-
Notifications
You must be signed in to change notification settings - Fork 7
/
infra-azure-rhel.yaml
201 lines (180 loc) · 7.03 KB
/
infra-azure-rhel.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
---
apiVersion: tekton.dev/v1beta1
kind: Task
metadata:
name: infra-azure-rhel
labels:
app.kubernetes.io/version: "0.8.0-dev"
annotations:
tekton.dev/pipelines.minVersion: "0.44.x"
tekton.dev/categories: infrastructure
tekton.dev/tags: infrastructure, azure
tekton.dev/displayName: "azure manager"
tekton.dev/platforms: "linux/amd64"
spec:
description: |
This task will provision / decomission rhel on azure
The output will give required information to connect within the remote provisioned host
workspaces:
- name: pipelines-data
description: workspace to store outputs to connect within the target machine + state file for the infrastructure
- name: az-credentials
description: |
ocp secret holding the azure credentials. Secret should be accessible to this task.
To be a valid secret it should contains the following fields:
* tenant_id
* subscription_id
* client_id
* client_secret
* storage_account (optional if we use remote az storage)
* storage_key (optional if we use remote az storage)
mountPath: /opt/credentials
- name: rh-account-secret
optional: true
description: |
ocp secret holding the credentials for a valid rh user to subscribe VM. Secret should be accessible to this task.
Sample format for valid Secret
---
apiVersion: v1
kind: Secret
metadata:
name: credentials-${configname}
type: Opaque
data:
user: ${user}
password: ${password}
mountPath: /opt/rh-account-secret
params:
# mapt params
- name: project-name
description: identifier for project.
- name: backed-url
description: |
If we want to backed resources externally we can use az storage setting this param(i.e azblob://existing-storage).
If default will be store on storage workspace at path set by param ws-output-path.
default: "''"
- name: ws-output-path
description: path on workspace where to store ephemeral assets related with the provisioning
- name: operation
description: operation to execute within the infrastructure. Current values (create, destroy)
default: create
# VM type params
- name: arch
description: Architecture for the machine. Allowed x86_64 or arm64 (default "x86_64")
default: 'x86_64'
- name: cpus
description: Number of CPUs for the cloud instance (default 8)
default: '8'
- name: memory
description: Amount of RAM for the cloud instance in GiB (default 64)
default: '64'
- name: nested-virt
description: Use cloud instance that has nested virtualization support
default: 'false'
- name: vmsize
description: size for the machine
default: "''"
- name: spot
description: in case spot is set to true it will check for best spot price and create the VM on the target region
default: 'true'
- name: spot-eviction-tolerance
description: 'if spot is enable we can define the minimum tolerance level of eviction. Allowed value are: lowest, low, medium, high or highest'
default: 'lowest'
# RHEL params
- name: version
description: this task will spin a RHEL image. This param will set the version for it. Default 9.4.
default: '9.4'
- name: profile-snc
description: |
This param will setup RHEL with SNC profile. Setting up all requirements to run https://github.com/crc-org/snc
default: 'false'
# Metadata params
- name: tags
description: tags for the resources created on the providers
default: "''"
# Control params
- name: remove-lock
description: in case a previous run fails the stack can be locked. This value allows to control if remove lock
default: 'true'
results:
- name: host
description: ip to connect to the provisioned machine
- name: username
description: username to connect to the provisioned machine
- name: key
description: filename for the private key. The key is located at ws-output-path
steps:
- name: provisioner
image: quay.io/redhat-developer/mapt:v0.8.0-dev
imagePullPolicy: Always
script: |
#!/bin/sh
# Added verbosity
set -xuo
# Credentials
export ARM_TENANT_ID=$(cat /opt/credentials/tenant_id)
export ARM_SUBSCRIPTION_ID=$(cat /opt/credentials/subscription_id)
export ARM_CLIENT_ID=$(cat /opt/credentials/client_id)
export ARM_CLIENT_SECRET=$(cat /opt/credentials/client_secret)
if ! [ -f /opt/credentials/storage_account ]; then
export AZURE_STORAGE_ACCOUNT=$(cat /opt/credentials/storage_account)
fi
if ! [ -f /opt/credentials/storage_key ]; then
export AZURE_STORAGE_KEY=$(cat /opt/credentials/storage_key)
fi
# Output folder
workspace_path=$(workspaces.pipelines-data.path)/$(params.ws-output-path)
mkdir -p ${workspace_path}
# Remove lock
if [[ $(params.remove-lock) == "true" ]]; then
rm -rf ${workspace_path}/.pulumi/locks/*
fi
# Run mapt
cmd="mapt azure rhel $(params.operation) "
cmd="$cmd --project-name $(params.project-name) "
if [[ $(params.backed-url) != "" ]]; then
cmd="$cmd --backed-url $(params.backed-url) "
else
cmd="$cmd --backed-url file://${workspace_path} "
fi
if [[ $(params.operation) == "create" ]]; then
cmd="$cmd --conn-details-output ${workspace_path} "
cmd="$cmd --arch $(params.arch) "
cmd="$cmd --cpus $(params.cpus) "
cmd="$cmd --memory $(params.memory) "
if [[ $(params.nested-virt) == "true" ]]; then
cmd="$cmd --nested-virt "
fi
if [[ $(params.vmsize) != "" ]]; then
cmd="$cmd --vmsize $(params.vmsize) "
fi
cmd="$cmd --version $(params.version) "
if [[ $(params.spot) == "true" ]]; then
cmd="$cmd --spot "
cmd="$cmd --spot-eviction-tolerance $(params.spot-eviction-tolerance) "
fi
cmd="$cmd --rh-subscription-username $(cat /opt/rh-account-secret/user) "
cmd="$cmd --rh-subscription-password $(cat /opt/rh-account-secret/password) "
if [[ $(params.profile-snc) == "true" ]]; then
cmd="$cmd --snc "
fi
if [[ $(params.tags) != "" ]]; then
cmd="$cmd --tags $(params.tags) "
fi
fi
eval "${cmd}"
create_exit_code=$?
# set task results
cat "${workspace_path}/host" | tee $(results.host.path)
cat "${workspace_path}/username" | tee $(results.username.path)
echo -n "id_rsa" | tee $(results.key.path)
if [[ ${create_exit_code} -ne 0 ]]; then
exit 1
fi
resources:
requests:
memory: "200Mi"
cpu: "100m"
limits:
memory: "600Mi"
cpu: "300m"