.d/phpMyAdmin.conf
- #force: yes
-
- - name: Systemd start mariadb
- systemd:
- name: mariadb
- state: started
diff --git a/ops/ansible/phpmyadmin.yml b/ops/ansible/phpmyadmin.yml
deleted file mode 100644
index c088a86..0000000
--- a/ops/ansible/phpmyadmin.yml
+++ /dev/null
@@ -1,19 +0,0 @@
----
-- hosts: hifive
- become: yes
- become_user: root
-
- tasks:
- - name: Install amazon epel
- command: amazon-linux-extras install epel -y
-
- - name: Install phpMyAdmin
- yum:
- name: phpmyadmin
- state: latest
-
- - name: Create phpMyAdmin.conf
- template:
- src: phpMyAdmin.j2
- dest: /etc/httpd/conf.d/phpMyAdmin.conf
- force: yes
diff --git a/ops/ansible/templates/httpd.j2 b/ops/ansible/templates/httpd.j2
deleted file mode 100644
index d7dc24d..0000000
--- a/ops/ansible/templates/httpd.j2
+++ /dev/null
@@ -1,371 +0,0 @@
-#
-# This is the main Apache HTTP server configuration file. It contains the
-# configuration directives that give the server its instructions.
-# See for detailed information.
-# In particular, see
-#
-# for a discussion of each configuration directive.
-#
-# Do NOT simply read the instructions in here without understanding
-# what they do. They're here only as hints or reminders. If you are unsure
-# consult the online docs. You have been warned.
-#
-# Configuration and logfile names: If the filenames you specify for many
-# of the server's control files begin with "/" (or "drive:/" for Win32), the
-# server will use that explicit path. If the filenames do *not* begin
-# with "/", the value of ServerRoot is prepended -- so 'log/access_log'
-# with ServerRoot set to '/www' will be interpreted by the
-# server as '/www/log/access_log', where as '/log/access_log' will be
-# interpreted as '/log/access_log'.
-
-#
-# ServerRoot: The top of the directory tree under which the server's
-# configuration, error, and log files are kept.
-#
-# Do not add a slash at the end of the directory path. If you point
-# ServerRoot at a non-local disk, be sure to specify a local disk on the
-# Mutex directive, if file-based mutexes are used. If you wish to share the
-# same ServerRoot for multiple httpd daemons, you will need to change at
-# least PidFile.
-#
-ServerRoot "/etc/httpd"
-
-#
-# Listen: Allows you to bind Apache to specific IP addresses and/or
-# ports, instead of the default. See also the
-# directive.
-#
-# Change this to Listen on specific IP addresses as shown below to
-# prevent Apache from glomming onto all bound IP addresses.
-#
-#Listen 12.34.56.78:80
-Listen 80
-
-#
-# Dynamic Shared Object (DSO) Support
-#
-# To be able to use the functionality of a module which was built as a DSO you
-# have to place corresponding `LoadModule' lines at this location so the
-# directives contained in it are actually available _before_ they are used.
-# Statically compiled modules (those listed by `httpd -l') do not need
-# to be loaded here.
-#
-# Example:
-# LoadModule foo_module modules/mod_foo.so
-#
-Include conf.modules.d/*.conf
-
-#
-# If you wish httpd to run as a different user or group, you must run
-# httpd as root initially and it will switch.
-#
-# User/Group: The name (or #number) of the user/group to run httpd as.
-# It is usually good practice to create a dedicated user and group for
-# running httpd, as with most system services.
-#
-User apache
-Group apache
-
-# 'Main' server configuration
-#
-# The directives in this section set up the values used by the 'main'
-# server, which responds to any requests that aren't handled by a
-# definition. These values also provide defaults for
-# any containers you may define later in the file.
-#
-# All of these directives may appear inside containers,
-# in which case these default settings will be overridden for the
-# virtual host being defined.
-#
-
-#
-# ServerAdmin: Your address, where problems with the server should be
-# e-mailed. This address appears on some server-generated pages, such
-# as error documents. e.g. admin@your-domain.com
-#
-ServerAdmin root@localhost
-
-#
-# ServerName gives the name and port that the server uses to identify itself.
-# This can often be determined automatically, but we recommend you specify
-# it explicitly to prevent problems during startup.
-#
-# If your host doesn't have a registered DNS name, enter its IP address here.
-#
-#ServerName www.example.com:80
-
-#
-# Deny access to the entirety of your server's filesystem. You must
-# explicitly permit access to web content directories in other
-# blocks below.
-#
-
- AllowOverride none
- Require all denied
-
-
-#
-# Note that from this point forward you must specifically allow
-# particular features to be enabled - so if something's not working as
-# you might expect, make sure that you have specifically enabled it
-# below.
-#
-
-#
-# DocumentRoot: The directory out of which you will serve your
-# documents. By default, all requests are taken from this directory, but
-# symbolic links and aliases may be used to point to other locations.
-#
-
-DocumentRoot "/var/www/html"
-
-#
-# Relax access to content within /var/www.
-#
-
- AllowOverride None
- # Allow open access:
- Require all granted
-
-
-# Further relax access to the default document root:
-
-
- #
- # Possible values for the Options directive are "None", "All",
- # or any combination of:
- # Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
- #
- # Note that "MultiViews" must be named *explicitly* --- "Options All"
- # doesn't give it to you.
- #
- # The Options directive is both complicated and important. Please see
- # http://httpd.apache.org/docs/2.4/mod/core.html#options
- # for more information.
- #
- Options Indexes FollowSymLinks
-
- #
- # AllowOverride controls what directives may be placed in .htaccess files.
- # It can be "All", "None", or any combination of the keywords:
- # Options FileInfo AuthConfig Limit
- #
- AllowOverride None
-
- #
- # Controls who can get stuff from this server.
- #
- # Require all granted
-
- #AuthType Basic
- #AuthName "Restricted Content"
- #AuthBasicProvider file
- #AuthUserFile /etc/httpd/passwords
- #Require valid-user
-
-
-
-#
-# DirectoryIndex: sets the file that Apache will serve if a directory
-# is requested.
-#
-
- DirectoryIndex index.html
-
-
-#
-# The following lines prevent .htaccess and .htpasswd files from being
-# viewed by Web clients.
-#
-
- Require all denied
-
-
-#
-# ErrorLog: The location of the error log file.
-# If you do not specify an ErrorLog directive within a
-# container, error messages relating to that virtual host will be
-# logged here. If you *do* define an error logfile for a
-# container, that host's errors will be logged there and not here.
-#
-ErrorLog "logs/error_log"
-
-#
-# LogLevel: Control the number of messages logged to the error_log.
-# Possible values include: debug, info, notice, warn, error, crit,
-# alert, emerg.
-#
-LogLevel warn
-
-
- #
- # The following directives define some format nicknames for use with
- # a CustomLog directive (see below).
- #
- LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
- LogFormat "%h %l %u %t \"%r\" %>s %b" common
-
-
- # You need to enable mod_logio.c to use %I and %O
- LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
-
-
- #
- # The location and format of the access logfile (Common Logfile Format).
- # If you do not define any access logfiles within a
- # container, they will be logged here. Contrariwise, if you *do*
- # define per- access logfiles, transactions will be
- # logged therein and *not* in this file.
- #
- #CustomLog "logs/access_log" common
-
- #
- # If you prefer a logfile with access, agent, and referer information
- # (Combined Logfile Format) you can use the following directive.
- #
- CustomLog "logs/access_log" combined
-
-
-
- #
- # Redirect: Allows you to tell clients about documents that used to
- # exist in your server's namespace, but do not anymore. The client
- # will make a new request for the document at its new location.
- # Example:
- # Redirect permanent /foo http://www.example.com/bar
-
- #
- # Alias: Maps web paths into filesystem paths and is used to
- # access content that does not live under the DocumentRoot.
- # Example:
- # Alias /webpath /full/filesystem/path
- #
- # If you include a trailing / on /webpath then the server will
- # require it to be present in the URL. You will also likely
- # need to provide a section to allow access to
- # the filesystem path.
-
- #
- # ScriptAlias: This controls which directories contain server scripts.
- # ScriptAliases are essentially the same as Aliases, except that
- # documents in the target directory are treated as applications and
- # run by the server when requested rather than as documents sent to the
- # client. The same rules about trailing "/" apply to ScriptAlias
- # directives as to Alias.
- #
- ScriptAlias /cgi-bin/ "/var/www/cgi-bin/"
-
-
-
-#
-# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased
-# CGI directory exists, if you have that configured.
-#
-
- AllowOverride None
- Options None
- Require all granted
-
-
-
- #
- # TypesConfig points to the file containing the list of mappings from
- # filename extension to MIME-type.
- #
- TypesConfig /etc/mime.types
-
- #
- # AddType allows you to add to or override the MIME configuration
- # file specified in TypesConfig for specific file types.
- #
- #AddType application/x-gzip .tgz
- #
- # AddEncoding allows you to have certain browsers uncompress
- # information on the fly. Note: Not all browsers support this.
- #
- #AddEncoding x-compress .Z
- #AddEncoding x-gzip .gz .tgz
- #
- # If the AddEncoding directives above are commented-out, then you
- # probably should define those extensions to indicate media types:
- #
- AddType application/x-compress .Z
- AddType application/x-gzip .gz .tgz
-
- #
- # AddHandler allows you to map certain file extensions to "handlers":
- # actions unrelated to filetype. These can be either built into the server
- # or added with the Action directive (see below)
- #
- # To use CGI scripts outside of ScriptAliased directories:
- # (You will also need to add "ExecCGI" to the "Options" directive.)
- #
- #AddHandler cgi-script .cgi
-
- # For type maps (negotiated resources):
- #AddHandler type-map var
-
- #
- # Filters allow you to process content before it is sent to the client.
- #
- # To parse .shtml files for server-side includes (SSI):
- # (You will also need to add "Includes" to the "Options" directive.)
- #
- AddType text/html .shtml
- AddOutputFilter INCLUDES .shtml
-
-
-#
-# Specify a default charset for all content served; this enables
-# interpretation of all content as UTF-8 by default. To use the
-# default browser choice (ISO-8859-1), or to allow the META tags
-# in HTML content to override this choice, comment out this
-# directive:
-#
-AddDefaultCharset UTF-8
-
-
- #
- # The mod_mime_magic module allows the server to use various hints from the
- # contents of the file itself to determine its type. The MIMEMagicFile
- # directive tells the module where the hint definitions are located.
- #
- MIMEMagicFile conf/magic
-
-
-#
-# Customizable error responses come in three flavors:
-# 1) plain text 2) local redirects 3) external redirects
-#
-# Some examples:
-#ErrorDocument 500 "The server made a boo boo."
-#ErrorDocument 404 /missing.html
-#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
-#ErrorDocument 402 http://www.example.com/subscription_info.html
-#
-
-#
-# EnableMMAP and EnableSendfile: On systems that support it,
-# memory-mapping or the sendfile syscall may be used to deliver
-# files. This usually improves server performance, but must
-# be turned off when serving from networked-mounted
-# filesystems or if support for these functions is otherwise
-# broken on your system.
-# Defaults if commented: EnableMMAP On, EnableSendfile Off
-#
-#EnableMMAP off
-EnableSendfile on
-
-# Enable HTTP/2 by default
-#
-# https://httpd.apache.org/docs/2.4/mod/core.html#protocols
-
-
- Protocols h2 h2c http/1.1
-
-
-
-# Supplemental configuration
-#
-# Load config files in the "/etc/httpd/conf.d" directory, if any.
-IncludeOptional conf.d/*.conf
diff --git a/ops/ansible/templates/phpMyAdmin.j2 b/ops/ansible/templates/phpMyAdmin.j2
deleted file mode 100644
index 93bcb6b..0000000
--- a/ops/ansible/templates/phpMyAdmin.j2
+++ /dev/null
@@ -1,77 +0,0 @@
-# phpMyAdmin - Web based MySQL browser written in php
-#
-# Allows only localhost by default
-#
-# But allowing phpMyAdmin to anyone other than localhost should be considered
-# dangerous unless properly secured by SSL
-
-Alias /phpMyAdmin /usr/share/phpMyAdmin
-Alias /phpmyadmin /usr/share/phpMyAdmin
-
-
- AddDefaultCharset UTF-8
-
-
- # Apache 2.4
-
- Require all granted
- #Require ip 127.0.0.1
- #Require ip ::1
-
-
-
- # Apache 2.2
- Order Deny,Allow
- Deny from All
- Allow from 127.0.0.1
- Allow from ::1
-
-
-
-
-
- # Apache 2.4
-
- Require all granted
- #Require ip 127.0.0.1
- #Require ip ::1
-
-
-
- # Apache 2.2
- Order Deny,Allow
- Deny from All
- Allow from 127.0.0.1
- Allow from ::1
-
-
-
-# These directories do not require access over HTTP - taken from the original
-# phpMyAdmin upstream tarball
-#
-
- Order Deny,Allow
- Deny from All
- Allow from None
-
-
-
- Order Deny,Allow
- Deny from All
- Allow from None
-
-
-
- Order Deny,Allow
- Deny from All
- Allow from None
-
-
-# This configuration prevents mod_security at phpMyAdmin directories from
-# filtering SQL etc. This may break your mod_security implementation.
-#
-#
-#
-# SecRuleInheritance Off
-#
-#
diff --git a/ops/terraform/master.tf b/ops/terraform/master.tf
deleted file mode 100644
index 3f3494e..0000000
--- a/ops/terraform/master.tf
+++ /dev/null
@@ -1,49 +0,0 @@
-###########################
-# PROVIDER
-###########################
-
-provider "aws" {
- access_key = "${var.aws_access_key_id}"
- secret_key = "${var.aws_secret_access_key}"
- region = "${var.aws_region}"
-}
-
-###########################
-# ELASTIC IP
-###########################
-
-data "aws_eip" "webserver-ip" {
- public_ip = "35.180.10.123"
-}
-
-resource "aws_eip_association" "webserver-eip" {
- instance_id = "${aws_instance.webserver.id}"
- allocation_id = "${data.aws_eip.webserver-ip.id}"
-}
-
-###########################
-# ADD SSH KEY
-###########################
-
-resource "aws_key_pair" "terraform_ec2_key" {
- key_name = "terraform_ec2_key"
- public_key = "${var.aws_ssh_key}"
-}
-
-###########################
-# INSTANCE
-###########################
-
-resource "aws_instance" "webserver" {
- ami = "ami-04992646d54c69ef4"
- instance_type = "t2.micro"
- key_name = "${aws_key_pair.terraform_ec2_key.id}"
- vpc_security_group_ids = [
- "${aws_security_group.allow_ssh.id}",
- "${aws_security_group.allow_http.id}"
- ]
-
- tags {
- Name = "hifive-webserver"
- }
-}
diff --git a/ops/terraform/security.tf b/ops/terraform/security.tf
deleted file mode 100644
index f49295e..0000000
--- a/ops/terraform/security.tf
+++ /dev/null
@@ -1,58 +0,0 @@
-###########################
-# ALLOW SSH
-###########################
-
-resource "aws_security_group" "allow_ssh" {
- name = "allow ssh"
-
- ingress {
- from_port = 22
- to_port = 22
- protocol = "tcp"
- cidr_blocks = ["0.0.0.0/0"]
- }
-
- lifecycle {
- create_before_destroy = true
- }
-}
-
-###########################
-# ALLOW HTTP
-###########################
-
-resource "aws_security_group" "allow_http" {
- name = "allow http"
-
- ingress {
- from_port = 80
- to_port = 80
- protocol = "tcp"
- cidr_blocks = ["0.0.0.0/0"]
- }
-
- ingress {
- from_port = 443
- to_port = 443
- protocol = "tcp"
- cidr_blocks = ["0.0.0.0/0"]
- }
-
- egress {
- from_port = 80
- to_port = 80
- protocol = "tcp"
- cidr_blocks = ["0.0.0.0/0"]
- }
-
- egress {
- from_port = 443
- to_port = 443
- protocol = "tcp"
- cidr_blocks = ["0.0.0.0/0"]
- }
-
- lifecycle {
- create_before_destroy = true
- }
-}
diff --git a/ops/terraform/terraform.tfstate b/ops/terraform/terraform.tfstate
deleted file mode 100644
index 3174f5c..0000000
--- a/ops/terraform/terraform.tfstate
+++ /dev/null
@@ -1,252 +0,0 @@
-{
- "version": 3,
- "terraform_version": "0.11.10",
- "serial": 8,
- "lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22",
- "modules": [
- {
- "path": [
- "root"
- ],
- "outputs": {},
- "resources": {
- "aws_eip_association.webserver-eip": {
- "type": "aws_eip_association",
- "depends_on": [
- "aws_instance.webserver",
- "data.aws_eip.webserver-ip"
- ],
- "primary": {
- "id": "eipassoc-0826b0b47141924ba",
- "attributes": {
- "allocation_id": "eipalloc-0f61e902f5f680dc0",
- "id": "eipassoc-0826b0b47141924ba",
- "instance_id": "i-09f2de73feb5c3e7a",
- "network_interface_id": "eni-02d855d56e40967d0",
- "private_ip_address": "172.31.36.68",
- "public_ip": "35.180.10.123"
- },
- "meta": {},
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_instance.webserver": {
- "type": "aws_instance",
- "depends_on": [
- "aws_key_pair.terraform_ec2_key",
- "aws_security_group.allow_http",
- "aws_security_group.allow_ssh"
- ],
- "primary": {
- "id": "i-09f2de73feb5c3e7a",
- "attributes": {
- "ami": "ami-04992646d54c69ef4",
- "arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a",
- "associate_public_ip_address": "true",
- "availability_zone": "eu-west-3c",
- "cpu_core_count": "1",
- "cpu_threads_per_core": "1",
- "credit_specification.#": "1",
- "credit_specification.0.cpu_credits": "standard",
- "disable_api_termination": "false",
- "ebs_block_device.#": "0",
- "ebs_optimized": "false",
- "ephemeral_block_device.#": "0",
- "get_password_data": "false",
- "iam_instance_profile": "",
- "id": "i-09f2de73feb5c3e7a",
- "instance_state": "running",
- "instance_type": "t2.micro",
- "ipv6_addresses.#": "0",
- "key_name": "terraform_ec2_key",
- "monitoring": "false",
- "network_interface.#": "0",
- "network_interface_id": "eni-02d855d56e40967d0",
- "password_data": "",
- "placement_group": "",
- "primary_network_interface_id": "eni-02d855d56e40967d0",
- "private_dns": "ip-172-31-36-68.eu-west-3.compute.internal",
- "private_ip": "172.31.36.68",
- "public_dns": "ec2-35-180-10-123.eu-west-3.compute.amazonaws.com",
- "public_ip": "35.180.10.123",
- "root_block_device.#": "1",
- "root_block_device.0.delete_on_termination": "true",
- "root_block_device.0.iops": "100",
- "root_block_device.0.volume_id": "vol-0b1da0548cc9c546e",
- "root_block_device.0.volume_size": "8",
- "root_block_device.0.volume_type": "gp2",
- "security_groups.#": "2",
- "security_groups.1710041364": "allow ssh",
- "security_groups.4237835427": "allow http",
- "source_dest_check": "true",
- "subnet_id": "subnet-6308d02e",
- "tags.%": "1",
- "tags.Name": "hifive-webserver",
- "tenancy": "default",
- "volume_tags.%": "0",
- "vpc_security_group_ids.#": "2",
- "vpc_security_group_ids.1821931549": "sg-059fe679d9db32397",
- "vpc_security_group_ids.2822979855": "sg-082897f758ada2701"
- },
- "meta": {
- "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
- "create": 600000000000,
- "delete": 1200000000000,
- "update": 600000000000
- },
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_key_pair.terraform_ec2_key": {
- "type": "aws_key_pair",
- "depends_on": [],
- "primary": {
- "id": "terraform_ec2_key",
- "attributes": {
- "fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74",
- "id": "terraform_ec2_key",
- "key_name": "terraform_ec2_key",
- "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad"
- },
- "meta": {
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_security_group.allow_http": {
- "type": "aws_security_group",
- "depends_on": [],
- "primary": {
- "id": "sg-082897f758ada2701",
- "attributes": {
- "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701",
- "description": "Managed by Terraform",
- "egress.#": "2",
- "egress.2214680975.cidr_blocks.#": "1",
- "egress.2214680975.cidr_blocks.0": "0.0.0.0/0",
- "egress.2214680975.description": "",
- "egress.2214680975.from_port": "80",
- "egress.2214680975.ipv6_cidr_blocks.#": "0",
- "egress.2214680975.prefix_list_ids.#": "0",
- "egress.2214680975.protocol": "tcp",
- "egress.2214680975.security_groups.#": "0",
- "egress.2214680975.self": "false",
- "egress.2214680975.to_port": "80",
- "egress.2617001939.cidr_blocks.#": "1",
- "egress.2617001939.cidr_blocks.0": "0.0.0.0/0",
- "egress.2617001939.description": "",
- "egress.2617001939.from_port": "443",
- "egress.2617001939.ipv6_cidr_blocks.#": "0",
- "egress.2617001939.prefix_list_ids.#": "0",
- "egress.2617001939.protocol": "tcp",
- "egress.2617001939.security_groups.#": "0",
- "egress.2617001939.self": "false",
- "egress.2617001939.to_port": "443",
- "id": "sg-082897f758ada2701",
- "ingress.#": "2",
- "ingress.2214680975.cidr_blocks.#": "1",
- "ingress.2214680975.cidr_blocks.0": "0.0.0.0/0",
- "ingress.2214680975.description": "",
- "ingress.2214680975.from_port": "80",
- "ingress.2214680975.ipv6_cidr_blocks.#": "0",
- "ingress.2214680975.prefix_list_ids.#": "0",
- "ingress.2214680975.protocol": "tcp",
- "ingress.2214680975.security_groups.#": "0",
- "ingress.2214680975.self": "false",
- "ingress.2214680975.to_port": "80",
- "ingress.2617001939.cidr_blocks.#": "1",
- "ingress.2617001939.cidr_blocks.0": "0.0.0.0/0",
- "ingress.2617001939.description": "",
- "ingress.2617001939.from_port": "443",
- "ingress.2617001939.ipv6_cidr_blocks.#": "0",
- "ingress.2617001939.prefix_list_ids.#": "0",
- "ingress.2617001939.protocol": "tcp",
- "ingress.2617001939.security_groups.#": "0",
- "ingress.2617001939.self": "false",
- "ingress.2617001939.to_port": "443",
- "name": "allow http",
- "owner_id": "116854918046",
- "revoke_rules_on_delete": "false",
- "tags.%": "0",
- "vpc_id": "vpc-8a4b1ae3"
- },
- "meta": {
- "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
- "create": 600000000000,
- "delete": 600000000000
- },
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_security_group.allow_ssh": {
- "type": "aws_security_group",
- "depends_on": [],
- "primary": {
- "id": "sg-059fe679d9db32397",
- "attributes": {
- "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397",
- "description": "Managed by Terraform",
- "egress.#": "0",
- "id": "sg-059fe679d9db32397",
- "ingress.#": "1",
- "ingress.2541437006.cidr_blocks.#": "1",
- "ingress.2541437006.cidr_blocks.0": "0.0.0.0/0",
- "ingress.2541437006.description": "",
- "ingress.2541437006.from_port": "22",
- "ingress.2541437006.ipv6_cidr_blocks.#": "0",
- "ingress.2541437006.prefix_list_ids.#": "0",
- "ingress.2541437006.protocol": "tcp",
- "ingress.2541437006.security_groups.#": "0",
- "ingress.2541437006.self": "false",
- "ingress.2541437006.to_port": "22",
- "name": "allow ssh",
- "owner_id": "116854918046",
- "revoke_rules_on_delete": "false",
- "tags.%": "0",
- "vpc_id": "vpc-8a4b1ae3"
- },
- "meta": {
- "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
- "create": 600000000000,
- "delete": 600000000000
- },
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "data.aws_eip.webserver-ip": {
- "type": "aws_eip",
- "depends_on": [],
- "primary": {
- "id": "eipalloc-0f61e902f5f680dc0",
- "attributes": {
- "id": "eipalloc-0f61e902f5f680dc0",
- "public_ip": "35.180.10.123"
- },
- "meta": {},
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- }
- },
- "depends_on": []
- }
- ]
-}
diff --git a/ops/terraform/terraform.tfstate.backup b/ops/terraform/terraform.tfstate.backup
deleted file mode 100644
index 466ee83..0000000
--- a/ops/terraform/terraform.tfstate.backup
+++ /dev/null
@@ -1,232 +0,0 @@
-{
- "version": 3,
- "terraform_version": "0.11.10",
- "serial": 8,
- "lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22",
- "modules": [
- {
- "path": [
- "root"
- ],
- "outputs": {},
- "resources": {
- "aws_eip_association.webserver-eip": {
- "type": "aws_eip_association",
- "depends_on": [
- "aws_instance.webserver",
- "data.aws_eip.webserver-ip"
- ],
- "primary": {
- "id": "eipassoc-0826b0b47141924ba",
- "attributes": {
- "allocation_id": "eipalloc-0f61e902f5f680dc0",
- "id": "eipassoc-0826b0b47141924ba",
- "instance_id": "i-09f2de73feb5c3e7a",
- "network_interface_id": "eni-02d855d56e40967d0",
- "private_ip_address": "172.31.36.68",
- "public_ip": "35.180.10.123"
- },
- "meta": {},
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_instance.webserver": {
- "type": "aws_instance",
- "depends_on": [
- "aws_key_pair.terraform_ec2_key",
- "aws_security_group.allow_http",
- "aws_security_group.allow_ssh"
- ],
- "primary": {
- "id": "i-09f2de73feb5c3e7a",
- "attributes": {
- "ami": "ami-04992646d54c69ef4",
- "arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a",
- "associate_public_ip_address": "true",
- "availability_zone": "eu-west-3c",
- "cpu_core_count": "1",
- "cpu_threads_per_core": "1",
- "credit_specification.#": "1",
- "credit_specification.0.cpu_credits": "standard",
- "disable_api_termination": "false",
- "ebs_block_device.#": "0",
- "ebs_optimized": "false",
- "ephemeral_block_device.#": "0",
- "get_password_data": "false",
- "iam_instance_profile": "",
- "id": "i-09f2de73feb5c3e7a",
- "instance_state": "running",
- "instance_type": "t2.micro",
- "ipv6_addresses.#": "0",
- "key_name": "terraform_ec2_key",
- "monitoring": "false",
- "network_interface.#": "0",
- "network_interface_id": "eni-02d855d56e40967d0",
- "password_data": "",
- "placement_group": "",
- "primary_network_interface_id": "eni-02d855d56e40967d0",
- "private_dns": "ip-172-31-36-68.eu-west-3.compute.internal",
- "private_ip": "172.31.36.68",
- "public_dns": "ec2-35-180-74-87.eu-west-3.compute.amazonaws.com",
- "public_ip": "35.180.74.87",
- "root_block_device.#": "1",
- "root_block_device.0.delete_on_termination": "true",
- "root_block_device.0.iops": "100",
- "root_block_device.0.volume_id": "vol-0b1da0548cc9c546e",
- "root_block_device.0.volume_size": "8",
- "root_block_device.0.volume_type": "gp2",
- "security_groups.#": "2",
- "security_groups.1710041364": "allow ssh",
- "security_groups.4237835427": "allow http",
- "source_dest_check": "true",
- "subnet_id": "subnet-6308d02e",
- "tags.%": "1",
- "tags.Name": "hifive-webserver",
- "tenancy": "default",
- "volume_tags.%": "0",
- "vpc_security_group_ids.#": "2",
- "vpc_security_group_ids.1821931549": "sg-059fe679d9db32397",
- "vpc_security_group_ids.2822979855": "sg-082897f758ada2701"
- },
- "meta": {
- "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
- "create": 600000000000,
- "delete": 1200000000000,
- "update": 600000000000
- },
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_key_pair.terraform_ec2_key": {
- "type": "aws_key_pair",
- "depends_on": [],
- "primary": {
- "id": "terraform_ec2_key",
- "attributes": {
- "fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74",
- "id": "terraform_ec2_key",
- "key_name": "terraform_ec2_key",
- "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad"
- },
- "meta": {
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_security_group.allow_http": {
- "type": "aws_security_group",
- "depends_on": [],
- "primary": {
- "id": "sg-082897f758ada2701",
- "attributes": {
- "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701",
- "description": "Managed by Terraform",
- "egress.#": "2",
- "egress.2214680975.cidr_blocks.#": "1",
- "egress.2214680975.cidr_blocks.0": "0.0.0.0/0",
- "egress.2214680975.description": "",
- "egress.2214680975.from_port": "80",
- "egress.2214680975.ipv6_cidr_blocks.#": "0",
- "egress.2214680975.prefix_list_ids.#": "0",
- "egress.2214680975.protocol": "tcp",
- "egress.2214680975.security_groups.#": "0",
- "egress.2214680975.self": "false",
- "egress.2214680975.to_port": "80",
- "egress.2617001939.cidr_blocks.#": "1",
- "egress.2617001939.cidr_blocks.0": "0.0.0.0/0",
- "egress.2617001939.description": "",
- "egress.2617001939.from_port": "443",
- "egress.2617001939.ipv6_cidr_blocks.#": "0",
- "egress.2617001939.prefix_list_ids.#": "0",
- "egress.2617001939.protocol": "tcp",
- "egress.2617001939.security_groups.#": "0",
- "egress.2617001939.self": "false",
- "egress.2617001939.to_port": "443",
- "id": "sg-082897f758ada2701",
- "ingress.#": "0",
- "name": "allow http",
- "owner_id": "116854918046",
- "revoke_rules_on_delete": "false",
- "tags.%": "0",
- "vpc_id": "vpc-8a4b1ae3"
- },
- "meta": {
- "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
- "create": 600000000000,
- "delete": 600000000000
- },
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "aws_security_group.allow_ssh": {
- "type": "aws_security_group",
- "depends_on": [],
- "primary": {
- "id": "sg-059fe679d9db32397",
- "attributes": {
- "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397",
- "description": "Managed by Terraform",
- "egress.#": "0",
- "id": "sg-059fe679d9db32397",
- "ingress.#": "1",
- "ingress.2541437006.cidr_blocks.#": "1",
- "ingress.2541437006.cidr_blocks.0": "0.0.0.0/0",
- "ingress.2541437006.description": "",
- "ingress.2541437006.from_port": "22",
- "ingress.2541437006.ipv6_cidr_blocks.#": "0",
- "ingress.2541437006.prefix_list_ids.#": "0",
- "ingress.2541437006.protocol": "tcp",
- "ingress.2541437006.security_groups.#": "0",
- "ingress.2541437006.self": "false",
- "ingress.2541437006.to_port": "22",
- "name": "allow ssh",
- "owner_id": "116854918046",
- "revoke_rules_on_delete": "false",
- "tags.%": "0",
- "vpc_id": "vpc-8a4b1ae3"
- },
- "meta": {
- "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": {
- "create": 600000000000,
- "delete": 600000000000
- },
- "schema_version": "1"
- },
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- },
- "data.aws_eip.webserver-ip": {
- "type": "aws_eip",
- "depends_on": [],
- "primary": {
- "id": "eipalloc-0f61e902f5f680dc0",
- "attributes": {
- "id": "eipalloc-0f61e902f5f680dc0",
- "public_ip": "35.180.10.123"
- },
- "meta": {},
- "tainted": false
- },
- "deposed": [],
- "provider": "provider.aws"
- }
- },
- "depends_on": []
- }
- ]
-}
diff --git a/ops/test b/ops/test
deleted file mode 100644
index e69de29..0000000