Skip to content

Commit 6cc864c

Browse files
chore: Add icons to templates (#5368)
1 parent c6ae151 commit 6cc864c

File tree

19 files changed

+106
-90
lines changed

19 files changed

+106
-90
lines changed

examples/templates/aws-ecs-container/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in an ECS-hosted container
33
description: Get started with Linux development on AWS ECS.
44
tags: [cloud, aws]
5+
icon: /icon/aws.png
56
---
67

78
# aws-ecs

examples/templates/aws-linux/README.md

Lines changed: 44 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Linux on AWS EC2
33
description: Get started with Linux development on AWS EC2.
44
tags: [cloud, aws]
5+
icon: /icon/aws.png
56
---
67

78
# aws-linux
@@ -13,7 +14,7 @@ Follow the on-screen instructions to proceed.
1314

1415
This template assumes that coderd is run in an environment that is authenticated
1516
with AWS. For example, run `aws configure import` to import credentials on the
16-
system and user running coderd. For other ways to authenticate [consult the
17+
system and user running coderd. For other ways to authenticate [consult the
1718
Terraform docs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration).
1819

1920
## Required permissions / policy
@@ -23,49 +24,49 @@ instances provisioned by Coder:
2324

2425
```json
2526
{
26-
"Version": "2012-10-17",
27-
"Statement": [
28-
{
29-
"Sid": "VisualEditor0",
30-
"Effect": "Allow",
31-
"Action": [
32-
"ec2:GetDefaultCreditSpecification",
33-
"ec2:DescribeIamInstanceProfileAssociations",
34-
"ec2:DescribeTags",
35-
"ec2:CreateTags",
36-
"ec2:RunInstances",
37-
"ec2:DescribeInstanceCreditSpecifications",
38-
"ec2:DescribeImages",
39-
"ec2:ModifyDefaultCreditSpecification",
40-
"ec2:DescribeVolumes"
41-
],
42-
"Resource": "*"
43-
},
44-
{
45-
"Sid": "CoderResources",
46-
"Effect": "Allow",
47-
"Action": [
48-
"ec2:DescribeInstances",
49-
"ec2:DescribeInstanceAttribute",
50-
"ec2:UnmonitorInstances",
51-
"ec2:TerminateInstances",
52-
"ec2:StartInstances",
53-
"ec2:StopInstances",
54-
"ec2:DeleteTags",
55-
"ec2:MonitorInstances",
56-
"ec2:CreateTags",
57-
"ec2:RunInstances",
58-
"ec2:ModifyInstanceAttribute",
59-
"ec2:ModifyInstanceCreditSpecification"
60-
],
61-
"Resource": "arn:aws:ec2:*:*:instance/*",
62-
"Condition": {
63-
"StringEquals": {
64-
"aws:ResourceTag/Coder_Provisioned": "true"
65-
}
66-
}
27+
"Version": "2012-10-17",
28+
"Statement": [
29+
{
30+
"Sid": "VisualEditor0",
31+
"Effect": "Allow",
32+
"Action": [
33+
"ec2:GetDefaultCreditSpecification",
34+
"ec2:DescribeIamInstanceProfileAssociations",
35+
"ec2:DescribeTags",
36+
"ec2:CreateTags",
37+
"ec2:RunInstances",
38+
"ec2:DescribeInstanceCreditSpecifications",
39+
"ec2:DescribeImages",
40+
"ec2:ModifyDefaultCreditSpecification",
41+
"ec2:DescribeVolumes"
42+
],
43+
"Resource": "*"
44+
},
45+
{
46+
"Sid": "CoderResources",
47+
"Effect": "Allow",
48+
"Action": [
49+
"ec2:DescribeInstances",
50+
"ec2:DescribeInstanceAttribute",
51+
"ec2:UnmonitorInstances",
52+
"ec2:TerminateInstances",
53+
"ec2:StartInstances",
54+
"ec2:StopInstances",
55+
"ec2:DeleteTags",
56+
"ec2:MonitorInstances",
57+
"ec2:CreateTags",
58+
"ec2:RunInstances",
59+
"ec2:ModifyInstanceAttribute",
60+
"ec2:ModifyInstanceCreditSpecification"
61+
],
62+
"Resource": "arn:aws:ec2:*:*:instance/*",
63+
"Condition": {
64+
"StringEquals": {
65+
"aws:ResourceTag/Coder_Provisioned": "true"
6766
}
68-
]
67+
}
68+
}
69+
]
6970
}
7071
```
7172

examples/templates/aws-windows/README.md

Lines changed: 44 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Windows on AWS
33
description: Get started with Windows development on AWS.
44
tags: [cloud, aws]
5+
icon: /icon/aws.png
56
---
67

78
# aws-windows
@@ -15,7 +16,7 @@ Follow the on-screen instructions to proceed.
1516

1617
This template assumes that coderd is run in an environment that is authenticated
1718
with AWS. For example, run `aws configure import` to import credentials on the
18-
system and user running coderd. For other ways to authenticate [consult the
19+
system and user running coderd. For other ways to authenticate [consult the
1920
Terraform docs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration).
2021

2122
## Required permissions / policy
@@ -25,48 +26,48 @@ instances provisioned by Coder:
2526

2627
```json
2728
{
28-
"Version": "2012-10-17",
29-
"Statement": [
30-
{
31-
"Sid": "VisualEditor0",
32-
"Effect": "Allow",
33-
"Action": [
34-
"ec2:GetDefaultCreditSpecification",
35-
"ec2:DescribeIamInstanceProfileAssociations",
36-
"ec2:DescribeTags",
37-
"ec2:CreateTags",
38-
"ec2:RunInstances",
39-
"ec2:DescribeInstanceCreditSpecifications",
40-
"ec2:DescribeImages",
41-
"ec2:ModifyDefaultCreditSpecification",
42-
"ec2:DescribeVolumes"
43-
],
44-
"Resource": "*"
45-
},
46-
{
47-
"Sid": "CoderResources",
48-
"Effect": "Allow",
49-
"Action": [
50-
"ec2:DescribeInstances",
51-
"ec2:DescribeInstanceAttribute",
52-
"ec2:UnmonitorInstances",
53-
"ec2:TerminateInstances",
54-
"ec2:StartInstances",
55-
"ec2:StopInstances",
56-
"ec2:DeleteTags",
57-
"ec2:MonitorInstances",
58-
"ec2:CreateTags",
59-
"ec2:RunInstances",
60-
"ec2:ModifyInstanceAttribute",
61-
"ec2:ModifyInstanceCreditSpecification"
62-
],
63-
"Resource": "arn:aws:ec2:*:*:instance/*",
64-
"Condition": {
65-
"StringEquals": {
66-
"aws:ResourceTag/Coder_Provisioned": "true"
67-
}
68-
}
29+
"Version": "2012-10-17",
30+
"Statement": [
31+
{
32+
"Sid": "VisualEditor0",
33+
"Effect": "Allow",
34+
"Action": [
35+
"ec2:GetDefaultCreditSpecification",
36+
"ec2:DescribeIamInstanceProfileAssociations",
37+
"ec2:DescribeTags",
38+
"ec2:CreateTags",
39+
"ec2:RunInstances",
40+
"ec2:DescribeInstanceCreditSpecifications",
41+
"ec2:DescribeImages",
42+
"ec2:ModifyDefaultCreditSpecification",
43+
"ec2:DescribeVolumes"
44+
],
45+
"Resource": "*"
46+
},
47+
{
48+
"Sid": "CoderResources",
49+
"Effect": "Allow",
50+
"Action": [
51+
"ec2:DescribeInstances",
52+
"ec2:DescribeInstanceAttribute",
53+
"ec2:UnmonitorInstances",
54+
"ec2:TerminateInstances",
55+
"ec2:StartInstances",
56+
"ec2:StopInstances",
57+
"ec2:DeleteTags",
58+
"ec2:MonitorInstances",
59+
"ec2:CreateTags",
60+
"ec2:RunInstances",
61+
"ec2:ModifyInstanceAttribute",
62+
"ec2:ModifyInstanceCreditSpecification"
63+
],
64+
"Resource": "arn:aws:ec2:*:*:instance/*",
65+
"Condition": {
66+
"StringEquals": {
67+
"aws:ResourceTag/Coder_Provisioned": "true"
6968
}
70-
]
69+
}
70+
}
71+
]
7172
}
7273
```

examples/templates/azure-linux/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Linux on Azure
33
description: Get started with Linux development on Microsoft Azure.
44
tags: [cloud, azure, linux]
5+
icon: /icon/azure.png
56
---
67

78
# azure-linux
@@ -13,5 +14,5 @@ Follow the on-screen instructions to proceed.
1314

1415
This template assumes that coderd is run in an environment that is authenticated
1516
with Azure. For example, run `az login` then `az account set --subscription=<id>`
16-
to import credentials on the system and user running coderd. For other ways to
17+
to import credentials on the system and user running coderd. For other ways to
1718
authenticate [consult the Terraform docs](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs#authenticating-to-azure).

examples/templates/do-linux/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Linux on a Digital Ocean Droplet
33
description: Get started with Linux development on a Digital Ocean Droplet.
44
tags: [cloud, digitalocean]
5+
icon: /icon/do.png
56
---
67

78
# do-linux

examples/templates/docker-code-server/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop code-server in Docker
33
description: Run code-server in a Docker development environment
44
tags: [local, docker]
5+
icon: /icon/docker.png
56
---
67

78
# code-server in Docker

examples/templates/docker-image-builds/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Docker with custom image builds
33
description: Build images and run workspaces on the Docker host with no image registry required
44
tags: [local, docker]
5+
icon: /icon/docker.png
56
---
67

78
# docker-image-builds

examples/templates/docker-with-dotfiles/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Docker with a dotfiles URL
33
description: Run workspaces on a Docker host using registry images
44
tags: [local, docker]
5+
icon: /icon/docker.png
56
---
67

78
# docker-with-dotfiles

examples/templates/docker/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Docker
33
description: Run workspaces on a Docker host using registry images
44
tags: [local, docker]
5+
icon: /icon/docker.png
56
---
67

78
# docker

examples/templates/gcp-linux/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Linux on Google Cloud
33
description: Get started with Linux development on Google Cloud.
44
tags: [cloud, google]
5+
icon: /icon/gcp.png
56
---
67

78
# gcp-linux
@@ -13,7 +14,7 @@ and follow the on-screen instructions to proceed.
1314

1415
This template assumes that coderd is run in an environment that is authenticated
1516
with Google Cloud. For example, run `gcloud auth application-default login` to
16-
import credentials on the system and user running coderd. For other ways to
17+
import credentials on the system and user running coderd. For other ways to
1718
authenticate [consult the Terraform
1819
docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials).
1920

@@ -32,6 +33,7 @@ a service account:
3233

3334
1. Click **Create and continue**, and choose the following IAM roles to grant to
3435
the service account:
36+
3537
- Compute Admin
3638
- Service Account User
3739

examples/templates/gcp-vm-container/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in a container on a Google Cloud VM
33
description: Get started with Linux development on Google Cloud.
44
tags: [cloud, google, container]
5+
icon: /icon/gcp.png
56
---
67

78
# gcp-vm-container
@@ -13,7 +14,7 @@ and follow the on-screen instructions to proceed.
1314

1415
This template assumes that coderd is run in an environment that is authenticated
1516
with Google Cloud. For example, run `gcloud auth application-default login` to
16-
import credentials on the system and user running coderd. For other ways to
17+
import credentials on the system and user running coderd. For other ways to
1718
authenticate [consult the Terraform
1819
docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials).
1920

@@ -32,6 +33,7 @@ a service account:
3233

3334
1. Click **Create and continue**, and choose the following IAM roles to grant to
3435
the service account:
36+
3537
- Compute Admin
3638
- Service Account User
3739

examples/templates/gcp-windows/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Windows on Google Cloud
33
description: Get started with Windows development on Google Cloud.
44
tags: [cloud, google]
5+
icon: /icon/gcp.png
56
---
67

78
# gcp-windows
@@ -13,7 +14,7 @@ and follow the on-screen instructions to proceed.
1314

1415
This template assumes that coderd is run in an environment that is authenticated
1516
with Google Cloud. For example, run `gcloud auth application-default login` to
16-
import credentials on the system and user running coderd. For other ways to
17+
import credentials on the system and user running coderd. For other ways to
1718
authenticate [consult the Terraform
1819
docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials).
1920

@@ -32,6 +33,7 @@ a service account:
3233

3334
1. Click **Create and continue**, and choose the following IAM roles to grant to
3435
the service account:
36+
3537
- Compute Admin
3638
- Service Account User
3739

examples/templates/kubernetes/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
name: Develop in Kubernetes
33
description: Get started with Kubernetes development.
44
tags: [cloud, kubernetes]
5+
icon: /icon/k8s.png
56
---
67

78
# Getting started

site/static/icon/aws.png

1.79 KB
Loading

site/static/icon/azure.png

1.34 KB
Loading

site/static/icon/do.png

1.01 KB
Loading

site/static/icon/docker.png

2.43 KB
Loading

site/static/icon/gcp.png

1.84 KB
Loading

site/static/icon/k8s.png

2.39 KB
Loading

0 commit comments

Comments
 (0)