daml/infra
Gary Verhaegen 852fc7cd1a
remove temp debug ci nodes (#4373)
Following the happy resolution of #4370 in #4371, we do not need the
temporary nodes anymore. This PR therefore removes them.

CHANGELOG_BEGIN
CHANGELOG_END
2020-02-04 15:54:03 +01:00
..
files update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
modules/gcp_cdn_bucket update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
.gitignore open-sourcing daml 2019-04-04 09:33:38 +01:00
apply infra: add a VSTS windows agents (#368) 2019-04-18 11:20:57 +00:00
bazel_cache.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
data_bucket.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
dumps_bucket.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
hoogle_server.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
main.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
nix_cache.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
README.md terraform files for hoogle server (#1660) 2019-06-22 00:15:52 +00:00
vsts_agent_linux_startup.sh update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
vsts_agent_linux.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00
vsts_agent_windows.tf fix Windows CI node startup script (#4371) 2020-02-04 14:37:53 +01:00
writer.tf update copyright notices to 2020 (#3939) 2020-01-02 21:21:13 +01:00

DAML

This is the terraform code used by the DAML repository to deploy supporting infrastructure such as the Bazel caches, Nix caches and Azure Pipeline (VSTS) Agents.

Setup

To deploy the infrastructure changes, you will to get access to the da-dev-gcp-daml-language Google project from DA IT. Then run gcloud auth login to configure the local credentials.

Deployment

All the infrastructure is currently deployed using Terraform. For convenience we have a little wrapper script that you can run to apply the latest changes:

$ ./apply

Writer service-account key

To avoid holding the secret key into the store, creating the key has to be done through the UI.

This can be done here: https://console.cloud.google.com/iam-admin/serviceaccounts/details/104272946446260011088?project=da-dev-gcp-daml-language

Setting up credentials

In order to interact with these Terraform files, you will need security to give you access to the relevant GCP project (da-dev-gcp-daml-language), and login via gcloud by running:

gcloud auth application-default login --account your.name@gcloud-domain.com