This commit is contained in:
Thomas Boerger 2016-12-14 14:43:27 +01:00 коммит произвёл Lunny Xiao
Родитель 695010da15
Коммит a3b4a0ee84
23 изменённых файлов: 751 добавлений и 297 удалений

Просмотреть файл

@ -1,9 +1,3 @@
root_sshkeys: |
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNxqUBNvl59j7Xkw3I1rXkiz0LWNvOK2KFFgLB4C101xv6C/UGjCJPlAWYl5lrTokICqi8fmLkVzAuhhGaPs28Eo55lARl1uZoTSuuobKaZHc/SZzIqn2NgSYV9WNzskpo8IkN2K5DWCYr73x6tskJ5BT9hcXWaPRb8s7dEPnw7NduhMroqlNBFgCwIgkYrjjNNIEZt5G5q2aYFLmIRRZ1JimuAJBlmQJCw+W049tjjNUKY4f2Fm9zIbktPZvSgT2kRvMWxUc8KR1kyzMVaDgqFJKQFjEoZ3kKTfkf3FV2O6tIZHA9fnRYABQy+7HAjRRFcVEu7usu12BKZ0QHKhWT lunny@gitea.io
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCianSaWiFmKklsBv1GlN2wLx9MTfVqjUHSKyYz54AbCBBpXzOx6mrc86DiNuYHmCGDJAHywtCEQfZQTC0gqI62bKhjtI7tVo3Pp47cpAYLX8i4DR5YOHDTZTBRrLAsoACu+Cv905LD/R7FAtR5rKDXl8706HS0ftIiB1bsOBaH2UMIKZHfKg2swR4uMRsLec8GC4lZ5G1kVbtuT9jor7lvWPABstdp7eAe7Ty6/K0HvAo9IXdPdIbKUxVAkwpYnCsh+Ri4AFwWSnDTpBp/w2v4MarhMFno3Qm+3Kqusug1V8/XxsxPD1PVPVZnRocbuocTcuB1uhyWMYh29x7hN6bp bkc@gitea.io
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2Sovl8XfHqhiAo1GQpsJ/Z8YMvs+xPt1NMsHa5mqAtaMSGsaxIgfpL80+oSX7/itHZJfi7OcRz7R8LzJfy6WKMZUzSkkXXZlxYT328qlMzRPOtkyDWBgIY7ArcDkiyY2MFnbv5uIgilpRKFxFNxx7TuUucOmrB9SHTINy1rDiLHbvZTyJH83WVRo8V6+2JB1N1hyBWbsLNRL9VTAb3v1RvRaDUq92HJqLN77SrxHitst/7PnSimIdnPN04pogP8bDqD/XVL08ZAOXgIQvXqHIC6V+UebLSw18tw/Iac7rYNyYo949NnzQCZ0lB3/yi+L/3Hq9rpiDp3GmANQRRcBN bkc@gitea.io
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9WgmBjn7jlFzAz7QPE5p3F+wG2Dbcg616J/vQk1e0Z4hlRSejoFoA9JVV8IuKBdXYDCieqctvbd01S/5dyDOq8rIoyLa1vfYAqkztzShjZ91WAnv8JOU2o5YC1HtiSKP4ygDzTztr97L1Mv29S3RM1ZFjiNo/0gncMK2uI7z9BgzTXkHEvWPqOy+ca8f6HFVDTL5wfer1oY0gkj4fbYdHclpFrMQh0WBI/Z4YvZz7oRmJHajyRfmTu5X/iLsFk8daP+O7wJpQPwKsefczZmrHyKLC4DgrcHEBzvfyfRa/MQNdJZ+ohayomX51xpsAfBOb4AlJbM7o2SgyJcnfolK7 bkc@gitea.io
root_castles:
- tboerger/homeshick-base
- tboerger/homeshick-vim

Просмотреть файл

Просмотреть файл

Просмотреть файл

@ -1,2 +1,3 @@
[server]
laozi ansible_user=root ansible_host=laozi.gitea.io
dchi ansible_user=root ansible_host=dchi.gitea.io ansible_port=22022
pangu ansible_user=root ansible_host=pangu.gitea.io ansible_port=22022

Просмотреть файл

@ -1,18 +1,33 @@
- hosts: server
gather_facts: False
tasks:
- name: bootstrap
raw: test -e /usr/bin/python || (apt -y update && apt install -y python-minimal)
changed_when: False
- hosts: server
roles:
- base
- root
- users
- docker
- watchtower
- docker-gc
- traefik
- hosts: dchi
roles:
- demo
- hosts: pangu
roles:
- lgtm
- coverage
- drone
- minio
- website
- docs
- blog
- code
- downloads
- lgtm
- coverage
- drone
- minio
- watchtower
- docker-gc

Просмотреть файл

@ -1,3 +1,5 @@
base_packages:
- apt-transport-https
- software-properties-common
- htop
- tree

Просмотреть файл

@ -0,0 +1,2 @@
demo_domain: try.gitea.io
demo_container: gitea/gitea:latest

Просмотреть файл

@ -0,0 +1,5 @@
- name: restart demo
systemd:
name: demo
state: restarted
daemon_reload: yes

Просмотреть файл

@ -0,0 +1,21 @@
- name: service
notify:
- restart demo
template:
src: service.j2
dest: /etc/systemd/system/demo.service
- name: default
notify:
- restart demo
template:
src: default.j2
dest: /etc/default/demo
- name: start
systemd:
name: demo
state: started
daemon_reload: yes
masked: no
enabled: yes

Просмотреть файл

Просмотреть файл

@ -0,0 +1,26 @@
[Unit]
Description=Demo
Requires=docker.service
After=docker.service
[Service]
Restart=always
EnvironmentFile=/etc/default/demo
ExecStop=/bin/sh -c '/usr/bin/docker ps | /bin/grep %p 1> /dev/null && /usr/bin/docker stop %p || true'
ExecStartPre=/bin/sh -c '/usr/bin/docker ps | /bin/grep %p 1> /dev/null && /usr/bin/docker kill %p || true'
ExecStartPre=/bin/sh -c '/usr/bin/docker ps -a | /bin/grep %p 1> /dev/null && /usr/bin/docker rm %p || true'
ExecStartPre=/usr/bin/docker pull {{ demo_container }}
ExecStart=/usr/bin/docker run --rm \
--name %p \
--hostname {{ demo_domain }} \
--label traefik.frontend.rule=Host:{{ demo_domain }} \
--label traefik.port=3000 \
--volume /var/lib/gitea:/data \
--publish 22:22 \
{{ demo_container }}
[Install]
WantedBy=multi-user.target

Просмотреть файл

@ -8,7 +8,7 @@ After=docker.service
Restart=always
EnvironmentFile=/etc/default/secrets
EnvironmentFile=/etc/default/coverage
EnvironmentFile=/etc/default/minio
ExecStop=/bin/sh -c '/usr/bin/docker ps | /bin/grep %p 1> /dev/null && /usr/bin/docker stop %p || true'
ExecStartPre=/bin/sh -c '/usr/bin/docker ps | /bin/grep %p 1> /dev/null && /usr/bin/docker kill %p || true'
ExecStartPre=/bin/sh -c '/usr/bin/docker ps -a | /bin/grep %p 1> /dev/null && /usr/bin/docker rm %p || true'

Двоичные данные
docs/terraform.png

Двоичный файл не отображается.

До

Ширина:  |  Высота:  |  Размер: 125 KiB

После

Ширина:  |  Высота:  |  Размер: 123 KiB

50
templates/user_data.yml Normal file
Просмотреть файл

@ -0,0 +1,50 @@
#cloud-config
write_files:
- path: /etc/ssh/sshd_config
content: |
Port ${ssh_port}
Protocol 2
AddressFamily any
ListenAddress 0.0.0.0
ListenAddress ::
SyslogFacility AUTH
LogLevel INFO
HostKey /etc/ssh/ssh_host_ed25519_key
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
KeyRegenerationInterval 3600
ServerKeyBits 1024
LoginGraceTime 120
UseDNS no
AllowAgentForwarding no
AllowTcpForwarding no
PrintMotd no
PrintLastLog no
PermitUserEnvironment yes
PermitRootLogin yes
ChallengeResponseAuthentication no
PasswordAuthentication no
PermitEmptyPasswords no
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
IgnoreRhosts yes
RhostsRSAAuthentication no
HostbasedAuthentication no
TCPKeepAlive yes
UsePrivilegeSeparation yes
X11Forwarding yes
X11DisplayOffset 10
AcceptEnv LANG LC_*
AuthorizedKeysFile %h/.ssh/authorized_keys
Banner none
Subsystem sftp /usr/lib/openssh/sftp-server

34
terraform/demos.tf Normal file
Просмотреть файл

@ -0,0 +1,34 @@
resource "digitalocean_droplet" "demo" {
count = "${var.demo_count}"
name = "${lookup(var.demo_names, count.index)}"
image = "${lookup(var.demo_images, count.index)}"
region = "${lookup(var.demo_regions, count.index)}"
size = "${lookup(var.demo_sizes, count.index)}"
user_data = "${data.template_file.user_data.rendered}"
ssh_keys = ["${digitalocean_ssh_key.owners.*.id}"]
ipv6 = true
backups = false
private_networking = false
resize_disk = false
}
resource "cloudflare_record" "demov4" {
count = "${var.demo_count}"
name = "${lookup(var.demo_names, count.index)}"
domain = "${var.cloudflare_domain}"
value = "${element(digitalocean_droplet.demo.*.ipv4_address, count.index)}"
type = "A"
}
resource "cloudflare_record" "demov6" {
count = "${var.demo_count}"
name = "${lookup(var.demo_names, count.index)}"
domain = "${var.cloudflare_domain}"
value = "${element(digitalocean_droplet.demo.*.ipv6_address, count.index)}"
type = "AAAA"
}

Просмотреть файл

@ -1,86 +1,90 @@
resource "cloudflare_record" "servers" {
count = "${var.server_count}"
domain = "${var.cloudflare_domain}"
name = "server"
value = "${element(scaleway_ip.server.*.ip, count.index)}"
type = "A"
}
resource "cloudflare_record" "server" {
count = "${var.server_count}"
domain = "${var.cloudflare_domain}"
name = "${lookup(var.server_names, count.index)}"
value = "${element(scaleway_ip.server.*.ip, count.index)}"
type = "A"
}
resource "cloudflare_record" "blog" {
domain = "${var.cloudflare_domain}"
name = "blog"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "docs" {
domain = "${var.cloudflare_domain}"
name = "docs"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "dl" {
domain = "${var.cloudflare_domain}"
name = "dl"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "storage" {
domain = "${var.cloudflare_domain}"
name = "storage"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "code" {
domain = "${var.cloudflare_domain}"
name = "code"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "lgtm" {
domain = "${var.cloudflare_domain}"
name = "lgtm"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "coverage" {
domain = "${var.cloudflare_domain}"
name = "coverage"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "drone" {
domain = "${var.cloudflare_domain}"
name = "drone"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "gitea" {
domain = "${var.cloudflare_domain}"
name = "@"
value = "${cloudflare_record.servers.hostname}"
type = "CNAME"
}
resource "cloudflare_record" "mx" {
domain = "${var.cloudflare_domain}"
name = "@"
value = "${var.mail_domain}"
type = "MX"
priority = 10
proxied = false
}
resource "cloudflare_record" "gitea" {
domain = "${var.cloudflare_domain}"
name = "@"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = true
}
resource "cloudflare_record" "blog" {
domain = "${var.cloudflare_domain}"
name = "blog"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = true
}
resource "cloudflare_record" "docs" {
domain = "${var.cloudflare_domain}"
name = "docs"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = true
}
resource "cloudflare_record" "dl" {
domain = "${var.cloudflare_domain}"
name = "dl"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = true
}
resource "cloudflare_record" "code" {
domain = "${var.cloudflare_domain}"
name = "code"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = true
}
resource "cloudflare_record" "storage" {
domain = "${var.cloudflare_domain}"
name = "storage"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = false
}
resource "cloudflare_record" "lgtm" {
domain = "${var.cloudflare_domain}"
name = "lgtm"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = false
}
resource "cloudflare_record" "coverage" {
domain = "${var.cloudflare_domain}"
name = "coverage"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = false
}
resource "cloudflare_record" "drone" {
domain = "${var.cloudflare_domain}"
name = "drone"
value = "${lookup(var.server_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = false
}
resource "cloudflare_record" "try" {
domain = "${var.cloudflare_domain}"
name = "try"
value = "${lookup(var.demo_names, 0)}.${var.cloudflare_domain}"
type = "CNAME"
proxied = false
depends_on = ["digitalocean_droplet.demo"]
}

Просмотреть файл

@ -1,7 +1,23 @@
output "server_ips" {
value = "${join(" ", scaleway_ip.server.*.ip)}"
output "demo_ipv4" {
value = "${join(" ", digitalocean_droplet.demo.*.ipv4_address)}"
}
output "demo_ipv6" {
value = "${join(" ", digitalocean_droplet.demo.*.ipv6_address)}"
}
output "demo_names" {
value = "${join(" ", cloudflare_record.demov4.*.hostname)}"
}
output "server_ipv4" {
value = "${join(" ", digitalocean_droplet.server.*.ipv4_address)}"
}
output "server_ipv6" {
value = "${join(" ", digitalocean_droplet.server.*.ipv6_address)}"
}
output "server_names" {
value = "${join(" ", cloudflare_record.server.*.hostname)}"
value = "${join(" ", cloudflare_record.serverv4.*.hostname)}"
}

Просмотреть файл

@ -1,7 +1,5 @@
provider "scaleway" {
access_key = "${var.scaleway_access}"
organization = "${var.scaleway_org}"
region = "${var.scaleway_region}"
provider "digitalocean" {
token = "${var.do_token}"
}
provider "cloudflare" {

Просмотреть файл

@ -1,30 +1,34 @@
data "scaleway_image" "server" {
architecture = "x86_64"
name = "${var.server_image}"
resource "digitalocean_droplet" "server" {
count = "${var.server_count}"
name = "${lookup(var.server_names, count.index)}"
image = "${lookup(var.server_images, count.index)}"
region = "${lookup(var.server_regions, count.index)}"
size = "${lookup(var.server_sizes, count.index)}"
user_data = "${data.template_file.user_data.rendered}"
ssh_keys = ["${digitalocean_ssh_key.owners.*.id}"]
ipv6 = true
backups = true
private_networking = false
resize_disk = false
}
data "scaleway_bootscript" "server" {
architecture = "x86_64"
name_filter = "docker"
resource "cloudflare_record" "serverv4" {
count = "${var.server_count}"
name = "${lookup(var.server_names, count.index)}"
domain = "${var.cloudflare_domain}"
value = "${element(digitalocean_droplet.server.*.ipv4_address, count.index)}"
type = "A"
}
resource "scaleway_server" "server" {
count = "${var.server_count}"
name = "${lookup(var.server_names, count.index)}"
image = "${data.scaleway_image.server.id}"
bootscript = "${data.scaleway_bootscript.server.id}"
type = "${var.server_type}"
tags = "${var.server_tags}"
enable_ipv6 = false
dynamic_ip_required = false
resource "cloudflare_record" "serverv6" {
count = "${var.server_count}"
name = "${lookup(var.server_names, count.index)}"
volume {
size_in_gb = 150
type = "l_ssd"
}
}
resource "scaleway_ip" "server" {
count = "${var.server_count}"
server = "${element(scaleway_server.server.*.id, count.index)}"
domain = "${var.cloudflare_domain}"
value = "${element(digitalocean_droplet.server.*.ipv6_address, count.index)}"
type = "AAAA"
}

6
terraform/sshkeys.tf Normal file
Просмотреть файл

@ -0,0 +1,6 @@
resource "digitalocean_ssh_key" "owners" {
count = "${length(var.ssh_keys)}"
name = "${element(keys(var.ssh_keys), count.index)}"
public_key = "${element(values(var.ssh_keys), count.index)}"
}

7
terraform/templates.tf Normal file
Просмотреть файл

@ -0,0 +1,7 @@
data "template_file" "user_data" {
template = "${file("../templates/user_data.yml")}"
vars {
ssh_port = "${var.ssh_port}"
}
}

Просмотреть файл

@ -1,43 +1,61 @@
{
"version": 3,
"terraform_version": "0.7.8",
"serial": 7,
"lineage": "642cadd1-0607-4014-ae4c-f9e3d396fbf4",
"serial": 6,
"lineage": "0af194e8-1acd-47d1-965b-b7ca65772f1f",
"modules": [
{
"path": [
"root"
],
"outputs": {
"server_ips": {
"demo_ipv4": {
"sensitive": false,
"type": "string",
"value": "51.15.46.244"
"value": "159.203.182.191"
},
"demo_ipv6": {
"sensitive": false,
"type": "string",
"value": "2604:a880:0400:00d0:0000:0000:10a0:5001"
},
"demo_names": {
"sensitive": false,
"type": "string",
"value": "dchi.gitea.io"
},
"server_ipv4": {
"sensitive": false,
"type": "string",
"value": "192.241.136.132"
},
"server_ipv6": {
"sensitive": false,
"type": "string",
"value": "2604:a880:0400:00d0:0000:0000:10a0:4001"
},
"server_names": {
"sensitive": false,
"type": "string",
"value": "laozi.gitea.io"
"value": "pangu.gitea.io"
}
},
"resources": {
"cloudflare_record.blog": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "c44e777b05fbef82e7cda40fe2ea697c",
"id": "1bd06ba90eeaf7cc4185bc7bf60a894b",
"attributes": {
"domain": "gitea.io",
"hostname": "blog.gitea.io",
"id": "c44e777b05fbef82e7cda40fe2ea697c",
"id": "1bd06ba90eeaf7cc4185bc7bf60a894b",
"name": "blog",
"priority": "0",
"proxied": "false",
"proxied": "true",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -50,21 +68,19 @@
},
"cloudflare_record.code": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "3eb8df49fe50ca5ca051ff6c434a84cd",
"id": "6b7bb500b398e1a82ef739f90fd836f1",
"attributes": {
"domain": "gitea.io",
"hostname": "code.gitea.io",
"id": "3eb8df49fe50ca5ca051ff6c434a84cd",
"id": "6b7bb500b398e1a82ef739f90fd836f1",
"name": "code",
"priority": "0",
"proxied": "false",
"proxied": "true",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -77,21 +93,73 @@
},
"cloudflare_record.coverage": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "3168dd2a8ce7fde96c29578724ec679e",
"id": "903c4ddb252e4d760588cc0653e48e8d",
"attributes": {
"domain": "gitea.io",
"hostname": "coverage.gitea.io",
"id": "3168dd2a8ce7fde96c29578724ec679e",
"id": "903c4ddb252e4d760588cc0653e48e8d",
"name": "coverage",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": ""
},
"cloudflare_record.demov4": {
"type": "cloudflare_record",
"depends_on": [
"digitalocean_droplet.demo"
],
"primary": {
"id": "0ff0d654a467b497295d7e0cc6c1aa5f",
"attributes": {
"domain": "gitea.io",
"hostname": "dchi.gitea.io",
"id": "0ff0d654a467b497295d7e0cc6c1aa5f",
"name": "dchi",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "A",
"value": "159.203.182.191",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": ""
},
"cloudflare_record.demov6": {
"type": "cloudflare_record",
"depends_on": [
"digitalocean_droplet.demo"
],
"primary": {
"id": "a6567783fcd88203765b851f5b649c85",
"attributes": {
"domain": "gitea.io",
"hostname": "dchi.gitea.io",
"id": "a6567783fcd88203765b851f5b649c85",
"name": "dchi",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "AAAA",
"value": "2604:a880:0400:00d0:0000:0000:10a0:5001",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -104,21 +172,19 @@
},
"cloudflare_record.dl": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "53936cda81a81b6243ffcca86a36d5f8",
"id": "0f0585cc3687c7820c93c3c6fc03d509",
"attributes": {
"domain": "gitea.io",
"hostname": "dl.gitea.io",
"id": "53936cda81a81b6243ffcca86a36d5f8",
"id": "0f0585cc3687c7820c93c3c6fc03d509",
"name": "dl",
"priority": "0",
"proxied": "false",
"proxied": "true",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -131,21 +197,19 @@
},
"cloudflare_record.docs": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "c3311f8cd7d1955be5fa8f024796b363",
"id": "d39af87a4e625163a2386c6b24e3ca82",
"attributes": {
"domain": "gitea.io",
"hostname": "docs.gitea.io",
"id": "c3311f8cd7d1955be5fa8f024796b363",
"id": "d39af87a4e625163a2386c6b24e3ca82",
"name": "docs",
"priority": "0",
"proxied": "false",
"proxied": "true",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -158,21 +222,19 @@
},
"cloudflare_record.drone": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "39863a1e1fcc15d98afacc9c53fd995d",
"id": "0ac7962b56acad986c20ae8d609b81e9",
"attributes": {
"domain": "gitea.io",
"hostname": "drone.gitea.io",
"id": "39863a1e1fcc15d98afacc9c53fd995d",
"id": "0ac7962b56acad986c20ae8d609b81e9",
"name": "drone",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -185,21 +247,19 @@
},
"cloudflare_record.gitea": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "551ca83335633b0ef17ae19dccdaf251",
"id": "4bb1e977244df4d4f84d0c7902ad9fd1",
"attributes": {
"domain": "gitea.io",
"hostname": "gitea.io",
"id": "551ca83335633b0ef17ae19dccdaf251",
"id": "4bb1e977244df4d4f84d0c7902ad9fd1",
"name": "@",
"priority": "0",
"proxied": "false",
"proxied": "true",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -212,21 +272,19 @@
},
"cloudflare_record.lgtm": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "44e83548f89d3b6870816d29ba1137b3",
"id": "4c5bdd9dace1ae578ce7a9c4d632c4c5",
"attributes": {
"domain": "gitea.io",
"hostname": "lgtm.gitea.io",
"id": "44e83548f89d3b6870816d29ba1137b3",
"id": "4c5bdd9dace1ae578ce7a9c4d632c4c5",
"name": "lgtm",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -241,11 +299,11 @@
"type": "cloudflare_record",
"depends_on": [],
"primary": {
"id": "c25e906b2b17e0ee5ee393d44e6388ee",
"id": "41ec8909b9f8de5fca1a2ba0a8440cb7",
"attributes": {
"domain": "gitea.io",
"hostname": "gitea.io",
"id": "c25e906b2b17e0ee5ee393d44e6388ee",
"id": "41ec8909b9f8de5fca1a2ba0a8440cb7",
"name": "@",
"priority": "10",
"proxied": "false",
@ -262,23 +320,23 @@
"deposed": [],
"provider": ""
},
"cloudflare_record.server": {
"cloudflare_record.serverv4": {
"type": "cloudflare_record",
"depends_on": [
"scaleway_ip.server"
"digitalocean_droplet.server"
],
"primary": {
"id": "ccc1ee83cd5000a173609f8102fd6ccf",
"id": "fe648d477854d034e035b70e25dac9be",
"attributes": {
"domain": "gitea.io",
"hostname": "laozi.gitea.io",
"id": "ccc1ee83cd5000a173609f8102fd6ccf",
"name": "laozi",
"hostname": "pangu.gitea.io",
"id": "fe648d477854d034e035b70e25dac9be",
"name": "pangu",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "A",
"value": "51.15.46.244",
"value": "192.241.136.132",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -289,23 +347,23 @@
"deposed": [],
"provider": ""
},
"cloudflare_record.servers": {
"cloudflare_record.serverv6": {
"type": "cloudflare_record",
"depends_on": [
"scaleway_ip.server"
"digitalocean_droplet.server"
],
"primary": {
"id": "18ed759fc5a7ce5489692d03f8a38e49",
"id": "2935a55dd9cd98f0e5bfa1534316fcd7",
"attributes": {
"domain": "gitea.io",
"hostname": "server.gitea.io",
"id": "18ed759fc5a7ce5489692d03f8a38e49",
"name": "server",
"hostname": "pangu.gitea.io",
"id": "2935a55dd9cd98f0e5bfa1534316fcd7",
"name": "pangu",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "A",
"value": "51.15.46.244",
"type": "AAAA",
"value": "2604:a880:0400:00d0:0000:0000:10a0:4001",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -318,21 +376,19 @@
},
"cloudflare_record.storage": {
"type": "cloudflare_record",
"depends_on": [
"cloudflare_record.servers"
],
"depends_on": [],
"primary": {
"id": "fd0d1d33a4b4ff570c4ae40615d796e8",
"id": "6515c00ec63cdcdd8b2d22c06e9e60e2",
"attributes": {
"domain": "gitea.io",
"hostname": "storage.gitea.io",
"id": "fd0d1d33a4b4ff570c4ae40615d796e8",
"id": "6515c00ec63cdcdd8b2d22c06e9e60e2",
"name": "storage",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "CNAME",
"value": "server.gitea.io",
"value": "pangu.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
@ -343,57 +399,44 @@
"deposed": [],
"provider": ""
},
"data.scaleway_bootscript.server": {
"type": "scaleway_bootscript",
"depends_on": [],
"primary": {
"id": "61648cb3-193d-41cf-bc20-9530fc3a659f",
"attributes": {
"architecture": "x86_64",
"boot_cmd_args": "LINUX_COMMON ip=:::::eth0: boot=local",
"dtb": "",
"id": "61648cb3-193d-41cf-bc20-9530fc3a659f",
"initrd": "http://169.254.42.24/initrd/initrd-Linux-x86_64-v3.12.gz",
"kernel": "http://169.254.42.24/kernel/x86_64-4.8.3-docker-1/vmlinuz-4.8.3-docker-1",
"name_filter": "docker",
"organization": "11111111-1111-4111-8111-111111111111",
"public": "true"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"data.scaleway_image.server": {
"type": "scaleway_image",
"depends_on": [],
"primary": {
"id": "69eb9e7e-f70f-453d-b0cf-088a94e09ef3",
"attributes": {
"architecture": "x86_64",
"creation_date": "2016-04-22T13:27:33.769932+00:00",
"id": "69eb9e7e-f70f-453d-b0cf-088a94e09ef3",
"name": "Ubuntu Xenial",
"public": "true"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"scaleway_ip.server": {
"type": "scaleway_ip",
"cloudflare_record.try": {
"type": "cloudflare_record",
"depends_on": [
"scaleway_server.server"
"digitalocean_droplet.demo"
],
"primary": {
"id": "f228bd15-6f94-45ca-853c-6224956ed7ac",
"id": "03d9442c0bed272c2759303218d29c36",
"attributes": {
"id": "f228bd15-6f94-45ca-853c-6224956ed7ac",
"ip": "51.15.46.244",
"server": "61b62812-63fc-4383-8188-e1a9549d950c"
"domain": "gitea.io",
"hostname": "try.gitea.io",
"id": "03d9442c0bed272c2759303218d29c36",
"name": "try",
"priority": "0",
"proxied": "false",
"ttl": "1",
"type": "CNAME",
"value": "dchi.gitea.io",
"zone_id": "2e9b920df675c8371c0639e71695b4a3"
},
"meta": {
"schema_version": "1"
},
"tainted": false
},
"deposed": [],
"provider": ""
},
"data.template_file.user_data": {
"type": "template_file",
"depends_on": [],
"primary": {
"id": "34a830f40f84116ea7c6c2f5c83fb0a5e9dade50b49bd5fedd6bfd1b18c4e965",
"attributes": {
"id": "34a830f40f84116ea7c6c2f5c83fb0a5e9dade50b49bd5fedd6bfd1b18c4e965",
"rendered": "#cloud-config\n\nwrite_files:\n - path: /etc/ssh/sshd_config\n content: |\n Port 22022\n Protocol 2\n\n AddressFamily any\n ListenAddress 0.0.0.0\n ListenAddress ::\n\n SyslogFacility AUTH\n LogLevel INFO\n\n HostKey /etc/ssh/ssh_host_ed25519_key\n HostKey /etc/ssh/ssh_host_rsa_key\n HostKey /etc/ssh/ssh_host_dsa_key\n HostKey /etc/ssh/ssh_host_ecdsa_key\n\n KeyRegenerationInterval 3600\n ServerKeyBits 1024\n LoginGraceTime 120\n\n UseDNS no\n AllowAgentForwarding no\n AllowTcpForwarding no\n PrintMotd no\n PrintLastLog no\n PermitUserEnvironment yes\n PermitRootLogin yes\n ChallengeResponseAuthentication no\n PasswordAuthentication no\n PermitEmptyPasswords no\n StrictModes yes\n RSAAuthentication yes\n PubkeyAuthentication yes\n IgnoreRhosts yes\n RhostsRSAAuthentication no\n HostbasedAuthentication no\n TCPKeepAlive yes\n UsePrivilegeSeparation yes\n\n X11Forwarding yes\n X11DisplayOffset 10\n\n AcceptEnv LANG LC_*\n AuthorizedKeysFile %h/.ssh/authorized_keys\n Banner none\n Subsystem sftp /usr/lib/openssh/sftp-server\n",
"template": "#cloud-config\n\nwrite_files:\n - path: /etc/ssh/sshd_config\n content: |\n Port ${ssh_port}\n Protocol 2\n\n AddressFamily any\n ListenAddress 0.0.0.0\n ListenAddress ::\n\n SyslogFacility AUTH\n LogLevel INFO\n\n HostKey /etc/ssh/ssh_host_ed25519_key\n HostKey /etc/ssh/ssh_host_rsa_key\n HostKey /etc/ssh/ssh_host_dsa_key\n HostKey /etc/ssh/ssh_host_ecdsa_key\n\n KeyRegenerationInterval 3600\n ServerKeyBits 1024\n LoginGraceTime 120\n\n UseDNS no\n AllowAgentForwarding no\n AllowTcpForwarding no\n PrintMotd no\n PrintLastLog no\n PermitUserEnvironment yes\n PermitRootLogin yes\n ChallengeResponseAuthentication no\n PasswordAuthentication no\n PermitEmptyPasswords no\n StrictModes yes\n RSAAuthentication yes\n PubkeyAuthentication yes\n IgnoreRhosts yes\n RhostsRSAAuthentication no\n HostbasedAuthentication no\n TCPKeepAlive yes\n UsePrivilegeSeparation yes\n\n X11Forwarding yes\n X11DisplayOffset 10\n\n AcceptEnv LANG LC_*\n AuthorizedKeysFile %h/.ssh/authorized_keys\n Banner none\n Subsystem sftp /usr/lib/openssh/sftp-server\n",
"vars.%": "1",
"vars.ssh_port": "22022"
},
"meta": {},
"tainted": false
@ -401,32 +444,202 @@
"deposed": [],
"provider": ""
},
"scaleway_server.server": {
"type": "scaleway_server",
"digitalocean_droplet.demo": {
"type": "digitalocean_droplet",
"depends_on": [
"data.scaleway_bootscript.server",
"data.scaleway_image.server"
"data.template_file.user_data",
"digitalocean_ssh_key.owners"
],
"primary": {
"id": "61b62812-63fc-4383-8188-e1a9549d950c",
"id": "34490779",
"attributes": {
"bootscript": "61648cb3-193d-41cf-bc20-9530fc3a659f",
"dynamic_ip_required": "false",
"enable_ipv6": "false",
"id": "61b62812-63fc-4383-8188-e1a9549d950c",
"image": "69eb9e7e-f70f-453d-b0cf-088a94e09ef3",
"name": "laozi",
"private_ip": "10.8.54.67",
"public_ip": "51.15.46.244",
"state": "running",
"state_detail": "booted",
"tags.#": "1",
"tags.0": "gitea",
"type": "VC1L",
"volume.#": "1",
"volume.0.size_in_gb": "150",
"volume.0.type": "l_ssd",
"volume.0.volume_id": "a92f77fd-8d04-4fde-ab31-6c9cccc597d2"
"backups": "false",
"disk": "30",
"id": "34490779",
"image": "ubuntu-16-04-x64",
"ipv4_address": "159.203.182.191",
"ipv6": "true",
"ipv6_address": "2604:a880:0400:00d0:0000:0000:10a0:5001",
"ipv6_address_private": "",
"locked": "false",
"name": "dchi",
"private_networking": "false",
"region": "nyc1",
"resize_disk": "false",
"size": "1gb",
"ssh_keys.#": "7",
"ssh_keys.0": "5223245",
"ssh_keys.1": "5223239",
"ssh_keys.2": "5223244",
"ssh_keys.3": "5223242",
"ssh_keys.4": "5223243",
"ssh_keys.5": "5223241",
"ssh_keys.6": "5223240",
"status": "active",
"tags.#": "0",
"user_data": "#cloud-config\n\nwrite_files:\n - path: /etc/ssh/sshd_config\n content: |\n Port 22022\n Protocol 2\n\n AddressFamily any\n ListenAddress 0.0.0.0\n ListenAddress ::\n\n SyslogFacility AUTH\n LogLevel INFO\n\n HostKey /etc/ssh/ssh_host_ed25519_key\n HostKey /etc/ssh/ssh_host_rsa_key\n HostKey /etc/ssh/ssh_host_dsa_key\n HostKey /etc/ssh/ssh_host_ecdsa_key\n\n KeyRegenerationInterval 3600\n ServerKeyBits 1024\n LoginGraceTime 120\n\n UseDNS no\n AllowAgentForwarding no\n AllowTcpForwarding no\n PrintMotd no\n PrintLastLog no\n PermitUserEnvironment yes\n PermitRootLogin yes\n ChallengeResponseAuthentication no\n PasswordAuthentication no\n PermitEmptyPasswords no\n StrictModes yes\n RSAAuthentication yes\n PubkeyAuthentication yes\n IgnoreRhosts yes\n RhostsRSAAuthentication no\n HostbasedAuthentication no\n TCPKeepAlive yes\n UsePrivilegeSeparation yes\n\n X11Forwarding yes\n X11DisplayOffset 10\n\n AcceptEnv LANG LC_*\n AuthorizedKeysFile %h/.ssh/authorized_keys\n Banner none\n Subsystem sftp /usr/lib/openssh/sftp-server\n",
"vcpus": "1"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_droplet.server": {
"type": "digitalocean_droplet",
"depends_on": [
"data.template_file.user_data",
"digitalocean_ssh_key.owners"
],
"primary": {
"id": "34490778",
"attributes": {
"backups": "true",
"disk": "80",
"id": "34490778",
"image": "ubuntu-16-04-x64",
"ipv4_address": "192.241.136.132",
"ipv6": "true",
"ipv6_address": "2604:a880:0400:00d0:0000:0000:10a0:4001",
"ipv6_address_private": "",
"locked": "false",
"name": "pangu",
"private_networking": "false",
"region": "nyc1",
"resize_disk": "false",
"size": "8gb",
"ssh_keys.#": "7",
"ssh_keys.0": "5223245",
"ssh_keys.1": "5223239",
"ssh_keys.2": "5223244",
"ssh_keys.3": "5223242",
"ssh_keys.4": "5223243",
"ssh_keys.5": "5223241",
"ssh_keys.6": "5223240",
"status": "active",
"tags.#": "0",
"user_data": "#cloud-config\n\nwrite_files:\n - path: /etc/ssh/sshd_config\n content: |\n Port 22022\n Protocol 2\n\n AddressFamily any\n ListenAddress 0.0.0.0\n ListenAddress ::\n\n SyslogFacility AUTH\n LogLevel INFO\n\n HostKey /etc/ssh/ssh_host_ed25519_key\n HostKey /etc/ssh/ssh_host_rsa_key\n HostKey /etc/ssh/ssh_host_dsa_key\n HostKey /etc/ssh/ssh_host_ecdsa_key\n\n KeyRegenerationInterval 3600\n ServerKeyBits 1024\n LoginGraceTime 120\n\n UseDNS no\n AllowAgentForwarding no\n AllowTcpForwarding no\n PrintMotd no\n PrintLastLog no\n PermitUserEnvironment yes\n PermitRootLogin yes\n ChallengeResponseAuthentication no\n PasswordAuthentication no\n PermitEmptyPasswords no\n StrictModes yes\n RSAAuthentication yes\n PubkeyAuthentication yes\n IgnoreRhosts yes\n RhostsRSAAuthentication no\n HostbasedAuthentication no\n TCPKeepAlive yes\n UsePrivilegeSeparation yes\n\n X11Forwarding yes\n X11DisplayOffset 10\n\n AcceptEnv LANG LC_*\n AuthorizedKeysFile %h/.ssh/authorized_keys\n Banner none\n Subsystem sftp /usr/lib/openssh/sftp-server\n",
"vcpus": "4"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.0": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223245",
"attributes": {
"fingerprint": "ab:61:f7:f7:c9:ea:ac:2a:a7:01:03:e8:5a:3c:51:5f",
"id": "5223245",
"name": "bkc1",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCianSaWiFmKklsBv1GlN2wLx9MTfVqjUHSKyYz54AbCBBpXzOx6mrc86DiNuYHmCGDJAHywtCEQfZQTC0gqI62bKhjtI7tVo3Pp47cpAYLX8i4DR5YOHDTZTBRrLAsoACu+Cv905LD/R7FAtR5rKDXl8706HS0ftIiB1bsOBaH2UMIKZHfKg2swR4uMRsLec8GC4lZ5G1kVbtuT9jor7lvWPABstdp7eAe7Ty6/K0HvAo9IXdPdIbKUxVAkwpYnCsh+Ri4AFwWSnDTpBp/w2v4MarhMFno3Qm+3Kqusug1V8/XxsxPD1PVPVZnRocbuocTcuB1uhyWMYh29x7hN6bp bkc@gitea.io"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.1": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223239",
"attributes": {
"fingerprint": "99:ec:9a:38:01:0b:a8:ef:b9:bd:30:a2:68:5d:5d:cc",
"id": "5223239",
"name": "bkc2",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2Sovl8XfHqhiAo1GQpsJ/Z8YMvs+xPt1NMsHa5mqAtaMSGsaxIgfpL80+oSX7/itHZJfi7OcRz7R8LzJfy6WKMZUzSkkXXZlxYT328qlMzRPOtkyDWBgIY7ArcDkiyY2MFnbv5uIgilpRKFxFNxx7TuUucOmrB9SHTINy1rDiLHbvZTyJH83WVRo8V6+2JB1N1hyBWbsLNRL9VTAb3v1RvRaDUq92HJqLN77SrxHitst/7PnSimIdnPN04pogP8bDqD/XVL08ZAOXgIQvXqHIC6V+UebLSw18tw/Iac7rYNyYo949NnzQCZ0lB3/yi+L/3Hq9rpiDp3GmANQRRcBN bkc@gitea.io"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.2": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223244",
"attributes": {
"fingerprint": "e7:53:11:6e:ee:3b:52:79:26:2e:36:f6:61:6a:e6:3f",
"id": "5223244",
"name": "bkc3",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9WgmBjn7jlFzAz7QPE5p3F+wG2Dbcg616J/vQk1e0Z4hlRSejoFoA9JVV8IuKBdXYDCieqctvbd01S/5dyDOq8rIoyLa1vfYAqkztzShjZ91WAnv8JOU2o5YC1HtiSKP4ygDzTztr97L1Mv29S3RM1ZFjiNo/0gncMK2uI7z9BgzTXkHEvWPqOy+ca8f6HFVDTL5wfer1oY0gkj4fbYdHclpFrMQh0WBI/Z4YvZz7oRmJHajyRfmTu5X/iLsFk8daP+O7wJpQPwKsefczZmrHyKLC4DgrcHEBzvfyfRa/MQNdJZ+ohayomX51xpsAfBOb4AlJbM7o2SgyJcnfolK7 bkc@gitea.io"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.3": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223242",
"attributes": {
"fingerprint": "3f:c0:02:84:fc:c4:31:79:04:89:66:47:ce:63:b9:ba",
"id": "5223242",
"name": "lunny1",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNxqUBNvl59j7Xkw3I1rXkiz0LWNvOK2KFFgLB4C101xv6C/UGjCJPlAWYl5lrTokICqi8fmLkVzAuhhGaPs28Eo55lARl1uZoTSuuobKaZHc/SZzIqn2NgSYV9WNzskpo8IkN2K5DWCYr73x6tskJ5BT9hcXWaPRb8s7dEPnw7NduhMroqlNBFgCwIgkYrjjNNIEZt5G5q2aYFLmIRRZ1JimuAJBlmQJCw+W049tjjNUKY4f2Fm9zIbktPZvSgT2kRvMWxUc8KR1kyzMVaDgqFJKQFjEoZ3kKTfkf3FV2O6tIZHA9fnRYABQy+7HAjRRFcVEu7usu12BKZ0QHKhWT lunny@gitea.io"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.4": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223243",
"attributes": {
"fingerprint": "9d:90:a2:25:e6:cf:06:0a:1f:fb:62:5e:5d:dc:e8:d9",
"id": "5223243",
"name": "tboerger1",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCc1nE4kCs9WXEEbotF+0Rivnr/9I0fc56QLZTqIr4Rsl3iZcvVDgYJmh6rPcl9xKBptNo/jK1EJF/bm2APf6wIU5Q7tNjeIw5IMJnBRBfPdQujXumb1LZMGnQvPT/gHdpVZvPkYlKkBocOJGPG99GZL0FlXXpc4eDYrgCMfCzRFG1SbQWcUdipbJJgELmbiOy7c5eHtb9i51x7g99pC91WnpInuN4pa0AFHwDQpBhS8RSLFEAfWNNs4T3SiYiUUq0lIHBoIoTM8fTTzhshXAlGWuwsZ9c9luEAw+n4QL8oD9a2ycWTJ3JCRK3CC/+J2MqCROSL4zpVA7+PFrloScMV tboerger@gitea.io"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.5": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223241",
"attributes": {
"fingerprint": "22:dd:fe:b7:76:2d:c6:ba:6a:19:b8:fe:b0:69:14:38",
"id": "5223241",
"name": "tboerger2",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1vlBRSgKE2LN6Tbp5pQ4qVVOXlqUnhI4fkEJLCGAGmsQGu5usxNvp9UJq0cGt6Sq1htoDmgIjEZwCE/np8/O7ZQPyHpwOWtUlS4WWiXKW0GYaeoYsuMabMLbuV1CpSZhb93zy7ZLIKUYpP7WHyZmivDaXnYkn2IOu3fvDtTQdXbwlCer96dIQjNE/KEH4/gUXetrLMYYg26gUnSDeHaxGrLQAfA9jNG1EbXiUkx8cFmZLEREHjwkBAHcwZDkqbLvZr+ExAKIVUcSzj1ep5sOrtSpbwxRtmDscviFPruJmsx/Jjl9fMhpZq8lIQb6aQ0qq09KGv1WP4YbLGRItvq9T tboerger@gitea.io"
},
"meta": {},
"tainted": false
},
"deposed": [],
"provider": ""
},
"digitalocean_ssh_key.owners.6": {
"type": "digitalocean_ssh_key",
"depends_on": [],
"primary": {
"id": "5223240",
"attributes": {
"fingerprint": "1b:c1:0d:c1:6a:6b:5a:69:21:14:62:e1:96:3a:e0:b1",
"id": "5223240",
"name": "tboerger3",
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjASyOuvhSdzOeJCC/9crxcuztTY/AeFV7v59wQrCwozS2hPBcy5UJ4li80ly79t2D/ppCsiGDQjxCpMUKq++canqCIRZ1d6/6ylQPZIQw0rCGRHXDIKlc99i3Fz94XD85ZtFdGe2TWq1T2EEgmCRM9dGWq+f5iloRxnoSrCTXpy8JshnO5kMyQovChKzLBKdHIxddBDlEHxvWI0UcvWNuA8J2nrrOfMdMVKdPa5xeveX2V5oW3YClku7b/W6jO1rdkZ0tyl1n+wbETGmWQC+V4HE5qxK0u+Zmyz/4J+82sKQC6uEWbC9dFRslq+84rd4LyCD2467ZmzzV6HcyWJhL tboerger@gitea.io"
},
"meta": {},
"tainted": false

Просмотреть файл

@ -1,16 +1,7 @@
variable "scaleway_access" {
variable "do_token" {
type = "string"
}
variable "scaleway_org" {
type = "string"
}
variable "scaleway_region" {
type = "string"
default = "ams1"
}
variable "cloudflare_email" {
type = "string"
}
@ -29,30 +20,95 @@ variable "mail_domain" {
default = "mx.ym.163.com"
}
variable "demo_count" {
type = "string"
default = "1"
}
variable "demo_images" {
type = "map"
default = {
"0" = "ubuntu-16-04-x64"
}
}
variable "demo_names" {
type = "map"
default = {
"0" = "dchi"
}
}
variable "demo_regions" {
type = "map"
default = {
"0" = "nyc1"
}
}
variable "demo_sizes" {
type = "map"
default = {
"0" = "1gb"
}
}
variable "server_count" {
type = "string"
default = "1"
}
variable "server_image" {
type = "string"
default = "Ubuntu Xenial"
}
variable "server_images" {
type = "map"
variable "server_type" {
type = "string"
default = "VC1L"
}
variable "server_tags" {
type = "list"
default = ["gitea"]
default = {
"0" = "ubuntu-16-04-x64"
}
}
variable "server_names" {
type = "map"
default = {
"0" = "laozi"
"0" = "pangu"
}
}
variable "server_regions" {
type = "map"
default = {
"0" = "nyc1"
}
}
variable "server_sizes" {
type = "map"
default = {
"0" = "8gb"
}
}
variable "ssh_keys" {
type = "map"
default = {
"tboerger1" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCc1nE4kCs9WXEEbotF+0Rivnr/9I0fc56QLZTqIr4Rsl3iZcvVDgYJmh6rPcl9xKBptNo/jK1EJF/bm2APf6wIU5Q7tNjeIw5IMJnBRBfPdQujXumb1LZMGnQvPT/gHdpVZvPkYlKkBocOJGPG99GZL0FlXXpc4eDYrgCMfCzRFG1SbQWcUdipbJJgELmbiOy7c5eHtb9i51x7g99pC91WnpInuN4pa0AFHwDQpBhS8RSLFEAfWNNs4T3SiYiUUq0lIHBoIoTM8fTTzhshXAlGWuwsZ9c9luEAw+n4QL8oD9a2ycWTJ3JCRK3CC/+J2MqCROSL4zpVA7+PFrloScMV tboerger@gitea.io"
"tboerger2" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1vlBRSgKE2LN6Tbp5pQ4qVVOXlqUnhI4fkEJLCGAGmsQGu5usxNvp9UJq0cGt6Sq1htoDmgIjEZwCE/np8/O7ZQPyHpwOWtUlS4WWiXKW0GYaeoYsuMabMLbuV1CpSZhb93zy7ZLIKUYpP7WHyZmivDaXnYkn2IOu3fvDtTQdXbwlCer96dIQjNE/KEH4/gUXetrLMYYg26gUnSDeHaxGrLQAfA9jNG1EbXiUkx8cFmZLEREHjwkBAHcwZDkqbLvZr+ExAKIVUcSzj1ep5sOrtSpbwxRtmDscviFPruJmsx/Jjl9fMhpZq8lIQb6aQ0qq09KGv1WP4YbLGRItvq9T tboerger@gitea.io"
"tboerger3" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjASyOuvhSdzOeJCC/9crxcuztTY/AeFV7v59wQrCwozS2hPBcy5UJ4li80ly79t2D/ppCsiGDQjxCpMUKq++canqCIRZ1d6/6ylQPZIQw0rCGRHXDIKlc99i3Fz94XD85ZtFdGe2TWq1T2EEgmCRM9dGWq+f5iloRxnoSrCTXpy8JshnO5kMyQovChKzLBKdHIxddBDlEHxvWI0UcvWNuA8J2nrrOfMdMVKdPa5xeveX2V5oW3YClku7b/W6jO1rdkZ0tyl1n+wbETGmWQC+V4HE5qxK0u+Zmyz/4J+82sKQC6uEWbC9dFRslq+84rd4LyCD2467ZmzzV6HcyWJhL tboerger@gitea.io"
"bkc1" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCianSaWiFmKklsBv1GlN2wLx9MTfVqjUHSKyYz54AbCBBpXzOx6mrc86DiNuYHmCGDJAHywtCEQfZQTC0gqI62bKhjtI7tVo3Pp47cpAYLX8i4DR5YOHDTZTBRrLAsoACu+Cv905LD/R7FAtR5rKDXl8706HS0ftIiB1bsOBaH2UMIKZHfKg2swR4uMRsLec8GC4lZ5G1kVbtuT9jor7lvWPABstdp7eAe7Ty6/K0HvAo9IXdPdIbKUxVAkwpYnCsh+Ri4AFwWSnDTpBp/w2v4MarhMFno3Qm+3Kqusug1V8/XxsxPD1PVPVZnRocbuocTcuB1uhyWMYh29x7hN6bp bkc@gitea.io"
"bkc2" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2Sovl8XfHqhiAo1GQpsJ/Z8YMvs+xPt1NMsHa5mqAtaMSGsaxIgfpL80+oSX7/itHZJfi7OcRz7R8LzJfy6WKMZUzSkkXXZlxYT328qlMzRPOtkyDWBgIY7ArcDkiyY2MFnbv5uIgilpRKFxFNxx7TuUucOmrB9SHTINy1rDiLHbvZTyJH83WVRo8V6+2JB1N1hyBWbsLNRL9VTAb3v1RvRaDUq92HJqLN77SrxHitst/7PnSimIdnPN04pogP8bDqD/XVL08ZAOXgIQvXqHIC6V+UebLSw18tw/Iac7rYNyYo949NnzQCZ0lB3/yi+L/3Hq9rpiDp3GmANQRRcBN bkc@gitea.io"
"bkc3" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9WgmBjn7jlFzAz7QPE5p3F+wG2Dbcg616J/vQk1e0Z4hlRSejoFoA9JVV8IuKBdXYDCieqctvbd01S/5dyDOq8rIoyLa1vfYAqkztzShjZ91WAnv8JOU2o5YC1HtiSKP4ygDzTztr97L1Mv29S3RM1ZFjiNo/0gncMK2uI7z9BgzTXkHEvWPqOy+ca8f6HFVDTL5wfer1oY0gkj4fbYdHclpFrMQh0WBI/Z4YvZz7oRmJHajyRfmTu5X/iLsFk8daP+O7wJpQPwKsefczZmrHyKLC4DgrcHEBzvfyfRa/MQNdJZ+ohayomX51xpsAfBOb4AlJbM7o2SgyJcnfolK7 bkc@gitea.io"
"lunny1" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNxqUBNvl59j7Xkw3I1rXkiz0LWNvOK2KFFgLB4C101xv6C/UGjCJPlAWYl5lrTokICqi8fmLkVzAuhhGaPs28Eo55lARl1uZoTSuuobKaZHc/SZzIqn2NgSYV9WNzskpo8IkN2K5DWCYr73x6tskJ5BT9hcXWaPRb8s7dEPnw7NduhMroqlNBFgCwIgkYrjjNNIEZt5G5q2aYFLmIRRZ1JimuAJBlmQJCw+W049tjjNUKY4f2Fm9zIbktPZvSgT2kRvMWxUc8KR1kyzMVaDgqFJKQFjEoZ3kKTfkf3FV2O6tIZHA9fnRYABQy+7HAjRRFcVEu7usu12BKZ0QHKhWT lunny@gitea.io"
}
}
variable "ssh_port" {
type = "string"
default = "22022"
}