Initial check-in for repo structure
This commit is contained in:
parent
a44d015aa3
commit
0ba5c18031
@ -170,9 +170,9 @@
|
|||||||
"label": "Service Principal",
|
"label": "Service Principal",
|
||||||
"elements": [
|
"elements": [
|
||||||
{
|
{
|
||||||
"name": "spid",
|
"name": "principalId",
|
||||||
"type": "Microsoft.Common.TextBox",
|
"type": "Microsoft.Common.TextBox",
|
||||||
"label": "Application ID",
|
"label": "Service Principal ID",
|
||||||
"defaultValue": "",
|
"defaultValue": "",
|
||||||
"toolTip": "",
|
"toolTip": "",
|
||||||
"constraints": {
|
"constraints": {
|
||||||
@ -238,7 +238,7 @@
|
|||||||
"vmSize": "[steps('firstStep').vmSize]",
|
"vmSize": "[steps('firstStep').vmSize]",
|
||||||
"location": "[location()]",
|
"location": "[location()]",
|
||||||
"spType": "[steps('secondStep').sptype]",
|
"spType": "[steps('secondStep').sptype]",
|
||||||
"spId": "[steps('secondStep').spSection.spid]",
|
"principalId": "[steps('secondStep').spSection.principalId]",
|
||||||
"spSecret": "[steps('secondStep').spSection.spsecret]",
|
"spSecret": "[steps('secondStep').spSection.spsecret]",
|
||||||
"enableCloudAgents": "[steps('secondStep').enableCloudAgents]",
|
"enableCloudAgents": "[steps('secondStep').enableCloudAgents]",
|
||||||
"vnetName": "[steps('firstStep').vnet.name]",
|
"vnetName": "[steps('firstStep').vnet.name]",
|
324
solution_template/vm-linux-terraform/mainTemplate.json
Normal file
324
solution_template/vm-linux-terraform/mainTemplate.json
Normal file
@ -0,0 +1,324 @@
|
|||||||
|
{
|
||||||
|
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
|
||||||
|
"contentVersion": "1.0.0.0",
|
||||||
|
"parameters": {
|
||||||
|
"userName": {
|
||||||
|
"type": "string",
|
||||||
|
"metadata": {
|
||||||
|
"description": "Username for the Virtual Machine."
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"authenticationType": {
|
||||||
|
"type": "string",
|
||||||
|
"defaultValue": "password",
|
||||||
|
"allowedValues": [
|
||||||
|
"password",
|
||||||
|
"sshPublicKey"
|
||||||
|
],
|
||||||
|
"metadata": {
|
||||||
|
"description": "Authentication type"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"adminPassword": {
|
||||||
|
"type": "securestring",
|
||||||
|
"defaultValue": "",
|
||||||
|
"metadata": {
|
||||||
|
"description": "Password for the Virtual Machine."
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"sshPublicKey": {
|
||||||
|
"type": "securestring",
|
||||||
|
"defaultValue": "",
|
||||||
|
"metadata": {
|
||||||
|
"description": "ssh key for the Virtual Machine."
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"vmSize": {
|
||||||
|
"type": "string",
|
||||||
|
"metadata": {
|
||||||
|
"description": "The size of the VM to create"
|
||||||
|
},
|
||||||
|
"defaultValue": "Standard_D1_V2"
|
||||||
|
},
|
||||||
|
"desktopInstall": {
|
||||||
|
"type": "bool",
|
||||||
|
"defaultValue": false,
|
||||||
|
"metadata": {
|
||||||
|
"description": "Installs Ubuntu Mate desktop GUI"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"_artifactsLocation": {
|
||||||
|
"type": "string",
|
||||||
|
"metadata": {
|
||||||
|
"description": "The base URI where artifacts required by this template are located. When the template is deployed using the accompanying scripts, a private location in the subscription will be used and this value will be automatically generated."
|
||||||
|
},
|
||||||
|
"defaultValue": "https://raw.githubusercontent.com/Azure/terraform/master/solution_template/vm-linux-terraform"
|
||||||
|
},
|
||||||
|
"_artifactsLocationSasToken": {
|
||||||
|
"type": "securestring",
|
||||||
|
"metadata": {
|
||||||
|
"description": "The sasToken required to access _artifactsLocation. When the template is deployed using the accompanying scripts, a sasToken will be automatically generated."
|
||||||
|
},
|
||||||
|
"defaultValue": ""
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"variables": {
|
||||||
|
"dnsLabelPrefix": "[concat('msi',uniquestring(resourceGroup().id))]",
|
||||||
|
"infraStorageAccountName": "[take(concat('storeinfra', uniquestring(resourceGroup().id), variables('dnsLabelPrefix')),24)]",
|
||||||
|
"stateStorageAccountName": "[take(concat('storestate', uniquestring(resourceGroup().id), variables('dnsLabelPrefix')),24)]",
|
||||||
|
"nicName": "[concat('nic',uniquestring(resourceGroup().id))]",
|
||||||
|
"networkSecurityGroupName": "[concat('nsg',uniquestring(resourceGroup().id))]",
|
||||||
|
"addressPrefix": "10.0.0.0/16",
|
||||||
|
"subnetName": "Subnet",
|
||||||
|
"subnetPrefix": "10.0.0.0/24",
|
||||||
|
"publicIPAddressName": "[concat('pip',uniquestring(resourceGroup().id))]",
|
||||||
|
"vmName": "[concat('vm',uniquestring(resourceGroup().id))]",
|
||||||
|
"virtualNetworkName": "[concat('vnet',uniquestring(resourceGroup().id))]",
|
||||||
|
"subnetRef": "[resourceId('Microsoft.Network/virtualNetworks/subnets', variables('virtualNetworkName'), variables('subnetName'))]",
|
||||||
|
"linuxConfiguration": {
|
||||||
|
"disablePasswordAuthentication": true,
|
||||||
|
"ssh": {
|
||||||
|
"publicKeys": [
|
||||||
|
{
|
||||||
|
"path": "[concat('/home/', parameters('userName'), '/.ssh/authorized_keys')]",
|
||||||
|
"keyData": "[parameters('sshPublicKey')]"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"contributor" : "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '8e3af657-a8ff-443c-a75c-2fe8c4bcb635')]",
|
||||||
|
"installParm1": "[concat(' -u ', parameters('userName'))]",
|
||||||
|
"installParm2": "[concat(' -s ', subscription().subscriptionId)]",
|
||||||
|
"installParm3": "[concat(' -a ', variables('stateStorageAccountName'))]",
|
||||||
|
"installParm4": "[if(equals(parameters('desktopInstall'), bool('true')), concat(' -d ', parameters('desktopInstall')), '')]"
|
||||||
|
|
||||||
|
},
|
||||||
|
"resources": [
|
||||||
|
{
|
||||||
|
"type": "Microsoft.Storage/storageAccounts",
|
||||||
|
"name": "[variables('infraStorageAccountName')]",
|
||||||
|
"apiVersion": "2017-10-01",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"sku": {
|
||||||
|
"name": "Standard_LRS"
|
||||||
|
},
|
||||||
|
"kind": "Storage",
|
||||||
|
"properties": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "Microsoft.Storage/storageAccounts",
|
||||||
|
"name": "[variables('stateStorageAccountName')]",
|
||||||
|
"apiVersion": "2017-10-01",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"sku": {
|
||||||
|
"name": "Standard_LRS"
|
||||||
|
},
|
||||||
|
"kind": "Storage",
|
||||||
|
"properties": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"apiVersion": "2017-11-01",
|
||||||
|
"type": "Microsoft.Network/publicIPAddresses",
|
||||||
|
"name": "[variables('publicIPAddressName')]",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"properties": {
|
||||||
|
"publicIPAllocationMethod": "Dynamic",
|
||||||
|
"dnsSettings": {
|
||||||
|
"domainNameLabel": "[variables('dnsLabelPrefix')]"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"apiVersion": "2017-11-01",
|
||||||
|
"type": "Microsoft.Network/virtualNetworks",
|
||||||
|
"name": "[variables('virtualNetworkName')]",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"properties": {
|
||||||
|
"addressSpace": {
|
||||||
|
"addressPrefixes": [
|
||||||
|
"[variables('addressPrefix')]"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"subnets": [
|
||||||
|
{
|
||||||
|
"name": "[variables('subnetName')]",
|
||||||
|
"properties": {
|
||||||
|
"addressPrefix": "[variables('subnetPrefix')]"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[variables('networkSecurityGroupName')]",
|
||||||
|
"type": "Microsoft.Network/networkSecurityGroups",
|
||||||
|
"apiVersion": "2017-11-01",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"properties": {
|
||||||
|
"securityRules": [
|
||||||
|
{
|
||||||
|
"name": "default-allow-ssh",
|
||||||
|
"properties": {
|
||||||
|
"priority": 1000,
|
||||||
|
"sourceAddressPrefix": "*",
|
||||||
|
"protocol": "Tcp",
|
||||||
|
"destinationPortRange": "22",
|
||||||
|
"access": "Allow",
|
||||||
|
"direction": "Inbound",
|
||||||
|
"sourcePortRange": "*",
|
||||||
|
"destinationAddressPrefix": "*"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "rdp-rule",
|
||||||
|
"properties": {
|
||||||
|
"description": "Allow RDP",
|
||||||
|
"protocol": "Tcp",
|
||||||
|
"sourcePortRange": "*",
|
||||||
|
"destinationPortRange": "3389",
|
||||||
|
"sourceAddressPrefix": "Internet",
|
||||||
|
"destinationAddressPrefix": "*",
|
||||||
|
"access": "Allow",
|
||||||
|
"priority": 1001,
|
||||||
|
"direction": "Inbound"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"apiVersion": "2017-11-01",
|
||||||
|
"type": "Microsoft.Network/networkInterfaces",
|
||||||
|
"name": "[variables('nicName')]",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"dependsOn": [
|
||||||
|
"[resourceId('Microsoft.Network/publicIPAddresses/', variables('publicIPAddressName'))]",
|
||||||
|
"[resourceId('Microsoft.Network/virtualNetworks/', variables('virtualNetworkName'))]"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"ipConfigurations": [
|
||||||
|
{
|
||||||
|
"name": "ipconfig1",
|
||||||
|
"properties": {
|
||||||
|
"privateIPAllocationMethod": "Dynamic",
|
||||||
|
"publicIPAddress": {
|
||||||
|
"id": "[resourceId('Microsoft.Network/publicIPAddresses',variables('publicIPAddressName'))]"
|
||||||
|
},
|
||||||
|
"subnet": {
|
||||||
|
"id": "[variables('subnetRef')]"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"networkSecurityGroup": {
|
||||||
|
"id": "[resourceId('Microsoft.Network/networkSecurityGroups', variables('networkSecurityGroupName'))]"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"apiVersion": "2017-12-01",
|
||||||
|
"type": "Microsoft.Compute/virtualMachines",
|
||||||
|
"name": "[variables('vmName')]",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"identity": {
|
||||||
|
"type": "SystemAssigned"
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"hardwareProfile": {
|
||||||
|
"vmSize": "[parameters('vmSize')]"
|
||||||
|
},
|
||||||
|
"osProfile": {
|
||||||
|
"computerName": "[variables('vmName')]",
|
||||||
|
"adminUsername": "[parameters('userName')]",
|
||||||
|
"adminPassword": "[parameters('adminPassword')]",
|
||||||
|
"linuxConfiguration": "[if(equals(parameters('authenticationType'), 'password'), json('null'), variables('linuxConfiguration'))]"
|
||||||
|
},
|
||||||
|
"storageProfile": {
|
||||||
|
"imageReference": {
|
||||||
|
"publisher": "Canonical",
|
||||||
|
"offer": "UbuntuServer",
|
||||||
|
"sku": "17.10",
|
||||||
|
"version": "latest"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"networkProfile": {
|
||||||
|
"networkInterfaces": [
|
||||||
|
{
|
||||||
|
"id": "[resourceId('Microsoft.Network/networkInterfaces',variables('nicName'))]"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"diagnosticsProfile": {
|
||||||
|
"bootDiagnostics": {
|
||||||
|
"enabled": true,
|
||||||
|
"storageUri": "[reference(concat('Microsoft.Storage/storageAccounts/', variables('infraStorageAccountName')),'2016-12-01').primaryEndpoints.blob]"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "Microsoft.Compute/virtualMachines/extensions",
|
||||||
|
"name": "[concat(variables('vmName'),'/MSILinuxExtension')]",
|
||||||
|
"apiVersion": "2017-12-01",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"dependsOn": [
|
||||||
|
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"publisher": "Microsoft.ManagedIdentity",
|
||||||
|
"type": "ManagedIdentityExtensionForLinux",
|
||||||
|
"typeHandlerVersion": "1.0",
|
||||||
|
"autoUpgradeMinorVersion": true,
|
||||||
|
"settings": {
|
||||||
|
"port": 50342
|
||||||
|
},
|
||||||
|
"protectedSettings": {}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"apiVersion": "2017-09-01",
|
||||||
|
"name": "[guid(resourceGroup().id)]",
|
||||||
|
"type": "Microsoft.Authorization/roleAssignments",
|
||||||
|
"dependsOn": [
|
||||||
|
"[resourceId('Microsoft.Compute/virtualMachines/extensions/', variables('vmName'),'MSILinuxExtension')]"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"roleDefinitionId": "[variables('contributor')]",
|
||||||
|
"principalId": "[reference(concat(resourceId('Microsoft.Compute/virtualMachines/', variables('vmName')),'/providers/Microsoft.ManagedIdentity/Identities/default'),'2015-08-31-PREVIEW').principalId]",
|
||||||
|
"scope": "[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name)]"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[concat(variables('vmName'),'/customscriptextension')]",
|
||||||
|
"type": "Microsoft.Compute/virtualMachines/extensions",
|
||||||
|
"apiVersion": "2017-03-30",
|
||||||
|
"location": "[resourceGroup().location]",
|
||||||
|
"dependsOn": [
|
||||||
|
"[resourceId('Microsoft.Authorization/roleAssignments', guid(resourceGroup().id))]"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"publisher": "Microsoft.Azure.Extensions",
|
||||||
|
"type": "CustomScript",
|
||||||
|
"typeHandlerVersion": "2.0",
|
||||||
|
"autoUpgradeMinorVersion": true,
|
||||||
|
"settings": {
|
||||||
|
"fileUris": [
|
||||||
|
"[concat(parameters('_artifactsLocation'), '/scripts/infra.sh', parameters('_artifactsLocationSasToken'))]",
|
||||||
|
"[concat(parameters('_artifactsLocation'), '/scripts/install.sh', parameters('_artifactsLocationSasToken'))]",
|
||||||
|
"[concat(parameters('_artifactsLocation'), '/scripts/desktop.sh', parameters('_artifactsLocationSasToken'))]",
|
||||||
|
"[concat(parameters('_artifactsLocation'), '/scripts/azureProviderAndCreds.tf', parameters('_artifactsLocationSasToken'))]"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"protectedSettings": {
|
||||||
|
"commandToExecute": "[concat('bash infra.sh && bash install.sh ', variables('installParm1'), variables('installParm2'), variables('installParm3'), variables('installParm4'), ' -k ', listKeys(resourceId('Microsoft.Storage/storageAccounts', variables('stateStorageAccountName')), providers('Microsoft.Storage', 'storageAccounts').apiVersions[0]).keys[0].value, ' -l ', reference(concat(resourceId('Microsoft.Compute/virtualMachines/', variables('vmName')),'/providers/Microsoft.ManagedIdentity/Identities/default'),'2015-08-31-PREVIEW').principalId)]"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"outputs": {
|
||||||
|
"fqdn": {
|
||||||
|
"value": "[reference(resourceId('Microsoft.Network/publicIPAddresses',variables('publicIPAddressName')),'2017-10-01').dnsSettings.fqdn]",
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,19 @@
|
|||||||
|
#
|
||||||
|
#
|
||||||
|
# Provider and credential snippet to add to configurations
|
||||||
|
# Assumes that there's a terraform.tfvars file with the var values
|
||||||
|
#
|
||||||
|
# Uncomment the creds variables if using service principal auth
|
||||||
|
# Leave them commented to use MSI auth
|
||||||
|
#
|
||||||
|
#variable subscription_id {}
|
||||||
|
#variable tenant_id {}
|
||||||
|
#variable client_id {}
|
||||||
|
#variable client_secret {}
|
||||||
|
|
||||||
|
provider "azurerm" {
|
||||||
|
# subscription_id = "${var.subscription_id}"
|
||||||
|
# tenant_id = "${var.tenant_id}"
|
||||||
|
# client_id = "${var.client_id}"
|
||||||
|
# client_secret = "${var.client_secret}"
|
||||||
|
}
|
56
solution_template/vm-linux-terraform/scripts/desktop.sh
Normal file
56
solution_template/vm-linux-terraform/scripts/desktop.sh
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
logger -t devvm "Desktop Install started: $?"
|
||||||
|
|
||||||
|
sudo apt-get -y update
|
||||||
|
|
||||||
|
sudo apt-get -q=2 -y install xrdp
|
||||||
|
|
||||||
|
logger -t devvm "XRDP installed: $?"
|
||||||
|
|
||||||
|
logger -t devvm "Installing Mate Desktop ..."
|
||||||
|
|
||||||
|
sudo dpkg --configure -a
|
||||||
|
|
||||||
|
sudo apt-add-repository -y ppa:ubuntu-mate-dev/ppa
|
||||||
|
|
||||||
|
sudo apt-add-repository -y ppa:ubuntu-mate-dev/trusty-mate
|
||||||
|
|
||||||
|
sudo apt-get -y update
|
||||||
|
|
||||||
|
sudo apt-get -y upgrade
|
||||||
|
|
||||||
|
sudo apt-get install -q=2 --no-install-recommends -m ubuntu-mate-core
|
||||||
|
|
||||||
|
sudo apt-get install -q=2 --no-install-recommends -m ubuntu-mate-desktop
|
||||||
|
|
||||||
|
logger -t devvm "Mate Desktop installed. $?"
|
||||||
|
|
||||||
|
echo mate-session >~/.xsession
|
||||||
|
|
||||||
|
sudo service xrdp restart
|
||||||
|
|
||||||
|
# FIxes the issue with Ubuntu desktop being blank.
|
||||||
|
|
||||||
|
sudo sed -i -e 's/console/anybody/g' /etc/X11/Xwrapper.config
|
||||||
|
|
||||||
|
|
||||||
|
logger -t devvm "Mate Desktop configured. $?"
|
||||||
|
|
||||||
|
logger -t devvm "Installing VSCode: $?"
|
||||||
|
|
||||||
|
|
||||||
|
curl https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor > microsoft.gpg
|
||||||
|
|
||||||
|
sudo mv microsoft.gpg /etc/apt/trusted.gpg.d/microsoft.gpg
|
||||||
|
|
||||||
|
sudo sh -c 'echo "deb [arch=amd64] https://packages.microsoft.com/repos/vscode stable main" > /etc/apt/sources.list.d/vscode.list'
|
||||||
|
|
||||||
|
sudo apt-get update
|
||||||
|
|
||||||
|
sudo apt-get install -y code
|
||||||
|
|
||||||
|
logger -t devvm "VSCode Installed: $?"
|
||||||
|
|
||||||
|
logger -t devvm "Success"
|
||||||
|
exit 0
|
19
solution_template/vm-linux-terraform/scripts/infra.sh
Normal file
19
solution_template/vm-linux-terraform/scripts/infra.sh
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
apt-get update
|
||||||
|
|
||||||
|
wget -O terraform.zip https://releases.hashicorp.com/terraform/0.11.1/terraform_0.11.1_linux_amd64.zip?_ga=2.228206621.1801000149.1512425211-1345627201.1504718143
|
||||||
|
|
||||||
|
apt-get install unzip
|
||||||
|
|
||||||
|
unzip terraform.zip
|
||||||
|
|
||||||
|
mv terraform /usr/local/bin
|
||||||
|
|
||||||
|
echo "deb [arch=amd64] https://packages.microsoft.com/repos/azure-cli/ wheezy main" | sudo tee /etc/apt/sources.list.d/azure-cli.list
|
||||||
|
|
||||||
|
apt-key adv --keyserver packages.microsoft.com --recv-keys 52E16F86FEE04B979B07E28DB02C46DF417A0893
|
||||||
|
|
||||||
|
apt-get install apt-transport-https
|
||||||
|
|
||||||
|
apt-get update && sudo apt-get install azure-cli
|
132
solution_template/vm-linux-terraform/scripts/install.sh
Normal file
132
solution_template/vm-linux-terraform/scripts/install.sh
Normal file
@ -0,0 +1,132 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Script Name: install.sh
|
||||||
|
# Author: Greg Oliver - Microsoft github:(sebastus)
|
||||||
|
# Version: 0.1
|
||||||
|
# Last Modified By: Greg Oliver
|
||||||
|
# Description:
|
||||||
|
# This script configures authentication for Terraform and remote state for Terraform.
|
||||||
|
# Parameters :
|
||||||
|
# 1 - s: Azure subscription ID
|
||||||
|
# 2 - a: Storage account name
|
||||||
|
# 3 - k: Storage account key (password)
|
||||||
|
# 4 - l: MSI client id (principal id)
|
||||||
|
# 5 - u: User account name
|
||||||
|
# 6 - d: Ubuntu Desktop GUI for developement
|
||||||
|
# 7 - h: help
|
||||||
|
# Note :
|
||||||
|
# This script has only been tested on Ubuntu 12.04 LTS & 14.04 LTS and must be root
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
logger -t devvm "Install started: $?"
|
||||||
|
|
||||||
|
help()
|
||||||
|
{
|
||||||
|
echo "This script sets up a node, and configures pre-installed Splunk Enterprise"
|
||||||
|
echo "Usage: "
|
||||||
|
echo "Parameters:"
|
||||||
|
echo "- s: Azure subscription ID"
|
||||||
|
echo "- a: Storage account name"
|
||||||
|
echo "- k: Storage account key (password)"
|
||||||
|
echo "- l: MSI client id (principal id)"
|
||||||
|
echo "- u: User account name"
|
||||||
|
echo "- d: Ubuntu Desktop GUI"
|
||||||
|
echo "- h: help"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Log method to control log output
|
||||||
|
log()
|
||||||
|
{
|
||||||
|
echo "`date`: $1"
|
||||||
|
}
|
||||||
|
|
||||||
|
# You must be root to run this script
|
||||||
|
if [ "${UID}" -ne 0 ];
|
||||||
|
then
|
||||||
|
log "Script executed without root permissions"
|
||||||
|
echo "You must be root to run this program." >&2
|
||||||
|
exit 3
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Arguments
|
||||||
|
while getopts :s:a:k:l:u:d: optname; do
|
||||||
|
if [[ $optname != 'e' && $optname != 'k' ]]; then
|
||||||
|
log "Option $optname set with value ${OPTARG}"
|
||||||
|
fi
|
||||||
|
case $optname in
|
||||||
|
s) #azure subscription id
|
||||||
|
SUBSCRIPTION_ID=${OPTARG}
|
||||||
|
;;
|
||||||
|
a) #storage account name
|
||||||
|
STORAGE_ACCOUNT_NAME=${OPTARG}
|
||||||
|
;;
|
||||||
|
k) #storage account key
|
||||||
|
STORAGE_ACCOUNT_KEY=${OPTARG}
|
||||||
|
;;
|
||||||
|
l) #PrincipalId of the MSI identity
|
||||||
|
MSI_PRINCIPAL_ID=${OPTARG}
|
||||||
|
;;
|
||||||
|
u) #user account name
|
||||||
|
USERNAME=${OPTARG}
|
||||||
|
;;
|
||||||
|
d) #Desktop installation
|
||||||
|
DESKTOPINSTALL=${OPTARG}
|
||||||
|
;;
|
||||||
|
h) #Show help
|
||||||
|
help
|
||||||
|
exit 2
|
||||||
|
;;
|
||||||
|
\?) #Unrecognized option - show help
|
||||||
|
echo -e \\n"Option -${BOLD}$OPTARG${NORM} not allowed."
|
||||||
|
help
|
||||||
|
exit 2
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
TEMPLATEFOLDER="/home/$USERNAME/tfTemplate"
|
||||||
|
REMOTESTATEFILE="$TEMPLATEFOLDER/remoteState.tf"
|
||||||
|
ACCESSKEYFILE="/home/$USERNAME/access_key"
|
||||||
|
TFENVFILE="/home/$USERNAME/tfEnv.sh"
|
||||||
|
CREDSFILE="$TEMPLATEFOLDER/azureProviderAndCreds.tf"
|
||||||
|
|
||||||
|
mkdir $TEMPLATEFOLDER
|
||||||
|
|
||||||
|
cp ./azureProviderAndCreds.tf $TEMPLATEFOLDER
|
||||||
|
chmod 666 $CREDSFILE
|
||||||
|
|
||||||
|
touch $REMOTESTATEFILE
|
||||||
|
echo "terraform {" >> $REMOTESTATEFILE
|
||||||
|
echo " backend \"azurerm\" {" >> $REMOTESTATEFILE
|
||||||
|
echo " storage_account_name = \"$STORAGE_ACCOUNT_NAME\"" >> $REMOTESTATEFILE
|
||||||
|
echo " container_name = \"terraform-state\"" >> $REMOTESTATEFILE
|
||||||
|
echo " key = \"prod.terraform.tfstate\"" >> $REMOTESTATEFILE
|
||||||
|
echo " }" >> $REMOTESTATEFILE
|
||||||
|
echo "}" >> $REMOTESTATEFILE
|
||||||
|
chmod 666 $REMOTESTATEFILE
|
||||||
|
|
||||||
|
chown -R $USERNAME:$USERNAME /home/$USERNAME/tfTemplate
|
||||||
|
|
||||||
|
touch $ACCESSKEYFILE
|
||||||
|
echo "access_key = \"$STORAGE_ACCOUNT_KEY\"" >> $ACCESSKEYFILE
|
||||||
|
chmod 666 $ACCESSKEYFILE
|
||||||
|
chown $USERNAME:$USERNAME $ACCESSKEYFILE
|
||||||
|
|
||||||
|
touch $TFENVFILE
|
||||||
|
echo "export ARM_SUBSCRIPTION_ID =\"$SUBSCRIPTION_ID\"" >> $TFENVFILE
|
||||||
|
echo "export ARM_CLIENT_ID =\"$MSI_PRINCIPAL_ID\"" >> $TFENVFILE
|
||||||
|
chmod 755 $TFENVFILE
|
||||||
|
chown $USERNAME:$USERNAME $TFENVFILE
|
||||||
|
|
||||||
|
# create the container for remote state
|
||||||
|
logger -t devvm "Creating the container for remote state"
|
||||||
|
az login --msi
|
||||||
|
az storage container create -n terraform-state --account-name $STORAGE_ACCOUNT_NAME --account-key $STORAGE_ACCOUNT_KEY
|
||||||
|
logger -t devvm "Container for remote state created: $?"
|
||||||
|
|
||||||
|
if [[ -v DESKTOPINSTALL ]]; then
|
||||||
|
echo "Installing Mate Desktop"
|
||||||
|
bash ./desktop.sh
|
||||||
|
echo "Desktop installed"
|
||||||
|
fi
|
Loading…
x
Reference in New Issue
Block a user