Skip to content

Commit c58773a

Browse files
committed
updates for avant
1 parent 4d0c82e commit c58773a

File tree

1 file changed

+87
-6
lines changed

1 file changed

+87
-6
lines changed

ansible_osx.yml

Lines changed: 87 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
homebrew/cask-versions,
2121
thoughtbot/formulae,
2222
weaveworks/tap,
23+
hashicorp/tap
2324
]
2425

2526
- name: Install core packages via brew casks
@@ -36,9 +37,9 @@
3637
- google-chrome
3738
- iterm2
3839
- sublime-text
39-
- telegram
40+
# - telegram
4041
- visual-studio-code
41-
- vlc
42+
# - vlc
4243

4344
- name: "Install homebrew packages"
4445
community.general.homebrew:
@@ -66,7 +67,10 @@
6667
'zlib',
6768
'zsh',
6869
'tldr',
69-
'derailed/k9s/k9s'
70+
'derailed/k9s/k9s',
71+
'kubecm',
72+
'spacelift-io/spacelift/spacectl',
73+
'hashicorp/tap/vault'
7074
]
7175
state: present
7276
update_homebrew: yes
@@ -142,18 +146,19 @@
142146
143147
- name: "Setup pipx and venv and atuin"
144148
shell: |
145-
echo '/neval "$(atuin init zsh)"' >> /Users/{{ lookup('env', 'USER') }}/.zshrc
149+
echo '/neval "$(atuin init zsh)"/n' >> /Users/{{ lookup('env', 'USER') }}/.zshrc
146150
pip install --user pipx
147151
pipx ensurepath
148152
source /Users/{{ lookup('env', 'USER') }}/.zshrc
149153
pipx install virtualenv
150154
mkdir /Users/{{ lookup('env', 'USER') }}/venv
151155
156+
# AVANT STUFF
152157
- name: Add venv() function to zshrc
153158
blockinfile:
154159
path: "/Users/{{ lookup('env', 'USER') }}/.zshrc"
155160
block: |
156-
venv() {
161+
function venv() {
157162
local env_name="$1"
158163
local venv_path="$HOME/venv/$env_name"
159164
@@ -166,7 +171,83 @@
166171
source "$venv_path/bin/activate"
167172
fi
168173
}
169-
174+
175+
alias pip=pip3
176+
#AVANT
177+
export AD_USERNAME=ayjain25
178+
export GLOBAL_VAULT_ADDR=https://vault.services.global.avant.com
179+
function vault-global-login {
180+
vault_addr=$GLOBAL_VAULT_ADDR
181+
export VAULT_ADDR=${vault_addr}
182+
vault login -method=ldap username=${AD_USERNAME}
183+
}
184+
185+
# AWS Aliases
186+
alias aws-whoami="aws sts get-caller-identity"
187+
alias assume-avant-prd-app="source ~/.assume-avant-prd-app.sh"
188+
alias assume-avant-prd-ds='source ~/.assume-avant-prd-ds.sh'
189+
alias unassume-aws-role='source ~/.unassume-aws-role.sh'
190+
191+
#EKS Aliases
192+
alias kc=kubecm
193+
alias list-eks="aws eks list-clusters"
194+
alias add-eks="aws eks update-kubeconfig --name "
195+
196+
#Vault Aliases
197+
alias vlogin="vault login -method ldap -no-print"
198+
199+
#Spacelift aliases
200+
alias get-space-stack='export MY_STACK_ID=$(spacectl stack list | fzf | awk -F"|" "{print \$1}" | awk "{\$1=\$1};1")'
201+
alias space-stack-lp='spacectl stack local-preview --id $MY_STACK_ID'
202+
203+
- name: Add assume-avant-prd files
204+
shell:
205+
mkdir /Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-app.sh
206+
mkdir /Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-ds.sh
207+
mkdir /Users/{{ lookup('env', 'USER') }}/.unassume-aws-role.sh
208+
209+
- name: Add assume-avant-prd-app.sh
210+
blockinfile:
211+
path: "/Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-app.sh"
212+
block: |
213+
#!/bin/bash
214+
215+
unset AWS_ACCESS_KEY_ID
216+
unset AWS_SECRET_ACCESS_KEY
217+
unset AWS_SESSION_TOKEN
218+
219+
CREDS=$(aws sts assume-role --role-arn arn:aws:iam::005228414382:role/OrganizationAccountAccessRole --role-session-name OrganizationRole --query "Credentials.[AccessKeyId,SecretAccessKey,SessionToken]" --output text)
220+
221+
export AWS_ACCESS_KEY_ID=$(echo ${CREDS}| cut -f1 -d$'\t')
222+
export AWS_SECRET_ACCESS_KEY=$(echo ${CREDS}| cut -f2 -d$'\t')
223+
export AWS_SESSION_TOKEN=$(echo ${CREDS}| cut -f3 -d$'\t')
224+
225+
- name: Add assume-avant-prd-ds.sh
226+
blockinfile:
227+
path: "/Users/{{ lookup('env', 'USER') }}/.assume-avant-prd-ds.sh"
228+
block: |
229+
#!/bin/bash
230+
231+
unset AWS_ACCESS_KEY_ID
232+
unset AWS_SECRET_ACCESS_KEY
233+
unset AWS_SESSION_TOKEN
234+
235+
CREDS=$(aws sts assume-role --role-arn arn:aws:iam::654641313688:role/OrganizationAccountAccessRole --role-session-name OrganizationRole --query "Credentials.[AccessKeyId,SecretAccessKey,SessionToken]" --output text)
236+
237+
export AWS_ACCESS_KEY_ID=$(echo ${CREDS}| cut -f1 -d$'\t')
238+
export AWS_SECRET_ACCESS_KEY=$(echo ${CREDS}| cut -f2 -d$'\t')
239+
export AWS_SESSION_TOKEN=$(echo ${CREDS}| cut -f3 -d$'\t')
240+
241+
- name: Add unassume-aws-role.sh
242+
blockinfile:
243+
path: "/Users/{{ lookup('env', 'USER') }}/.unassume-aws-role.sh"
244+
block: |
245+
#!/bin/bash
246+
247+
unset AWS_ACCESS_KEY_ID
248+
unset AWS_SECRET_ACCESS_KEY
249+
unset AWS_SESSION_TOKEN
250+
170251
- name: Create ssh key for github
171252
shell: |
172253
mkdir /Users/{{ lookup('env', 'USER') }}/.ssh

0 commit comments

Comments
 (0)