Makefile: sync with infra-template repo

This commit is contained in:
Jakub Sokołowski 2024-10-21 16:19:03 +02:00
parent d2e1b8f880
commit 359f33316c
No known key found for this signature in database
GPG Key ID: FE65CD384D5BF7B4
6 changed files with 65 additions and 28 deletions

1
.envrc
View File

@ -2,5 +2,6 @@ if ! has nix_direnv_version || ! nix_direnv_version 3.0.6; then
source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/3.0.6/direnvrc" "sha256-RYcUJaRMf8oF5LznDrlCXbkOQrywm0HDv1VjYGaJGdM=" source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/3.0.6/direnvrc" "sha256-RYcUJaRMf8oF5LznDrlCXbkOQrywm0HDv1VjYGaJGdM="
fi fi
source .envrc.fixes
source .envrc.secrets source .envrc.secrets
use flake use flake

4
.envrc.fixes Normal file
View File

@ -0,0 +1,4 @@
# Fixing macOS issue:
# objc[33642]: +[__NSPlaceholderDate initialize] may have been in progress in another thread when fork() was called.
# See: https://github.com/ansible/ansible/issues/49207
export OBJC_DISABLE_INITIALIZE_FORK_SAFETY=YES

View File

@ -3,3 +3,7 @@ export VAULT_CLIENT_CERT=./ansible/files/vault-client-user.crt
export VAULT_CLIENT_KEY=./ansible/files/vault-client-user.key export VAULT_CLIENT_KEY=./ansible/files/vault-client-user.key
export VAULT_ADDR=https://vault-api.infra.status.im:8200 export VAULT_ADDR=https://vault-api.infra.status.im:8200
export CONSUL_HTTP_TOKEN=$(pass services/consul/tokens/terraform) export CONSUL_HTTP_TOKEN=$(pass services/consul/tokens/terraform)
# Provide a script in your PATH matching this name to load the token.
if command -v vault_token_provider >/dev/null; then
export VAULT_TOKEN=$(vault_token_provider)
fi

View File

@ -1,32 +1,40 @@
OS = $(strip $(shell uname -s)) # Colors
YLW = \033[1;33m
RED = \033[0;31m
GRN = \033[0;32m
BLU = \033[0;34m
BLD = \033[1m
RST = \033[0m
ifeq ($(OS),Darwin) OS = $(shell uname -s | tr A-Z a-z)
ARCH = darwin_amd64 ARCH = "${OS}-$(shell uname -m)"
ifeq ($(OS),darwin)
PROVISIONER_SHA1 = bd688a503f526beedaf6ef5d2dba1128051573b6 PROVISIONER_SHA1 = bd688a503f526beedaf6ef5d2dba1128051573b6
else else
ARCH = linux_amd64 PROVISIONER_SHA1 = 1cbdf2bafe9e968a039264a6d3e6b58a2d2576eb
PROVISIONER_SHA1 = da9cdf019d8f860a6e417257d81b1b21aceba7b7
endif endif
TF_PLUGINS_DIR = $(HOME)/.terraform.d/plugins TF_PLUGINS_DIR = $(HOME)/.terraform.d/plugins
PROVISIONER_NAME = terraform-provisioner-ansible PROVISIONER_NAME = terraform-provisioner-ansible
PROVISIONER_VERSION = v2.5.0 PROVISIONER_VERSION = v2.5.1
PROVISIONER_ARCHIVE = $(PROVISIONER_NAME)-$(subst _,-,$(ARCH))_$(PROVISIONER_VERSION) PROVISIONER_ARCHIVE = $(PROVISIONER_NAME)-$(ARCH)-$(PROVISIONER_VERSION)
PROVISIONER_URL = https://github.com/radekg/terraform-provisioner-ansible/releases/download/$(PROVISIONER_VERSION)/$(PROVISIONER_ARCHIVE) PROVISIONER_URL = https://github.com/status-im/terraform-provisioner-ansible/releases/download/$(PROVISIONER_VERSION)/$(PROVISIONER_ARCHIVE)
PROVISIONER_PATH = $(TF_PLUGINS_DIR)/$(ARCH)/$(PROVISIONER_NAME)_$(PROVISIONER_VERSION) PROVISIONER_PATH = $(TF_PLUGINS_DIR)/$(PROVISIONER_NAME)
all: roles-install install-provisioner secrets init-terraform all: roles-install install-provisioner secrets init-terraform checks
@echo "Success!" @echo "Success!"
roles-install: roles-install:
ansible/roles.py --install @ansible/roles.py --install
roles-check: roles-check:
ansible/roles.py --check @ansible/roles.py --check || \
echo -e '\n$(YLW)WARNING: Local role versions appear to be incorrect.$(RST)' >&2
roles-update: roles-update:
ansible/roles.py --update @ansible/roles.py --update
roles: roles-install roles-check roles: roles-install roles-check
@ -47,13 +55,30 @@ secrets:
pass services/vault/certs/client-user/cert > ansible/files/vault-client-user.crt pass services/vault/certs/client-user/cert > ansible/files/vault-client-user.crt
pass services/vault/certs/client-user/privkey > ansible/files/vault-client-user.key pass services/vault/certs/client-user/privkey > ansible/files/vault-client-user.key
consul-token-check: init-terraform: consul-check
ifndef CONSUL_HTTP_TOKEN
$(error No CONSUL_HTTP_TOKEN env variable set!)
endif
init-terraform: consul-token-check
terraform init -upgrade=true terraform init -upgrade=true
cleanup: cleanup:
rm -r $(TF_PLUGINS_DIR)/$(ARCHIVE) rm -r $(TF_PLUGINS_DIR)/$(ARCHIVE)
consul-check:
ifndef CONSUL_HTTP_TOKEN
@echo -e "$(RED)$(BLD)ERROR: No CONSUL_HTTP_TOKEN env variable set!$(RST)"; exit 1
endif
vault-check:
ifndef VAULT_TOKEN
@echo -e "$(RED)$(BLD)ERROR: No VAULT_TOKEN env variable set!$(RST)"; exit 1
endif
DIRENV_LOADED ?= $(shell direnv status --json | jq .state.loadedRC.allowed)
direnv-check:
@if [[ "$(DIRENV_LOADED)" -ne 0 ]] && [[ -z "$${DIRENV_IN_ENVRC}" ]]; then \
echo -e "$(YLW)WARNING: This repo assumes use of Direnv:$(RST)" \
"$(BLD)"'eval "$$(direnv hook zsh)"; direnv allow'"$(RST)"; \
fi
checks: roles-check direnv-check consul-check vault-check
@echo -e "\n$(GRN)$(BLD)WELCOME BACK, COMMANDER$(RST)"
.PHONY = checks roles-check direnv-check consul-check vault-check

View File

@ -2,17 +2,17 @@
"nodes": { "nodes": {
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1720031269, "lastModified": 1724224976,
"narHash": "sha256-rwz8NJZV+387rnWpTYcXaRNvzUSnnF9aHONoJIYmiUQ=", "narHash": "sha256-Z/ELQhrSd7bMzTO8r7NZgi9g5emh+aRKoCdaAv5fiO0=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "9f4128e00b0ae8ec65918efeba59db998750ead6", "rev": "c374d94f1536013ca8e92341b540eba4c22f9c62",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "c374d94f1536013ca8e92341b540eba4c22f9c62",
"type": "github" "type": "github"
} }
}, },

View File

@ -1,7 +1,11 @@
{ {
description = "infra-shell"; description = "infra-shell";
inputs.nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; # bitwarden-cli has a build issue on macOS since 2024.8.0:
# this commit fixes nixpkgs right before switching to 2024.8.0
# https://github.com/NixOS/nixpkgs/issues/339576
inputs.nixpkgs.url = "github:nixos/nixpkgs/c374d94f1536013ca8e92341b540eba4c22f9c62";
#inputs.nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
outputs = { self, nixpkgs }: outputs = { self, nixpkgs }:
let let
@ -15,8 +19,8 @@
pkgs = pkgsFor.${system}; pkgs = pkgsFor.${system};
in { in {
default = let default = let
pythonPkgs = pkgs.python311.withPackages ( pythonPkgs = pkgs.python3.withPackages (
_: with (pkgs.python311Packages); [ _: with (pkgs.python3Packages); [
ipython pyyaml jinja2 PyGithub ipython pyyaml jinja2 PyGithub
pyopenssl cryptography pyopenssl cryptography
hvac hvac
@ -38,8 +42,7 @@
]; ];
shellHook = '' shellHook = ''
./ansible/roles.py --check || \ make checks
echo -e '\nWARNING: Your role versions appear to be incorrect!' >&2
''; '';
}; };
}); });