infra-waku/Makefile

85 lines
2.6 KiB
Makefile
Raw Permalink Normal View History

# Colors
YLW = \033[1;33m
RED = \033[0;31m
GRN = \033[0;32m
BLU = \033[0;34m
BLD = \033[1m
RST = \033[0m
2023-10-05 12:08:18 +00:00
OS = $(shell uname -s | tr A-Z a-z)
ARCH = "${OS}-$(shell uname -m)"
ifeq ($(OS),darwin)
2023-10-05 12:08:18 +00:00
PROVISIONER_SHA1 = bd688a503f526beedaf6ef5d2dba1128051573b6
else
PROVISIONER_SHA1 = 1cbdf2bafe9e968a039264a6d3e6b58a2d2576eb
2023-10-05 12:08:18 +00:00
endif
TF_PLUGINS_DIR = $(HOME)/.terraform.d/plugins
PROVISIONER_NAME = terraform-provisioner-ansible
PROVISIONER_VERSION = v2.5.1
PROVISIONER_ARCHIVE = $(PROVISIONER_NAME)-$(ARCH)-$(PROVISIONER_VERSION)
PROVISIONER_URL = https://github.com/status-im/terraform-provisioner-ansible/releases/download/$(PROVISIONER_VERSION)/$(PROVISIONER_ARCHIVE)
PROVISIONER_PATH = $(TF_PLUGINS_DIR)/$(PROVISIONER_NAME)
2023-10-05 12:08:18 +00:00
all: roles-install install-provisioner secrets init-terraform checks
2023-10-05 12:08:18 +00:00
@echo "Success!"
roles-install:
@ansible/roles.py --install
2023-10-05 12:08:18 +00:00
roles-check:
@ansible/roles.py --check || \
echo -e '\n$(YLW)WARNING: Local role versions appear to be incorrect.$(RST)' >&2
2023-10-05 12:08:18 +00:00
roles-update:
@ansible/roles.py --update
roles: roles-install roles-check
2023-10-05 12:08:18 +00:00
$(PROVISIONER_PATH):
@mkdir -p $(TF_PLUGINS_DIR)/$(ARCH); \
wget -q $(PROVISIONER_URL) -O $(PROVISIONER_PATH); \
chmod +x $(PROVISIONER_PATH); \
install-provisioner: $(PROVISIONER_PATH)
@echo "$(PROVISIONER_SHA1) $(PROVISIONER_PATH)" | shasum -c \
|| rm -v $(PROVISIONER_PATH)
secrets:
pass services/consul/ca-crt > ansible/files/consul-ca.crt
pass services/consul/client-crt > ansible/files/consul-client.crt
pass services/consul/client-key > ansible/files/consul-client.key
2024-09-05 09:50:01 +00:00
pass services/vault/certs/root-ca/cert > ansible/files/vault-ca.crt
pass services/vault/certs/client-user/cert > ansible/files/vault-client-user.crt
pass services/vault/certs/client-user/privkey > ansible/files/vault-client-user.key
2023-10-05 12:08:18 +00:00
init-terraform: consul-check
2023-10-05 12:08:18 +00:00
terraform init -upgrade=true
cleanup:
rm -r $(TF_PLUGINS_DIR)/$(ARCHIVE)
consul-check:
ifndef CONSUL_HTTP_TOKEN
@echo -e "$(RED)$(BLD)ERROR: No CONSUL_HTTP_TOKEN env variable set!$(RST)"; exit 1
endif
vault-check:
ifndef VAULT_TOKEN
@echo -e "$(RED)$(BLD)ERROR: No VAULT_TOKEN env variable set!$(RST)"; exit 1
endif
DIRENV_LOADED ?= $(shell direnv status --json | jq .state.loadedRC.allowed)
direnv-check:
@if [[ "$(DIRENV_LOADED)" -ne 0 ]] && [[ -z "$${DIRENV_IN_ENVRC}" ]]; then \
echo -e "$(YLW)WARNING: This repo assumes use of Direnv:$(RST)" \
"$(BLD)"'eval "$$(direnv hook zsh)"; direnv allow'"$(RST)"; \
fi
checks: roles-check direnv-check consul-check vault-check
@echo -e "\n$(GRN)$(BLD)WELCOME BACK, COMMANDER$(RST)"
.PHONY = checks roles-check direnv-check consul-check vault-check