initial commit
This commit is contained in:
190
Dat File Script/decrypt-dat-file.md
Normal file
190
Dat File Script/decrypt-dat-file.md
Normal file
@@ -0,0 +1,190 @@
|
||||
# How to read/edit `store.dat` on Windows
|
||||
|
||||
## What this does
|
||||
|
||||
- Decrypts `%AppData%\rIDE\<userId>\store.dat` using Windows **DPAPI
|
||||
(CurrentUser)**.
|
||||
- Lets you **view** keys and **update** a value (e.g., `GithubToken`,
|
||||
`SupabaseToken`, etc.).
|
||||
- Must be run **as the same Windows user account** that created the
|
||||
file.
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 0) One-time setup
|
||||
|
||||
1. **Save the script** (name it exactly): `decrypt-dat-file.ps1`\
|
||||
(Use the version Jimmy shared --- it already loads the
|
||||
`System.Security` assembly and includes `Set-StoreValue`.)
|
||||
|
||||
2. Put it somewhere easy, e.g.:
|
||||
|
||||
C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 1) Open PowerShell & allow running the script (this session only)
|
||||
|
||||
``` powershell
|
||||
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
|
||||
```
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 2) Find your `userId` folder and back up the file
|
||||
|
||||
`store.dat` lives at:
|
||||
|
||||
%AppData%\rIDE\<userId>\store.dat
|
||||
|
||||
In PowerShell, reference `%AppData%` as `$env:APPDATA`. Example:
|
||||
|
||||
``` powershell
|
||||
# Replace <userId> with the actual folder name (GUID)
|
||||
cd "$env:APPDATA\rIDE\<userId>"
|
||||
Copy .\store.dat .\store.bak
|
||||
```
|
||||
|
||||
> Tip: to list the available userId folders:
|
||||
|
||||
``` powershell
|
||||
Get-ChildItem "$env:APPDATA\rIDE"
|
||||
```
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 3) List keys / read values (no edits yet)
|
||||
|
||||
### Option A --- run the script with parameters (no functions loaded)
|
||||
|
||||
Use the **call operator** `&` when passing parameters:
|
||||
|
||||
``` powershell
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -ListKeys
|
||||
# Example output: GithubToken, SupabaseToken, AzureAccessToken, ...
|
||||
```
|
||||
|
||||
Read a specific key:
|
||||
|
||||
``` powershell
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -Key GithubToken -Raw
|
||||
```
|
||||
|
||||
> `-Raw` prints the exact string. Without `-Raw`, JSON values (like
|
||||
> `SupabaseToken`) are pretty-printed.
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 4) Edit a value
|
||||
|
||||
You have **two ways** to edit:
|
||||
|
||||
### Option A (recommended): *dot-source* once, then call `Set-StoreValue`
|
||||
|
||||
Dot-sourcing loads the helper functions into your shell:
|
||||
|
||||
``` powershell
|
||||
. "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1"
|
||||
```
|
||||
|
||||
Now update a key:
|
||||
|
||||
- **Plain string key** (e.g., `GithubToken`):
|
||||
|
||||
``` powershell
|
||||
Set-StoreValue -UserId "<userId>" -Key "GithubToken" -Value "ghp_or_ghu_yourNewTokenHere"
|
||||
```
|
||||
|
||||
- **JSON key** (e.g., `SupabaseToken` expects JSON):
|
||||
|
||||
``` powershell
|
||||
$newPat = '{"AccessToken":"myNewSupabasePAT","RefreshToken":null,"ExpiresAt":"2025-12-31T23:59:59Z"}'
|
||||
Set-StoreValue -UserId "<userId>" -Key "SupabaseToken" -Value $newPat
|
||||
```
|
||||
|
||||
Verify:
|
||||
|
||||
``` powershell
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -Key GithubToken -Raw
|
||||
# or
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -Key SupabaseToken
|
||||
```
|
||||
|
||||
### Option B: stay "no functions" and only run the script
|
||||
|
||||
Use this only to **view** or **list**; editing requires Option A.
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 5) Common pitfalls & fixes
|
||||
|
||||
- **`The term 'Set-StoreValue' is not recognized`**\
|
||||
You *ran* the script but didn't dot-source it. Dot-source first:
|
||||
|
||||
``` powershell
|
||||
. "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1"
|
||||
```
|
||||
|
||||
- **`Unable to find type [System.Security.Cryptography.ProtectedData]`**\
|
||||
Use the script Jimmy provided (it includes
|
||||
`Add-Type -AssemblyName System.Security`).\
|
||||
If you still see it:
|
||||
|
||||
``` powershell
|
||||
Add-Type -AssemblyName System.Security
|
||||
```
|
||||
|
||||
- **`DPAPI Unprotect failed...`**\
|
||||
You're not running as the same Windows user that created the file.
|
||||
Switch to that user profile.
|
||||
|
||||
- **`%AppData%` doesn't work in PowerShell**\
|
||||
Use `$env:APPDATA` (PowerShell style):
|
||||
|
||||
``` powershell
|
||||
cd "$env:APPDATA\rIDE\<userId>"
|
||||
```
|
||||
|
||||
- **Edited value shape**
|
||||
|
||||
- Keys like `GithubToken` are **plain strings**.\
|
||||
- Keys like `SupabaseToken` and `projectSecret_*` are **JSON**.
|
||||
Make sure you pass valid JSON.
|
||||
|
||||
------------------------------------------------------------------------
|
||||
|
||||
## 6) Quick examples (ready to paste)
|
||||
|
||||
### List keys
|
||||
|
||||
``` powershell
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -ListKeys
|
||||
```
|
||||
|
||||
### Read GitHub token (raw)
|
||||
|
||||
``` powershell
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -Key GithubToken -Raw
|
||||
```
|
||||
|
||||
### Update GitHub token
|
||||
|
||||
``` powershell
|
||||
. "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1"
|
||||
Set-StoreValue -UserId "<userId>" -Key "GithubToken" -Value "ghp_or_ghu_yourNewTokenHere"
|
||||
```
|
||||
|
||||
### Update Supabase token (JSON)
|
||||
|
||||
``` powershell
|
||||
. "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1"
|
||||
$newPat = '{"AccessToken":"myNewSupabasePAT","RefreshToken":null,"ExpiresAt":"2025-12-31T23:59:59Z"}'
|
||||
Set-StoreValue -UserId "<userId>" -Key "SupabaseToken" -Value $newPat
|
||||
```
|
||||
|
||||
### Verify
|
||||
|
||||
``` powershell
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -Key GithubToken -Raw
|
||||
& "C:\Users\<you>\OneDrive\Desktop\Codebuddy\decrypt-dat-file.ps1" -UserId "<userId>" -Key SupabaseToken
|
||||
```
|
||||
196
Dat File Script/decrypt-dat-file.ps1
Normal file
196
Dat File Script/decrypt-dat-file.ps1
Normal file
@@ -0,0 +1,196 @@
|
||||
<#
|
||||
.SYNOPSIS
|
||||
Decrypts and edits rIDE SecureLocalStorage store.dat (DPAPI CurrentUser).
|
||||
Works on Windows PowerShell 5.1 and PowerShell 7+.
|
||||
|
||||
.PARAMETER UserId
|
||||
The userId subfolder under %AppData%\rIDE\. Use "." with -AppDataOverride "." if you're already in the folder.
|
||||
|
||||
.PARAMETER Key
|
||||
Optional. If provided, prints only this key's value.
|
||||
|
||||
.PARAMETER ListKeys
|
||||
Optional. If set, prints only the available keys.
|
||||
|
||||
.PARAMETER AppDataOverride
|
||||
Optional. Override base AppData path (defaults to [Environment]::GetFolderPath("ApplicationData")).
|
||||
Example: -AppDataOverride "." to use .\store.dat in the current directory.
|
||||
|
||||
.PARAMETER Raw
|
||||
Optional. Output raw strings (no pretty objects / nested JSON parsing).
|
||||
#>
|
||||
|
||||
[CmdletBinding()]
|
||||
param(
|
||||
[Parameter(Mandatory = $true)]
|
||||
[string]$UserId,
|
||||
|
||||
[string]$Key,
|
||||
|
||||
[switch]$ListKeys,
|
||||
|
||||
[string]$AppDataOverride,
|
||||
|
||||
[switch]$Raw
|
||||
)
|
||||
|
||||
# Ensure DPAPI types exist
|
||||
Add-Type -AssemblyName System.Security
|
||||
|
||||
# ---- Helpers ----
|
||||
|
||||
# Convert PSObject/arrays into pure hashtables/arrays so PS 5.1 works like PS7 -AsHashtable
|
||||
function Convert-PSObjectToHashtable {
|
||||
param([Parameter(ValueFromPipeline=$true)]$InputObject)
|
||||
process {
|
||||
if ($null -eq $InputObject) { return $null }
|
||||
|
||||
if ($InputObject -is [System.Collections.IDictionary]) {
|
||||
$ht = @{}
|
||||
foreach ($k in $InputObject.Keys) {
|
||||
$ht[$k] = Convert-PSObjectToHashtable $InputObject[$k]
|
||||
}
|
||||
return $ht
|
||||
}
|
||||
|
||||
if ($InputObject -is [System.Collections.IEnumerable] -and -not ($InputObject -is [string])) {
|
||||
$arr = @()
|
||||
foreach ($item in $InputObject) { $arr += ,(Convert-PSObjectToHashtable $item) }
|
||||
return $arr
|
||||
}
|
||||
|
||||
if ($InputObject -is [psobject]) {
|
||||
$ht = @{}
|
||||
foreach ($p in $InputObject.PSObject.Properties) {
|
||||
$ht[$p.Name] = Convert-PSObjectToHashtable $p.Value
|
||||
}
|
||||
return $ht
|
||||
}
|
||||
|
||||
return $InputObject
|
||||
}
|
||||
}
|
||||
|
||||
function Get-StorePath {
|
||||
param([string]$UserId, [string]$AppDataOverride)
|
||||
|
||||
$appData = if ($AppDataOverride) { $AppDataOverride } else { [Environment]::GetFolderPath("ApplicationData") }
|
||||
# Code uses "rIDE" but Windows is case-insensitive
|
||||
$dir = Join-Path (Join-Path $appData "rIDE") $UserId
|
||||
return Join-Path $dir "store.dat"
|
||||
}
|
||||
|
||||
function Read-DecryptedStore {
|
||||
param([string]$Path)
|
||||
|
||||
if (-not (Test-Path -LiteralPath $Path)) { throw "File not found: $Path" }
|
||||
|
||||
try {
|
||||
$encBytes = [System.IO.File]::ReadAllBytes($Path)
|
||||
} catch {
|
||||
throw "Unable to read file '$Path': $($_.Exception.Message)"
|
||||
}
|
||||
|
||||
try {
|
||||
$decBytes = [System.Security.Cryptography.ProtectedData]::Unprotect(
|
||||
$encBytes, $null,
|
||||
[System.Security.Cryptography.DataProtectionScope]::CurrentUser
|
||||
)
|
||||
} catch {
|
||||
throw "DPAPI Unprotect failed. Are you running as the SAME Windows user that created the file? Inner: $($_.Exception.Message)"
|
||||
}
|
||||
|
||||
$json = [System.Text.Encoding]::UTF8.GetString($decBytes)
|
||||
|
||||
try {
|
||||
$obj = $json | ConvertFrom-Json
|
||||
$dict = Convert-PSObjectToHashtable $obj # PS5.1-safe
|
||||
if ($dict -isnot [hashtable]) { throw "Expected a JSON object/dictionary at the top level." }
|
||||
return $dict
|
||||
} catch {
|
||||
throw "Decrypted bytes were not valid JSON: $($_.Exception.Message)"
|
||||
}
|
||||
}
|
||||
|
||||
function Try-ParseJson {
|
||||
param([string]$s)
|
||||
try {
|
||||
if ($null -ne $s -and ($s.TrimStart().StartsWith('{') -or $s.TrimStart().StartsWith('['))) {
|
||||
return $s | ConvertFrom-Json
|
||||
}
|
||||
} catch { }
|
||||
return $s
|
||||
}
|
||||
|
||||
function Write-EncryptedStore {
|
||||
param(
|
||||
[string]$Path,
|
||||
[hashtable]$Store
|
||||
)
|
||||
|
||||
$json = $Store | ConvertTo-Json -Depth 10 -Compress
|
||||
$bytes = [System.Text.Encoding]::UTF8.GetBytes($json)
|
||||
$enc = [System.Security.Cryptography.ProtectedData]::Protect(
|
||||
$bytes, $null,
|
||||
[System.Security.Cryptography.DataProtectionScope]::CurrentUser
|
||||
)
|
||||
[System.IO.File]::WriteAllBytes($Path, $enc)
|
||||
}
|
||||
|
||||
function Set-StoreValue {
|
||||
param(
|
||||
[string]$UserId,
|
||||
[string]$Key,
|
||||
[string]$Value,
|
||||
[string]$AppDataOverride
|
||||
)
|
||||
|
||||
$path = Get-StorePath -UserId $UserId -AppDataOverride $AppDataOverride
|
||||
$store = Read-DecryptedStore -Path $path
|
||||
|
||||
$store[$Key] = $Value
|
||||
Write-EncryptedStore -Path $path -Store $store
|
||||
Write-Host "Key '$Key' updated successfully in $path"
|
||||
}
|
||||
|
||||
# ---- Main (print/list/single-key) ----
|
||||
$path = Get-StorePath -UserId $UserId -AppDataOverride $AppDataOverride
|
||||
|
||||
try {
|
||||
$store = Read-DecryptedStore -Path $path
|
||||
} catch {
|
||||
Write-Error $_.Exception.Message
|
||||
exit 1
|
||||
}
|
||||
|
||||
if ($ListKeys) {
|
||||
$store.Keys | Sort-Object
|
||||
exit 0
|
||||
}
|
||||
|
||||
if ($Key) {
|
||||
if ($store.ContainsKey($Key)) {
|
||||
$val = $store[$Key]
|
||||
if ($Raw) {
|
||||
$val
|
||||
} else {
|
||||
$parsed = Try-ParseJson -s $val
|
||||
$parsed | ConvertTo-Json -Depth 10
|
||||
}
|
||||
exit 0
|
||||
} else {
|
||||
Write-Error "Key '$Key' not found. Use -ListKeys to see available keys."
|
||||
exit 2
|
||||
}
|
||||
}
|
||||
|
||||
# No key specified: show entire dictionary (pretty where possible)
|
||||
if ($Raw) {
|
||||
$store.GetEnumerator() | Sort-Object Name | ForEach-Object {
|
||||
"{0} = {1}" -f $_.Key, $_.Value
|
||||
}
|
||||
} else {
|
||||
$pretty = @{}
|
||||
foreach ($k in $store.Keys) { $pretty[$k] = Try-ParseJson -s $store[$k] }
|
||||
$pretty | ConvertTo-Json -Depth 10
|
||||
}
|
||||
22
Gitea Infrastructure/Gitea Deployment/.terraform.lock.hcl
generated
Normal file
22
Gitea Infrastructure/Gitea Deployment/.terraform.lock.hcl
generated
Normal file
@@ -0,0 +1,22 @@
|
||||
# This file is maintained automatically by "terraform init".
|
||||
# Manual edits may be lost in future updates.
|
||||
|
||||
provider "registry.terraform.io/hashicorp/azurerm" {
|
||||
version = "3.117.1"
|
||||
constraints = "~> 3.0"
|
||||
hashes = [
|
||||
"h1:Y9J+emydHX7LpJYKdF9Zmng0zcRR86Awm/t28LNzb68=",
|
||||
"zh:0c513676836e3c50d004ece7d2624a8aff6faac14b833b96feeac2e4bc2c1c12",
|
||||
"zh:50ea01ada95bae2f187db9e926e463f45d860767a85ebc59160414e00e76c35d",
|
||||
"zh:52c2a9edacc06b3f72153f5ef6daca0761c6292158815961fe37f60bc576a3d7",
|
||||
"zh:618eed2a06b19b1a025b45b05891846d570a6a1cca4d23f4942f5a99e1f747ae",
|
||||
"zh:61cde5d3165d7e5ec311d5d89486819cd605c1b2d54611b5c97bd4e97dba2762",
|
||||
"zh:6a873358d5031fc222f5e05f029d1237f3dce8345c767665f393283dfa2627f6",
|
||||
"zh:afdd80064b2a04da311856feb4ed45f77ff4df6c356e8c2b10afb51fe7e61c70",
|
||||
"zh:b09113df7e0e8c8959539bd22bae6c39faeb269ba3c4cd948e742f5cf58c35fb",
|
||||
"zh:d340db7973109761cfc27d52aa02560363337c908b2c99b3628adc5a70a99d5b",
|
||||
"zh:d5a577226ebc8c65e8f19384878a86acc4b51ede4b4a82d37c3b331b0efcd4a7",
|
||||
"zh:e2962b147f9e71732df8dbc74940c10d20906f3c003cbfaa1eb9fabbf601a9f0",
|
||||
"zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c",
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1 @@
|
||||
prod
|
||||
@@ -0,0 +1,375 @@
|
||||
Copyright (c) 2017 HashiCorp, Inc.
|
||||
|
||||
Mozilla Public License Version 2.0
|
||||
==================================
|
||||
|
||||
1. Definitions
|
||||
--------------
|
||||
|
||||
1.1. "Contributor"
|
||||
means each individual or legal entity that creates, contributes to
|
||||
the creation of, or owns Covered Software.
|
||||
|
||||
1.2. "Contributor Version"
|
||||
means the combination of the Contributions of others (if any) used
|
||||
by a Contributor and that particular Contributor's Contribution.
|
||||
|
||||
1.3. "Contribution"
|
||||
means Covered Software of a particular Contributor.
|
||||
|
||||
1.4. "Covered Software"
|
||||
means Source Code Form to which the initial Contributor has attached
|
||||
the notice in Exhibit A, the Executable Form of such Source Code
|
||||
Form, and Modifications of such Source Code Form, in each case
|
||||
including portions thereof.
|
||||
|
||||
1.5. "Incompatible With Secondary Licenses"
|
||||
means
|
||||
|
||||
(a) that the initial Contributor has attached the notice described
|
||||
in Exhibit B to the Covered Software; or
|
||||
|
||||
(b) that the Covered Software was made available under the terms of
|
||||
version 1.1 or earlier of the License, but not also under the
|
||||
terms of a Secondary License.
|
||||
|
||||
1.6. "Executable Form"
|
||||
means any form of the work other than Source Code Form.
|
||||
|
||||
1.7. "Larger Work"
|
||||
means a work that combines Covered Software with other material, in
|
||||
a separate file or files, that is not Covered Software.
|
||||
|
||||
1.8. "License"
|
||||
means this document.
|
||||
|
||||
1.9. "Licensable"
|
||||
means having the right to grant, to the maximum extent possible,
|
||||
whether at the time of the initial grant or subsequently, any and
|
||||
all of the rights conveyed by this License.
|
||||
|
||||
1.10. "Modifications"
|
||||
means any of the following:
|
||||
|
||||
(a) any file in Source Code Form that results from an addition to,
|
||||
deletion from, or modification of the contents of Covered
|
||||
Software; or
|
||||
|
||||
(b) any new file in Source Code Form that contains any Covered
|
||||
Software.
|
||||
|
||||
1.11. "Patent Claims" of a Contributor
|
||||
means any patent claim(s), including without limitation, method,
|
||||
process, and apparatus claims, in any patent Licensable by such
|
||||
Contributor that would be infringed, but for the grant of the
|
||||
License, by the making, using, selling, offering for sale, having
|
||||
made, import, or transfer of either its Contributions or its
|
||||
Contributor Version.
|
||||
|
||||
1.12. "Secondary License"
|
||||
means either the GNU General Public License, Version 2.0, the GNU
|
||||
Lesser General Public License, Version 2.1, the GNU Affero General
|
||||
Public License, Version 3.0, or any later versions of those
|
||||
licenses.
|
||||
|
||||
1.13. "Source Code Form"
|
||||
means the form of the work preferred for making modifications.
|
||||
|
||||
1.14. "You" (or "Your")
|
||||
means an individual or a legal entity exercising rights under this
|
||||
License. For legal entities, "You" includes any entity that
|
||||
controls, is controlled by, or is under common control with You. For
|
||||
purposes of this definition, "control" means (a) the power, direct
|
||||
or indirect, to cause the direction or management of such entity,
|
||||
whether by contract or otherwise, or (b) ownership of more than
|
||||
fifty percent (50%) of the outstanding shares or beneficial
|
||||
ownership of such entity.
|
||||
|
||||
2. License Grants and Conditions
|
||||
--------------------------------
|
||||
|
||||
2.1. Grants
|
||||
|
||||
Each Contributor hereby grants You a world-wide, royalty-free,
|
||||
non-exclusive license:
|
||||
|
||||
(a) under intellectual property rights (other than patent or trademark)
|
||||
Licensable by such Contributor to use, reproduce, make available,
|
||||
modify, display, perform, distribute, and otherwise exploit its
|
||||
Contributions, either on an unmodified basis, with Modifications, or
|
||||
as part of a Larger Work; and
|
||||
|
||||
(b) under Patent Claims of such Contributor to make, use, sell, offer
|
||||
for sale, have made, import, and otherwise transfer either its
|
||||
Contributions or its Contributor Version.
|
||||
|
||||
2.2. Effective Date
|
||||
|
||||
The licenses granted in Section 2.1 with respect to any Contribution
|
||||
become effective for each Contribution on the date the Contributor first
|
||||
distributes such Contribution.
|
||||
|
||||
2.3. Limitations on Grant Scope
|
||||
|
||||
The licenses granted in this Section 2 are the only rights granted under
|
||||
this License. No additional rights or licenses will be implied from the
|
||||
distribution or licensing of Covered Software under this License.
|
||||
Notwithstanding Section 2.1(b) above, no patent license is granted by a
|
||||
Contributor:
|
||||
|
||||
(a) for any code that a Contributor has removed from Covered Software;
|
||||
or
|
||||
|
||||
(b) for infringements caused by: (i) Your and any other third party's
|
||||
modifications of Covered Software, or (ii) the combination of its
|
||||
Contributions with other software (except as part of its Contributor
|
||||
Version); or
|
||||
|
||||
(c) under Patent Claims infringed by Covered Software in the absence of
|
||||
its Contributions.
|
||||
|
||||
This License does not grant any rights in the trademarks, service marks,
|
||||
or logos of any Contributor (except as may be necessary to comply with
|
||||
the notice requirements in Section 3.4).
|
||||
|
||||
2.4. Subsequent Licenses
|
||||
|
||||
No Contributor makes additional grants as a result of Your choice to
|
||||
distribute the Covered Software under a subsequent version of this
|
||||
License (see Section 10.2) or under the terms of a Secondary License (if
|
||||
permitted under the terms of Section 3.3).
|
||||
|
||||
2.5. Representation
|
||||
|
||||
Each Contributor represents that the Contributor believes its
|
||||
Contributions are its original creation(s) or it has sufficient rights
|
||||
to grant the rights to its Contributions conveyed by this License.
|
||||
|
||||
2.6. Fair Use
|
||||
|
||||
This License is not intended to limit any rights You have under
|
||||
applicable copyright doctrines of fair use, fair dealing, or other
|
||||
equivalents.
|
||||
|
||||
2.7. Conditions
|
||||
|
||||
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
|
||||
in Section 2.1.
|
||||
|
||||
3. Responsibilities
|
||||
-------------------
|
||||
|
||||
3.1. Distribution of Source Form
|
||||
|
||||
All distribution of Covered Software in Source Code Form, including any
|
||||
Modifications that You create or to which You contribute, must be under
|
||||
the terms of this License. You must inform recipients that the Source
|
||||
Code Form of the Covered Software is governed by the terms of this
|
||||
License, and how they can obtain a copy of this License. You may not
|
||||
attempt to alter or restrict the recipients' rights in the Source Code
|
||||
Form.
|
||||
|
||||
3.2. Distribution of Executable Form
|
||||
|
||||
If You distribute Covered Software in Executable Form then:
|
||||
|
||||
(a) such Covered Software must also be made available in Source Code
|
||||
Form, as described in Section 3.1, and You must inform recipients of
|
||||
the Executable Form how they can obtain a copy of such Source Code
|
||||
Form by reasonable means in a timely manner, at a charge no more
|
||||
than the cost of distribution to the recipient; and
|
||||
|
||||
(b) You may distribute such Executable Form under the terms of this
|
||||
License, or sublicense it under different terms, provided that the
|
||||
license for the Executable Form does not attempt to limit or alter
|
||||
the recipients' rights in the Source Code Form under this License.
|
||||
|
||||
3.3. Distribution of a Larger Work
|
||||
|
||||
You may create and distribute a Larger Work under terms of Your choice,
|
||||
provided that You also comply with the requirements of this License for
|
||||
the Covered Software. If the Larger Work is a combination of Covered
|
||||
Software with a work governed by one or more Secondary Licenses, and the
|
||||
Covered Software is not Incompatible With Secondary Licenses, this
|
||||
License permits You to additionally distribute such Covered Software
|
||||
under the terms of such Secondary License(s), so that the recipient of
|
||||
the Larger Work may, at their option, further distribute the Covered
|
||||
Software under the terms of either this License or such Secondary
|
||||
License(s).
|
||||
|
||||
3.4. Notices
|
||||
|
||||
You may not remove or alter the substance of any license notices
|
||||
(including copyright notices, patent notices, disclaimers of warranty,
|
||||
or limitations of liability) contained within the Source Code Form of
|
||||
the Covered Software, except that You may alter any license notices to
|
||||
the extent required to remedy known factual inaccuracies.
|
||||
|
||||
3.5. Application of Additional Terms
|
||||
|
||||
You may choose to offer, and to charge a fee for, warranty, support,
|
||||
indemnity or liability obligations to one or more recipients of Covered
|
||||
Software. However, You may do so only on Your own behalf, and not on
|
||||
behalf of any Contributor. You must make it absolutely clear that any
|
||||
such warranty, support, indemnity, or liability obligation is offered by
|
||||
You alone, and You hereby agree to indemnify every Contributor for any
|
||||
liability incurred by such Contributor as a result of warranty, support,
|
||||
indemnity or liability terms You offer. You may include additional
|
||||
disclaimers of warranty and limitations of liability specific to any
|
||||
jurisdiction.
|
||||
|
||||
4. Inability to Comply Due to Statute or Regulation
|
||||
---------------------------------------------------
|
||||
|
||||
If it is impossible for You to comply with any of the terms of this
|
||||
License with respect to some or all of the Covered Software due to
|
||||
statute, judicial order, or regulation then You must: (a) comply with
|
||||
the terms of this License to the maximum extent possible; and (b)
|
||||
describe the limitations and the code they affect. Such description must
|
||||
be placed in a text file included with all distributions of the Covered
|
||||
Software under this License. Except to the extent prohibited by statute
|
||||
or regulation, such description must be sufficiently detailed for a
|
||||
recipient of ordinary skill to be able to understand it.
|
||||
|
||||
5. Termination
|
||||
--------------
|
||||
|
||||
5.1. The rights granted under this License will terminate automatically
|
||||
if You fail to comply with any of its terms. However, if You become
|
||||
compliant, then the rights granted under this License from a particular
|
||||
Contributor are reinstated (a) provisionally, unless and until such
|
||||
Contributor explicitly and finally terminates Your grants, and (b) on an
|
||||
ongoing basis, if such Contributor fails to notify You of the
|
||||
non-compliance by some reasonable means prior to 60 days after You have
|
||||
come back into compliance. Moreover, Your grants from a particular
|
||||
Contributor are reinstated on an ongoing basis if such Contributor
|
||||
notifies You of the non-compliance by some reasonable means, this is the
|
||||
first time You have received notice of non-compliance with this License
|
||||
from such Contributor, and You become compliant prior to 30 days after
|
||||
Your receipt of the notice.
|
||||
|
||||
5.2. If You initiate litigation against any entity by asserting a patent
|
||||
infringement claim (excluding declaratory judgment actions,
|
||||
counter-claims, and cross-claims) alleging that a Contributor Version
|
||||
directly or indirectly infringes any patent, then the rights granted to
|
||||
You by any and all Contributors for the Covered Software under Section
|
||||
2.1 of this License shall terminate.
|
||||
|
||||
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
|
||||
end user license agreements (excluding distributors and resellers) which
|
||||
have been validly granted by You or Your distributors under this License
|
||||
prior to termination shall survive termination.
|
||||
|
||||
************************************************************************
|
||||
* *
|
||||
* 6. Disclaimer of Warranty *
|
||||
* ------------------------- *
|
||||
* *
|
||||
* Covered Software is provided under this License on an "as is" *
|
||||
* basis, without warranty of any kind, either expressed, implied, or *
|
||||
* statutory, including, without limitation, warranties that the *
|
||||
* Covered Software is free of defects, merchantable, fit for a *
|
||||
* particular purpose or non-infringing. The entire risk as to the *
|
||||
* quality and performance of the Covered Software is with You. *
|
||||
* Should any Covered Software prove defective in any respect, You *
|
||||
* (not any Contributor) assume the cost of any necessary servicing, *
|
||||
* repair, or correction. This disclaimer of warranty constitutes an *
|
||||
* essential part of this License. No use of any Covered Software is *
|
||||
* authorized under this License except under this disclaimer. *
|
||||
* *
|
||||
************************************************************************
|
||||
|
||||
************************************************************************
|
||||
* *
|
||||
* 7. Limitation of Liability *
|
||||
* -------------------------- *
|
||||
* *
|
||||
* Under no circumstances and under no legal theory, whether tort *
|
||||
* (including negligence), contract, or otherwise, shall any *
|
||||
* Contributor, or anyone who distributes Covered Software as *
|
||||
* permitted above, be liable to You for any direct, indirect, *
|
||||
* special, incidental, or consequential damages of any character *
|
||||
* including, without limitation, damages for lost profits, loss of *
|
||||
* goodwill, work stoppage, computer failure or malfunction, or any *
|
||||
* and all other commercial damages or losses, even if such party *
|
||||
* shall have been informed of the possibility of such damages. This *
|
||||
* limitation of liability shall not apply to liability for death or *
|
||||
* personal injury resulting from such party's negligence to the *
|
||||
* extent applicable law prohibits such limitation. Some *
|
||||
* jurisdictions do not allow the exclusion or limitation of *
|
||||
* incidental or consequential damages, so this exclusion and *
|
||||
* limitation may not apply to You. *
|
||||
* *
|
||||
************************************************************************
|
||||
|
||||
8. Litigation
|
||||
-------------
|
||||
|
||||
Any litigation relating to this License may be brought only in the
|
||||
courts of a jurisdiction where the defendant maintains its principal
|
||||
place of business and such litigation shall be governed by laws of that
|
||||
jurisdiction, without reference to its conflict-of-law provisions.
|
||||
Nothing in this Section shall prevent a party's ability to bring
|
||||
cross-claims or counter-claims.
|
||||
|
||||
9. Miscellaneous
|
||||
----------------
|
||||
|
||||
This License represents the complete agreement concerning the subject
|
||||
matter hereof. If any provision of this License is held to be
|
||||
unenforceable, such provision shall be reformed only to the extent
|
||||
necessary to make it enforceable. Any law or regulation which provides
|
||||
that the language of a contract shall be construed against the drafter
|
||||
shall not be used to construe this License against a Contributor.
|
||||
|
||||
10. Versions of the License
|
||||
---------------------------
|
||||
|
||||
10.1. New Versions
|
||||
|
||||
Mozilla Foundation is the license steward. Except as provided in Section
|
||||
10.3, no one other than the license steward has the right to modify or
|
||||
publish new versions of this License. Each version will be given a
|
||||
distinguishing version number.
|
||||
|
||||
10.2. Effect of New Versions
|
||||
|
||||
You may distribute the Covered Software under the terms of the version
|
||||
of the License under which You originally received the Covered Software,
|
||||
or under the terms of any subsequent version published by the license
|
||||
steward.
|
||||
|
||||
10.3. Modified Versions
|
||||
|
||||
If you create software not governed by this License, and you want to
|
||||
create a new license for such software, you may create and use a
|
||||
modified version of this License if you rename the license and remove
|
||||
any references to the name of the license steward (except to note that
|
||||
such modified license differs from this License).
|
||||
|
||||
10.4. Distributing Source Code Form that is Incompatible With Secondary
|
||||
Licenses
|
||||
|
||||
If You choose to distribute Source Code Form that is Incompatible With
|
||||
Secondary Licenses under the terms of this version of the License, the
|
||||
notice described in Exhibit B of this License must be attached.
|
||||
|
||||
Exhibit A - Source Code Form License Notice
|
||||
-------------------------------------------
|
||||
|
||||
This Source Code Form is subject to the terms of the Mozilla Public
|
||||
License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
If it is not possible or desirable to put the notice in a particular
|
||||
file, then You may include the notice in a location (such as a LICENSE
|
||||
file in a relevant directory) where a recipient would be likely to look
|
||||
for such a notice.
|
||||
|
||||
You may add additional accurate notices of copyright ownership.
|
||||
|
||||
Exhibit B - "Incompatible With Secondary Licenses" Notice
|
||||
---------------------------------------------------------
|
||||
|
||||
This Source Code Form is "Incompatible With Secondary Licenses", as
|
||||
defined by the Mozilla Public License, v. 2.0.
|
||||
Binary file not shown.
124
Gitea Infrastructure/Gitea Deployment/main.tf
Normal file
124
Gitea Infrastructure/Gitea Deployment/main.tf
Normal file
@@ -0,0 +1,124 @@
|
||||
terraform {
|
||||
required_providers { azurerm = { source = "hashicorp/azurerm", version = "~>3.0" } }
|
||||
}
|
||||
|
||||
provider "azurerm" {
|
||||
features {}
|
||||
}
|
||||
|
||||
resource "azurerm_resource_group" "rg" {
|
||||
name = var.rg_name
|
||||
location = var.location
|
||||
}
|
||||
|
||||
# (Marketplace terms must be accepted via Azure CLI once before applying)
|
||||
resource "azurerm_virtual_network" "vnet" {
|
||||
name = "${var.rg_name}-vnet"
|
||||
location = azurerm_resource_group.rg.location
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
address_space = ["10.1.0.0/16"]
|
||||
}
|
||||
resource "azurerm_subnet" "subnet" {
|
||||
name = "default"
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
virtual_network_name = azurerm_virtual_network.vnet.name
|
||||
address_prefixes = ["10.1.1.0/24"]
|
||||
}
|
||||
|
||||
resource "azurerm_network_security_group" "nsg" {
|
||||
name = "${var.rg_name}-nsg"
|
||||
location = azurerm_resource_group.rg.location
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
}
|
||||
resource "azurerm_network_security_rule" "ssh" {
|
||||
name = "Allow-SSH"
|
||||
priority = 100
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "22"
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "*"
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
network_security_group_name = azurerm_network_security_group.nsg.name
|
||||
}
|
||||
resource "azurerm_network_security_rule" "gitea" {
|
||||
name = "Allow-Gitea-HTTP"
|
||||
priority = 110
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "3000"
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "*"
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
network_security_group_name = azurerm_network_security_group.nsg.name
|
||||
}
|
||||
|
||||
resource "azurerm_public_ip" "pip" {
|
||||
name = "${var.rg_name}-pip"
|
||||
location = azurerm_resource_group.rg.location
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
allocation_method = "Static"
|
||||
sku = "Standard"
|
||||
}
|
||||
|
||||
resource "azurerm_network_interface" "nic" {
|
||||
name = "${var.rg_name}-nic"
|
||||
location = azurerm_resource_group.rg.location
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
|
||||
ip_configuration {
|
||||
name = "nic-ipconfig"
|
||||
subnet_id = azurerm_subnet.subnet.id
|
||||
private_ip_address_allocation = "Dynamic"
|
||||
public_ip_address_id = azurerm_public_ip.pip.id
|
||||
}
|
||||
}
|
||||
|
||||
# Attach NSG to this specific NIC:
|
||||
resource "azurerm_network_interface_security_group_association" "nic_nsg" {
|
||||
network_interface_id = azurerm_network_interface.nic.id
|
||||
network_security_group_id = azurerm_network_security_group.nsg.id
|
||||
}
|
||||
|
||||
/*resource "azurerm_marketplace_agreement" "gitea_terms" {
|
||||
publisher = "bitnami"
|
||||
offer = "gitea"
|
||||
plan = "default"
|
||||
}*/
|
||||
|
||||
resource "azurerm_linux_virtual_machine" "gitea" {
|
||||
name = var.vm_name
|
||||
location = azurerm_resource_group.rg.location
|
||||
resource_group_name = azurerm_resource_group.rg.name
|
||||
size = var.vm_size
|
||||
admin_username = var.admin_user
|
||||
network_interface_ids = [azurerm_network_interface.nic.id]
|
||||
disable_password_authentication = true
|
||||
|
||||
source_image_reference {
|
||||
publisher = "bitnami"
|
||||
offer = "gitea"
|
||||
sku = "default"
|
||||
version = "1.24.2114171813"
|
||||
}
|
||||
|
||||
plan {
|
||||
name = "default"
|
||||
publisher = "bitnami"
|
||||
product = "gitea"
|
||||
}
|
||||
|
||||
admin_ssh_key {
|
||||
username = var.admin_user
|
||||
public_key = file(var.ssh_pub_key_path)
|
||||
}
|
||||
|
||||
os_disk {
|
||||
caching = "ReadWrite"
|
||||
storage_account_type = "Premium_LRS"
|
||||
}
|
||||
}
|
||||
520
Gitea Infrastructure/Gitea Deployment/terraform.tfstate
Normal file
520
Gitea Infrastructure/Gitea Deployment/terraform.tfstate
Normal file
@@ -0,0 +1,520 @@
|
||||
{
|
||||
"version": 4,
|
||||
"terraform_version": "1.10.3",
|
||||
"serial": 19,
|
||||
"lineage": "1629efaa-f776-08b0-383b-b0872a2253a9",
|
||||
"outputs": {},
|
||||
"resources": [
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_linux_virtual_machine",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"additional_capabilities": [],
|
||||
"admin_password": null,
|
||||
"admin_ssh_key": [
|
||||
{
|
||||
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPHBBG/NzLtEJZgxidD6xO3lxmx0z3KJZmfuKqjeDF6XNn/EYdA+73gKFoF1x2w3BChejZpywQGr79fsPznvNqUiiJ/DQcxS023NONhhr6lo0KNi0a7sAnHXiRJjjK60iYx+poU27IiIwsjld8PlYoy+8ZB3uhiAEQlG9U2hBy2PudUuTTAOCYhbLwW851/YpPBXhOXVkUHOmTDb1V/yrVkHkIs/LsyuhiVq5s3c2/maA6vO+PydzTl6sv06xcP78xbB+EDW+yIYc55Y31utYu/iYIre3fVsyxsBxdxj/DLJBGXL9DlSsVL64s2LC5kVk+Pell2Y3tO4PXGwyCkwbh",
|
||||
"username": "azureuser"
|
||||
}
|
||||
],
|
||||
"admin_username": "azureuser",
|
||||
"allow_extension_operations": true,
|
||||
"availability_set_id": "",
|
||||
"boot_diagnostics": [],
|
||||
"bypass_platform_safety_checks_on_user_schedule_enabled": false,
|
||||
"capacity_reservation_group_id": "",
|
||||
"computer_name": "ride-gitea-dev-vm",
|
||||
"custom_data": null,
|
||||
"dedicated_host_group_id": "",
|
||||
"dedicated_host_id": "",
|
||||
"disable_password_authentication": true,
|
||||
"disk_controller_type": "",
|
||||
"edge_zone": "",
|
||||
"encryption_at_host_enabled": false,
|
||||
"eviction_policy": "",
|
||||
"extensions_time_budget": "PT1H30M",
|
||||
"gallery_application": [],
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Compute/virtualMachines/ride-gitea-dev-vm",
|
||||
"identity": [],
|
||||
"license_type": "",
|
||||
"location": "eastus2",
|
||||
"max_bid_price": -1,
|
||||
"name": "ride-gitea-dev-vm",
|
||||
"network_interface_ids": [
|
||||
"/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic"
|
||||
],
|
||||
"os_disk": [
|
||||
{
|
||||
"caching": "ReadWrite",
|
||||
"diff_disk_settings": [],
|
||||
"disk_encryption_set_id": "",
|
||||
"disk_size_gb": 30,
|
||||
"name": "ride-gitea-dev-vm_OsDisk_1_2255f5e0d7fc408ea8c44e46527f66bf",
|
||||
"secure_vm_disk_encryption_set_id": "",
|
||||
"security_encryption_type": "",
|
||||
"storage_account_type": "Premium_LRS",
|
||||
"write_accelerator_enabled": false
|
||||
}
|
||||
],
|
||||
"os_image_notification": [],
|
||||
"patch_assessment_mode": "ImageDefault",
|
||||
"patch_mode": "ImageDefault",
|
||||
"plan": [
|
||||
{
|
||||
"name": "default",
|
||||
"product": "gitea",
|
||||
"publisher": "bitnami"
|
||||
}
|
||||
],
|
||||
"platform_fault_domain": -1,
|
||||
"priority": "Regular",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"provision_vm_agent": true,
|
||||
"proximity_placement_group_id": "",
|
||||
"public_ip_address": "172.203.60.84",
|
||||
"public_ip_addresses": [
|
||||
"172.203.60.84"
|
||||
],
|
||||
"reboot_setting": "",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"secret": [],
|
||||
"secure_boot_enabled": false,
|
||||
"size": "Standard_B2s",
|
||||
"source_image_id": "",
|
||||
"source_image_reference": [
|
||||
{
|
||||
"offer": "gitea",
|
||||
"publisher": "bitnami",
|
||||
"sku": "default",
|
||||
"version": "1.24.2114171813"
|
||||
}
|
||||
],
|
||||
"tags": null,
|
||||
"termination_notification": null,
|
||||
"timeouts": null,
|
||||
"user_data": "",
|
||||
"virtual_machine_id": "b709cc82-65be-4bed-b679-65be529cbf06",
|
||||
"virtual_machine_scale_set_id": "",
|
||||
"vm_agent_platform_updates_enabled": false,
|
||||
"vtpm_enabled": false,
|
||||
"zone": ""
|
||||
},
|
||||
"sensitive_attributes": [
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "admin_password"
|
||||
}
|
||||
],
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "custom_data"
|
||||
}
|
||||
]
|
||||
],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoyNzAwMDAwMDAwMDAwLCJkZWxldGUiOjI3MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoyNzAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_marketplace_agreement",
|
||||
"name": "gitea_terms",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/providers/Microsoft.MarketplaceOrdering/agreements/bitnami/offers/gitea/plans/default",
|
||||
"license_text_link": "https://storeordersprodsn.blob.core.windows.net/legalterms/3E5ED_legalterms_BITNAMI%253a24GITEA%253a24DEFAULT%253a244GTTQBXZD64P7Q75WFWXVI6CB3NAYRHG4WWJDKOSPUSGVD2XP5JJCTBATY5ABSXAWBDESLAXZ4CUF3LKVZOAOQOD2AXH2ZDKBEHJBGA.txt",
|
||||
"offer": "gitea",
|
||||
"plan": "default",
|
||||
"privacy_policy_link": "https://www.broadcom.com/company/legal/privacy/policy",
|
||||
"publisher": "bitnami",
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMCJ9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface",
|
||||
"name": "nic",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"accelerated_networking_enabled": false,
|
||||
"applied_dns_servers": [],
|
||||
"auxiliary_mode": "",
|
||||
"auxiliary_sku": "",
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"enable_accelerated_networking": false,
|
||||
"enable_ip_forwarding": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic",
|
||||
"internal_dns_name_label": "",
|
||||
"internal_domain_name_suffix": "gxarnue0b3petn2qi1uo5h22rf.cx.internal.cloudapp.net",
|
||||
"ip_configuration": [
|
||||
{
|
||||
"gateway_load_balancer_frontend_ip_configuration_id": "",
|
||||
"name": "nic-ipconfig",
|
||||
"primary": true,
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_address_allocation": "Dynamic",
|
||||
"private_ip_address_version": "IPv4",
|
||||
"public_ip_address_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-development-rg-pip",
|
||||
"subnet_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet/subnets/default"
|
||||
}
|
||||
],
|
||||
"ip_forwarding_enabled": false,
|
||||
"location": "eastus2",
|
||||
"mac_address": "",
|
||||
"name": "ride-gitea-development-rg-nic",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"tags": {},
|
||||
"timeouts": null,
|
||||
"virtual_machine_id": ""
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface_security_group_association",
|
||||
"name": "nic_nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic|/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg",
|
||||
"network_interface_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic",
|
||||
"network_security_group_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg",
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_group",
|
||||
"name": "nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-development-rg-nsg",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"security_rule": [
|
||||
{
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"name": "Allow-SSH",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": []
|
||||
},
|
||||
{
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": []
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg/securityRules/Allow-Gitea-HTTP",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"network_security_group_name": "ride-gitea-development-rg-nsg",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": [],
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "ssh",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg/securityRules/Allow-SSH",
|
||||
"name": "Allow-SSH",
|
||||
"network_security_group_name": "ride-gitea-development-rg-nsg",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": [],
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_public_ip",
|
||||
"name": "pip",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"allocation_method": "Static",
|
||||
"ddos_protection_mode": "VirtualNetworkInherited",
|
||||
"ddos_protection_plan_id": null,
|
||||
"domain_name_label": null,
|
||||
"edge_zone": "",
|
||||
"fqdn": null,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-development-rg-pip",
|
||||
"idle_timeout_in_minutes": 4,
|
||||
"ip_address": "172.203.60.84",
|
||||
"ip_tags": {},
|
||||
"ip_version": "IPv4",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-development-rg-pip",
|
||||
"public_ip_prefix_id": null,
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"reverse_fqdn": null,
|
||||
"sku": "Standard",
|
||||
"sku_tier": "Regional",
|
||||
"tags": {},
|
||||
"timeouts": null,
|
||||
"zones": []
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_resource_group",
|
||||
"name": "rg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg",
|
||||
"location": "eastus2",
|
||||
"managed_by": "",
|
||||
"name": "ride-gitea-development-rg",
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwLCJkZWxldGUiOjU0MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjo1NDAwMDAwMDAwMDAwfX0="
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_subnet",
|
||||
"name": "subnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_prefixes": [
|
||||
"10.1.1.0/24"
|
||||
],
|
||||
"default_outbound_access_enabled": true,
|
||||
"delegation": [],
|
||||
"enforce_private_link_endpoint_network_policies": false,
|
||||
"enforce_private_link_service_network_policies": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"private_endpoint_network_policies": "Enabled",
|
||||
"private_endpoint_network_policies_enabled": true,
|
||||
"private_link_service_network_policies_enabled": true,
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"service_endpoint_policy_ids": [],
|
||||
"service_endpoints": [],
|
||||
"timeouts": null,
|
||||
"virtual_network_name": "ride-gitea-development-rg-vnet"
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_virtual_network",
|
||||
"name": "vnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_space": [
|
||||
"10.1.0.0/16"
|
||||
],
|
||||
"bgp_community": "",
|
||||
"ddos_protection_plan": [],
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"encryption": [],
|
||||
"flow_timeout_in_minutes": 0,
|
||||
"guid": "d016c135-0f9a-495e-b790-46e8ef9f9c8d",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-development-rg-vnet",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"subnet": [
|
||||
{
|
||||
"address_prefix": "10.1.1.0/24",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"security_group": ""
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"check_results": null
|
||||
}
|
||||
507
Gitea Infrastructure/Gitea Deployment/terraform.tfstate.backup
Normal file
507
Gitea Infrastructure/Gitea Deployment/terraform.tfstate.backup
Normal file
@@ -0,0 +1,507 @@
|
||||
{
|
||||
"version": 4,
|
||||
"terraform_version": "1.10.3",
|
||||
"serial": 16,
|
||||
"lineage": "1629efaa-f776-08b0-383b-b0872a2253a9",
|
||||
"outputs": {},
|
||||
"resources": [
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_linux_virtual_machine",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"additional_capabilities": [],
|
||||
"admin_password": null,
|
||||
"admin_ssh_key": [
|
||||
{
|
||||
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPHBBG/NzLtEJZgxidD6xO3lxmx0z3KJZmfuKqjeDF6XNn/EYdA+73gKFoF1x2w3BChejZpywQGr79fsPznvNqUiiJ/DQcxS023NONhhr6lo0KNi0a7sAnHXiRJjjK60iYx+poU27IiIwsjld8PlYoy+8ZB3uhiAEQlG9U2hBy2PudUuTTAOCYhbLwW851/YpPBXhOXVkUHOmTDb1V/yrVkHkIs/LsyuhiVq5s3c2/maA6vO+PydzTl6sv06xcP78xbB+EDW+yIYc55Y31utYu/iYIre3fVsyxsBxdxj/DLJBGXL9DlSsVL64s2LC5kVk+Pell2Y3tO4PXGwyCkwbh",
|
||||
"username": "azureuser"
|
||||
}
|
||||
],
|
||||
"admin_username": "azureuser",
|
||||
"allow_extension_operations": true,
|
||||
"availability_set_id": "",
|
||||
"boot_diagnostics": [],
|
||||
"bypass_platform_safety_checks_on_user_schedule_enabled": false,
|
||||
"capacity_reservation_group_id": "",
|
||||
"computer_name": "ride-gitea-dev-vm",
|
||||
"custom_data": null,
|
||||
"dedicated_host_group_id": "",
|
||||
"dedicated_host_id": "",
|
||||
"disable_password_authentication": true,
|
||||
"disk_controller_type": "",
|
||||
"edge_zone": "",
|
||||
"encryption_at_host_enabled": false,
|
||||
"eviction_policy": "",
|
||||
"extensions_time_budget": "PT1H30M",
|
||||
"gallery_application": [],
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Compute/virtualMachines/ride-gitea-dev-vm",
|
||||
"identity": [],
|
||||
"license_type": "",
|
||||
"location": "eastus2",
|
||||
"max_bid_price": -1,
|
||||
"name": "ride-gitea-dev-vm",
|
||||
"network_interface_ids": [
|
||||
"/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic"
|
||||
],
|
||||
"os_disk": [
|
||||
{
|
||||
"caching": "ReadWrite",
|
||||
"diff_disk_settings": [],
|
||||
"disk_encryption_set_id": "",
|
||||
"disk_size_gb": 30,
|
||||
"name": "ride-gitea-dev-vm_OsDisk_1_9bc916feed184290931ddd49223e09d6",
|
||||
"secure_vm_disk_encryption_set_id": "",
|
||||
"security_encryption_type": "",
|
||||
"storage_account_type": "Premium_LRS",
|
||||
"write_accelerator_enabled": false
|
||||
}
|
||||
],
|
||||
"os_image_notification": [],
|
||||
"patch_assessment_mode": "ImageDefault",
|
||||
"patch_mode": "ImageDefault",
|
||||
"plan": [],
|
||||
"platform_fault_domain": -1,
|
||||
"priority": "Regular",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"provision_vm_agent": true,
|
||||
"proximity_placement_group_id": "",
|
||||
"public_ip_address": "172.203.60.84",
|
||||
"public_ip_addresses": [
|
||||
"172.203.60.84"
|
||||
],
|
||||
"reboot_setting": "",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"secret": [],
|
||||
"secure_boot_enabled": false,
|
||||
"size": "Standard_B2s",
|
||||
"source_image_id": "",
|
||||
"source_image_reference": [
|
||||
{
|
||||
"offer": "gitea",
|
||||
"publisher": "bitnami",
|
||||
"sku": "default",
|
||||
"version": "1.24.2114171813"
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"termination_notification": [],
|
||||
"timeouts": null,
|
||||
"user_data": "",
|
||||
"virtual_machine_id": "03952815-5cf3-441a-910a-ebee159b980d",
|
||||
"virtual_machine_scale_set_id": "",
|
||||
"vm_agent_platform_updates_enabled": false,
|
||||
"vtpm_enabled": false,
|
||||
"zone": ""
|
||||
},
|
||||
"sensitive_attributes": [
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "custom_data"
|
||||
}
|
||||
],
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "admin_password"
|
||||
}
|
||||
]
|
||||
],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoyNzAwMDAwMDAwMDAwLCJkZWxldGUiOjI3MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoyNzAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIwIn0="
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_marketplace_agreement",
|
||||
"name": "gitea_terms",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/providers/Microsoft.MarketplaceOrdering/agreements/bitnami/offers/gitea/plans/default",
|
||||
"license_text_link": "https://storeordersprodsn.blob.core.windows.net/legalterms/3E5ED_legalterms_BITNAMI%253a24GITEA%253a24DEFAULT%253a244GTTQBXZD64P7Q75WFWXVI6CB3NAYRHG4WWJDKOSPUSGVD2XP5JJCTBATY5ABSXAWBDESLAXZ4CUF3LKVZOAOQOD2AXH2ZDKBEHJBGA.txt",
|
||||
"offer": "gitea",
|
||||
"plan": "default",
|
||||
"privacy_policy_link": "https://www.broadcom.com/company/legal/privacy/policy",
|
||||
"publisher": "bitnami",
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMCJ9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface",
|
||||
"name": "nic",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"accelerated_networking_enabled": false,
|
||||
"applied_dns_servers": [],
|
||||
"auxiliary_mode": "",
|
||||
"auxiliary_sku": "",
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"enable_accelerated_networking": false,
|
||||
"enable_ip_forwarding": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic",
|
||||
"internal_dns_name_label": "",
|
||||
"internal_domain_name_suffix": "gxarnue0b3petn2qi1uo5h22rf.cx.internal.cloudapp.net",
|
||||
"ip_configuration": [
|
||||
{
|
||||
"gateway_load_balancer_frontend_ip_configuration_id": "",
|
||||
"name": "nic-ipconfig",
|
||||
"primary": true,
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_address_allocation": "Dynamic",
|
||||
"private_ip_address_version": "IPv4",
|
||||
"public_ip_address_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-development-rg-pip",
|
||||
"subnet_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet/subnets/default"
|
||||
}
|
||||
],
|
||||
"ip_forwarding_enabled": false,
|
||||
"location": "eastus2",
|
||||
"mac_address": "",
|
||||
"name": "ride-gitea-development-rg-nic",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"tags": {},
|
||||
"timeouts": null,
|
||||
"virtual_machine_id": ""
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface_security_group_association",
|
||||
"name": "nic_nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic|/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg",
|
||||
"network_interface_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-development-rg-nic",
|
||||
"network_security_group_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg",
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_group",
|
||||
"name": "nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-development-rg-nsg",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"security_rule": [
|
||||
{
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"name": "Allow-SSH",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": []
|
||||
},
|
||||
{
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": []
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg/securityRules/Allow-Gitea-HTTP",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"network_security_group_name": "ride-gitea-development-rg-nsg",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": [],
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "ssh",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-development-rg-nsg/securityRules/Allow-SSH",
|
||||
"name": "Allow-SSH",
|
||||
"network_security_group_name": "ride-gitea-development-rg-nsg",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": [],
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_public_ip",
|
||||
"name": "pip",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"allocation_method": "Static",
|
||||
"ddos_protection_mode": "VirtualNetworkInherited",
|
||||
"ddos_protection_plan_id": null,
|
||||
"domain_name_label": null,
|
||||
"edge_zone": "",
|
||||
"fqdn": null,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-development-rg-pip",
|
||||
"idle_timeout_in_minutes": 4,
|
||||
"ip_address": "172.203.60.84",
|
||||
"ip_tags": {},
|
||||
"ip_version": "IPv4",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-development-rg-pip",
|
||||
"public_ip_prefix_id": null,
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"reverse_fqdn": null,
|
||||
"sku": "Standard",
|
||||
"sku_tier": "Regional",
|
||||
"tags": {},
|
||||
"timeouts": null,
|
||||
"zones": []
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_resource_group",
|
||||
"name": "rg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg",
|
||||
"location": "eastus2",
|
||||
"managed_by": "",
|
||||
"name": "ride-gitea-development-rg",
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwLCJkZWxldGUiOjU0MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjo1NDAwMDAwMDAwMDAwfX0="
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_subnet",
|
||||
"name": "subnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_prefixes": [
|
||||
"10.1.1.0/24"
|
||||
],
|
||||
"default_outbound_access_enabled": true,
|
||||
"delegation": [],
|
||||
"enforce_private_link_endpoint_network_policies": false,
|
||||
"enforce_private_link_service_network_policies": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"private_endpoint_network_policies": "Enabled",
|
||||
"private_endpoint_network_policies_enabled": true,
|
||||
"private_link_service_network_policies_enabled": true,
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"service_endpoint_policy_ids": [],
|
||||
"service_endpoints": [],
|
||||
"timeouts": null,
|
||||
"virtual_network_name": "ride-gitea-development-rg-vnet"
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_virtual_network",
|
||||
"name": "vnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_space": [
|
||||
"10.1.0.0/16"
|
||||
],
|
||||
"bgp_community": "",
|
||||
"ddos_protection_plan": [],
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"encryption": [],
|
||||
"flow_timeout_in_minutes": 0,
|
||||
"guid": "d016c135-0f9a-495e-b790-46e8ef9f9c8d",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-development-rg-vnet",
|
||||
"resource_group_name": "ride-gitea-development-rg",
|
||||
"subnet": [
|
||||
{
|
||||
"address_prefix": "10.1.1.0/24",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-development-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-development-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"security_group": ""
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"check_results": null
|
||||
}
|
||||
@@ -0,0 +1,498 @@
|
||||
{
|
||||
"version": 4,
|
||||
"terraform_version": "1.10.3",
|
||||
"serial": 13,
|
||||
"lineage": "8c4f4662-7a22-9c60-5ee6-025c956cea8b",
|
||||
"outputs": {},
|
||||
"resources": [
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_linux_virtual_machine",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"additional_capabilities": [],
|
||||
"admin_password": null,
|
||||
"admin_ssh_key": [
|
||||
{
|
||||
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPHBBG/NzLtEJZgxidD6xO3lxmx0z3KJZmfuKqjeDF6XNn/EYdA+73gKFoF1x2w3BChejZpywQGr79fsPznvNqUiiJ/DQcxS023NONhhr6lo0KNi0a7sAnHXiRJjjK60iYx+poU27IiIwsjld8PlYoy+8ZB3uhiAEQlG9U2hBy2PudUuTTAOCYhbLwW851/YpPBXhOXVkUHOmTDb1V/yrVkHkIs/LsyuhiVq5s3c2/maA6vO+PydzTl6sv06xcP78xbB+EDW+yIYc55Y31utYu/iYIre3fVsyxsBxdxj/DLJBGXL9DlSsVL64s2LC5kVk+Pell2Y3tO4PXGwyCkwbh",
|
||||
"username": "azureuser"
|
||||
}
|
||||
],
|
||||
"admin_username": "azureuser",
|
||||
"allow_extension_operations": true,
|
||||
"availability_set_id": "",
|
||||
"boot_diagnostics": [],
|
||||
"bypass_platform_safety_checks_on_user_schedule_enabled": false,
|
||||
"capacity_reservation_group_id": "",
|
||||
"computer_name": "ride-gitea-prod-vm",
|
||||
"custom_data": null,
|
||||
"dedicated_host_group_id": "",
|
||||
"dedicated_host_id": "",
|
||||
"disable_password_authentication": true,
|
||||
"disk_controller_type": "",
|
||||
"edge_zone": "",
|
||||
"encryption_at_host_enabled": false,
|
||||
"eviction_policy": "",
|
||||
"extensions_time_budget": "PT1H30M",
|
||||
"gallery_application": [],
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Compute/virtualMachines/ride-gitea-prod-vm",
|
||||
"identity": [],
|
||||
"license_type": "",
|
||||
"location": "eastus2",
|
||||
"max_bid_price": -1,
|
||||
"name": "ride-gitea-prod-vm",
|
||||
"network_interface_ids": [
|
||||
"/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic"
|
||||
],
|
||||
"os_disk": [
|
||||
{
|
||||
"caching": "ReadWrite",
|
||||
"diff_disk_settings": [],
|
||||
"disk_encryption_set_id": "",
|
||||
"disk_size_gb": 30,
|
||||
"name": "ride-gitea-prod-vm_OsDisk_1_5d685c5287ed4bea8c05adb5e553fc41",
|
||||
"secure_vm_disk_encryption_set_id": "",
|
||||
"security_encryption_type": "",
|
||||
"storage_account_type": "Premium_LRS",
|
||||
"write_accelerator_enabled": false
|
||||
}
|
||||
],
|
||||
"os_image_notification": [],
|
||||
"patch_assessment_mode": "ImageDefault",
|
||||
"patch_mode": "ImageDefault",
|
||||
"plan": [
|
||||
{
|
||||
"name": "default",
|
||||
"product": "gitea",
|
||||
"publisher": "bitnami"
|
||||
}
|
||||
],
|
||||
"platform_fault_domain": -1,
|
||||
"priority": "Regular",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"provision_vm_agent": true,
|
||||
"proximity_placement_group_id": "",
|
||||
"public_ip_address": "172.172.102.93",
|
||||
"public_ip_addresses": [
|
||||
"172.172.102.93"
|
||||
],
|
||||
"reboot_setting": "",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"secret": [],
|
||||
"secure_boot_enabled": false,
|
||||
"size": "Standard_B2s",
|
||||
"source_image_id": "",
|
||||
"source_image_reference": [
|
||||
{
|
||||
"offer": "gitea",
|
||||
"publisher": "bitnami",
|
||||
"sku": "default",
|
||||
"version": "1.24.2114171813"
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"termination_notification": [],
|
||||
"timeouts": null,
|
||||
"user_data": "",
|
||||
"virtual_machine_id": "a19cec49-79ef-4171-89f5-d47e57c1e1f3",
|
||||
"virtual_machine_scale_set_id": "",
|
||||
"vm_agent_platform_updates_enabled": false,
|
||||
"vtpm_enabled": false,
|
||||
"zone": ""
|
||||
},
|
||||
"sensitive_attributes": [
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "admin_password"
|
||||
}
|
||||
],
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "custom_data"
|
||||
}
|
||||
]
|
||||
],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoyNzAwMDAwMDAwMDAwLCJkZWxldGUiOjI3MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoyNzAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface",
|
||||
"name": "nic",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"accelerated_networking_enabled": false,
|
||||
"applied_dns_servers": [],
|
||||
"auxiliary_mode": "",
|
||||
"auxiliary_sku": "",
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"enable_accelerated_networking": false,
|
||||
"enable_ip_forwarding": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic",
|
||||
"internal_dns_name_label": "",
|
||||
"internal_domain_name_suffix": "f4txgmmfzcaejla4ivh0t332vh.cx.internal.cloudapp.net",
|
||||
"ip_configuration": [
|
||||
{
|
||||
"gateway_load_balancer_frontend_ip_configuration_id": "",
|
||||
"name": "nic-ipconfig",
|
||||
"primary": true,
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_address_allocation": "Dynamic",
|
||||
"private_ip_address_version": "IPv4",
|
||||
"public_ip_address_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-production-rg-pip",
|
||||
"subnet_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet/subnets/default"
|
||||
}
|
||||
],
|
||||
"ip_forwarding_enabled": false,
|
||||
"location": "eastus2",
|
||||
"mac_address": "7C-1E-52-9A-BA-6D",
|
||||
"name": "ride-gitea-production-rg-nic",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"tags": {},
|
||||
"timeouts": null,
|
||||
"virtual_machine_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Compute/virtualMachines/ride-gitea-prod-vm"
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface_security_group_association",
|
||||
"name": "nic_nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic|/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg",
|
||||
"network_interface_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic",
|
||||
"network_security_group_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg",
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_group",
|
||||
"name": "nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-production-rg-nsg",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"security_rule": [
|
||||
{
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"name": "Allow-SSH",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": []
|
||||
},
|
||||
{
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": []
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg/securityRules/Allow-Gitea-HTTP",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"network_security_group_name": "ride-gitea-production-rg-nsg",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": [],
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "ssh",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": [],
|
||||
"destination_application_security_group_ids": [],
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": [],
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg/securityRules/Allow-SSH",
|
||||
"name": "Allow-SSH",
|
||||
"network_security_group_name": "ride-gitea-production-rg-nsg",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": [],
|
||||
"source_application_security_group_ids": [],
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": [],
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_public_ip",
|
||||
"name": "pip",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"allocation_method": "Static",
|
||||
"ddos_protection_mode": "VirtualNetworkInherited",
|
||||
"ddos_protection_plan_id": null,
|
||||
"domain_name_label": null,
|
||||
"edge_zone": "",
|
||||
"fqdn": null,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-production-rg-pip",
|
||||
"idle_timeout_in_minutes": 4,
|
||||
"ip_address": "172.172.102.93",
|
||||
"ip_tags": {},
|
||||
"ip_version": "IPv4",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-production-rg-pip",
|
||||
"public_ip_prefix_id": null,
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"reverse_fqdn": null,
|
||||
"sku": "Standard",
|
||||
"sku_tier": "Regional",
|
||||
"tags": {},
|
||||
"timeouts": null,
|
||||
"zones": []
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_resource_group",
|
||||
"name": "rg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg",
|
||||
"location": "eastus2",
|
||||
"managed_by": "",
|
||||
"name": "ride-gitea-production-rg",
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwLCJkZWxldGUiOjU0MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjo1NDAwMDAwMDAwMDAwfX0="
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_subnet",
|
||||
"name": "subnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_prefixes": [
|
||||
"10.1.1.0/24"
|
||||
],
|
||||
"default_outbound_access_enabled": true,
|
||||
"delegation": [],
|
||||
"enforce_private_link_endpoint_network_policies": false,
|
||||
"enforce_private_link_service_network_policies": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"private_endpoint_network_policies": "Enabled",
|
||||
"private_endpoint_network_policies_enabled": true,
|
||||
"private_link_service_network_policies_enabled": true,
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"service_endpoint_policy_ids": [],
|
||||
"service_endpoints": [],
|
||||
"timeouts": null,
|
||||
"virtual_network_name": "ride-gitea-production-rg-vnet"
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_virtual_network",
|
||||
"name": "vnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_space": [
|
||||
"10.1.0.0/16"
|
||||
],
|
||||
"bgp_community": "",
|
||||
"ddos_protection_plan": [],
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"encryption": [],
|
||||
"flow_timeout_in_minutes": 0,
|
||||
"guid": "3173a72f-c885-4480-ac1e-454fa9f7bcaf",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-production-rg-vnet",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"subnet": [
|
||||
{
|
||||
"address_prefix": "10.1.1.0/24",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"security_group": ""
|
||||
}
|
||||
],
|
||||
"tags": {},
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"check_results": null
|
||||
}
|
||||
@@ -0,0 +1,454 @@
|
||||
{
|
||||
"version": 4,
|
||||
"terraform_version": "1.10.3",
|
||||
"serial": 12,
|
||||
"lineage": "8c4f4662-7a22-9c60-5ee6-025c956cea8b",
|
||||
"outputs": {},
|
||||
"resources": [
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_linux_virtual_machine",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"additional_capabilities": [],
|
||||
"admin_password": null,
|
||||
"admin_ssh_key": [
|
||||
{
|
||||
"public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPHBBG/NzLtEJZgxidD6xO3lxmx0z3KJZmfuKqjeDF6XNn/EYdA+73gKFoF1x2w3BChejZpywQGr79fsPznvNqUiiJ/DQcxS023NONhhr6lo0KNi0a7sAnHXiRJjjK60iYx+poU27IiIwsjld8PlYoy+8ZB3uhiAEQlG9U2hBy2PudUuTTAOCYhbLwW851/YpPBXhOXVkUHOmTDb1V/yrVkHkIs/LsyuhiVq5s3c2/maA6vO+PydzTl6sv06xcP78xbB+EDW+yIYc55Y31utYu/iYIre3fVsyxsBxdxj/DLJBGXL9DlSsVL64s2LC5kVk+Pell2Y3tO4PXGwyCkwbh",
|
||||
"username": "azureuser"
|
||||
}
|
||||
],
|
||||
"admin_username": "azureuser",
|
||||
"allow_extension_operations": true,
|
||||
"availability_set_id": "",
|
||||
"boot_diagnostics": [],
|
||||
"bypass_platform_safety_checks_on_user_schedule_enabled": false,
|
||||
"capacity_reservation_group_id": "",
|
||||
"computer_name": "ride-gitea-prod-vm",
|
||||
"custom_data": null,
|
||||
"dedicated_host_group_id": "",
|
||||
"dedicated_host_id": "",
|
||||
"disable_password_authentication": true,
|
||||
"disk_controller_type": "",
|
||||
"edge_zone": "",
|
||||
"encryption_at_host_enabled": false,
|
||||
"eviction_policy": "",
|
||||
"extensions_time_budget": "PT1H30M",
|
||||
"gallery_application": [],
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Compute/virtualMachines/ride-gitea-prod-vm",
|
||||
"identity": [],
|
||||
"license_type": "",
|
||||
"location": "eastus2",
|
||||
"max_bid_price": -1,
|
||||
"name": "ride-gitea-prod-vm",
|
||||
"network_interface_ids": [
|
||||
"/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic"
|
||||
],
|
||||
"os_disk": [
|
||||
{
|
||||
"caching": "ReadWrite",
|
||||
"diff_disk_settings": [],
|
||||
"disk_encryption_set_id": "",
|
||||
"disk_size_gb": 30,
|
||||
"name": "ride-gitea-prod-vm_OsDisk_1_5d685c5287ed4bea8c05adb5e553fc41",
|
||||
"secure_vm_disk_encryption_set_id": "",
|
||||
"security_encryption_type": "",
|
||||
"storage_account_type": "Premium_LRS",
|
||||
"write_accelerator_enabled": false
|
||||
}
|
||||
],
|
||||
"os_image_notification": [],
|
||||
"patch_assessment_mode": "ImageDefault",
|
||||
"patch_mode": "ImageDefault",
|
||||
"plan": [
|
||||
{
|
||||
"name": "default",
|
||||
"product": "gitea",
|
||||
"publisher": "bitnami"
|
||||
}
|
||||
],
|
||||
"platform_fault_domain": -1,
|
||||
"priority": "Regular",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"provision_vm_agent": true,
|
||||
"proximity_placement_group_id": "",
|
||||
"public_ip_address": "172.172.102.93",
|
||||
"public_ip_addresses": [
|
||||
"172.172.102.93"
|
||||
],
|
||||
"reboot_setting": "",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"secret": [],
|
||||
"secure_boot_enabled": false,
|
||||
"size": "Standard_B2s",
|
||||
"source_image_id": "",
|
||||
"source_image_reference": [
|
||||
{
|
||||
"offer": "gitea",
|
||||
"publisher": "bitnami",
|
||||
"sku": "default",
|
||||
"version": "1.24.2114171813"
|
||||
}
|
||||
],
|
||||
"tags": null,
|
||||
"termination_notification": null,
|
||||
"timeouts": null,
|
||||
"user_data": "",
|
||||
"virtual_machine_id": "a19cec49-79ef-4171-89f5-d47e57c1e1f3",
|
||||
"virtual_machine_scale_set_id": "",
|
||||
"vm_agent_platform_updates_enabled": false,
|
||||
"vtpm_enabled": false,
|
||||
"zone": ""
|
||||
},
|
||||
"sensitive_attributes": [
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "admin_password"
|
||||
}
|
||||
],
|
||||
[
|
||||
{
|
||||
"type": "get_attr",
|
||||
"value": "custom_data"
|
||||
}
|
||||
]
|
||||
],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoyNzAwMDAwMDAwMDAwLCJkZWxldGUiOjI3MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoyNzAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface",
|
||||
"name": "nic",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"accelerated_networking_enabled": false,
|
||||
"applied_dns_servers": [],
|
||||
"auxiliary_mode": "",
|
||||
"auxiliary_sku": "",
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"enable_accelerated_networking": false,
|
||||
"enable_ip_forwarding": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic",
|
||||
"internal_dns_name_label": "",
|
||||
"internal_domain_name_suffix": "f4txgmmfzcaejla4ivh0t332vh.cx.internal.cloudapp.net",
|
||||
"ip_configuration": [
|
||||
{
|
||||
"gateway_load_balancer_frontend_ip_configuration_id": "",
|
||||
"name": "nic-ipconfig",
|
||||
"primary": true,
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_address_allocation": "Dynamic",
|
||||
"private_ip_address_version": "IPv4",
|
||||
"public_ip_address_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-production-rg-pip",
|
||||
"subnet_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet/subnets/default"
|
||||
}
|
||||
],
|
||||
"ip_forwarding_enabled": false,
|
||||
"location": "eastus2",
|
||||
"mac_address": "",
|
||||
"name": "ride-gitea-production-rg-nic",
|
||||
"private_ip_address": "10.1.1.4",
|
||||
"private_ip_addresses": [
|
||||
"10.1.1.4"
|
||||
],
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"tags": null,
|
||||
"timeouts": null,
|
||||
"virtual_machine_id": ""
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_interface_security_group_association",
|
||||
"name": "nic_nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic|/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg",
|
||||
"network_interface_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkInterfaces/ride-gitea-production-rg-nic",
|
||||
"network_security_group_id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg",
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19",
|
||||
"dependencies": [
|
||||
"azurerm_network_interface.nic",
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_public_ip.pip",
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_subnet.subnet",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_group",
|
||||
"name": "nsg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-production-rg-nsg",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"security_rule": [],
|
||||
"tags": null,
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "gitea",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": null,
|
||||
"destination_application_security_group_ids": null,
|
||||
"destination_port_range": "3000",
|
||||
"destination_port_ranges": null,
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg/securityRules/Allow-Gitea-HTTP",
|
||||
"name": "Allow-Gitea-HTTP",
|
||||
"network_security_group_name": "ride-gitea-production-rg-nsg",
|
||||
"priority": 110,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": null,
|
||||
"source_application_security_group_ids": null,
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": null,
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_network_security_rule",
|
||||
"name": "ssh",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"access": "Allow",
|
||||
"description": "",
|
||||
"destination_address_prefix": "*",
|
||||
"destination_address_prefixes": null,
|
||||
"destination_application_security_group_ids": null,
|
||||
"destination_port_range": "22",
|
||||
"destination_port_ranges": null,
|
||||
"direction": "Inbound",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/networkSecurityGroups/ride-gitea-production-rg-nsg/securityRules/Allow-SSH",
|
||||
"name": "Allow-SSH",
|
||||
"network_security_group_name": "ride-gitea-production-rg-nsg",
|
||||
"priority": 100,
|
||||
"protocol": "Tcp",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"source_address_prefix": "*",
|
||||
"source_address_prefixes": null,
|
||||
"source_application_security_group_ids": null,
|
||||
"source_port_range": "*",
|
||||
"source_port_ranges": null,
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_network_security_group.nsg",
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_public_ip",
|
||||
"name": "pip",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"allocation_method": "Static",
|
||||
"ddos_protection_mode": "VirtualNetworkInherited",
|
||||
"ddos_protection_plan_id": null,
|
||||
"domain_name_label": null,
|
||||
"edge_zone": "",
|
||||
"fqdn": null,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/publicIPAddresses/ride-gitea-production-rg-pip",
|
||||
"idle_timeout_in_minutes": 4,
|
||||
"ip_address": "172.172.102.93",
|
||||
"ip_tags": null,
|
||||
"ip_version": "IPv4",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-production-rg-pip",
|
||||
"public_ip_prefix_id": null,
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"reverse_fqdn": null,
|
||||
"sku": "Standard",
|
||||
"sku_tier": "Regional",
|
||||
"tags": null,
|
||||
"timeouts": null,
|
||||
"zones": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_resource_group",
|
||||
"name": "rg",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg",
|
||||
"location": "eastus2",
|
||||
"managed_by": "",
|
||||
"name": "ride-gitea-production-rg",
|
||||
"tags": null,
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwLCJkZWxldGUiOjU0MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjo1NDAwMDAwMDAwMDAwfX0="
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_subnet",
|
||||
"name": "subnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_prefixes": [
|
||||
"10.1.1.0/24"
|
||||
],
|
||||
"default_outbound_access_enabled": true,
|
||||
"delegation": [],
|
||||
"enforce_private_link_endpoint_network_policies": false,
|
||||
"enforce_private_link_service_network_policies": false,
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet/subnets/default",
|
||||
"name": "default",
|
||||
"private_endpoint_network_policies": "Enabled",
|
||||
"private_endpoint_network_policies_enabled": true,
|
||||
"private_link_service_network_policies_enabled": true,
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"service_endpoint_policy_ids": null,
|
||||
"service_endpoints": null,
|
||||
"timeouts": null,
|
||||
"virtual_network_name": "ride-gitea-production-rg-vnet"
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg",
|
||||
"azurerm_virtual_network.vnet"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"mode": "managed",
|
||||
"type": "azurerm_virtual_network",
|
||||
"name": "vnet",
|
||||
"provider": "provider[\"registry.terraform.io/hashicorp/azurerm\"]",
|
||||
"instances": [
|
||||
{
|
||||
"schema_version": 0,
|
||||
"attributes": {
|
||||
"address_space": [
|
||||
"10.1.0.0/16"
|
||||
],
|
||||
"bgp_community": "",
|
||||
"ddos_protection_plan": [],
|
||||
"dns_servers": [],
|
||||
"edge_zone": "",
|
||||
"encryption": [],
|
||||
"flow_timeout_in_minutes": 0,
|
||||
"guid": "3173a72f-c885-4480-ac1e-454fa9f7bcaf",
|
||||
"id": "/subscriptions/bf0be4a4-5608-40ef-b653-e2242d24e448/resourceGroups/ride-gitea-production-rg/providers/Microsoft.Network/virtualNetworks/ride-gitea-production-rg-vnet",
|
||||
"location": "eastus2",
|
||||
"name": "ride-gitea-production-rg-vnet",
|
||||
"resource_group_name": "ride-gitea-production-rg",
|
||||
"subnet": [],
|
||||
"tags": null,
|
||||
"timeouts": null
|
||||
},
|
||||
"sensitive_attributes": [],
|
||||
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfX0=",
|
||||
"dependencies": [
|
||||
"azurerm_resource_group.rg"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"check_results": null
|
||||
}
|
||||
6
Gitea Infrastructure/Gitea Deployment/terraform.tfvars
Normal file
6
Gitea Infrastructure/Gitea Deployment/terraform.tfvars
Normal file
@@ -0,0 +1,6 @@
|
||||
rg_name = "ride-gitea-production-rg"
|
||||
location = "eastus2"
|
||||
vm_name = "ride-gitea-prod-vm"
|
||||
vm_size = "Standard_B2s"
|
||||
admin_user = "azureuser"
|
||||
ssh_pub_key_path = "~/.ssh/id_rsa.pub"
|
||||
31
Gitea Infrastructure/Gitea Deployment/variables.tf
Normal file
31
Gitea Infrastructure/Gitea Deployment/variables.tf
Normal file
@@ -0,0 +1,31 @@
|
||||
variable "rg_name" {
|
||||
description = "Name of the Azure resource group"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "location" {
|
||||
description = "Azure region to deploy into (e.g. eastus2)"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "vm_name" {
|
||||
description = "Name of the Linux VM"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "vm_size" {
|
||||
description = "Azure VM SKU (e.g. Standard_B2s)"
|
||||
type = string
|
||||
default = "Standard_B2s"
|
||||
}
|
||||
|
||||
variable "admin_user" {
|
||||
description = "Admin username for SSH on the VM"
|
||||
type = string
|
||||
default = "azureuser"
|
||||
}
|
||||
|
||||
variable "ssh_pub_key_path" {
|
||||
description = "Local path to SSH public key"
|
||||
type = string
|
||||
}
|
||||
Reference in New Issue
Block a user