|
20 | 20 | homebrew/cask-versions,
|
21 | 21 | thoughtbot/formulae,
|
22 | 22 | weaveworks/tap,
|
| 23 | + hashicorp/tap |
23 | 24 | ]
|
24 | 25 |
|
25 | 26 | - name: Install core packages via brew casks
|
|
36 | 37 | - google-chrome
|
37 | 38 | - iterm2
|
38 | 39 | - sublime-text
|
39 |
| - - telegram |
| 40 | + # - telegram |
40 | 41 | - visual-studio-code
|
41 |
| - - vlc |
| 42 | + # - vlc |
42 | 43 |
|
43 | 44 | - name: "Install homebrew packages"
|
44 | 45 | community.general.homebrew:
|
|
66 | 67 | 'zlib',
|
67 | 68 | 'zsh',
|
68 | 69 | 'tldr',
|
69 |
| - 'derailed/k9s/k9s' |
| 70 | + 'derailed/k9s/k9s', |
| 71 | + 'kubecm', |
| 72 | + 'spacelift-io/spacelift/spacectl', |
| 73 | + 'hashicorp/tap/vault', |
| 74 | + 'hashicorp/tap/terraform' |
70 | 75 | ]
|
71 | 76 | state: present
|
72 | 77 | update_homebrew: yes
|
|
142 | 147 |
|
143 | 148 | - name: "Setup pipx and venv and atuin"
|
144 | 149 | shell: |
|
145 |
| - echo '/neval "$(atuin init zsh)"' >> /Users/{{ lookup('env', 'USER') }}/.zshrc |
| 150 | + echo '/neval "$(atuin init zsh)"/n' >> /Users/{{ lookup('env', 'USER') }}/.zshrc |
146 | 151 | pip install --user pipx
|
147 | 152 | pipx ensurepath
|
148 | 153 | source /Users/{{ lookup('env', 'USER') }}/.zshrc
|
149 | 154 | pipx install virtualenv
|
150 | 155 | mkdir /Users/{{ lookup('env', 'USER') }}/venv
|
151 | 156 |
|
| 157 | + # AVANT STUFF |
152 | 158 | - name: Add venv() function to zshrc
|
153 | 159 | blockinfile:
|
154 | 160 | path: "/Users/{{ lookup('env', 'USER') }}/.zshrc"
|
155 | 161 | block: |
|
156 |
| - venv() { |
| 162 | + function venv() { |
157 | 163 | local env_name="$1"
|
158 | 164 | local venv_path="$HOME/venv/$env_name"
|
159 | 165 |
|
|
166 | 172 | source "$venv_path/bin/activate"
|
167 | 173 | fi
|
168 | 174 | }
|
169 |
| - |
| 175 | +
|
| 176 | + alias pip=pip3 |
| 177 | + #AVANT |
| 178 | + export AD_USERNAME=ayjain25 |
| 179 | + export GLOBAL_VAULT_ADDR=https://vault.services.global.avant.com |
| 180 | + function vault-global-login { |
| 181 | + vault_addr=$GLOBAL_VAULT_ADDR |
| 182 | + export VAULT_ADDR=${vault_addr} |
| 183 | + vault login -method=ldap username=${AD_USERNAME} |
| 184 | + } |
| 185 | +
|
| 186 | + # AWS Aliases |
| 187 | + alias aws-whoami="aws sts get-caller-identity" |
| 188 | + alias assume-avant-prd-app="source ~/.assume-avant-prd-app.sh" |
| 189 | + alias assume-avant-prd-ds='source ~/.assume-avant-prd-ds.sh' |
| 190 | + alias unassume-aws-role='source ~/.unassume-aws-role.sh' |
| 191 | +
|
| 192 | + #EKS Aliases |
| 193 | + alias kc=kubecm |
| 194 | + alias list-eks="aws eks list-clusters" |
| 195 | + alias add-eks="aws eks update-kubeconfig --name " |
| 196 | +
|
| 197 | + #Vault Aliases |
| 198 | + alias vlogin="vault login -method ldap -no-print" |
| 199 | +
|
| 200 | + #Spacelift aliases |
| 201 | + alias get-space-stack='export MY_STACK_ID=$(spacectl stack list | fzf | awk -F"|" "{print \$1}" | awk "{\$1=\$1};1")' |
| 202 | + alias space-stack-lp='spacectl stack local-preview --id $MY_STACK_ID' |
| 203 | +
|
| 204 | + - name: Add assume-avant-prd files |
| 205 | + shell: |
| 206 | + mkdir /Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-app.sh |
| 207 | + mkdir /Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-ds.sh |
| 208 | + mkdir /Users/{{ lookup('env', 'USER') }}/.unassume-aws-role.sh |
| 209 | + |
| 210 | + - name: Add assume-avant-prd-app.sh |
| 211 | + blockinfile: |
| 212 | + path: "/Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-app.sh" |
| 213 | + block: | |
| 214 | + #!/bin/bash |
| 215 | +
|
| 216 | + unset AWS_ACCESS_KEY_ID |
| 217 | + unset AWS_SECRET_ACCESS_KEY |
| 218 | + unset AWS_SESSION_TOKEN |
| 219 | +
|
| 220 | + CREDS=$(aws sts assume-role --role-arn arn:aws:iam::005228414382:role/OrganizationAccountAccessRole --role-session-name OrganizationRole --query "Credentials.[AccessKeyId,SecretAccessKey,SessionToken]" --output text) |
| 221 | +
|
| 222 | + export AWS_ACCESS_KEY_ID=$(echo ${CREDS}| cut -f1 -d$'\t') |
| 223 | + export AWS_SECRET_ACCESS_KEY=$(echo ${CREDS}| cut -f2 -d$'\t') |
| 224 | + export AWS_SESSION_TOKEN=$(echo ${CREDS}| cut -f3 -d$'\t') |
| 225 | +
|
| 226 | + - name: Add assume-avant-prd-ds.sh |
| 227 | + blockinfile: |
| 228 | + path: "/Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-ds.sh" |
| 229 | + block: | |
| 230 | + #!/bin/bash |
| 231 | +
|
| 232 | + unset AWS_ACCESS_KEY_ID |
| 233 | + unset AWS_SECRET_ACCESS_KEY |
| 234 | + unset AWS_SESSION_TOKEN |
| 235 | +
|
| 236 | + CREDS=$(aws sts assume-role --role-arn arn:aws:iam::654641313688:role/OrganizationAccountAccessRole --role-session-name OrganizationRole --query "Credentials.[AccessKeyId,SecretAccessKey,SessionToken]" --output text) |
| 237 | +
|
| 238 | + export AWS_ACCESS_KEY_ID=$(echo ${CREDS}| cut -f1 -d$'\t') |
| 239 | + export AWS_SECRET_ACCESS_KEY=$(echo ${CREDS}| cut -f2 -d$'\t') |
| 240 | + export AWS_SESSION_TOKEN=$(echo ${CREDS}| cut -f3 -d$'\t') |
| 241 | + |
| 242 | + - name: Add unassume-aws-role.sh |
| 243 | + blockinfile: |
| 244 | + path: "/Users/{{ lookup('env', 'USER') }}/.unassume-aws-role.sh" |
| 245 | + block: | |
| 246 | + #!/bin/bash |
| 247 | +
|
| 248 | + unset AWS_ACCESS_KEY_ID |
| 249 | + unset AWS_SECRET_ACCESS_KEY |
| 250 | + unset AWS_SESSION_TOKEN |
| 251 | +
|
170 | 252 | - name: Create ssh key for github
|
171 | 253 | shell: |
|
172 | 254 | mkdir /Users/{{ lookup('env', 'USER') }}/.ssh
|
|
0 commit comments