I hereby claim:
- I am nicusX on github.
- I am nicus (https://keybase.io/nicus) on keybase.
- I have a public key whose fingerprint is DDAE E90D B270 D52C 7D70 CBD6 01D7 58A7 D46D 6B5B
To claim this, I am signing this object:
| 'use strict'; | |
| const sourceCoookie = 'X-Source'; | |
| const sourceMain = 'main'; | |
| const sourceExperiment = 'experiment'; | |
| const cookiePath = '/'; | |
| // Origin Response handler | |
| exports.handler = (event, context, callback) => { | |
| const request = event.Records[0].cf.request; |
| 'use strict'; | |
| const sourceCoookie = 'X-Source'; | |
| const sourceMain = 'main'; | |
| const sourceExperiment = 'experiment'; | |
| const experimentBucketName = 'my-experiment.s3.amazonaws.com'; | |
| const experimentBucketRegion = 'eu-west-1'; | |
| // Origin Request handler | |
| exports.handler = (event, context, callback) => { |
| # {{ ansible_managed }} | |
| [Unit] | |
| Description=etcd | |
| Documentation=https://github.com/coreos | |
| [Service] | |
| ExecStart=/usr/bin/etcd --name {{ inventory_hostname }} \ | |
| --cert-file=/etc/etcd/kubernetes.pem \ | |
| --key-file=/etc/etcd/kubernetes-key.pem \ | |
| --peer-cert-file=/etc/etcd/kubernetes.pem \ |
| resource "aws_security_group" "kubernetes" { | |
| vpc_id = "${aws_vpc.kubernetes.id}" | |
| name = "kubernetes" | |
| # Allow all outbound | |
| egress { | |
| from_port = 0 | |
| to_port = 0 | |
| protocol = "-1" | |
| cidr_blocks = ["0.0.0.0/0"] |
| 'use strict'; | |
| const sourceCoookie = 'X-Source'; | |
| const sourceMain = 'main'; | |
| const sourceExperiment = 'experiment'; | |
| const experimentTraffic = 0.5; | |
| const experimentBucketEndpoint = 'my-experiment.s3.amazonaws.com'; | |
| const experimentBucketRegion = 'eu-west-1'; |
| 'use strict'; | |
| const sourceCoookie = 'X-Source'; | |
| const sourceMain = 'main'; | |
| const sourceExperiment = 'experiment'; | |
| const experimentTraffic = 0.5; | |
| // Viewer request handler | |
| exports.handler = (event, context, callback) => { | |
| const request = event.Records[0].cf.request; |
| resource "aws_iam_role" "kubernetes" { | |
| name = "kubernetes" | |
| assume_role_policy = <<EOF | |
| { | |
| "Version": "2012-10-17", | |
| "Statement": [ { "Effect": "Allow", "Principal": { "Service": "ec2.amazonaws.com" }, "Action": "sts:AssumeRole" } ] | |
| } | |
| EOF | |
| } |
I hereby claim:
To claim this, I am signing this object:
| resource "aws_key_pair" "default_keypair" { | |
| key_name = "my-keypair" | |
| public_key = "ssh-rsa AA....zzz" | |
| } |
| # Generate Certificates | |
| data "template_file" "certificates" { | |
| template = "${file("${path.module}/template/kubernetes-csr.json")}" | |
| depends_on = ["aws_elb.kubernetes_api","aws_instance.etcd","aws_instance.controller","aws_instance.worker"] | |
| vars { | |
| kubernetes_api_elb_dns_name = "${aws_elb.kubernetes_api.dns_name}" | |
| kubernetes_cluster_dns = "${var.kubernetes_cluster_dns}" | |
| etcd0_ip = "${aws_instance.etcd.0.private_ip}" | |
| ... | |
| controller0_ip = "${aws_instance.controller.0.private_ip}" |