Hetzner Cloud Terraform setup
This commit is contained in:
parent
ec43fe2fd3
commit
1fab179066
67
restore-tests/.gitignore
vendored
Normal file
67
restore-tests/.gitignore
vendored
Normal file
@ -0,0 +1,67 @@
|
||||
.envrc
|
||||
# Created by https://www.toptal.com/developers/gitignore/api/terraform,vim,nvim,ansible
|
||||
# Edit at https://www.toptal.com/developers/gitignore?templates=terraform,vim,ansible
|
||||
|
||||
### Ansible ###
|
||||
*.retry
|
||||
|
||||
### Terraform ###
|
||||
# Local .terraform directories
|
||||
**/.terraform/*
|
||||
|
||||
# .tfstate files
|
||||
*.tfstate
|
||||
*.tfstate.*
|
||||
|
||||
# Crash log files
|
||||
crash.log
|
||||
crash.*.log
|
||||
|
||||
# Exclude all .tfvars files, which are likely to contain sensitive data, such as
|
||||
# password, private keys, and other secrets. These should not be part of version
|
||||
# control as they are data points which are potentially sensitive and subject
|
||||
# to change depending on the environment.
|
||||
*.tfvars
|
||||
*.tfvars.json
|
||||
|
||||
# Ignore override files as they are usually used to override resources locally and so
|
||||
# are not checked in
|
||||
override.tf
|
||||
override.tf.json
|
||||
*_override.tf
|
||||
*_override.tf.json
|
||||
|
||||
# Include override files you do wish to add to version control using negated pattern
|
||||
# !example_override.tf
|
||||
|
||||
# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan
|
||||
# example: *tfplan*
|
||||
|
||||
# Ignore CLI configuration files
|
||||
.terraformrc
|
||||
terraform.rc
|
||||
|
||||
### Vim ###
|
||||
# Swap
|
||||
[._]*.s[a-v][a-z]
|
||||
!*.svg # comment out if you don't need vector files
|
||||
[._]*.sw[a-p]
|
||||
[._]s[a-rt-v][a-z]
|
||||
[._]ss[a-gi-z]
|
||||
[._]sw[a-p]
|
||||
|
||||
# Session
|
||||
Session.vim
|
||||
Sessionx.vim
|
||||
|
||||
# Temporary
|
||||
.netrwhist
|
||||
*~
|
||||
# Auto-generated tag files
|
||||
tags
|
||||
# Persistent undo
|
||||
[._]*.un~
|
||||
|
||||
# End of https://www.toptal.com/developers/gitignore/api/terraform,vim,nvim,ansible
|
||||
artifacts/
|
||||
*.hcl
|
4
restore-tests/Makefile
Normal file
4
restore-tests/Makefile
Normal file
@ -0,0 +1,4 @@
|
||||
all: artifacts/release/coreos-installer
|
||||
|
||||
artifacts/release/coreos-installer:
|
||||
docker run --rm -v "${PWD}/artifacts:/artifacts" clux/muslrust:stable cargo install --bin=coreos-installer --target=x86_64-unknown-linux-musl --root=/artifacts coreos-installer --force
|
11
restore-tests/ansible.tf
Normal file
11
restore-tests/ansible.tf
Normal file
@ -0,0 +1,11 @@
|
||||
resource "local_file" "inventory" {
|
||||
filename = "${var.files_dir}/inventory.yaml"
|
||||
content = templatefile(
|
||||
"${path.module}/templates/inventory.yaml.tpl",
|
||||
{
|
||||
server_under_test_ip = hcloud_server.under_test.ipv4_address,
|
||||
server_under_test_hostname = hcloud_server.under_test.name,
|
||||
ssh_private_key_file = local_sensitive_file.ssh_private_key.filename
|
||||
}
|
||||
)
|
||||
}
|
7
restore-tests/configure.bu
Normal file
7
restore-tests/configure.bu
Normal file
@ -0,0 +1,7 @@
|
||||
variant: fcos
|
||||
version: 1.4.0
|
||||
ignition:
|
||||
config:
|
||||
merge:
|
||||
- local: ./artifacts/ansible.ign
|
||||
- local: ./setup.ign
|
9
restore-tests/ignition.tf
Normal file
9
restore-tests/ignition.tf
Normal file
@ -0,0 +1,9 @@
|
||||
resource "local_file" "ignition" {
|
||||
filename = "${var.files_dir}/ansible.ign"
|
||||
content = templatefile(
|
||||
"${path.module}/templates/ansible.ign.tpl",
|
||||
{
|
||||
ssh_public_key = chomp(one(tls_private_key.root[*].public_key_openssh))
|
||||
}
|
||||
)
|
||||
}
|
88
restore-tests/main.tf
Normal file
88
restore-tests/main.tf
Normal file
@ -0,0 +1,88 @@
|
||||
provider "hcloud" {
|
||||
token = var.hcloud_token
|
||||
}
|
||||
|
||||
resource "tls_private_key" "root" {
|
||||
algorithm = "RSA"
|
||||
rsa_bits = 4096
|
||||
}
|
||||
|
||||
resource "hcloud_ssh_key" "this" {
|
||||
name = var.ssh_key_name
|
||||
public_key = one(tls_private_key.root[*].public_key_openssh)
|
||||
}
|
||||
|
||||
resource "local_sensitive_file" "ssh_private_key" {
|
||||
filename = "${var.files_dir}/id_rsa"
|
||||
file_permission = "0600"
|
||||
directory_permission = "0755"
|
||||
content = one(tls_private_key.root[*].private_key_pem)
|
||||
}
|
||||
|
||||
resource "hcloud_server" "under_test" {
|
||||
name = var.hcloud_server_name
|
||||
labels = { "os" = "coreos" }
|
||||
|
||||
server_type = "cx31"
|
||||
datacenter = var.hcloud_server_datacenter
|
||||
|
||||
# Image is ignored, as we boot into rescue mode, but is a required field
|
||||
image = "fedora-36"
|
||||
rescue = "linux64"
|
||||
ssh_keys = concat(hcloud_ssh_key.this[*].name, var.ssh_extra_key_names)
|
||||
|
||||
|
||||
connection {
|
||||
host = hcloud_server.under_test.ipv4_address
|
||||
timeout = "5m"
|
||||
private_key = file(local_sensitive_file.ssh_private_key.filename)
|
||||
# Root is the available user in rescue mode
|
||||
user = "root"
|
||||
}
|
||||
|
||||
provisioner "local-exec" {
|
||||
command = "butane --pretty --strict -d . configure.bu > ${var.files_dir}/configure.ign"
|
||||
}
|
||||
|
||||
|
||||
# Copy Ignition config to server
|
||||
provisioner "file" {
|
||||
content = file("${var.files_dir}/configure.ign")
|
||||
destination = "/root/setup.ign"
|
||||
}
|
||||
|
||||
provisioner "file" {
|
||||
source = "${path.module}/artifacts/bin/coreos-installer"
|
||||
destination = "/usr/local/bin/coreos-installer"
|
||||
}
|
||||
|
||||
# Install Fedora CoreOS in rescue mode
|
||||
provisioner "remote-exec" {
|
||||
inline = [
|
||||
"set -x",
|
||||
"set -e",
|
||||
# "apt update",
|
||||
# "apt install -y cargo",
|
||||
# "cargo install coreos-installer",
|
||||
"chmod 755 /usr/local/bin/coreos-installer",
|
||||
# Download and install Fedora CoreOS to /dev/sda
|
||||
"coreos-installer install /dev/sda -i /root/setup.ign",
|
||||
"shutdown -r now"
|
||||
]
|
||||
}
|
||||
|
||||
# # Configure CoreOS after installation
|
||||
# provisioner "remote-exec" {
|
||||
# connection {
|
||||
# host = hcloud_server.under_test.ipv4_address
|
||||
# timeout = "1m"
|
||||
# agent = true
|
||||
# user = "core"
|
||||
# }
|
||||
#
|
||||
# inline = [
|
||||
# "sudo hostnamectl set-hostname ${hcloud_server.under_test.name}"
|
||||
# # Add additional commands if needed
|
||||
# ]
|
||||
# }
|
||||
}
|
3
restore-tests/outputs.tf
Normal file
3
restore-tests/outputs.tf
Normal file
@ -0,0 +1,3 @@
|
||||
output "server_under_test_ip" {
|
||||
value = hcloud_server.under_test.ipv4_address
|
||||
}
|
1
restore-tests/setup.ign
Symbolic link
1
restore-tests/setup.ign
Symbolic link
@ -0,0 +1 @@
|
||||
../coreos-config/setup.ign
|
1
restore-tests/templates/ansible.ign.tpl
Normal file
1
restore-tests/templates/ansible.ign.tpl
Normal file
@ -0,0 +1 @@
|
||||
{"ignition":{"version":"3.0.0"},"passwd":{"users":[{"name":"core","sshAuthorizedKeys":["${ssh_public_key}"]}]}}
|
12
restore-tests/templates/inventory.yaml.tpl
Normal file
12
restore-tests/templates/inventory.yaml.tpl
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
all:
|
||||
hosts:
|
||||
${server_under_test_hostname}:
|
||||
ansible_host: ${server_under_test_ip}
|
||||
ansible_user: core
|
||||
ansible_ssh_private_key_file: ${ssh_private_key_file}
|
||||
network_interface: ens3
|
||||
children:
|
||||
unprovisioned:
|
||||
hosts:
|
||||
${server_under_test_hostname}: null
|
49
restore-tests/variables.tf
Normal file
49
restore-tests/variables.tf
Normal file
@ -0,0 +1,49 @@
|
||||
variable "hcloud_token" {
|
||||
description = "Hetzner Cloud API Token"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "ssh_key_name" {
|
||||
description = "Name of your public key to identify at Hetzner Cloud portal"
|
||||
type = string
|
||||
default = "restore_test_key"
|
||||
}
|
||||
|
||||
variable "ssh_extra_key_names" {
|
||||
description = "Name of additional public keys installed on the system"
|
||||
type = list(any)
|
||||
default = [
|
||||
"zahnrad"
|
||||
]
|
||||
}
|
||||
|
||||
variable "files_dir" {
|
||||
description = "Directory to store artifacts"
|
||||
type = string
|
||||
default = "artifacts/"
|
||||
}
|
||||
|
||||
variable "hcloud_server_type" {
|
||||
description = "vServer type name, lookup via `hcloud server-type list`"
|
||||
type = string
|
||||
default = "cx11"
|
||||
}
|
||||
|
||||
variable "hcloud_server_datacenter" {
|
||||
description = "Desired datacenter location name, lookup via `hcloud datacenter list`"
|
||||
type = string
|
||||
default = "hel1-dc2"
|
||||
}
|
||||
|
||||
variable "hcloud_server_name" {
|
||||
description = "Name of the server"
|
||||
type = string
|
||||
default = "www1"
|
||||
}
|
||||
|
||||
# Update version to the latest release of fcct
|
||||
variable "tools_fcct_version" {
|
||||
description = "See https://github.com/coreos/fcct/releases for available versions"
|
||||
type = string
|
||||
default = "0.6.0"
|
||||
}
|
24
restore-tests/versions.tf
Normal file
24
restore-tests/versions.tf
Normal file
@ -0,0 +1,24 @@
|
||||
terraform {
|
||||
required_providers {
|
||||
hcloud = {
|
||||
source = "hetznercloud/hcloud"
|
||||
version = ">= 1.32.0"
|
||||
}
|
||||
|
||||
local = {
|
||||
source = "hashicorp/local"
|
||||
version = ">= 2.1.0"
|
||||
}
|
||||
|
||||
tls = {
|
||||
source = "hashicorp/tls"
|
||||
version = ">= 3.1.0"
|
||||
}
|
||||
|
||||
ignition = {
|
||||
source = "community-terraform-providers/ignition"
|
||||
version = ">= 2.1.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user