aboutsummaryrefslogtreecommitdiffstats
path: root/terraform-ci-infra/2n_aws_c5n/deploy/main.tf
diff options
context:
space:
mode:
authorTomas Alexy <tomas.alexy@pantheon.tech>2021-01-28 08:59:22 +0100
committerPeter Mikus <pmikus@cisco.com>2021-02-18 13:51:53 +0000
commita678231f39f4d4ea079018e7d11be36d0cc454d2 (patch)
tree973ad7d06ef0a419b945e7bfab0cee8818039c01 /terraform-ci-infra/2n_aws_c5n/deploy/main.tf
parent98d86e98c9bc9d2ed10b01fb81d6d7e02f09eb51 (diff)
Infra: Fix AWS deployment
Signed-off-by: Tomas Alexy <tomas.alexy@pantheon.tech> Change-Id: Ie24f5fac5827e28b1ac7c22192a94994700b2910
Diffstat (limited to 'terraform-ci-infra/2n_aws_c5n/deploy/main.tf')
-rw-r--r--terraform-ci-infra/2n_aws_c5n/deploy/main.tf380
1 files changed, 380 insertions, 0 deletions
diff --git a/terraform-ci-infra/2n_aws_c5n/deploy/main.tf b/terraform-ci-infra/2n_aws_c5n/deploy/main.tf
new file mode 100644
index 0000000000..7fe815188e
--- /dev/null
+++ b/terraform-ci-infra/2n_aws_c5n/deploy/main.tf
@@ -0,0 +1,380 @@
+provider "aws" {
+ region = var.region
+}
+
+resource "aws_vpc" "CSITVPC" {
+ cidr_block = var.vpc_cidr_mgmt
+
+ tags = {
+ "Name" = "${var.resources_name_prefix}_${var.testbed_name}-vpc"
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_security_group" "CSITSG" {
+ name = "${var.resources_name_prefix}_${var.testbed_name}-sg"
+ description = "Allow inbound traffic"
+ vpc_id = aws_vpc.CSITVPC.id
+ depends_on = [aws_vpc.CSITVPC]
+
+ ingress {
+ from_port = 22
+ to_port = 22
+ protocol = "tcp"
+ cidr_blocks = ["0.0.0.0/0"]
+ }
+
+ ingress {
+ from_port = 0
+ to_port = 0
+ protocol = -1
+ self = true
+ }
+
+ egress {
+ from_port = 0
+ to_port = 0
+ protocol = "-1"
+ cidr_blocks = ["0.0.0.0/0"]
+ }
+
+ tags = {
+ "Name" = "${var.resources_name_prefix}_${var.testbed_name}-sg"
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_vpc_ipv4_cidr_block_association" "b" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_b
+ depends_on = [aws_vpc.CSITVPC]
+}
+resource "aws_vpc_ipv4_cidr_block_association" "c" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_c
+ depends_on = [aws_vpc.CSITVPC]
+}
+resource "aws_vpc_ipv4_cidr_block_association" "d" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_d
+ depends_on = [aws_vpc.CSITVPC]
+}
+
+# Subnets
+resource "aws_subnet" "mgmt" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_mgmt
+ availability_zone = var.avail_zone
+ depends_on = [aws_vpc.CSITVPC]
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+resource "aws_subnet" "b" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_b
+ availability_zone = var.avail_zone
+ depends_on = [aws_vpc.CSITVPC, aws_vpc_ipv4_cidr_block_association.b]
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+resource "aws_subnet" "c" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_c
+ availability_zone = var.avail_zone
+ depends_on = [aws_vpc.CSITVPC, aws_vpc_ipv4_cidr_block_association.c]
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+resource "aws_subnet" "d" {
+ vpc_id = aws_vpc.CSITVPC.id
+ cidr_block = var.vpc_cidr_d
+ availability_zone = var.avail_zone
+ depends_on = [aws_vpc.CSITVPC, aws_vpc_ipv4_cidr_block_association.d]
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_internet_gateway" "CSITGW" {
+ vpc_id = aws_vpc.CSITVPC.id
+ depends_on = [aws_vpc.CSITVPC]
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+
+# SSH keypair
+# Temporary key for provisioning only
+resource "tls_private_key" "CSITTLS" {
+ algorithm = "RSA"
+ rsa_bits = 4096
+}
+resource "aws_key_pair" "CSITKP" {
+ key_name = "${var.resources_name_prefix}_${var.testbed_name}-key"
+ public_key = tls_private_key.CSITTLS.public_key_openssh
+}
+
+resource "aws_placement_group" "CSITPG" {
+ name = "${var.resources_name_prefix}_${var.testbed_name}-pg"
+ strategy = "cluster"
+}
+
+# NICs
+resource "aws_network_interface" "dut1_if1" {
+ subnet_id = aws_subnet.b.id
+ source_dest_check = false
+ private_ip = var.dut1_if1_ip
+ private_ips = [var.dut1_if1_ip]
+ security_groups = [aws_security_group.CSITSG.id]
+ depends_on = [aws_vpc.CSITVPC, aws_subnet.b]
+
+ attachment {
+ instance = aws_instance.dut1.id
+ device_index = 1
+ }
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_network_interface" "dut1_if2" {
+ subnet_id = aws_subnet.d.id
+ source_dest_check = false
+ private_ip = var.dut1_if2_ip
+ private_ips = [var.dut1_if2_ip]
+ security_groups = [aws_security_group.CSITSG.id]
+ depends_on = [aws_vpc.CSITVPC]
+
+ attachment {
+ instance = aws_instance.dut1.id
+ device_index = 2
+ }
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_network_interface" "tg_if1" {
+ subnet_id = aws_subnet.b.id
+ source_dest_check = false
+ private_ip = var.tg_if1_ip
+ private_ips = [var.tg_if1_ip]
+ security_groups = [aws_security_group.CSITSG.id]
+ depends_on = [aws_vpc.CSITVPC, aws_subnet.b]
+
+ attachment {
+ instance = aws_instance.tg.id
+ device_index = 1
+ }
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_network_interface" "tg_if2" {
+ subnet_id = aws_subnet.d.id
+ source_dest_check = false
+ private_ip = var.tg_if2_ip
+ private_ips = [var.tg_if2_ip]
+ security_groups = [aws_security_group.CSITSG.id]
+ depends_on = [aws_vpc.CSITVPC, aws_subnet.d]
+
+ attachment {
+ instance = aws_instance.tg.id
+ device_index = 2
+ }
+
+ tags = {
+ "Environment" = var.environment_name
+ }
+}
+
+data "aws_network_interface" "dut1_if1" {
+ id = aws_network_interface.dut1_if1.id
+}
+
+data "aws_network_interface" "dut1_if2" {
+ id = aws_network_interface.dut1_if2.id
+}
+
+data "aws_network_interface" "tg_if1" {
+ id = aws_network_interface.tg_if1.id
+}
+
+data "aws_network_interface" "tg_if2" {
+ id = aws_network_interface.tg_if2.id
+}
+
+# Instances
+resource "aws_instance" "tg" {
+ ami = var.ami_image
+ availability_zone = var.avail_zone
+ instance_type = var.instance_type
+ key_name = aws_key_pair.CSITKP.key_name
+ associate_public_ip_address = true
+ subnet_id = aws_subnet.mgmt.id
+ private_ip = var.tg_mgmt_ip
+ vpc_security_group_ids = [aws_security_group.CSITSG.id]
+ placement_group = aws_placement_group.CSITPG.id
+ source_dest_check = false
+ depends_on = [aws_vpc.CSITVPC, aws_placement_group.CSITPG]
+ # host_id = "1"
+
+ root_block_device {
+ volume_size = 50
+ }
+
+ tags = {
+ "Name" = "${var.resources_name_prefix}_${var.testbed_name}-tg"
+ "Environment" = var.environment_name
+ }
+}
+
+resource "aws_instance" "dut1" {
+ ami = var.ami_image
+ availability_zone = var.avail_zone
+ instance_type = var.instance_type
+ key_name = aws_key_pair.CSITKP.key_name
+ associate_public_ip_address = true
+ subnet_id = aws_subnet.mgmt.id
+ private_ip = var.dut1_mgmt_ip
+ vpc_security_group_ids = [aws_security_group.CSITSG.id]
+ placement_group = aws_placement_group.CSITPG.id
+ source_dest_check = false
+ depends_on = [aws_vpc.CSITVPC, aws_placement_group.CSITPG]
+ # host_id = "2"
+
+ root_block_device {
+ volume_size = 50
+ }
+
+ tags = {
+ "Name" = "${var.resources_name_prefix}_${var.testbed_name}-dut1"
+ "Environment" = var.environment_name
+ }
+}
+
+# Routes
+resource "aws_route" "CSIT-igw" {
+ route_table_id = aws_vpc.CSITVPC.main_route_table_id
+ gateway_id = aws_internet_gateway.CSITGW.id
+ destination_cidr_block = "0.0.0.0/0"
+ depends_on = [aws_vpc.CSITVPC, aws_internet_gateway.CSITGW]
+}
+
+resource "aws_route" "dummy-trex-port-0" {
+ route_table_id = aws_vpc.CSITVPC.main_route_table_id
+ network_interface_id = aws_instance.tg.primary_network_interface_id
+ destination_cidr_block = var.trex_dummy_cidr_port_0
+ depends_on = [aws_vpc.CSITVPC, aws_instance.dut1]
+}
+
+resource "aws_route" "dummy-trex-port-1" {
+ route_table_id = aws_vpc.CSITVPC.main_route_table_id
+ network_interface_id = aws_instance.tg.primary_network_interface_id
+ destination_cidr_block = var.trex_dummy_cidr_port_1
+ depends_on = [aws_vpc.CSITVPC, aws_instance.dut1]
+}
+
+# Deployment/Ansible
+resource "null_resource" "deploy_tg" {
+ depends_on = [
+ aws_instance.tg,
+ aws_network_interface.tg_if1,
+ aws_network_interface.tg_if2
+ ]
+
+ connection {
+ user = "ubuntu"
+ host = aws_instance.tg.public_ip
+ private_key = tls_private_key.CSITTLS.private_key_pem
+ }
+
+ provisioner "remote-exec" {
+ inline = var.first_run_commands
+ }
+
+ provisioner "ansible" {
+ plays {
+ playbook {
+ file_path = var.ansible_file_path
+ force_handlers = true
+ }
+ hosts = ["tg_aws"]
+ extra_vars = {
+ ansible_ssh_pass = var.ansible_provision_pwd
+ ansible_python_interpreter = var.ansible_python_executable
+ aws = true
+ }
+ }
+ }
+}
+
+resource "null_resource" "deploy_dut1" {
+ depends_on = [
+ aws_instance.dut1,
+ aws_network_interface.dut1_if1,
+ aws_network_interface.dut1_if2
+ ]
+
+ connection {
+ user = "ubuntu"
+ host = aws_instance.dut1.public_ip
+ private_key = tls_private_key.CSITTLS.private_key_pem
+ }
+
+ provisioner "remote-exec" {
+ inline = var.first_run_commands
+ }
+
+ provisioner "ansible" {
+ plays {
+ playbook {
+ file_path = var.ansible_file_path
+ force_handlers = true
+ }
+ hosts = ["sut_aws"]
+ extra_vars = {
+ ansible_ssh_pass = var.ansible_provision_pwd
+ ansible_python_interpreter = var.ansible_python_executable
+ aws = true
+ }
+ }
+ }
+}
+
+resource "null_resource" "deploy_topology" {
+ depends_on = [ aws_instance.tg, aws_instance.dut1 ]
+
+ provisioner "ansible" {
+ plays {
+ playbook {
+ file_path = var.ansible_topology_path
+ }
+ hosts = ["local"]
+ extra_vars = {
+ ansible_python_interpreter = var.ansible_python_executable
+ testbed_name = var.testbed_name
+ cloud_topology = var.topology_name
+ tg_if1_mac = data.aws_network_interface.tg_if1.mac_address
+ tg_if2_mac = data.aws_network_interface.tg_if2.mac_address
+ dut1_if1_mac = data.aws_network_interface.dut1_if1.mac_address
+ dut1_if2_mac = data.aws_network_interface.dut1_if2.mac_address
+ tg_public_ip = aws_instance.tg.public_ip
+ dut1_public_ip = aws_instance.dut1.public_ip
+ public_ip_list = "${aws_instance.tg.public_ip},${aws_instance.dut1.public_ip}"
+ }
+ }
+ }
+}