chore: Add icons to templates (#5368)

This commit is contained in:
Bruno Quaresma
2022-12-09 15:47:09 -03:00
committed by GitHub
parent c6ae151f49
commit 6cc864c048
19 changed files with 106 additions and 90 deletions

View File

@ -2,6 +2,7 @@
name: Develop in an ECS-hosted container name: Develop in an ECS-hosted container
description: Get started with Linux development on AWS ECS. description: Get started with Linux development on AWS ECS.
tags: [cloud, aws] tags: [cloud, aws]
icon: /icon/aws.png
--- ---
# aws-ecs # aws-ecs

View File

@ -2,6 +2,7 @@
name: Develop in Linux on AWS EC2 name: Develop in Linux on AWS EC2
description: Get started with Linux development on AWS EC2. description: Get started with Linux development on AWS EC2.
tags: [cloud, aws] tags: [cloud, aws]
icon: /icon/aws.png
--- ---
# aws-linux # aws-linux
@ -13,7 +14,7 @@ Follow the on-screen instructions to proceed.
This template assumes that coderd is run in an environment that is authenticated This template assumes that coderd is run in an environment that is authenticated
with AWS. For example, run `aws configure import` to import credentials on the with AWS. For example, run `aws configure import` to import credentials on the
system and user running coderd. For other ways to authenticate [consult the system and user running coderd. For other ways to authenticate [consult the
Terraform docs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration). Terraform docs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration).
## Required permissions / policy ## Required permissions / policy
@ -23,49 +24,49 @@ instances provisioned by Coder:
```json ```json
{ {
"Version": "2012-10-17", "Version": "2012-10-17",
"Statement": [ "Statement": [
{ {
"Sid": "VisualEditor0", "Sid": "VisualEditor0",
"Effect": "Allow", "Effect": "Allow",
"Action": [ "Action": [
"ec2:GetDefaultCreditSpecification", "ec2:GetDefaultCreditSpecification",
"ec2:DescribeIamInstanceProfileAssociations", "ec2:DescribeIamInstanceProfileAssociations",
"ec2:DescribeTags", "ec2:DescribeTags",
"ec2:CreateTags", "ec2:CreateTags",
"ec2:RunInstances", "ec2:RunInstances",
"ec2:DescribeInstanceCreditSpecifications", "ec2:DescribeInstanceCreditSpecifications",
"ec2:DescribeImages", "ec2:DescribeImages",
"ec2:ModifyDefaultCreditSpecification", "ec2:ModifyDefaultCreditSpecification",
"ec2:DescribeVolumes" "ec2:DescribeVolumes"
], ],
"Resource": "*" "Resource": "*"
}, },
{ {
"Sid": "CoderResources", "Sid": "CoderResources",
"Effect": "Allow", "Effect": "Allow",
"Action": [ "Action": [
"ec2:DescribeInstances", "ec2:DescribeInstances",
"ec2:DescribeInstanceAttribute", "ec2:DescribeInstanceAttribute",
"ec2:UnmonitorInstances", "ec2:UnmonitorInstances",
"ec2:TerminateInstances", "ec2:TerminateInstances",
"ec2:StartInstances", "ec2:StartInstances",
"ec2:StopInstances", "ec2:StopInstances",
"ec2:DeleteTags", "ec2:DeleteTags",
"ec2:MonitorInstances", "ec2:MonitorInstances",
"ec2:CreateTags", "ec2:CreateTags",
"ec2:RunInstances", "ec2:RunInstances",
"ec2:ModifyInstanceAttribute", "ec2:ModifyInstanceAttribute",
"ec2:ModifyInstanceCreditSpecification" "ec2:ModifyInstanceCreditSpecification"
], ],
"Resource": "arn:aws:ec2:*:*:instance/*", "Resource": "arn:aws:ec2:*:*:instance/*",
"Condition": { "Condition": {
"StringEquals": { "StringEquals": {
"aws:ResourceTag/Coder_Provisioned": "true" "aws:ResourceTag/Coder_Provisioned": "true"
}
}
} }
] }
}
]
} }
``` ```

View File

@ -2,6 +2,7 @@
name: Develop in Windows on AWS name: Develop in Windows on AWS
description: Get started with Windows development on AWS. description: Get started with Windows development on AWS.
tags: [cloud, aws] tags: [cloud, aws]
icon: /icon/aws.png
--- ---
# aws-windows # aws-windows
@ -15,7 +16,7 @@ Follow the on-screen instructions to proceed.
This template assumes that coderd is run in an environment that is authenticated This template assumes that coderd is run in an environment that is authenticated
with AWS. For example, run `aws configure import` to import credentials on the with AWS. For example, run `aws configure import` to import credentials on the
system and user running coderd. For other ways to authenticate [consult the system and user running coderd. For other ways to authenticate [consult the
Terraform docs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration). Terraform docs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration).
## Required permissions / policy ## Required permissions / policy
@ -25,48 +26,48 @@ instances provisioned by Coder:
```json ```json
{ {
"Version": "2012-10-17", "Version": "2012-10-17",
"Statement": [ "Statement": [
{ {
"Sid": "VisualEditor0", "Sid": "VisualEditor0",
"Effect": "Allow", "Effect": "Allow",
"Action": [ "Action": [
"ec2:GetDefaultCreditSpecification", "ec2:GetDefaultCreditSpecification",
"ec2:DescribeIamInstanceProfileAssociations", "ec2:DescribeIamInstanceProfileAssociations",
"ec2:DescribeTags", "ec2:DescribeTags",
"ec2:CreateTags", "ec2:CreateTags",
"ec2:RunInstances", "ec2:RunInstances",
"ec2:DescribeInstanceCreditSpecifications", "ec2:DescribeInstanceCreditSpecifications",
"ec2:DescribeImages", "ec2:DescribeImages",
"ec2:ModifyDefaultCreditSpecification", "ec2:ModifyDefaultCreditSpecification",
"ec2:DescribeVolumes" "ec2:DescribeVolumes"
], ],
"Resource": "*" "Resource": "*"
}, },
{ {
"Sid": "CoderResources", "Sid": "CoderResources",
"Effect": "Allow", "Effect": "Allow",
"Action": [ "Action": [
"ec2:DescribeInstances", "ec2:DescribeInstances",
"ec2:DescribeInstanceAttribute", "ec2:DescribeInstanceAttribute",
"ec2:UnmonitorInstances", "ec2:UnmonitorInstances",
"ec2:TerminateInstances", "ec2:TerminateInstances",
"ec2:StartInstances", "ec2:StartInstances",
"ec2:StopInstances", "ec2:StopInstances",
"ec2:DeleteTags", "ec2:DeleteTags",
"ec2:MonitorInstances", "ec2:MonitorInstances",
"ec2:CreateTags", "ec2:CreateTags",
"ec2:RunInstances", "ec2:RunInstances",
"ec2:ModifyInstanceAttribute", "ec2:ModifyInstanceAttribute",
"ec2:ModifyInstanceCreditSpecification" "ec2:ModifyInstanceCreditSpecification"
], ],
"Resource": "arn:aws:ec2:*:*:instance/*", "Resource": "arn:aws:ec2:*:*:instance/*",
"Condition": { "Condition": {
"StringEquals": { "StringEquals": {
"aws:ResourceTag/Coder_Provisioned": "true" "aws:ResourceTag/Coder_Provisioned": "true"
}
}
} }
] }
}
]
} }
``` ```

View File

@ -2,6 +2,7 @@
name: Develop in Linux on Azure name: Develop in Linux on Azure
description: Get started with Linux development on Microsoft Azure. description: Get started with Linux development on Microsoft Azure.
tags: [cloud, azure, linux] tags: [cloud, azure, linux]
icon: /icon/azure.png
--- ---
# azure-linux # azure-linux
@ -13,5 +14,5 @@ Follow the on-screen instructions to proceed.
This template assumes that coderd is run in an environment that is authenticated This template assumes that coderd is run in an environment that is authenticated
with Azure. For example, run `az login` then `az account set --subscription=<id>` with Azure. For example, run `az login` then `az account set --subscription=<id>`
to import credentials on the system and user running coderd. For other ways to to import credentials on the system and user running coderd. For other ways to
authenticate [consult the Terraform docs](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs#authenticating-to-azure). authenticate [consult the Terraform docs](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs#authenticating-to-azure).

View File

@ -2,6 +2,7 @@
name: Develop in Linux on a Digital Ocean Droplet name: Develop in Linux on a Digital Ocean Droplet
description: Get started with Linux development on a Digital Ocean Droplet. description: Get started with Linux development on a Digital Ocean Droplet.
tags: [cloud, digitalocean] tags: [cloud, digitalocean]
icon: /icon/do.png
--- ---
# do-linux # do-linux

View File

@ -2,6 +2,7 @@
name: Develop code-server in Docker name: Develop code-server in Docker
description: Run code-server in a Docker development environment description: Run code-server in a Docker development environment
tags: [local, docker] tags: [local, docker]
icon: /icon/docker.png
--- ---
# code-server in Docker # code-server in Docker

View File

@ -2,6 +2,7 @@
name: Develop in Docker with custom image builds name: Develop in Docker with custom image builds
description: Build images and run workspaces on the Docker host with no image registry required description: Build images and run workspaces on the Docker host with no image registry required
tags: [local, docker] tags: [local, docker]
icon: /icon/docker.png
--- ---
# docker-image-builds # docker-image-builds

View File

@ -2,6 +2,7 @@
name: Develop in Docker with a dotfiles URL name: Develop in Docker with a dotfiles URL
description: Run workspaces on a Docker host using registry images description: Run workspaces on a Docker host using registry images
tags: [local, docker] tags: [local, docker]
icon: /icon/docker.png
--- ---
# docker-with-dotfiles # docker-with-dotfiles

View File

@ -2,6 +2,7 @@
name: Develop in Docker name: Develop in Docker
description: Run workspaces on a Docker host using registry images description: Run workspaces on a Docker host using registry images
tags: [local, docker] tags: [local, docker]
icon: /icon/docker.png
--- ---
# docker # docker

View File

@ -2,6 +2,7 @@
name: Develop in Linux on Google Cloud name: Develop in Linux on Google Cloud
description: Get started with Linux development on Google Cloud. description: Get started with Linux development on Google Cloud.
tags: [cloud, google] tags: [cloud, google]
icon: /icon/gcp.png
--- ---
# gcp-linux # gcp-linux
@ -13,7 +14,7 @@ and follow the on-screen instructions to proceed.
This template assumes that coderd is run in an environment that is authenticated This template assumes that coderd is run in an environment that is authenticated
with Google Cloud. For example, run `gcloud auth application-default login` to with Google Cloud. For example, run `gcloud auth application-default login` to
import credentials on the system and user running coderd. For other ways to import credentials on the system and user running coderd. For other ways to
authenticate [consult the Terraform authenticate [consult the Terraform
docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials). docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials).
@ -32,6 +33,7 @@ a service account:
1. Click **Create and continue**, and choose the following IAM roles to grant to 1. Click **Create and continue**, and choose the following IAM roles to grant to
the service account: the service account:
- Compute Admin - Compute Admin
- Service Account User - Service Account User

View File

@ -2,6 +2,7 @@
name: Develop in a container on a Google Cloud VM name: Develop in a container on a Google Cloud VM
description: Get started with Linux development on Google Cloud. description: Get started with Linux development on Google Cloud.
tags: [cloud, google, container] tags: [cloud, google, container]
icon: /icon/gcp.png
--- ---
# gcp-vm-container # gcp-vm-container
@ -13,7 +14,7 @@ and follow the on-screen instructions to proceed.
This template assumes that coderd is run in an environment that is authenticated This template assumes that coderd is run in an environment that is authenticated
with Google Cloud. For example, run `gcloud auth application-default login` to with Google Cloud. For example, run `gcloud auth application-default login` to
import credentials on the system and user running coderd. For other ways to import credentials on the system and user running coderd. For other ways to
authenticate [consult the Terraform authenticate [consult the Terraform
docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials). docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials).
@ -32,6 +33,7 @@ a service account:
1. Click **Create and continue**, and choose the following IAM roles to grant to 1. Click **Create and continue**, and choose the following IAM roles to grant to
the service account: the service account:
- Compute Admin - Compute Admin
- Service Account User - Service Account User

View File

@ -2,6 +2,7 @@
name: Develop in Windows on Google Cloud name: Develop in Windows on Google Cloud
description: Get started with Windows development on Google Cloud. description: Get started with Windows development on Google Cloud.
tags: [cloud, google] tags: [cloud, google]
icon: /icon/gcp.png
--- ---
# gcp-windows # gcp-windows
@ -13,7 +14,7 @@ and follow the on-screen instructions to proceed.
This template assumes that coderd is run in an environment that is authenticated This template assumes that coderd is run in an environment that is authenticated
with Google Cloud. For example, run `gcloud auth application-default login` to with Google Cloud. For example, run `gcloud auth application-default login` to
import credentials on the system and user running coderd. For other ways to import credentials on the system and user running coderd. For other ways to
authenticate [consult the Terraform authenticate [consult the Terraform
docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials). docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials).
@ -32,6 +33,7 @@ a service account:
1. Click **Create and continue**, and choose the following IAM roles to grant to 1. Click **Create and continue**, and choose the following IAM roles to grant to
the service account: the service account:
- Compute Admin - Compute Admin
- Service Account User - Service Account User

View File

@ -2,6 +2,7 @@
name: Develop in Kubernetes name: Develop in Kubernetes
description: Get started with Kubernetes development. description: Get started with Kubernetes development.
tags: [cloud, kubernetes] tags: [cloud, kubernetes]
icon: /icon/k8s.png
--- ---
# Getting started # Getting started

BIN
site/static/icon/aws.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.8 KiB

BIN
site/static/icon/azure.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.3 KiB

BIN
site/static/icon/do.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.0 KiB

BIN
site/static/icon/docker.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.4 KiB

BIN
site/static/icon/gcp.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.8 KiB

BIN
site/static/icon/k8s.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.4 KiB