[ci skip] Move Terraform modules into stack directories
Move all 88 service modules (66 individual + 22 platform) from modules/kubernetes/<service>/ into their corresponding stack directories: - Service stacks: stacks/<service>/module/ - Platform stack: stacks/platform/modules/<service>/ This collocates module source code with its Terragrunt definition. Only shared utility modules remain in modules/kubernetes/: ingress_factory, setup_tls_secret, dockerhub_secret, oauth-proxy. All cross-references to shared modules updated to use correct relative paths. Verified with terragrunt run --all -- plan: 0 adds, 0 destroys across all 68 stacks.
This commit is contained in:
parent
73cb696f12
commit
e225e81ebf
614 changed files with 12075 additions and 352 deletions
201
stacks/webhook_handler/module/main.tf
Normal file
201
stacks/webhook_handler/module/main.tf
Normal file
|
|
@ -0,0 +1,201 @@
|
|||
|
||||
variable "tls_secret_name" {}
|
||||
variable "tier" { type = string }
|
||||
variable "webhook_secret" {}
|
||||
variable "fb_verify_token" {}
|
||||
variable "fb_page_token" {}
|
||||
variable "fb_app_secret" {}
|
||||
variable "git_user" {}
|
||||
variable "git_token" {}
|
||||
variable "ssh_key" {}
|
||||
|
||||
resource "kubernetes_namespace" "webhook-handler" {
|
||||
metadata {
|
||||
name = "webhook-handler"
|
||||
labels = {
|
||||
tier = var.tier
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
module "tls_secret" {
|
||||
source = "../../../modules/kubernetes/setup_tls_secret"
|
||||
namespace = kubernetes_namespace.webhook-handler.metadata[0].name
|
||||
tls_secret_name = var.tls_secret_name
|
||||
}
|
||||
|
||||
resource "kubernetes_cluster_role" "deployment_updater" {
|
||||
metadata {
|
||||
name = "deployment-updater"
|
||||
}
|
||||
|
||||
rule {
|
||||
verbs = ["create", "update", "get", "patch", "list"]
|
||||
api_groups = ["extensions", "apps", ""]
|
||||
resources = ["deployments", "namespaces", "pods", "services"]
|
||||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_cluster_role_binding" "update_deployment_binding" {
|
||||
metadata {
|
||||
name = "update-deployment-binding"
|
||||
}
|
||||
|
||||
subject {
|
||||
kind = "ServiceAccount"
|
||||
name = "default"
|
||||
namespace = kubernetes_namespace.webhook-handler.metadata[0].name
|
||||
}
|
||||
|
||||
role_ref {
|
||||
api_group = "rbac.authorization.k8s.io"
|
||||
kind = "ClusterRole"
|
||||
name = "deployment-updater"
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
resource "kubernetes_secret" "ssh-key" {
|
||||
metadata {
|
||||
name = "ssh-key"
|
||||
namespace = kubernetes_namespace.webhook-handler.metadata[0].name
|
||||
|
||||
annotations = {
|
||||
"reloader.stakater.com/match" = "true"
|
||||
}
|
||||
}
|
||||
data = {
|
||||
"id_rsa" = var.ssh_key
|
||||
}
|
||||
type = "generic"
|
||||
}
|
||||
resource "kubernetes_deployment" "webhook_handler" {
|
||||
metadata {
|
||||
name = "webhook-handler"
|
||||
namespace = kubernetes_namespace.webhook-handler.metadata[0].name
|
||||
labels = {
|
||||
app = "webhook-handler"
|
||||
tier = var.tier
|
||||
}
|
||||
annotations = {
|
||||
"reloader.stakater.com/search" = "true"
|
||||
}
|
||||
}
|
||||
spec {
|
||||
replicas = 1
|
||||
selector {
|
||||
match_labels = {
|
||||
app = "webhook-handler"
|
||||
}
|
||||
}
|
||||
template {
|
||||
metadata {
|
||||
labels = {
|
||||
app = "webhook-handler"
|
||||
}
|
||||
}
|
||||
spec {
|
||||
container {
|
||||
# security_context {
|
||||
# run_as_user = 1000
|
||||
# }
|
||||
# lifecycle {
|
||||
# post_start {
|
||||
# exec {
|
||||
# # Must be kept in sycn with webhook_handler dockerfile
|
||||
# command = ["echo", "\"$SSH_KEY\"", ">", "/opt/id_rsa", "&&", "chown", "appuser", "/opt/id_rsa", "&&", "chmod", "600", "/opt/id_rsa"]
|
||||
# }
|
||||
# }
|
||||
# }
|
||||
image = "viktorbarzin/webhook-handler:latest"
|
||||
name = "webhook-handler"
|
||||
resources {
|
||||
limits = {
|
||||
cpu = "0.5"
|
||||
memory = "512Mi"
|
||||
}
|
||||
requests = {
|
||||
cpu = "250m"
|
||||
memory = "50Mi"
|
||||
}
|
||||
}
|
||||
port {
|
||||
container_port = 80
|
||||
}
|
||||
volume_mount {
|
||||
name = "id-rsa"
|
||||
mount_path = "/opt/id_rsa"
|
||||
sub_path = "id_rsa"
|
||||
}
|
||||
env {
|
||||
name = "WEBHOOKSECRET"
|
||||
value = var.webhook_secret
|
||||
}
|
||||
env {
|
||||
name = "FB_APP_SECRET"
|
||||
value = var.fb_app_secret
|
||||
}
|
||||
env {
|
||||
name = "FB_VERIFY_TOKEN"
|
||||
value = var.fb_verify_token
|
||||
}
|
||||
env {
|
||||
name = "FB_PAGE_TOKEN"
|
||||
value = var.fb_page_token
|
||||
}
|
||||
env {
|
||||
name = "CONFIG"
|
||||
value = "./chatbot/config/viktorwebservices.yaml"
|
||||
}
|
||||
env {
|
||||
name = "GIT_USER"
|
||||
value = var.git_user
|
||||
}
|
||||
env {
|
||||
name = "GIT_TOKEN"
|
||||
value = var.git_token
|
||||
}
|
||||
env {
|
||||
name = "SSH_KEY"
|
||||
value = "/opt/id_rsa"
|
||||
}
|
||||
}
|
||||
volume {
|
||||
name = "id-rsa"
|
||||
secret {
|
||||
secret_name = "ssh-key"
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_service" "webhook_handler" {
|
||||
metadata {
|
||||
name = "webhook-handler"
|
||||
namespace = kubernetes_namespace.webhook-handler.metadata[0].name
|
||||
labels = {
|
||||
"app" = "webhook-handler"
|
||||
}
|
||||
}
|
||||
|
||||
spec {
|
||||
selector = {
|
||||
app = "webhook-handler"
|
||||
}
|
||||
port {
|
||||
port = "80"
|
||||
target_port = "3000"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
module "ingress" {
|
||||
source = "../../../modules/kubernetes/ingress_factory"
|
||||
namespace = kubernetes_namespace.webhook-handler.metadata[0].name
|
||||
name = "webhook-handler"
|
||||
host = "webhook"
|
||||
tls_secret_name = var.tls_secret_name
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue