BoilerWorks

boilerworks / docs / cli / bootstrap.md
1
# boilerworks bootstrap
2
3
Run Terraform infrastructure layers. Requires a generated ops directory (from `boilerworks init` with `ops: true`).
4
5
```bash
6
boilerworks bootstrap
7
boilerworks bootstrap --dry-run
8
```
9
10
!!! warning "v2 feature"
11
`bootstrap` is a v2 CLI feature. The ops Terraform files are fully functional — run them directly with `./run.sh` in the ops directory. The CLI wrapper is coming in v0.2.
12
13
## Manual bootstrap (v1)
14
15
Until the CLI wrapper lands, use `run.sh` directly:
16
17
```bash
18
cd my-app-ops # or my-app/ops for omni topology
19
20
# Edit cloud config
21
vim aws/config.env # set PROJECT, AWS_REGION
22
23
# Bootstrap state backend (S3 + DynamoDB)
24
./run.sh bootstrap aws dev
25
26
# Plan and apply
27
./run.sh plan aws dev
28
./run.sh apply aws dev
29
```
30
31
## run.sh commands
32
33
| Command | Description |
34
|---------|-------------|
35
| `./run.sh init aws dev` | `terraform init` for AWS dev |
36
| `./run.sh plan aws dev` | `terraform plan` |
37
| `./run.sh apply aws dev` | `terraform apply` |
38
| `./run.sh destroy aws dev` | `terraform destroy` |
39
| `./run.sh fmt` | Format all `.tf` files |
40
| `./run.sh validate` | Validate all Terraform directories |
41
| `./run.sh bootstrap aws dev` | Create state backend + init |
42
43
## What gets created
44
45
Running `./run.sh apply aws dev` provisions:
46
47
- VPC (3 AZs, public/private/database/cache subnets)
48
- ECS Fargate cluster + service
49
- RDS PostgreSQL 16
50
- ElastiCache Redis 7
51
- Application Load Balancer (HTTPS)
52
- Route53 hosted zone + A record
53
- ACM wildcard TLS certificate
54
- S3 file storage bucket
55
- Secrets Manager (db creds, app secrets)
56
- CloudWatch log groups + alarms
57
- IAM roles (ECS task execution, CI/CD)
58
- Security groups (ALB → ECS → RDS/Redis)
59

Keyboard Shortcuts

Open search /
Next entry (timeline) j
Previous entry (timeline) k
Open focused entry Enter
Show this help ?
Toggle theme Top nav button