variable "hackmd_db_password" { type = string sensitive = true } variable "tls_secret_name" { type = string } variable "nfs_server" { type = string } variable "mysql_host" { type = string } resource "kubernetes_namespace" "hackmd" { metadata { name = "hackmd" labels = { "istio-injection" : "disabled" tier = local.tiers.edge } } } module "tls_secret" { source = "../../modules/kubernetes/setup_tls_secret" namespace = kubernetes_namespace.hackmd.metadata[0].name tls_secret_name = var.tls_secret_name } module "nfs_data" { source = "../../modules/kubernetes/nfs_volume" name = "hackmd-data" namespace = kubernetes_namespace.hackmd.metadata[0].name nfs_server = var.nfs_server nfs_path = "/mnt/main/hackmd" } resource "kubernetes_deployment" "hackmd" { metadata { name = "hackmd" namespace = kubernetes_namespace.hackmd.metadata[0].name labels = { app = "hackmd" "kubernetes.io/cluster-service" = "true" tier = local.tiers.edge } } spec { replicas = 1 strategy { type = "RollingUpdate" # DB is external so we can roll } selector { match_labels = { app = "hackmd" } } template { metadata { labels = { app = "hackmd" "kubernetes.io/cluster-service" = "true" } } spec { # container { # image = "postgres:11.6-alpine" # name = "postgres" # image_pull_policy = "IfNotPresent" # env { # name = "POSTGRES_USER" # value = "codimd" # } # env { # name = "POSTGRES_PASSWORD" # value = var.hackmd_db_password # } # env { # name = "POSTGRES_DB" # value = "codimd" # } # resources { # limits = { # cpu = "1" # memory = "1Gi" # } # requests = { # cpu = "1" # memory = "1Gi" # } # } # port { # container_port = 80 # } # volume_mount { # name = "data" # mount_path = "/var/lib/postgresql/data" # sub_path = "postgres" # } # } container { name = "codimd" image = "hackmdio/hackmd" env { name = "CMD_DB_URL" # value = format("%s%s%s", "postgres://codimd:", var.hackmd_db_password, "@localhost/codimd") value = format("%s%s%s", "mysql://codimd:", var.hackmd_db_password, "@${var.mysql_host}/codimd") } env { name = "CMD_USECDN" value = "false" } volume_mount { name = "data" mount_path = "/home/hackmd/app/public/uploads" sub_path = "hackmd" } port { name = "http" container_port = 3000 protocol = "TCP" } resources { requests = { cpu = "15m" memory = "64Mi" } limits = { cpu = "250m" memory = "512Mi" } } } security_context { fs_group = "1500" } volume { name = "data" persistent_volume_claim { claim_name = module.nfs_data.claim_name } } } } } } resource "kubernetes_service" "hackmd" { metadata { name = "hackmd" namespace = kubernetes_namespace.hackmd.metadata[0].name labels = { "app" = "hackmd" } } spec { selector = { app = "hackmd" } port { port = "80" target_port = "3000" } } } module "ingress" { source = "../../modules/kubernetes/ingress_factory" namespace = kubernetes_namespace.hackmd.metadata[0].name name = "hackmd" tls_secret_name = var.tls_secret_name extra_annotations = { "gethomepage.dev/enabled" = "true" "gethomepage.dev/name" = "HackMD" "gethomepage.dev/description" = "Collaborative markdown" "gethomepage.dev/icon" = "hedgedoc.png" "gethomepage.dev/group" = "Development & CI" "gethomepage.dev/pod-selector" = "" } }