GCP Cloud Provider for Idem
Project description
GCP Cloud Provider for Idem.
About
idem-gcp helps manage GCP with idem.
What is POP?
This project is built with pop, a Python-based implementation of Plugin Oriented Programming (POP). POP seeks to bring together concepts and wisdom from the history of computing in new ways to solve modern computing problems.
For more information:
What is Idem?
This project is built with idem, an idempotent, imperatively executed, declarative programming language written in Python. This project extends idem!
For more information:
Getting Started
DEVELOPMENT
Clone the idem_gcp repository and install with pip.
git clone git@gitlab.com:my-user/idem_gcp.git
cd idem_gcp
Create a virtual environment, and then activate it:
python3 -m venv venv
source venv/bin/activate
Install idem-gcp and other base requirements:
pip3 install -e .
pip3 install -r requirements/base.txt
Install the following packages in order to run the tests:
pip3 install -r requirements/py3.10/tests.txt
NOTE: Change py3.10 if needed with your Python version. There is support for py3.7, py3.8, py3.9 and py3.10.
ACCT
After installation gcp Idem Provider execution and state modules will be accessible to the pop hub. In order to use them we need to set up our credentials.
Create a new file called credentials.yaml and populate it with profiles. The default profile will be used automatically by idem unless you specify one with –acct-profile=profile_name on the cli.
acct backends provide alternate methods for storing profiles.
The gcp provider uses the gcp acct plugin for authentication. A profile needs to specify the authentication parameters for gcp.
credentials.yaml
gcp:
default:
username: my_user
password: my_good_password
endpoint_url: https://console.gcp.com/api
Now encrypt the credentials file and add the encryption key and encrypted file path to the ENVIRONMENT.
The acct command should be available as it is a requisite of idem and idem_gcp. Encrypt the the credential file.
acct encrypt credentials.yaml
output:
-A9ZkiCSOjWYG_lbGmmkVh4jKLFDyOFH4e4S1HNtNwI=
Add these to your environment:
export ACCT_KEY="-A9ZkiCSOjWYG_lbGmmkVh4jKLFDyOFH4e4S1HNtNwI="
export ACCT_FILE=$PWD/credentials.yaml.fernet
USAGE
A profile can be specified for use with a specific state. If no profile is specified, the profile called “default”, if one exists, will be used:
ensure_user_exists:
gcp.user.present:
- acct_profile: my-staging-env
- name: a_user_name
- kwarg1: val1
It can also be specified from the command line when executing states.
idem state --acct-profile my-staging-env my_state.sls
It can also be specified from the command line when calling an exec module directly.
idem exec --acct-profile my-staging-env gcp.user.list
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file idem_gcp-0.19.0.tar.gz
.
File metadata
- Download URL: idem_gcp-0.19.0.tar.gz
- Upload date:
- Size: 185.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.9.6 readme-renderer/37.3 requests/2.28.2 requests-toolbelt/0.10.1 urllib3/1.26.15 tqdm/4.65.0 importlib-metadata/6.4.1 keyring/23.13.1 rfc3986/2.0.0 colorama/0.4.6 CPython/3.9.16
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | cfeed3b896c865a7667637ada1cda970df2e4e48d4bc6fde11bfb734f47231f5 |
|
MD5 | b810495cbbfeeb3caf381c34c996b19c |
|
BLAKE2b-256 | 88799c9ef63c6273f52e5975abfb818cdb5b39bbeb67a051906ffe0fd93cc63a |
File details
Details for the file idem_gcp-0.19.0-py3-none-any.whl
.
File metadata
- Download URL: idem_gcp-0.19.0-py3-none-any.whl
- Upload date:
- Size: 278.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.9.6 readme-renderer/37.3 requests/2.28.2 requests-toolbelt/0.10.1 urllib3/1.26.15 tqdm/4.65.0 importlib-metadata/6.4.1 keyring/23.13.1 rfc3986/2.0.0 colorama/0.4.6 CPython/3.9.16
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e30ebfd6fd683b14461f7fabac4e72cd1e54e8b9caa74aa39bfa64033705ad84 |
|
MD5 | c60e8743e6ab6dc839d4920c996518bb |
|
BLAKE2b-256 | c12661f6a748cff9ca33f9f22891e05b6fefec2290779f0cf5762bb5d443a811 |