daml/infra
2020-04-22 18:57:40 +02:00
..
macos Minor changes to MacOS infra config (#5673) 2020-04-22 18:57:40 +02:00
modules/gcp_cdn_bucket replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
.gitignore open-sourcing daml 2019-04-04 09:33:38 +01:00
apply infra: add a VSTS windows agents (#368) 2019-04-18 11:20:57 +00:00
bazel_cache.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
data_bucket.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
dumps_bucket.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
hoogle_server.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
main.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
nix_cache.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
periodic_killer.tf fix permissions on periodic-killer (#5307) 2020-03-31 19:04:40 +02:00
README.md terraform files for hoogle server (#1660) 2019-06-22 00:15:52 +00:00
vsts_agent_linux_startup.sh add puppeteer dependencies to Linux nodes (#5575) 2020-04-17 01:32:25 +02:00
vsts_agent_linux.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00
vsts_agent_windows.tf replace Windows agents (#5527) 2020-04-14 13:58:42 +02:00
writer.tf replace DAML Authors with DA in copyright headers (#5228) 2020-03-27 01:26:10 +01:00

DAML

This is the terraform code used by the DAML repository to deploy supporting infrastructure such as the Bazel caches, Nix caches and Azure Pipeline (VSTS) Agents.

Setup

To deploy the infrastructure changes, you will to get access to the da-dev-gcp-daml-language Google project from DA IT. Then run gcloud auth login to configure the local credentials.

Deployment

All the infrastructure is currently deployed using Terraform. For convenience we have a little wrapper script that you can run to apply the latest changes:

$ ./apply

Writer service-account key

To avoid holding the secret key into the store, creating the key has to be done through the UI.

This can be done here: https://console.cloud.google.com/iam-admin/serviceaccounts/details/104272946446260011088?project=da-dev-gcp-daml-language

Setting up credentials

In order to interact with these Terraform files, you will need security to give you access to the relevant GCP project (da-dev-gcp-daml-language), and login via gcloud by running:

gcloud auth application-default login --account your.name@gcloud-domain.com