daml/infra
2019-07-04 11:23:51 +00:00
..
files infra: move index.html outside gcp_cdn_bucket module (#1716) 2019-07-02 11:14:21 +01:00
modules/gcp_cdn_bucket infra: move index.html outside gcp_cdn_bucket module (#1716) 2019-07-02 11:14:21 +01:00
.gitignore open-sourcing daml 2019-04-04 09:33:38 +01:00
apply infra: add a VSTS windows agents (#368) 2019-04-18 11:20:57 +00:00
bazel_cache.tf infra: move index.html outside gcp_cdn_bucket module (#1716) 2019-07-02 11:14:21 +01:00
data_bucket.tf collect historical download data (#2003) 2019-07-04 11:23:51 +00:00
hoogle_server.tf add authealing to hoogle cluster (#1906) 2019-06-27 05:46:01 +00:00
main.tf collect historical download data (#2003) 2019-07-04 11:23:51 +00:00
nix_cache.tf infra: move index.html outside gcp_cdn_bucket module (#1716) 2019-07-02 11:14:21 +01:00
README.md terraform files for hoogle server (#1660) 2019-06-22 00:15:52 +00:00
vsts_agent_linux_startup.sh infra: add docker daemon to ci agent (#1566) 2019-06-08 22:31:55 +00:00
vsts_agent_linux.tf [linux/ci] fix logging agent (#1356) 2019-05-30 15:36:57 +00:00
vsts_agent_windows.tf Install the Windows SDK on CI nodes (#1272) 2019-05-21 13:42:49 +02:00
writer.tf open-sourcing daml 2019-04-04 09:33:38 +01:00

DAML

This is the terraform code used by the DAML repository to deploy supporting infrastructure such as the Bazel caches, Nix caches and Azure Pipeline (VSTS) Agents.

Setup

To deploy the infrastructure changes, you will to get access to the da-dev-gcp-daml-language Google project from DA IT. Then run gcloud auth login to configure the local credentials.

Deployment

All the infrastructure is currently deployed using Terraform. For convenience we have a little wrapper script that you can run to apply the latest changes:

$ ./apply

Writer service-account key

To avoid holding the secret key into the store, creating the key has to be done through the UI.

This can be done here: https://console.cloud.google.com/iam-admin/serviceaccounts/details/104272946446260011088?project=da-dev-gcp-daml-language

Setting up credentials

In order to interact with these Terraform files, you will need security to give you access to the relevant GCP project (da-dev-gcp-daml-language), and login via gcloud by running:

gcloud auth application-default login --account your.name@gcloud-domain.com