daml/infra
2019-11-13 18:33:15 +01:00
..
files update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
modules/gcp_cdn_bucket update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
.gitignore open-sourcing daml 2019-04-04 09:33:38 +01:00
apply infra: add a VSTS windows agents (#368) 2019-04-18 11:20:57 +00:00
bazel_cache.tf fix hoogle; revert cache buckets ACL changes (#3062) 2019-09-27 15:42:31 +01:00
data_bucket.tf update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
dumps_bucket.tf add gcs bucket for ledger dumps (#3374) 2019-11-07 14:41:15 +00:00
hoogle_server.tf pin hoogle version to avoid surprises (#3322) 2019-11-05 18:14:29 +00:00
main.tf update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
nix_cache.tf fix hoogle; revert cache buckets ACL changes (#3062) 2019-09-27 15:42:31 +01:00
README.md terraform files for hoogle server (#1660) 2019-06-22 00:15:52 +00:00
vsts_agent_linux_startup.sh update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
vsts_agent_linux.tf update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
vsts_agent_windows.tf update copyright notices (#2499) 2019-08-13 17:23:03 +01:00
writer.tf update copyright notices (#2499) 2019-08-13 17:23:03 +01:00

DAML

This is the terraform code used by the DAML repository to deploy supporting infrastructure such as the Bazel caches, Nix caches and Azure Pipeline (VSTS) Agents.

Setup

To deploy the infrastructure changes, you will to get access to the da-dev-gcp-daml-language Google project from DA IT. Then run gcloud auth login to configure the local credentials.

Deployment

All the infrastructure is currently deployed using Terraform. For convenience we have a little wrapper script that you can run to apply the latest changes:

$ ./apply

Writer service-account key

To avoid holding the secret key into the store, creating the key has to be done through the UI.

This can be done here: https://console.cloud.google.com/iam-admin/serviceaccounts/details/104272946446260011088?project=da-dev-gcp-daml-language

Setting up credentials

In order to interact with these Terraform files, you will need security to give you access to the relevant GCP project (da-dev-gcp-daml-language), and login via gcloud by running:

gcloud auth application-default login --account your.name@gcloud-domain.com