From 013e14b1ed871f18f735d546196d6dd070c1c689 Mon Sep 17 00:00:00 2001 From: s0dy Date: Fri, 28 Dec 2018 14:54:59 +0100 Subject: [PATCH] delete ops files --- .ansible-ci.yml | 31 --- .gitlab-ci.yml | 29 -- ops/ansible/httpd-centos.yml | 53 ---- ops/ansible/mariadb.yml | 32 --- ops/ansible/phpmyadmin.yml | 19 -- ops/ansible/templates/httpd.j2 | 371 ------------------------- ops/ansible/templates/phpMyAdmin.j2 | 77 ----- ops/terraform/master.tf | 49 ---- ops/terraform/security.tf | 58 ---- ops/terraform/terraform.tfstate | 252 ----------------- ops/terraform/terraform.tfstate.backup | 232 ---------------- ops/test | 0 12 files changed, 1203 deletions(-) delete mode 100644 .ansible-ci.yml delete mode 100644 .gitlab-ci.yml delete mode 100644 ops/ansible/httpd-centos.yml delete mode 100644 ops/ansible/mariadb.yml delete mode 100644 ops/ansible/phpmyadmin.yml delete mode 100644 ops/ansible/templates/httpd.j2 delete mode 100644 ops/ansible/templates/phpMyAdmin.j2 delete mode 100644 ops/terraform/master.tf delete mode 100644 ops/terraform/security.tf delete mode 100644 ops/terraform/terraform.tfstate delete mode 100644 ops/terraform/terraform.tfstate.backup delete mode 100644 ops/test diff --git a/.ansible-ci.yml b/.ansible-ci.yml deleted file mode 100644 index 3068ac1..0000000 --- a/.ansible-ci.yml +++ /dev/null @@ -1,31 +0,0 @@ ---- -- hosts: hifive - become: yes - become_user: root - - tasks: - - - name: Delete last deploy - file: - path: /var/www/html/ - state: absent - - - name: Copy all files to web server - synchronize: - src: /builds/aviortheking/blog_imie/project/ - dest: /var/www/html - rsync_opts: - - --exclude=.htaccess - - - name: Change ownership and group - file: - path: /var/www/html - owner: apache - group: apache - recurse: yes - - - name: Change file chmod 640 - command: find /var/www/html -type f -exec chmod 640 {} \; - - - name: Change directory chmod 750 - command: find /var/www/html -type d -exec chmod 750 {} \; \ No newline at end of file diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml deleted file mode 100644 index 049f353..0000000 --- a/.gitlab-ci.yml +++ /dev/null @@ -1,29 +0,0 @@ -image: ansible/centos7-ansible - -before_script: - # Run ssh-agent (inside the build environment) - - eval $(ssh-agent -s) - - # Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent - - echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null - - #Create the SSH directory - - mkdir -p ~/.ssh - - chmod 700 ~/.ssh - - #Verifying the SSH host keys - - echo "$SSH_KNOWN_HOSTS" > ~/.ssh/known_hosts - - chmod 644 ~/.ssh/known_hosts - -deploy_to_webserver: - stage: deploy - - only: - - master - - script: - - pwd - - echo -e "$ANSIBLE_HIFIVE_HOSTS" > /etc/ansible/hosts - - ansible-playbook .ansible-ci.yml - - when: manual \ No newline at end of file diff --git a/ops/ansible/httpd-centos.yml b/ops/ansible/httpd-centos.yml deleted file mode 100644 index f1ba72f..0000000 --- a/ops/ansible/httpd-centos.yml +++ /dev/null @@ -1,53 +0,0 @@ ---- -- hosts: hifive - become: yes - become_user: root - - tasks: - - name: Yum update - yum: - name: '*' - state: latest - - - name: Install httpd - yum: - name: httpd - state: latest - - - name: Systemd enable httpd - systemd: - name: httpd - enabled: yes - masked: no - - - name: Change file ownership, group and mode - file: - path: /var/www - owner: apache - group: apache - mode: 0750 - recurse: yes - - - name: Install python-passlib - yum: - name: python-passlib - state: latest - - - htpasswd: - path: /etc/httpd/passwords - name: hifive - password: hifive - owner: apache - group: apache - mode: 0640 - - - name: Create httpd.conf - template: - src: httpd.j2 - dest: /etc/httpd/conf/httpd.conf - force: yes - - - name: Systemd start httpd - systemd: - name: httpd - state: started diff --git a/ops/ansible/mariadb.yml b/ops/ansible/mariadb.yml deleted file mode 100644 index 85a121c..0000000 --- a/ops/ansible/mariadb.yml +++ /dev/null @@ -1,32 +0,0 @@ ---- -- hosts: hifive - become: yes - become_user: root - - tasks: - - name: Install mariadb client - yum: - name: mariadb - state: latest - - - name: Install mariadb server - yum: - name: mariadb-server - state: latest - - - name: Systemd enable mariadb - systemd: - name: mariadb - enabled: yes - masked: no - - #- name: Create phpMyAdmin.conf - #template: - #src: phpMyAdmin.j2 - #dest: /etc/httpd/conf.d/phpMyAdmin.conf - #force: yes - - - name: Systemd start mariadb - systemd: - name: mariadb - state: started diff --git a/ops/ansible/phpmyadmin.yml b/ops/ansible/phpmyadmin.yml deleted file mode 100644 index c088a86..0000000 --- a/ops/ansible/phpmyadmin.yml +++ /dev/null @@ -1,19 +0,0 @@ ---- -- hosts: hifive - become: yes - become_user: root - - tasks: - - name: Install amazon epel - command: amazon-linux-extras install epel -y - - - name: Install phpMyAdmin - yum: - name: phpmyadmin - state: latest - - - name: Create phpMyAdmin.conf - template: - src: phpMyAdmin.j2 - dest: /etc/httpd/conf.d/phpMyAdmin.conf - force: yes diff --git a/ops/ansible/templates/httpd.j2 b/ops/ansible/templates/httpd.j2 deleted file mode 100644 index d7dc24d..0000000 --- a/ops/ansible/templates/httpd.j2 +++ /dev/null @@ -1,371 +0,0 @@ -# -# This is the main Apache HTTP server configuration file. It contains the -# configuration directives that give the server its instructions. -# See for detailed information. -# In particular, see -# -# for a discussion of each configuration directive. -# -# Do NOT simply read the instructions in here without understanding -# what they do. They're here only as hints or reminders. If you are unsure -# consult the online docs. You have been warned. -# -# Configuration and logfile names: If the filenames you specify for many -# of the server's control files begin with "/" (or "drive:/" for Win32), the -# server will use that explicit path. If the filenames do *not* begin -# with "/", the value of ServerRoot is prepended -- so 'log/access_log' -# with ServerRoot set to '/www' will be interpreted by the -# server as '/www/log/access_log', where as '/log/access_log' will be -# interpreted as '/log/access_log'. - -# -# ServerRoot: The top of the directory tree under which the server's -# configuration, error, and log files are kept. -# -# Do not add a slash at the end of the directory path. If you point -# ServerRoot at a non-local disk, be sure to specify a local disk on the -# Mutex directive, if file-based mutexes are used. If you wish to share the -# same ServerRoot for multiple httpd daemons, you will need to change at -# least PidFile. -# -ServerRoot "/etc/httpd" - -# -# Listen: Allows you to bind Apache to specific IP addresses and/or -# ports, instead of the default. See also the -# directive. -# -# Change this to Listen on specific IP addresses as shown below to -# prevent Apache from glomming onto all bound IP addresses. -# -#Listen 12.34.56.78:80 -Listen 80 - -# -# Dynamic Shared Object (DSO) Support -# -# To be able to use the functionality of a module which was built as a DSO you -# have to place corresponding `LoadModule' lines at this location so the -# directives contained in it are actually available _before_ they are used. -# Statically compiled modules (those listed by `httpd -l') do not need -# to be loaded here. -# -# Example: -# LoadModule foo_module modules/mod_foo.so -# -Include conf.modules.d/*.conf - -# -# If you wish httpd to run as a different user or group, you must run -# httpd as root initially and it will switch. -# -# User/Group: The name (or #number) of the user/group to run httpd as. -# It is usually good practice to create a dedicated user and group for -# running httpd, as with most system services. -# -User apache -Group apache - -# 'Main' server configuration -# -# The directives in this section set up the values used by the 'main' -# server, which responds to any requests that aren't handled by a -# definition. These values also provide defaults for -# any containers you may define later in the file. -# -# All of these directives may appear inside containers, -# in which case these default settings will be overridden for the -# virtual host being defined. -# - -# -# ServerAdmin: Your address, where problems with the server should be -# e-mailed. This address appears on some server-generated pages, such -# as error documents. e.g. admin@your-domain.com -# -ServerAdmin root@localhost - -# -# ServerName gives the name and port that the server uses to identify itself. -# This can often be determined automatically, but we recommend you specify -# it explicitly to prevent problems during startup. -# -# If your host doesn't have a registered DNS name, enter its IP address here. -# -#ServerName www.example.com:80 - -# -# Deny access to the entirety of your server's filesystem. You must -# explicitly permit access to web content directories in other -# blocks below. -# - - AllowOverride none - Require all denied - - -# -# Note that from this point forward you must specifically allow -# particular features to be enabled - so if something's not working as -# you might expect, make sure that you have specifically enabled it -# below. -# - -# -# DocumentRoot: The directory out of which you will serve your -# documents. By default, all requests are taken from this directory, but -# symbolic links and aliases may be used to point to other locations. -# - -DocumentRoot "/var/www/html" - -# -# Relax access to content within /var/www. -# - - AllowOverride None - # Allow open access: - Require all granted - - -# Further relax access to the default document root: - - - # - # Possible values for the Options directive are "None", "All", - # or any combination of: - # Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews - # - # Note that "MultiViews" must be named *explicitly* --- "Options All" - # doesn't give it to you. - # - # The Options directive is both complicated and important. Please see - # http://httpd.apache.org/docs/2.4/mod/core.html#options - # for more information. - # - Options Indexes FollowSymLinks - - # - # AllowOverride controls what directives may be placed in .htaccess files. - # It can be "All", "None", or any combination of the keywords: - # Options FileInfo AuthConfig Limit - # - AllowOverride None - - # - # Controls who can get stuff from this server. - # - # Require all granted - - #AuthType Basic - #AuthName "Restricted Content" - #AuthBasicProvider file - #AuthUserFile /etc/httpd/passwords - #Require valid-user - - - -# -# DirectoryIndex: sets the file that Apache will serve if a directory -# is requested. -# - - DirectoryIndex index.html - - -# -# The following lines prevent .htaccess and .htpasswd files from being -# viewed by Web clients. -# - - Require all denied - - -# -# ErrorLog: The location of the error log file. -# If you do not specify an ErrorLog directive within a -# container, error messages relating to that virtual host will be -# logged here. If you *do* define an error logfile for a -# container, that host's errors will be logged there and not here. -# -ErrorLog "logs/error_log" - -# -# LogLevel: Control the number of messages logged to the error_log. -# Possible values include: debug, info, notice, warn, error, crit, -# alert, emerg. -# -LogLevel warn - - - # - # The following directives define some format nicknames for use with - # a CustomLog directive (see below). - # - LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined - LogFormat "%h %l %u %t \"%r\" %>s %b" common - - - # You need to enable mod_logio.c to use %I and %O - LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio - - - # - # The location and format of the access logfile (Common Logfile Format). - # If you do not define any access logfiles within a - # container, they will be logged here. Contrariwise, if you *do* - # define per- access logfiles, transactions will be - # logged therein and *not* in this file. - # - #CustomLog "logs/access_log" common - - # - # If you prefer a logfile with access, agent, and referer information - # (Combined Logfile Format) you can use the following directive. - # - CustomLog "logs/access_log" combined - - - - # - # Redirect: Allows you to tell clients about documents that used to - # exist in your server's namespace, but do not anymore. The client - # will make a new request for the document at its new location. - # Example: - # Redirect permanent /foo http://www.example.com/bar - - # - # Alias: Maps web paths into filesystem paths and is used to - # access content that does not live under the DocumentRoot. - # Example: - # Alias /webpath /full/filesystem/path - # - # If you include a trailing / on /webpath then the server will - # require it to be present in the URL. You will also likely - # need to provide a section to allow access to - # the filesystem path. - - # - # ScriptAlias: This controls which directories contain server scripts. - # ScriptAliases are essentially the same as Aliases, except that - # documents in the target directory are treated as applications and - # run by the server when requested rather than as documents sent to the - # client. The same rules about trailing "/" apply to ScriptAlias - # directives as to Alias. - # - ScriptAlias /cgi-bin/ "/var/www/cgi-bin/" - - - -# -# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased -# CGI directory exists, if you have that configured. -# - - AllowOverride None - Options None - Require all granted - - - - # - # TypesConfig points to the file containing the list of mappings from - # filename extension to MIME-type. - # - TypesConfig /etc/mime.types - - # - # AddType allows you to add to or override the MIME configuration - # file specified in TypesConfig for specific file types. - # - #AddType application/x-gzip .tgz - # - # AddEncoding allows you to have certain browsers uncompress - # information on the fly. Note: Not all browsers support this. - # - #AddEncoding x-compress .Z - #AddEncoding x-gzip .gz .tgz - # - # If the AddEncoding directives above are commented-out, then you - # probably should define those extensions to indicate media types: - # - AddType application/x-compress .Z - AddType application/x-gzip .gz .tgz - - # - # AddHandler allows you to map certain file extensions to "handlers": - # actions unrelated to filetype. These can be either built into the server - # or added with the Action directive (see below) - # - # To use CGI scripts outside of ScriptAliased directories: - # (You will also need to add "ExecCGI" to the "Options" directive.) - # - #AddHandler cgi-script .cgi - - # For type maps (negotiated resources): - #AddHandler type-map var - - # - # Filters allow you to process content before it is sent to the client. - # - # To parse .shtml files for server-side includes (SSI): - # (You will also need to add "Includes" to the "Options" directive.) - # - AddType text/html .shtml - AddOutputFilter INCLUDES .shtml - - -# -# Specify a default charset for all content served; this enables -# interpretation of all content as UTF-8 by default. To use the -# default browser choice (ISO-8859-1), or to allow the META tags -# in HTML content to override this choice, comment out this -# directive: -# -AddDefaultCharset UTF-8 - - - # - # The mod_mime_magic module allows the server to use various hints from the - # contents of the file itself to determine its type. The MIMEMagicFile - # directive tells the module where the hint definitions are located. - # - MIMEMagicFile conf/magic - - -# -# Customizable error responses come in three flavors: -# 1) plain text 2) local redirects 3) external redirects -# -# Some examples: -#ErrorDocument 500 "The server made a boo boo." -#ErrorDocument 404 /missing.html -#ErrorDocument 404 "/cgi-bin/missing_handler.pl" -#ErrorDocument 402 http://www.example.com/subscription_info.html -# - -# -# EnableMMAP and EnableSendfile: On systems that support it, -# memory-mapping or the sendfile syscall may be used to deliver -# files. This usually improves server performance, but must -# be turned off when serving from networked-mounted -# filesystems or if support for these functions is otherwise -# broken on your system. -# Defaults if commented: EnableMMAP On, EnableSendfile Off -# -#EnableMMAP off -EnableSendfile on - -# Enable HTTP/2 by default -# -# https://httpd.apache.org/docs/2.4/mod/core.html#protocols - - - Protocols h2 h2c http/1.1 - - - -# Supplemental configuration -# -# Load config files in the "/etc/httpd/conf.d" directory, if any. -IncludeOptional conf.d/*.conf diff --git a/ops/ansible/templates/phpMyAdmin.j2 b/ops/ansible/templates/phpMyAdmin.j2 deleted file mode 100644 index 93bcb6b..0000000 --- a/ops/ansible/templates/phpMyAdmin.j2 +++ /dev/null @@ -1,77 +0,0 @@ -# phpMyAdmin - Web based MySQL browser written in php -# -# Allows only localhost by default -# -# But allowing phpMyAdmin to anyone other than localhost should be considered -# dangerous unless properly secured by SSL - -Alias /phpMyAdmin /usr/share/phpMyAdmin -Alias /phpmyadmin /usr/share/phpMyAdmin - - - AddDefaultCharset UTF-8 - - - # Apache 2.4 - - Require all granted - #Require ip 127.0.0.1 - #Require ip ::1 - - - - # Apache 2.2 - Order Deny,Allow - Deny from All - Allow from 127.0.0.1 - Allow from ::1 - - - - - - # Apache 2.4 - - Require all granted - #Require ip 127.0.0.1 - #Require ip ::1 - - - - # Apache 2.2 - Order Deny,Allow - Deny from All - Allow from 127.0.0.1 - Allow from ::1 - - - -# These directories do not require access over HTTP - taken from the original -# phpMyAdmin upstream tarball -# - - Order Deny,Allow - Deny from All - Allow from None - - - - Order Deny,Allow - Deny from All - Allow from None - - - - Order Deny,Allow - Deny from All - Allow from None - - -# This configuration prevents mod_security at phpMyAdmin directories from -# filtering SQL etc. This may break your mod_security implementation. -# -# -# -# SecRuleInheritance Off -# -# diff --git a/ops/terraform/master.tf b/ops/terraform/master.tf deleted file mode 100644 index 3f3494e..0000000 --- a/ops/terraform/master.tf +++ /dev/null @@ -1,49 +0,0 @@ -########################### -# PROVIDER -########################### - -provider "aws" { - access_key = "${var.aws_access_key_id}" - secret_key = "${var.aws_secret_access_key}" - region = "${var.aws_region}" -} - -########################### -# ELASTIC IP -########################### - -data "aws_eip" "webserver-ip" { - public_ip = "35.180.10.123" -} - -resource "aws_eip_association" "webserver-eip" { - instance_id = "${aws_instance.webserver.id}" - allocation_id = "${data.aws_eip.webserver-ip.id}" -} - -########################### -# ADD SSH KEY -########################### - -resource "aws_key_pair" "terraform_ec2_key" { - key_name = "terraform_ec2_key" - public_key = "${var.aws_ssh_key}" -} - -########################### -# INSTANCE -########################### - -resource "aws_instance" "webserver" { - ami = "ami-04992646d54c69ef4" - instance_type = "t2.micro" - key_name = "${aws_key_pair.terraform_ec2_key.id}" - vpc_security_group_ids = [ - "${aws_security_group.allow_ssh.id}", - "${aws_security_group.allow_http.id}" - ] - - tags { - Name = "hifive-webserver" - } -} diff --git a/ops/terraform/security.tf b/ops/terraform/security.tf deleted file mode 100644 index f49295e..0000000 --- a/ops/terraform/security.tf +++ /dev/null @@ -1,58 +0,0 @@ -########################### -# ALLOW SSH -########################### - -resource "aws_security_group" "allow_ssh" { - name = "allow ssh" - - ingress { - from_port = 22 - to_port = 22 - protocol = "tcp" - cidr_blocks = ["0.0.0.0/0"] - } - - lifecycle { - create_before_destroy = true - } -} - -########################### -# ALLOW HTTP -########################### - -resource "aws_security_group" "allow_http" { - name = "allow http" - - ingress { - from_port = 80 - to_port = 80 - protocol = "tcp" - cidr_blocks = ["0.0.0.0/0"] - } - - ingress { - from_port = 443 - to_port = 443 - protocol = "tcp" - cidr_blocks = ["0.0.0.0/0"] - } - - egress { - from_port = 80 - to_port = 80 - protocol = "tcp" - cidr_blocks = ["0.0.0.0/0"] - } - - egress { - from_port = 443 - to_port = 443 - protocol = "tcp" - cidr_blocks = ["0.0.0.0/0"] - } - - lifecycle { - create_before_destroy = true - } -} diff --git a/ops/terraform/terraform.tfstate b/ops/terraform/terraform.tfstate deleted file mode 100644 index 3174f5c..0000000 --- a/ops/terraform/terraform.tfstate +++ /dev/null @@ -1,252 +0,0 @@ -{ - "version": 3, - "terraform_version": "0.11.10", - "serial": 8, - "lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22", - "modules": [ - { - "path": [ - "root" - ], - "outputs": {}, - "resources": { - "aws_eip_association.webserver-eip": { - "type": "aws_eip_association", - "depends_on": [ - "aws_instance.webserver", - "data.aws_eip.webserver-ip" - ], - "primary": { - "id": "eipassoc-0826b0b47141924ba", - "attributes": { - "allocation_id": "eipalloc-0f61e902f5f680dc0", - "id": "eipassoc-0826b0b47141924ba", - "instance_id": "i-09f2de73feb5c3e7a", - "network_interface_id": "eni-02d855d56e40967d0", - "private_ip_address": "172.31.36.68", - "public_ip": "35.180.10.123" - }, - "meta": {}, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_instance.webserver": { - "type": "aws_instance", - "depends_on": [ - "aws_key_pair.terraform_ec2_key", - "aws_security_group.allow_http", - "aws_security_group.allow_ssh" - ], - "primary": { - "id": "i-09f2de73feb5c3e7a", - "attributes": { - "ami": "ami-04992646d54c69ef4", - "arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a", - "associate_public_ip_address": "true", - "availability_zone": "eu-west-3c", - "cpu_core_count": "1", - "cpu_threads_per_core": "1", - "credit_specification.#": "1", - "credit_specification.0.cpu_credits": "standard", - "disable_api_termination": "false", - "ebs_block_device.#": "0", - "ebs_optimized": "false", - "ephemeral_block_device.#": "0", - "get_password_data": "false", - "iam_instance_profile": "", - "id": "i-09f2de73feb5c3e7a", - "instance_state": "running", - "instance_type": "t2.micro", - "ipv6_addresses.#": "0", - "key_name": "terraform_ec2_key", - "monitoring": "false", - "network_interface.#": "0", - "network_interface_id": "eni-02d855d56e40967d0", - "password_data": "", - "placement_group": "", - "primary_network_interface_id": "eni-02d855d56e40967d0", - "private_dns": "ip-172-31-36-68.eu-west-3.compute.internal", - "private_ip": "172.31.36.68", - "public_dns": "ec2-35-180-10-123.eu-west-3.compute.amazonaws.com", - "public_ip": "35.180.10.123", - "root_block_device.#": "1", - "root_block_device.0.delete_on_termination": "true", - "root_block_device.0.iops": "100", - "root_block_device.0.volume_id": "vol-0b1da0548cc9c546e", - "root_block_device.0.volume_size": "8", - "root_block_device.0.volume_type": "gp2", - "security_groups.#": "2", - "security_groups.1710041364": "allow ssh", - "security_groups.4237835427": "allow http", - "source_dest_check": "true", - "subnet_id": "subnet-6308d02e", - "tags.%": "1", - "tags.Name": "hifive-webserver", - "tenancy": "default", - "volume_tags.%": "0", - "vpc_security_group_ids.#": "2", - "vpc_security_group_ids.1821931549": "sg-059fe679d9db32397", - "vpc_security_group_ids.2822979855": "sg-082897f758ada2701" - }, - "meta": { - "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": { - "create": 600000000000, - "delete": 1200000000000, - "update": 600000000000 - }, - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_key_pair.terraform_ec2_key": { - "type": "aws_key_pair", - "depends_on": [], - "primary": { - "id": "terraform_ec2_key", - "attributes": { - "fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74", - "id": "terraform_ec2_key", - "key_name": "terraform_ec2_key", - "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad" - }, - "meta": { - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_security_group.allow_http": { - "type": "aws_security_group", - "depends_on": [], - "primary": { - "id": "sg-082897f758ada2701", - "attributes": { - "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701", - "description": "Managed by Terraform", - "egress.#": "2", - "egress.2214680975.cidr_blocks.#": "1", - "egress.2214680975.cidr_blocks.0": "0.0.0.0/0", - "egress.2214680975.description": "", - "egress.2214680975.from_port": "80", - "egress.2214680975.ipv6_cidr_blocks.#": "0", - "egress.2214680975.prefix_list_ids.#": "0", - "egress.2214680975.protocol": "tcp", - "egress.2214680975.security_groups.#": "0", - "egress.2214680975.self": "false", - "egress.2214680975.to_port": "80", - "egress.2617001939.cidr_blocks.#": "1", - "egress.2617001939.cidr_blocks.0": "0.0.0.0/0", - "egress.2617001939.description": "", - "egress.2617001939.from_port": "443", - "egress.2617001939.ipv6_cidr_blocks.#": "0", - "egress.2617001939.prefix_list_ids.#": "0", - "egress.2617001939.protocol": "tcp", - "egress.2617001939.security_groups.#": "0", - "egress.2617001939.self": "false", - "egress.2617001939.to_port": "443", - "id": "sg-082897f758ada2701", - "ingress.#": "2", - "ingress.2214680975.cidr_blocks.#": "1", - "ingress.2214680975.cidr_blocks.0": "0.0.0.0/0", - "ingress.2214680975.description": "", - "ingress.2214680975.from_port": "80", - "ingress.2214680975.ipv6_cidr_blocks.#": "0", - "ingress.2214680975.prefix_list_ids.#": "0", - "ingress.2214680975.protocol": "tcp", - "ingress.2214680975.security_groups.#": "0", - "ingress.2214680975.self": "false", - "ingress.2214680975.to_port": "80", - "ingress.2617001939.cidr_blocks.#": "1", - "ingress.2617001939.cidr_blocks.0": "0.0.0.0/0", - "ingress.2617001939.description": "", - "ingress.2617001939.from_port": "443", - "ingress.2617001939.ipv6_cidr_blocks.#": "0", - "ingress.2617001939.prefix_list_ids.#": "0", - "ingress.2617001939.protocol": "tcp", - "ingress.2617001939.security_groups.#": "0", - "ingress.2617001939.self": "false", - "ingress.2617001939.to_port": "443", - "name": "allow http", - "owner_id": "116854918046", - "revoke_rules_on_delete": "false", - "tags.%": "0", - "vpc_id": "vpc-8a4b1ae3" - }, - "meta": { - "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": { - "create": 600000000000, - "delete": 600000000000 - }, - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_security_group.allow_ssh": { - "type": "aws_security_group", - "depends_on": [], - "primary": { - "id": "sg-059fe679d9db32397", - "attributes": { - "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397", - "description": "Managed by Terraform", - "egress.#": "0", - "id": "sg-059fe679d9db32397", - "ingress.#": "1", - "ingress.2541437006.cidr_blocks.#": "1", - "ingress.2541437006.cidr_blocks.0": "0.0.0.0/0", - "ingress.2541437006.description": "", - "ingress.2541437006.from_port": "22", - "ingress.2541437006.ipv6_cidr_blocks.#": "0", - "ingress.2541437006.prefix_list_ids.#": "0", - "ingress.2541437006.protocol": "tcp", - "ingress.2541437006.security_groups.#": "0", - "ingress.2541437006.self": "false", - "ingress.2541437006.to_port": "22", - "name": "allow ssh", - "owner_id": "116854918046", - "revoke_rules_on_delete": "false", - "tags.%": "0", - "vpc_id": "vpc-8a4b1ae3" - }, - "meta": { - "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": { - "create": 600000000000, - "delete": 600000000000 - }, - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "data.aws_eip.webserver-ip": { - "type": "aws_eip", - "depends_on": [], - "primary": { - "id": "eipalloc-0f61e902f5f680dc0", - "attributes": { - "id": "eipalloc-0f61e902f5f680dc0", - "public_ip": "35.180.10.123" - }, - "meta": {}, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - } - }, - "depends_on": [] - } - ] -} diff --git a/ops/terraform/terraform.tfstate.backup b/ops/terraform/terraform.tfstate.backup deleted file mode 100644 index 466ee83..0000000 --- a/ops/terraform/terraform.tfstate.backup +++ /dev/null @@ -1,232 +0,0 @@ -{ - "version": 3, - "terraform_version": "0.11.10", - "serial": 8, - "lineage": "40e25136-2a8a-573c-e896-537bfb7f8b22", - "modules": [ - { - "path": [ - "root" - ], - "outputs": {}, - "resources": { - "aws_eip_association.webserver-eip": { - "type": "aws_eip_association", - "depends_on": [ - "aws_instance.webserver", - "data.aws_eip.webserver-ip" - ], - "primary": { - "id": "eipassoc-0826b0b47141924ba", - "attributes": { - "allocation_id": "eipalloc-0f61e902f5f680dc0", - "id": "eipassoc-0826b0b47141924ba", - "instance_id": "i-09f2de73feb5c3e7a", - "network_interface_id": "eni-02d855d56e40967d0", - "private_ip_address": "172.31.36.68", - "public_ip": "35.180.10.123" - }, - "meta": {}, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_instance.webserver": { - "type": "aws_instance", - "depends_on": [ - "aws_key_pair.terraform_ec2_key", - "aws_security_group.allow_http", - "aws_security_group.allow_ssh" - ], - "primary": { - "id": "i-09f2de73feb5c3e7a", - "attributes": { - "ami": "ami-04992646d54c69ef4", - "arn": "arn:aws:ec2:eu-west-3:116854918046:instance/i-09f2de73feb5c3e7a", - "associate_public_ip_address": "true", - "availability_zone": "eu-west-3c", - "cpu_core_count": "1", - "cpu_threads_per_core": "1", - "credit_specification.#": "1", - "credit_specification.0.cpu_credits": "standard", - "disable_api_termination": "false", - "ebs_block_device.#": "0", - "ebs_optimized": "false", - "ephemeral_block_device.#": "0", - "get_password_data": "false", - "iam_instance_profile": "", - "id": "i-09f2de73feb5c3e7a", - "instance_state": "running", - "instance_type": "t2.micro", - "ipv6_addresses.#": "0", - "key_name": "terraform_ec2_key", - "monitoring": "false", - "network_interface.#": "0", - "network_interface_id": "eni-02d855d56e40967d0", - "password_data": "", - "placement_group": "", - "primary_network_interface_id": "eni-02d855d56e40967d0", - "private_dns": "ip-172-31-36-68.eu-west-3.compute.internal", - "private_ip": "172.31.36.68", - "public_dns": "ec2-35-180-74-87.eu-west-3.compute.amazonaws.com", - "public_ip": "35.180.74.87", - "root_block_device.#": "1", - "root_block_device.0.delete_on_termination": "true", - "root_block_device.0.iops": "100", - "root_block_device.0.volume_id": "vol-0b1da0548cc9c546e", - "root_block_device.0.volume_size": "8", - "root_block_device.0.volume_type": "gp2", - "security_groups.#": "2", - "security_groups.1710041364": "allow ssh", - "security_groups.4237835427": "allow http", - "source_dest_check": "true", - "subnet_id": "subnet-6308d02e", - "tags.%": "1", - "tags.Name": "hifive-webserver", - "tenancy": "default", - "volume_tags.%": "0", - "vpc_security_group_ids.#": "2", - "vpc_security_group_ids.1821931549": "sg-059fe679d9db32397", - "vpc_security_group_ids.2822979855": "sg-082897f758ada2701" - }, - "meta": { - "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": { - "create": 600000000000, - "delete": 1200000000000, - "update": 600000000000 - }, - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_key_pair.terraform_ec2_key": { - "type": "aws_key_pair", - "depends_on": [], - "primary": { - "id": "terraform_ec2_key", - "attributes": { - "fingerprint": "24:c0:bd:83:25:d9:bb:12:0e:88:ab:d0:17:d9:07:74", - "id": "terraform_ec2_key", - "key_name": "terraform_ec2_key", - "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClFxq0O91KsqPLYWeONMjta9p5XsoP/LjzE1jUayr4n5c7uUb/ND9rab9lD+6DK0fhvN58xfZ4YdqPA1HUubaZtE21TIqL6zcOJ8c2z55iBEpzN6c9x6bmS+ZmOrWMUWsweZa1WWBz6UMDvrCRy+yDysndGOLbHZbjtYPv9Zg/9aCunVYDbQIfStRl9YwrR/wtIAyC5PsXJMoaoGrkh5Ac24upkPXCfm2MDirZuKfeMFh+5gSEzSfXXS1OKSVfXrxh9uL+TyqL1MCOn8QSxHVvdaLql6p0FXZrU53RXg5fVz0OwX2W1iSi/7xJiTcXoqZH7RhsH+gLfi1GdljQ2hCj s0dy@thinkpad" - }, - "meta": { - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_security_group.allow_http": { - "type": "aws_security_group", - "depends_on": [], - "primary": { - "id": "sg-082897f758ada2701", - "attributes": { - "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-082897f758ada2701", - "description": "Managed by Terraform", - "egress.#": "2", - "egress.2214680975.cidr_blocks.#": "1", - "egress.2214680975.cidr_blocks.0": "0.0.0.0/0", - "egress.2214680975.description": "", - "egress.2214680975.from_port": "80", - "egress.2214680975.ipv6_cidr_blocks.#": "0", - "egress.2214680975.prefix_list_ids.#": "0", - "egress.2214680975.protocol": "tcp", - "egress.2214680975.security_groups.#": "0", - "egress.2214680975.self": "false", - "egress.2214680975.to_port": "80", - "egress.2617001939.cidr_blocks.#": "1", - "egress.2617001939.cidr_blocks.0": "0.0.0.0/0", - "egress.2617001939.description": "", - "egress.2617001939.from_port": "443", - "egress.2617001939.ipv6_cidr_blocks.#": "0", - "egress.2617001939.prefix_list_ids.#": "0", - "egress.2617001939.protocol": "tcp", - "egress.2617001939.security_groups.#": "0", - "egress.2617001939.self": "false", - "egress.2617001939.to_port": "443", - "id": "sg-082897f758ada2701", - "ingress.#": "0", - "name": "allow http", - "owner_id": "116854918046", - "revoke_rules_on_delete": "false", - "tags.%": "0", - "vpc_id": "vpc-8a4b1ae3" - }, - "meta": { - "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": { - "create": 600000000000, - "delete": 600000000000 - }, - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "aws_security_group.allow_ssh": { - "type": "aws_security_group", - "depends_on": [], - "primary": { - "id": "sg-059fe679d9db32397", - "attributes": { - "arn": "arn:aws:ec2:eu-west-3:116854918046:security-group/sg-059fe679d9db32397", - "description": "Managed by Terraform", - "egress.#": "0", - "id": "sg-059fe679d9db32397", - "ingress.#": "1", - "ingress.2541437006.cidr_blocks.#": "1", - "ingress.2541437006.cidr_blocks.0": "0.0.0.0/0", - "ingress.2541437006.description": "", - "ingress.2541437006.from_port": "22", - "ingress.2541437006.ipv6_cidr_blocks.#": "0", - "ingress.2541437006.prefix_list_ids.#": "0", - "ingress.2541437006.protocol": "tcp", - "ingress.2541437006.security_groups.#": "0", - "ingress.2541437006.self": "false", - "ingress.2541437006.to_port": "22", - "name": "allow ssh", - "owner_id": "116854918046", - "revoke_rules_on_delete": "false", - "tags.%": "0", - "vpc_id": "vpc-8a4b1ae3" - }, - "meta": { - "e2bfb730-ecaa-11e6-8f88-34363bc7c4c0": { - "create": 600000000000, - "delete": 600000000000 - }, - "schema_version": "1" - }, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - }, - "data.aws_eip.webserver-ip": { - "type": "aws_eip", - "depends_on": [], - "primary": { - "id": "eipalloc-0f61e902f5f680dc0", - "attributes": { - "id": "eipalloc-0f61e902f5f680dc0", - "public_ip": "35.180.10.123" - }, - "meta": {}, - "tainted": false - }, - "deposed": [], - "provider": "provider.aws" - } - }, - "depends_on": [] - } - ] -} diff --git a/ops/test b/ops/test deleted file mode 100644 index e69de29..0000000