Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add Various Ops Files referenced in v7.12.0 Release (#259) #260

Draft
wants to merge 7 commits into
base: master
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -2,3 +2,4 @@
*state.json
deploy-*.sh
.DS_Store
/.idea/
13 changes: 13 additions & 0 deletions cluster/operations/aws-ssm-instance-profile.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
#
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing vm_extensions block to add the instance profile hook in to the web node

# This operations file will use remove the AWS SSM
# Access and Secret Access Key to instead use the instance
# profile of the web node.
#
# Requires the aws-ssm-manager.yml ops file

---
- type: remove
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm/access_key

- type: remove
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm/secret_key
17 changes: 17 additions & 0 deletions cluster/operations/aws-ssm-manager.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
#
# This operations file will add AWS SSM Secrets Manager Support to
# the web node

---
- type: replace
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm?
value:
access_key: ((aws_ssm.access_key))
secret_key: ((aws_ssm.secret_key))
region: ((aws_ssm.region))

pipeline_secret_template: ((aws_ssm.pipeline_secret_template))
# default value is /concourse/{{.Team}}/{{.Pipeline}}/{{.Secret}}

team_secret_template: ((aws_ssm.team_secret_template))
# default value is /concourse/{{.Team}}/{{.Secret}}
16 changes: 16 additions & 0 deletions cluster/operations/aws-ssm-session-token.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
#
# This operations file will use a Session Token instead of
# a pair of Access and Secret Access Keys
#
# Requires the aws-ssm-manager.yml ops file

---
- type: remove
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm/access_key

- type: remove
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm/secret_key

- type: replace
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm/session_token
value: ((aws_ssm_session_token))
10 changes: 10 additions & 0 deletions cluster/operations/aws-ssm-shared-path.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
#
# This operations file will add a shared path route
# in order to define secrets accessible by all teams.
#
# Requires the aws-ssm-manager.yml ops file

---
- type: replace
path: /instance_groups/name=web/jobs/name=web/properties/aws_ssm/shared_path?
value: ((aws_ssm_shared_path))
13 changes: 13 additions & 0 deletions cluster/operations/ipv6_networking.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
#
# This operations file will configure workers to communicate over
# the IPv6 Protocol in addition to existing IPv4
#
# Requires the runtime-containerd.yml ops file

---
- type: replace
path: /instance_groups/name=worker/containerd/ipv6?
value:
enabled: ((ipv6.enabled))
pool: ((ipv6.pool))
disable_masquerade: ((ipv6.disable_masquerade))
8 changes: 8 additions & 0 deletions cluster/operations/postgres-binary-parameters.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
#
# This operations file will allow the option for the
# PostgreSQL Driver to use Binary Parameters for Prepared Statements.

---
- type: replace
path: /instance_groups/name=web/jobs/name=web/properties/postgresql?/binary_parameters?
value: ((postgres_binary))
9 changes: 9 additions & 0 deletions cluster/operations/resource-type-checking-interval.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
#
# This operations file will override the default Resource Type
# Check Interval on the web node
#

---
- type: replace
path: /instance_groups/name=web/default_resource_type_check_interval
value: ((resource_check_interval))
15 changes: 15 additions & 0 deletions cluster/operations/vault-client-token-path.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
#
# This operations file will configure web to accept the Vault Client
# Token from a file
#
# Requires the vault.yml ops file
#

---
- type: remove
path: /instance_groups/name=web/jobs/name=web/properties/vault/auth/client_token

- type: replace
path: /instance_groups/name=web/jobs/name=web/properties/vault/auth?
value:
client_token_path: ((vault.client_token_path))