Separates Into SubModules

This commit is contained in:
2023-09-22 17:13:24 -03:00
parent 0eca3287d1
commit 6a36d215b9
19 changed files with 592 additions and 288 deletions

35
.gitignore vendored
View File

@@ -1,7 +1,36 @@
*.json
.terraform/*
# Local .terraform directories
**/.terraform/*
**.hcl
# .tfstate files
*.tfstate
*.tfstate.backup
*.tfstate.*
# Crash log files
crash.log
crash.*.log
# Exclude all .tfvars files, which are likely to contain sensitive data, such as
# password, private keys, and other secrets. These should not be part of version
# control as they are data points which are potentially sensitive and subject
# to change depending on the environment.
*.tfvars
*.tfvars.json
# Ignore override files as they are usually used to override resources locally and so
# are not checked in
override.tf
override.tf.json
*_override.tf
*_override.tf.json
# Include override files you do wish to add to version control using negated pattern
# !example_override.tf
# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan
# example: *tfplan*
# Ignore CLI configuration files
.terraformrc
terraform.rc

47
.terraform.lock.hcl generated Normal file
View File

@@ -0,0 +1,47 @@
# This file is maintained automatically by "terraform init".
# Manual edits may be lost in future updates.
provider "registry.terraform.io/hashicorp/aws" {
version = "5.17.0"
hashes = [
"h1:U+EDfeUqefebA1h7KyBMD1xH0h311LMi7wijPDPkC/0=",
"zh:0087b9dd2c9c638fd63e527e5b9b70988008e263d480a199f180efe5a4f070f0",
"zh:0fd532a4fd03ddef11f0502ff9fe4343443e1ae805cb088825a71d6d48906ec7",
"zh:16411e731100cd15f7e165f53c23be784b2c86c2fcfd34781e0642d17090d342",
"zh:251d520927e77f091e2ec6302e921d839a2430ac541c6a461aed7c08fb5eae12",
"zh:4919e69682dc2a8c32d44f6ebc038a52c9f40af9c61cb574b64e322800d6a794",
"zh:5334c60759d5f76bdc51355d1a3ebcc451d4d20f632f5c73b6e55c52b5dc9e52",
"zh:7341a2b7247572eba0d0486094a870b872967702ec0ac7af728c2df2c30af4e5",
"zh:81d1b1cb2cac6b3922a05adab69543b678f344a01debd54500263700dad7a288",
"zh:882bc8e15ef6d4020a07321ec4c056977c5c1d96934118032922561d29504d43",
"zh:8cd4871ef2b03fd916de1a6dc7eb8a81a354c421177d4334a2e3308e50215e41",
"zh:97e12fe6529b21298adf1046c5e20ac35d0569c836a6f385ff041e257e00cfd2",
"zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425",
"zh:9f5baf5d59b9f3cf5504d1fa975f10f27da3791896a9e18ece47c258bac17634",
"zh:dffafba6731ac1db1c540bdbd6a8c878486b71de9d0ca1d23c5c00a6c3c14d80",
"zh:fa7440c3c15a42fc5731444d324ced75407d417bfe3184661ae47d40a9718dce",
]
}
provider "registry.terraform.io/zaneatwork/godaddy" {
version = "1.9.10"
constraints = "1.9.10"
hashes = [
"h1:KZxLOy1oSAWDELKzlKog3Vkj7dkL5vnFM+upG05URZc=",
"zh:0f82e078d455e31432bb2dec1647afab95f1cf14ba4e4e466e84c83f7116f267",
"zh:29b0f2880ead720b735e10b1ea861556abfa77bcd9d2e19393bcbe9f01e9949f",
"zh:462a501f572be4340800963f0e32fff868edd822f70f7c0f89da078d85d7910f",
"zh:51f7023cc410b89e88e7f4d962dcf741165d98c5e77f34cdf92d69285efef521",
"zh:55103119896e8d9b58119c39a7f0df3ffc24f18e10274cd6e1c6fba02819840e",
"zh:55f95b8894874839402ed1ba21516a08c2de3ffe24a78e759c2a841f6fc174d3",
"zh:65fb702c9aabc2755722ab7c556a5e0d93c0fe23a12cd281a7c8274957b21027",
"zh:709de4a72eb680c543261e745a6b1049a06132cdc29856fa94d1a3ae04e66c8a",
"zh:80a6b47a5b7750aac95d6c8917a977269c8fd7194b65aa4a2848bdd0d6dc81c4",
"zh:a2cd5aca2f56e8cba11bdf72f2fb1a859a46b7f050131cd4348e103a1c1f0bef",
"zh:bb53536ebb52807811f3cb2337f679c427059024b2f1cb82909ab2dd9e412f61",
"zh:ca5c22df37d56e889946c6d5a2d9cdbde4443dffabc3c373d1483af6b0cc60e4",
"zh:d146fd079775588788f827af2cb248da9587c9a01f297f251ed4cf4a5f0b9b93",
"zh:d965709316a14d90f6e2fc9c35596b92f208347406e2588e87dec4793e92e5f6",
"zh:ef271d08825d3479a231fb03c9980b66ee5c7ecf4838e04fffcaabf7744a9d19",
]
}

24
bucket/.terraform.lock.hcl generated Normal file
View File

@@ -0,0 +1,24 @@
# This file is maintained automatically by "terraform init".
# Manual edits may be lost in future updates.
provider "registry.terraform.io/hashicorp/aws" {
version = "5.17.0"
hashes = [
"h1:U+EDfeUqefebA1h7KyBMD1xH0h311LMi7wijPDPkC/0=",
"zh:0087b9dd2c9c638fd63e527e5b9b70988008e263d480a199f180efe5a4f070f0",
"zh:0fd532a4fd03ddef11f0502ff9fe4343443e1ae805cb088825a71d6d48906ec7",
"zh:16411e731100cd15f7e165f53c23be784b2c86c2fcfd34781e0642d17090d342",
"zh:251d520927e77f091e2ec6302e921d839a2430ac541c6a461aed7c08fb5eae12",
"zh:4919e69682dc2a8c32d44f6ebc038a52c9f40af9c61cb574b64e322800d6a794",
"zh:5334c60759d5f76bdc51355d1a3ebcc451d4d20f632f5c73b6e55c52b5dc9e52",
"zh:7341a2b7247572eba0d0486094a870b872967702ec0ac7af728c2df2c30af4e5",
"zh:81d1b1cb2cac6b3922a05adab69543b678f344a01debd54500263700dad7a288",
"zh:882bc8e15ef6d4020a07321ec4c056977c5c1d96934118032922561d29504d43",
"zh:8cd4871ef2b03fd916de1a6dc7eb8a81a354c421177d4334a2e3308e50215e41",
"zh:97e12fe6529b21298adf1046c5e20ac35d0569c836a6f385ff041e257e00cfd2",
"zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425",
"zh:9f5baf5d59b9f3cf5504d1fa975f10f27da3791896a9e18ece47c258bac17634",
"zh:dffafba6731ac1db1c540bdbd6a8c878486b71de9d0ca1d23c5c00a6c3c14d80",
"zh:fa7440c3c15a42fc5731444d324ced75407d417bfe3184661ae47d40a9718dce",
]
}

79
bucket/bucket.tf Normal file
View File

@@ -0,0 +1,79 @@
terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = "5.17.0"
configuration_aliases = [ aws.main ]
}
}
}
# S3 Bucket
resource "aws_s3_bucket" "default" {
bucket = "${var.project_name}-bucket"
}
resource "aws_s3_bucket_public_access_block" "bucket_public_disabled" {
bucket = aws_s3_bucket.default.id
block_public_acls = true
block_public_policy = false
ignore_public_acls = true
restrict_public_buckets = true
}
resource "aws_s3_bucket_ownership_controls" "s3_bucket_acl_ownership" {
bucket = aws_s3_bucket.default.id
rule {
object_ownership = "BucketOwnerPreferred"
}
depends_on = [aws_s3_bucket_public_access_block.bucket_public_disabled]
}
resource "aws_s3_bucket_acl" "default" {
bucket = aws_s3_bucket.default.id
acl = "private"
depends_on = [aws_s3_bucket_ownership_controls.s3_bucket_acl_ownership]
}
resource "aws_s3_bucket_policy" "default" {
bucket = aws_s3_bucket.default.id
depends_on = [aws_s3_bucket_public_access_block.bucket_public_disabled]
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObject",
"s3:PutObjectAcl",
"s3:GetObjectAcl",
"s3:ListBucket"
],
"Resource": [
"${aws_s3_bucket.default.arn}",
"${aws_s3_bucket.default.arn}/*"
]
}
]
}
POLICY
}
resource "aws_s3_bucket_cors_configuration" "default" {
bucket = aws_s3_bucket.default.bucket
cors_rule {
allowed_headers = ["*"]
allowed_methods = ["GET", "PUT", "POST", "DELETE", "HEAD"]
allowed_origins = ["${var.project_domain}"]
}
}

10
bucket/config.tf Normal file
View File

@@ -0,0 +1,10 @@
### SET VARIABLES
variable "project_name" {
type = string
default = "hideyoshi-portifolio"
}
variable "project_domain" {
type = string
}

48
config.tf Normal file
View File

@@ -0,0 +1,48 @@
### SET VARIABLES
variable "project_name" {
type = string
default = "hideyoshi-portifolio"
}
variable "project_domain" {
type = string
}
variable "k3s_token" {
type = string
}
variable "number_of_workers" {
type = number
default = 2
}
variable "aws_region" {
type = string
default = "sa-east-1"
}
variable "aws_access" {
type = string
}
variable "aws_secret" {
type = string
}
variable "godaddy_key" {
type = string
}
variable "godaddy_secret" {
type = string
}
variable "ssh_public_key_main" {
type = string
}
variable "ssh_public_key_ci_cd" {
type = string
}

25
dns/.terraform.lock.hcl generated Normal file
View File

@@ -0,0 +1,25 @@
# This file is maintained automatically by "terraform init".
# Manual edits may be lost in future updates.
provider "registry.terraform.io/zaneatwork/godaddy" {
version = "1.9.10"
constraints = "1.9.10"
hashes = [
"h1:KZxLOy1oSAWDELKzlKog3Vkj7dkL5vnFM+upG05URZc=",
"zh:0f82e078d455e31432bb2dec1647afab95f1cf14ba4e4e466e84c83f7116f267",
"zh:29b0f2880ead720b735e10b1ea861556abfa77bcd9d2e19393bcbe9f01e9949f",
"zh:462a501f572be4340800963f0e32fff868edd822f70f7c0f89da078d85d7910f",
"zh:51f7023cc410b89e88e7f4d962dcf741165d98c5e77f34cdf92d69285efef521",
"zh:55103119896e8d9b58119c39a7f0df3ffc24f18e10274cd6e1c6fba02819840e",
"zh:55f95b8894874839402ed1ba21516a08c2de3ffe24a78e759c2a841f6fc174d3",
"zh:65fb702c9aabc2755722ab7c556a5e0d93c0fe23a12cd281a7c8274957b21027",
"zh:709de4a72eb680c543261e745a6b1049a06132cdc29856fa94d1a3ae04e66c8a",
"zh:80a6b47a5b7750aac95d6c8917a977269c8fd7194b65aa4a2848bdd0d6dc81c4",
"zh:a2cd5aca2f56e8cba11bdf72f2fb1a859a46b7f050131cd4348e103a1c1f0bef",
"zh:bb53536ebb52807811f3cb2337f679c427059024b2f1cb82909ab2dd9e412f61",
"zh:ca5c22df37d56e889946c6d5a2d9cdbde4443dffabc3c373d1483af6b0cc60e4",
"zh:d146fd079775588788f827af2cb248da9587c9a01f297f251ed4cf4a5f0b9b93",
"zh:d965709316a14d90f6e2fc9c35596b92f208347406e2588e87dec4793e92e5f6",
"zh:ef271d08825d3479a231fb03c9980b66ee5c7ecf4838e04fffcaabf7744a9d19",
]
}

36
dns/dns.tf Normal file
View File

@@ -0,0 +1,36 @@
terraform {
required_providers {
godaddy = {
source = "zaneatwork/godaddy"
version = "1.9.10"
}
}
}
variable "public_ip" {
type = string
}
resource "godaddy_domain_record" "default" {
domain = "hideyoshi.com.br"
overwrite = false
record {
name = "staging "
type = "A"
data = "${var.public_ip}"
ttl = 600
priority = 0
}
record {
name = "api.staging "
type = "A"
data = "${var.public_ip}"
ttl = 600
priority = 0
}
}

24
instances/.terraform.lock.hcl generated Normal file
View File

@@ -0,0 +1,24 @@
# This file is maintained automatically by "terraform init".
# Manual edits may be lost in future updates.
provider "registry.terraform.io/hashicorp/aws" {
version = "5.17.0"
hashes = [
"h1:U+EDfeUqefebA1h7KyBMD1xH0h311LMi7wijPDPkC/0=",
"zh:0087b9dd2c9c638fd63e527e5b9b70988008e263d480a199f180efe5a4f070f0",
"zh:0fd532a4fd03ddef11f0502ff9fe4343443e1ae805cb088825a71d6d48906ec7",
"zh:16411e731100cd15f7e165f53c23be784b2c86c2fcfd34781e0642d17090d342",
"zh:251d520927e77f091e2ec6302e921d839a2430ac541c6a461aed7c08fb5eae12",
"zh:4919e69682dc2a8c32d44f6ebc038a52c9f40af9c61cb574b64e322800d6a794",
"zh:5334c60759d5f76bdc51355d1a3ebcc451d4d20f632f5c73b6e55c52b5dc9e52",
"zh:7341a2b7247572eba0d0486094a870b872967702ec0ac7af728c2df2c30af4e5",
"zh:81d1b1cb2cac6b3922a05adab69543b678f344a01debd54500263700dad7a288",
"zh:882bc8e15ef6d4020a07321ec4c056977c5c1d96934118032922561d29504d43",
"zh:8cd4871ef2b03fd916de1a6dc7eb8a81a354c421177d4334a2e3308e50215e41",
"zh:97e12fe6529b21298adf1046c5e20ac35d0569c836a6f385ff041e257e00cfd2",
"zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425",
"zh:9f5baf5d59b9f3cf5504d1fa975f10f27da3791896a9e18ece47c258bac17634",
"zh:dffafba6731ac1db1c540bdbd6a8c878486b71de9d0ca1d23c5c00a6c3c14d80",
"zh:fa7440c3c15a42fc5731444d324ced75407d417bfe3184661ae47d40a9718dce",
]
}

32
instances/config.tf Normal file
View File

@@ -0,0 +1,32 @@
### SET VARIABLES
variable "project_name" {
type = string
default = "hideyoshi-portifolio"
}
variable "project_domain" {
type = string
}
variable "k3s_token" {
type = string
}
variable "number_of_workers" {
type = number
default = 2
}
variable "aws_region" {
type = string
default = "sa-east-1"
}
variable "ssh_public_key_main" {
type = string
}
variable "ssh_public_key_ci_cd" {
type = string
}

103
instances/instance.tf Normal file
View File

@@ -0,0 +1,103 @@
terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = "5.17.0"
configuration_aliases = [ aws.main ]
}
}
}
# EC2 Instances
resource "aws_key_pair" "ssh_key_main" {
key_name = "ssh_key_main"
public_key = var.ssh_public_key_main
}
resource "aws_key_pair" "ssh_key_ci_cd" {
key_name = "ssh_key_ci_cd"
public_key = var.ssh_public_key_ci_cd
}
locals {
ports_in = [
22,
80,
443,
6443,
10250
]
ports_out = [
0,
]
}
resource "aws_security_group" "project_pool" {
name = "${var.project_name}_pool_security_group"
description = "Security group for project pool"
dynamic "egress" {
for_each = toset(local.ports_out)
content {
from_port = egress.value
to_port = egress.value
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
dynamic "ingress" {
for_each = toset(local.ports_in)
content {
from_port = ingress.value
to_port = ingress.value
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
}
resource "aws_instance" "main" {
ami = "ami-0af6e9042ea5a4e3e"
instance_type = "t3a.medium"
vpc_security_group_ids = [ aws_security_group.project_pool.id ]
key_name = aws_key_pair.ssh_key_main.key_name
user_data = templatefile("${path.module}/scripts/setup_main.sh", {
extra_key = aws_key_pair.ssh_key_ci_cd.public_key
k3s_token = var.k3s_token
})
tags = {
Name = "${var.project_name}-main"
}
}
resource "aws_instance" "worker" {
ami = "ami-0af6e9042ea5a4e3e"
instance_type = "t2.micro"
vpc_security_group_ids = [ aws_security_group.project_pool.id ]
count = var.number_of_workers
key_name = aws_key_pair.ssh_key_main.key_name
user_data = templatefile("${path.module}/scripts/setup_worker.sh", {
extra_key = aws_key_pair.ssh_key_ci_cd.public_key
k3s_token = var.k3s_token
k3s_cluster_ip = var.project_domain
})
tags = {
Name = "${var.project_name}-worker-${count.index+1}"
}
}
# OUTPUTS
output "pool_master_public_ip" {
value = aws_instance.main.public_ip
}

View File

@@ -0,0 +1,12 @@
#!/bin/bash -xe
echo -e "\n${extra_key}" >> /home/ubuntu/.ssh/authorized_keys;
echo -e "export TERM='xterm-256color'" >> /home/ubuntu/.profile;
su ubuntu -i << EOF
# curl -sfL https://get.k3s.io | \
# K3S_TOKEN="${k3s_token}" sh -'
echo "HERE" >> /home/ubuntu/test.txt
EOF

View File

@@ -0,0 +1,14 @@
#!/bin/bash -xe
echo -e "\n${extra_key}" >> /home/ubuntu/.ssh/authorized_keys;
echo "export TERM='xterm-256color'" > /home/ubuntu/.profile;
su ubuntu -i << EOF
# curl -sfL https://get.k3s.io | \
# INSTALL_K3S_EXEC="agent" \
# K3S_TOKEN="${k3s_token}" \
# sh -s - --server ${k3s_cluster_ip}
echo "HERE" >> /home/ubuntu/test.txt
EOF

38
k3s/k3s.tf Normal file
View File

@@ -0,0 +1,38 @@
module "k3s" {
source = "xunleii/k3s/module"
version = "3.3.0"
k3s_version = "v1.21.4+k3s1"
cluster_domain = "civo_k3s"
drain_timeout = "60s"
managed_fields = ["label"]
generate_ca_certificates = true
global_flags = [for instance in civo_instance.node_instances : "--tls-san ${instance.public_ip}"]
servers = {
# The node name will be automatically provided by
# the module using the field name... any usage of
# --node-name in additional_flags will be ignored
for instance in civo_instance.node_instances :
instance.hostname => {
ip = instance.private_ip
connection = {
timeout = "60s"
type = "ssh"
host = instance.public_ip
password = instance.initial_password
user = "root"
}
labels = { "node.kubernetes.io/type" = "master" }
}
}
}
output "kube_config" {
value = module.k3s.kube_config
sensitive = true
}

59
main.tf Normal file
View File

@@ -0,0 +1,59 @@
### PROVIDERS
terraform {
required_providers {
godaddy = {
source = "zaneatwork/godaddy"
version = "1.9.10"
}
aws = {
source = "hashicorp/aws"
version = "5.17.0"
}
}
}
provider "aws" {
region = var.aws_region
access_key = var.aws_access
secret_key = var.aws_secret
}
provider "godaddy" {
key = var.godaddy_key
secret = var.godaddy_secret
}
### MODULES
module "bucket" {
source = "./bucket"
providers = {
aws.main = aws
}
project_domain = var.project_domain
project_name = var.project_name
}
module "instances" {
source = "./instances"
providers = {
aws.main = aws
}
project_domain = var.project_domain
project_name = var.project_name
k3s_token = var.k3s_token
number_of_workers = var.number_of_workers
aws_region = var.aws_region
ssh_public_key_main = var.ssh_public_key_main
ssh_public_key_ci_cd = var.ssh_public_key_ci_cd
}
module "dns" {
source = "./dns"
providers = {
godaddy = godaddy
}
public_ip = module.instances.pool_master_public_ip
}

View File

@@ -1,8 +0,0 @@
echo -e "\n${extra_key}" >> /home/ubuntu/.ssh/authorized_keys
echo "export TERM='xterm-256color'" > .profile;
curl -sfL https://get.k3s.io | \
K3S_TOKEN="${k3s_token}" \
sh -

View File

@@ -1,9 +0,0 @@
echo -e "\n${extra_key}" >> /home/ubuntu/.ssh/authorized_keys
echo "export TERM='xterm-256color'" > .profile;
curl -sfL https://get.k3s.io | \
INSTALL_K3S_EXEC="agent" \
K3S_TOKEN="${k3s_token}" \
sh -s - --server "${k3s_url}:6443"

9
terraform-cloud.tf Normal file
View File

@@ -0,0 +1,9 @@
terraform {
cloud {
organization = "vitorhnbatista"
workspaces {
name = "hideyoshi-portfolio"
}
}
}

View File

@@ -1,268 +0,0 @@
### SET VARIABLES
variable "project_name" {
type = string
default = "hideyoshi-portifolio"
}
variable "project_domain" {
type = string
}
variable "k3s_token" {
type = string
}
variable "number_of_workers" {
type = number
default = 2
}
variable "aws_region" {
type = string
default = "sa-east-1"
}
variable "aws_access" {
type = string
}
variable "aws_secret" {
type = string
}
variable "godaddy_key" {
type = string
}
variable "godaddy_secret" {
type = string
}
variable "ssh_public_key_main" {
type = string
}
variable "ssh_public_key_ci_cd" {
type = string
}
### PROVIDERS
terraform {
required_providers {
godaddy = {
source = "zaneatwork/godaddy"
version = "1.9.10"
}
aws = {
source = "hashicorp/aws"
version = "5.17.0"
}
}
}
provider "aws" {
region = var.aws_region
access_key = var.aws_access
secret_key = var.aws_secret
}
provider "godaddy" {
key = var.godaddy_key
secret = var.godaddy_secret
}
### RESOURCES
# S3 Bucket
resource "aws_s3_bucket" "default" {
bucket = "${var.project_name}-bucket"
}
resource "aws_s3_bucket_public_access_block" "bucket_public_disabled" {
bucket = aws_s3_bucket.default.id
block_public_acls = true
block_public_policy = false
ignore_public_acls = true
restrict_public_buckets = true
}
resource "aws_s3_bucket_ownership_controls" "s3_bucket_acl_ownership" {
bucket = aws_s3_bucket.default.id
rule {
object_ownership = "BucketOwnerPreferred"
}
depends_on = [aws_s3_bucket_public_access_block.bucket_public_disabled]
}
resource "aws_s3_bucket_acl" "default" {
bucket = aws_s3_bucket.default.id
acl = "private"
depends_on = [aws_s3_bucket_ownership_controls.s3_bucket_acl_ownership]
}
resource "aws_s3_bucket_policy" "default" {
bucket = aws_s3_bucket.default.id
depends_on = [aws_s3_bucket_public_access_block.bucket_public_disabled]
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObject",
"s3:PutObjectAcl",
"s3:GetObjectAcl",
"s3:ListBucket"
],
"Resource": [
"${aws_s3_bucket.default.arn}",
"${aws_s3_bucket.default.arn}/*"
]
}
]
}
POLICY
}
resource "aws_s3_bucket_cors_configuration" "default" {
bucket = aws_s3_bucket.default.bucket
cors_rule {
allowed_headers = ["*"]
allowed_methods = ["GET", "PUT", "POST", "DELETE", "HEAD"]
allowed_origins = ["${var.project_domain}"]
}
}
# EC2 Instances
resource "aws_key_pair" "ssh_key_main" {
key_name = "ssh_key_main"
public_key = var.ssh_public_key_main
}
resource "aws_key_pair" "ssh_key_ci_cd" {
key_name = "ssh_key_ci_cd"
public_key = var.ssh_public_key_ci_cd
}
locals {
ports_in = [
22,
80,
443,
6443,
10250
]
ports_out = [
0,
]
}
resource "aws_security_group" "project_pool" {
name = "${var.project_name}_pool_security_group"
description = "Security group for project pool"
dynamic "egress" {
for_each = toset(local.ports_out)
content {
from_port = egress.value
to_port = egress.value
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
dynamic "ingress" {
for_each = toset(local.ports_in)
content {
from_port = ingress.value
to_port = ingress.value
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
}
resource "aws_instance" "main" {
ami = "ami-0af6e9042ea5a4e3e"
instance_type = "t3a.medium"
vpc_security_group_ids = [ aws_security_group.project_pool.id ]
key_name = aws_key_pair.ssh_key_main.key_name
user_data = templatefile("${path.module}/setup_main.sh", {
extra_key = aws_key_pair.ssh_key_ci_cd.public_key
k3s_token = var.k3s_token
k3s_url = var.project_domain
})
tags = {
Name = "${var.project_name}-main"
}
}
resource "aws_instance" "worker" {
ami = "ami-0af6e9042ea5a4e3e"
instance_type = "t2.micro"
vpc_security_group_ids = [ aws_security_group.project_pool.id ]
count = var.number_of_workers
key_name = aws_key_pair.ssh_key_main.key_name
user_data = templatefile("${path.module}/setup_worker.sh", {
extra_key = aws_key_pair.ssh_key_ci_cd.public_key
k3s_token = var.k3s_token
k3s_url = var.project_domain
})
tags = {
Name = "${var.project_name}-worker-${count.index+1}"
}
}
# DNS
resource "godaddy_domain_record" "default" {
domain = "hideyoshi.com.br"
overwrite = false
record {
name = "staging "
type = "A"
data = "${aws_instance.main.public_ip}"
ttl = 600
priority = 0
}
record {
name = "api.staging "
type = "A"
data = "${aws_instance.main.public_ip}"
ttl = 600
priority = 0
}
}
### OUTPUTS
output "bucker_domain_name" {
value = aws_s3_bucket.default.bucket_domain_name
}