-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CI setup #1
Open
kbkk
wants to merge
7
commits into
master
Choose a base branch
from
ci-setup
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Infrastructure for commit Click to see the log> @abitia/[email protected] cdk /home/runner/work/abitia/abitia/infrastructure/aws
> cdk "synth"
Resources:
abitiavpc15A3974F:
Type: AWS::EC2::VPC
Properties:
CidrBlock: 10.0.0.0/16
EnableDnsHostnames: true
EnableDnsSupport: true
InstanceTenancy: default
Tags:
- Key: Name
Value: AwsStack/abitia-vpc
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/Resource
abitiavpcPublicSubnet1Subnet8BF83026:
Type: AWS::EC2::Subnet
Properties:
CidrBlock: 10.0.0.0/17
VpcId:
Ref: abitiavpc15A3974F
AvailabilityZone:
Fn::Select:
- 0
- Fn::GetAZs: ""
MapPublicIpOnLaunch: true
Tags:
- Key: aws-cdk:subnet-name
Value: Public
- Key: aws-cdk:subnet-type
Value: Public
- Key: Name
Value: AwsStack/abitia-vpc/PublicSubnet1
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PublicSubnet1/Subnet
abitiavpcPublicSubnet1RouteTable767C0E95:
Type: AWS::EC2::RouteTable
Properties:
VpcId:
Ref: abitiavpc15A3974F
Tags:
- Key: Name
Value: AwsStack/abitia-vpc/PublicSubnet1
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PublicSubnet1/RouteTable
abitiavpcPublicSubnet1RouteTableAssociation2DBF3711:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
RouteTableId:
Ref: abitiavpcPublicSubnet1RouteTable767C0E95
SubnetId:
Ref: abitiavpcPublicSubnet1Subnet8BF83026
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PublicSubnet1/RouteTableAssociation
abitiavpcPublicSubnet1DefaultRouteFD727509:
Type: AWS::EC2::Route
Properties:
RouteTableId:
Ref: abitiavpcPublicSubnet1RouteTable767C0E95
DestinationCidrBlock: 0.0.0.0/0
GatewayId:
Ref: abitiavpcIGW5EFD9D0B
DependsOn:
- abitiavpcVPCGW0CBE6EBC
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PublicSubnet1/DefaultRoute
abitiavpcPublicSubnet1EIPB5AFB079:
Type: AWS::EC2::EIP
Properties:
Domain: vpc
Tags:
- Key: Name
Value: AwsStack/abitia-vpc/PublicSubnet1
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PublicSubnet1/EIP
abitiavpcPublicSubnet1NATGateway364A743E:
Type: AWS::EC2::NatGateway
Properties:
AllocationId:
Fn::GetAtt:
- abitiavpcPublicSubnet1EIPB5AFB079
- AllocationId
SubnetId:
Ref: abitiavpcPublicSubnet1Subnet8BF83026
Tags:
- Key: Name
Value: AwsStack/abitia-vpc/PublicSubnet1
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PublicSubnet1/NATGateway
abitiavpcPrivateSubnet1SubnetBC1F3578:
Type: AWS::EC2::Subnet
Properties:
CidrBlock: 10.0.128.0/17
VpcId:
Ref: abitiavpc15A3974F
AvailabilityZone:
Fn::Select:
- 0
- Fn::GetAZs: ""
MapPublicIpOnLaunch: false
Tags:
- Key: aws-cdk:subnet-name
Value: Private
- Key: aws-cdk:subnet-type
Value: Private
- Key: Name
Value: AwsStack/abitia-vpc/PrivateSubnet1
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PrivateSubnet1/Subnet
abitiavpcPrivateSubnet1RouteTableC6D06919:
Type: AWS::EC2::RouteTable
Properties:
VpcId:
Ref: abitiavpc15A3974F
Tags:
- Key: Name
Value: AwsStack/abitia-vpc/PrivateSubnet1
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PrivateSubnet1/RouteTable
abitiavpcPrivateSubnet1RouteTableAssociation2F7A8429:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
RouteTableId:
Ref: abitiavpcPrivateSubnet1RouteTableC6D06919
SubnetId:
Ref: abitiavpcPrivateSubnet1SubnetBC1F3578
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PrivateSubnet1/RouteTableAssociation
abitiavpcPrivateSubnet1DefaultRoute307847ED:
Type: AWS::EC2::Route
Properties:
RouteTableId:
Ref: abitiavpcPrivateSubnet1RouteTableC6D06919
DestinationCidrBlock: 0.0.0.0/0
NatGatewayId:
Ref: abitiavpcPublicSubnet1NATGateway364A743E
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/PrivateSubnet1/DefaultRoute
abitiavpcIGW5EFD9D0B:
Type: AWS::EC2::InternetGateway
Properties:
Tags:
- Key: Name
Value: AwsStack/abitia-vpc
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/IGW
abitiavpcVPCGW0CBE6EBC:
Type: AWS::EC2::VPCGatewayAttachment
Properties:
VpcId:
Ref: abitiavpc15A3974F
InternetGatewayId:
Ref: abitiavpcIGW5EFD9D0B
Metadata:
aws:cdk:path: AwsStack/abitia-vpc/VPCGW
abitiaservicesecuritygroup6F4525B8:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: Allow HTTP/HTTPS access to fargate tasks.
SecurityGroupEgress:
- CidrIp: 0.0.0.0/0
Description: Allow all outbound traffic by default
IpProtocol: "-1"
SecurityGroupIngress:
- CidrIp: 0.0.0.0/0
Description: from 0.0.0.0/0:80
FromPort: 80
IpProtocol: tcp
ToPort: 80
- CidrIp: 0.0.0.0/0
Description: from 0.0.0.0/0:443
FromPort: 443
IpProtocol: tcp
ToPort: 443
VpcId:
Ref: abitiavpc15A3974F
Metadata:
aws:cdk:path: AwsStack/abitia-service-security-group/Resource
abitiacluster80857588:
Type: AWS::ECS::Cluster
Metadata:
aws:cdk:path: AwsStack/abitia-cluster/Resource
abitiatestservicetaskdefinitionTaskRoleFA45CBD8:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Statement:
- Action: sts:AssumeRole
Effect: Allow
Principal:
Service: ecs-tasks.amazonaws.com
Version: "2012-10-17"
Metadata:
aws:cdk:path: AwsStack/abitia-test-service-task-definition/TaskRole/Resource
abitiatestservicetaskdefinition214D6D33:
Type: AWS::ECS::TaskDefinition
Properties:
ContainerDefinitions:
- Essential: true
Image: amazon/amazon-ecs-sample
Name: service
PortMappings:
- ContainerPort: 80
Protocol: tcp
Cpu: "256"
Family: abitia-test-service-task-definition
Memory: "512"
NetworkMode: awsvpc
RequiresCompatibilities:
- FARGATE
TaskRoleArn:
Fn::GetAtt:
- abitiatestservicetaskdefinitionTaskRoleFA45CBD8
- Arn
Metadata:
aws:cdk:path: AwsStack/abitia-test-service-task-definition/Resource
abitiafargateserviceService60F3EFE3:
Type: AWS::ECS::Service
Properties:
Cluster:
Ref: abitiacluster80857588
DeploymentConfiguration:
MaximumPercent: 200
MinimumHealthyPercent: 50
DesiredCount: 1
EnableECSManagedTags: false
LaunchType: FARGATE
NetworkConfiguration:
AwsvpcConfiguration:
AssignPublicIp: ENABLED
SecurityGroups:
- Fn::GetAtt:
- abitiaservicesecuritygroup6F4525B8
- GroupId
Subnets:
- Ref: abitiavpcPublicSubnet1Subnet8BF83026
TaskDefinition:
Ref: abitiatestservicetaskdefinition214D6D33
Metadata:
aws:cdk:path: AwsStack/abitia-fargate-service/Service
CDKMetadata:
Type: AWS::CDK::Metadata
Properties:
Modules: aws-cdk=1.44.0,@aws-cdk/assets=1.44.0,@aws-cdk/aws-applicationautoscaling=1.44.0,@aws-cdk/aws-autoscaling=1.44.0,@aws-cdk/aws-autoscaling-common=1.44.0,@aws-cdk/aws-autoscaling-hooktargets=1.44.0,@aws-cdk/aws-cloudwatch=1.44.0,@aws-cdk/aws-ec2=1.44.0,@aws-cdk/aws-ecr=1.44.0,@aws-cdk/aws-ecr-assets=1.44.0,@aws-cdk/aws-ecs=1.44.0,@aws-cdk/aws-elasticloadbalancingv2=1.44.0,@aws-cdk/aws-events=1.44.0,@aws-cdk/aws-iam=1.44.0,@aws-cdk/aws-kms=1.44.0,@aws-cdk/aws-lambda=1.44.0,@aws-cdk/aws-logs=1.44.0,@aws-cdk/aws-s3=1.44.0,@aws-cdk/aws-s3-assets=1.44.0,@aws-cdk/aws-servicediscovery=1.44.0,@aws-cdk/aws-sns=1.44.0,@aws-cdk/aws-sns-subscriptions=1.44.0,@aws-cdk/aws-sqs=1.44.0,@aws-cdk/aws-ssm=1.44.0,@aws-cdk/cdk-assets-schema=1.44.0,@aws-cdk/cloud-assembly-schema=1.44.0,@aws-cdk/core=1.44.0,@aws-cdk/custom-resources=1.44.0,@aws-cdk/cx-api=1.44.0,@aws-cdk/region-info=1.44.0,jsii-runtime=node.js/v12.16.3
Condition: CDKMetadataAvailable
Conditions:
CDKMetadataAvailable:
Fn::Or:
- Fn::Or:
- Fn::Equals:
- Ref: AWS::Region
- ap-east-1
- Fn::Equals:
- Ref: AWS::Region
- ap-northeast-1
- Fn::Equals:
- Ref: AWS::Region
- ap-northeast-2
- Fn::Equals:
- Ref: AWS::Region
- ap-south-1
- Fn::Equals:
- Ref: AWS::Region
- ap-southeast-1
- Fn::Equals:
- Ref: AWS::Region
- ap-southeast-2
- Fn::Equals:
- Ref: AWS::Region
- ca-central-1
- Fn::Equals:
- Ref: AWS::Region
- cn-north-1
- Fn::Equals:
- Ref: AWS::Region
- cn-northwest-1
- Fn::Equals:
- Ref: AWS::Region
- eu-central-1
- Fn::Or:
- Fn::Equals:
- Ref: AWS::Region
- eu-north-1
- Fn::Equals:
- Ref: AWS::Region
- eu-west-1
- Fn::Equals:
- Ref: AWS::Region
- eu-west-2
- Fn::Equals:
- Ref: AWS::Region
- eu-west-3
- Fn::Equals:
- Ref: AWS::Region
- me-south-1
- Fn::Equals:
- Ref: AWS::Region
- sa-east-1
- Fn::Equals:
- Ref: AWS::Region
- us-east-1
- Fn::Equals:
- Ref: AWS::Region
- us-east-2
- Fn::Equals:
- Ref: AWS::Region
- us-west-1
- Fn::Equals:
- Ref: AWS::Region
- us-west-2 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.