mirror of
https://github.com/projecthorus/sondehub-infra.git
synced 2024-12-18 20:57:56 +00:00
07461c75e5
Co-authored-by: xss <michaela@michaela.lgbt>
668 lines
17 KiB
HCL
668 lines
17 KiB
HCL
resource "aws_apigatewayv2_route" "sign_socket" {
|
|
api_id = aws_apigatewayv2_api.main.id
|
|
api_key_required = false
|
|
authorization_type = "NONE"
|
|
route_key = "GET /sondes/websocket"
|
|
target = "integrations/${aws_apigatewayv2_integration.sign_socket.id}"
|
|
}
|
|
|
|
resource "aws_iam_role" "sign_socket" {
|
|
name = "sign_socket"
|
|
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role_policy.json
|
|
max_session_duration = 3600
|
|
}
|
|
|
|
resource "aws_lambda_function" "sign_socket" {
|
|
function_name = "sign-websocket"
|
|
handler = "sign_websocket.lambda_handler"
|
|
s3_bucket = aws_s3_bucket_object.lambda.bucket
|
|
s3_key = aws_s3_bucket_object.lambda.key
|
|
source_code_hash = data.archive_file.lambda.output_base64sha256
|
|
publish = true
|
|
memory_size = 128
|
|
role = aws_iam_role.sign_socket.arn
|
|
runtime = "python3.9"
|
|
timeout = 10
|
|
architectures = ["arm64"]
|
|
}
|
|
|
|
resource "aws_lambda_permission" "sign_socket" {
|
|
action = "lambda:InvokeFunction"
|
|
function_name = aws_lambda_function.sign_socket.arn
|
|
principal = "apigateway.amazonaws.com"
|
|
source_arn = "arn:aws:execute-api:us-east-1:${data.aws_caller_identity.current.account_id}:${aws_apigatewayv2_api.main.id}/*/*/sondes/websocket"
|
|
}
|
|
|
|
resource "aws_apigatewayv2_integration" "sign_socket" {
|
|
api_id = aws_apigatewayv2_api.main.id
|
|
connection_type = "INTERNET"
|
|
integration_method = "POST"
|
|
integration_type = "AWS_PROXY"
|
|
integration_uri = aws_lambda_function.sign_socket.arn
|
|
timeout_milliseconds = 30000
|
|
payload_format_version = "2.0"
|
|
}
|
|
|
|
|
|
resource "aws_ecr_repository" "wsproxy" {
|
|
name = "wsproxy"
|
|
image_tag_mutability = "MUTABLE"
|
|
|
|
image_scanning_configuration {
|
|
scan_on_push = true
|
|
}
|
|
}
|
|
|
|
|
|
// Subnet that is used to make discovery simple for the main ws server
|
|
resource "aws_subnet" "ws_main" {
|
|
map_public_ip_on_launch = false
|
|
vpc_id = aws_vpc.main.id
|
|
cidr_block = local.websocket_subnet
|
|
ipv6_cidr_block = cidrsubnet(aws_vpc.main.ipv6_cidr_block, 8, 128)
|
|
assign_ipv6_address_on_creation = true
|
|
|
|
tags = {
|
|
Name = "wsmain"
|
|
}
|
|
}
|
|
|
|
resource "aws_route_table_association" "ws_main" {
|
|
subnet_id = aws_subnet.ws_main.id
|
|
route_table_id = aws_route_table.main.id
|
|
}
|
|
|
|
locals {
|
|
websocket_subnet = "172.31.134.0/28"
|
|
websocket_network_addresses = cidrsubnets(local.websocket_subnet, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4)
|
|
websocket_host_addresses = setsubtract( # calculates what the "remaining" IP addresses are in the VPC subnet after padding
|
|
[for x in slice(local.websocket_network_addresses, 4, 15) : replace(x, "/32", "")],
|
|
[for x in aws_network_interface.ws_pad : tolist(x.private_ips)[0]]
|
|
)
|
|
}
|
|
|
|
|
|
// so we need to ensure there is only as handful of IP addresses avaliable in the subnet, so we assign all the IPs to ENIs
|
|
resource "aws_network_interface" "ws_pad" {
|
|
count = 9
|
|
subnet_id = aws_subnet.ws_main.id
|
|
|
|
description = "Do not delete. Padding to limit addresses"
|
|
}
|
|
|
|
resource "aws_ecs_task_definition" "ws_reader_ec2" {
|
|
family = "ws_reader_ec2"
|
|
container_definitions = jsonencode(
|
|
[
|
|
{
|
|
command = [
|
|
"s3",
|
|
"sync",
|
|
"s3://sondehub-ws-config/",
|
|
"/config/",
|
|
]
|
|
cpu = 0
|
|
environment = []
|
|
essential = false
|
|
image = "amazon/aws-cli"
|
|
logConfiguration = {
|
|
logDriver = "awslogs"
|
|
options = {
|
|
awslogs-group = "/ecs/ws"
|
|
awslogs-region = "us-east-1"
|
|
awslogs-stream-prefix = "ecs"
|
|
}
|
|
}
|
|
mountPoints = [
|
|
{
|
|
containerPath = "/config"
|
|
sourceVolume = "config"
|
|
},
|
|
]
|
|
name = "config"
|
|
portMappings = []
|
|
volumesFrom = []
|
|
},
|
|
{
|
|
command = []
|
|
cpu = 0
|
|
dependsOn = [
|
|
{
|
|
condition = "SUCCESS"
|
|
containerName = "config"
|
|
},
|
|
{
|
|
condition = "SUCCESS"
|
|
containerName = "config-move"
|
|
},
|
|
]
|
|
environment = []
|
|
essential = true
|
|
image = "eclipse-mosquitto:2.0.15"
|
|
# logConfiguration = {
|
|
# logDriver = "awslogs"
|
|
# options = {
|
|
# awslogs-group = "/ecs/ws"
|
|
# awslogs-region = "us-east-1"
|
|
# awslogs-stream-prefix = "ecs"
|
|
# }
|
|
# }
|
|
mountPoints = [
|
|
{
|
|
containerPath = "/mosquitto/config"
|
|
sourceVolume = "config"
|
|
},
|
|
]
|
|
name = "mqtt"
|
|
portMappings = [
|
|
{
|
|
containerPort = 8080
|
|
hostPort = 80
|
|
protocol = "tcp"
|
|
},
|
|
]
|
|
ulimits = [
|
|
{
|
|
hardLimit = 50000
|
|
name = "nofile"
|
|
softLimit = 30000
|
|
},
|
|
]
|
|
volumesFrom = []
|
|
},
|
|
{
|
|
command = [
|
|
"sh",
|
|
"-c",
|
|
"apk add gettext; envsubst < /config/mosquitto-reader-template.conf > /config/mosquitto.conf",
|
|
]
|
|
cpu = 0
|
|
dependsOn = [
|
|
{
|
|
condition = "SUCCESS"
|
|
containerName = "config"
|
|
},
|
|
]
|
|
environment = []
|
|
essential = false
|
|
image = "alpine"
|
|
logConfiguration = {
|
|
logDriver = "awslogs"
|
|
options = {
|
|
awslogs-group = "/ecs/ws-reader"
|
|
awslogs-region = "us-east-1"
|
|
awslogs-stream-prefix = "ecs"
|
|
}
|
|
}
|
|
mountPoints = [
|
|
{
|
|
containerPath = "/config"
|
|
sourceVolume = "config"
|
|
},
|
|
]
|
|
name = "config-move"
|
|
portMappings = []
|
|
volumesFrom = []
|
|
secrets = [
|
|
{
|
|
name = "PASSWORD"
|
|
valueFrom = "${aws_secretsmanager_secret.mqtt.arn}:PASSWORD::"
|
|
},
|
|
{
|
|
name = "HOST_MOS_FORMAT"
|
|
valueFrom = "${aws_secretsmanager_secret.mqtt.arn}:HOST_MOS_FORMAT::"
|
|
}
|
|
]
|
|
},
|
|
]
|
|
)
|
|
cpu = "768"
|
|
execution_role_arn = aws_iam_role.ecs_execution.arn
|
|
memory = "800"
|
|
network_mode = "bridge"
|
|
requires_compatibilities = [
|
|
"EC2",
|
|
]
|
|
|
|
tags = {}
|
|
task_role_arn = aws_iam_role.ws.arn
|
|
|
|
|
|
volume {
|
|
name = "config"
|
|
}
|
|
|
|
}
|
|
|
|
resource "aws_ecs_task_definition" "ws" {
|
|
family = "ws"
|
|
container_definitions = jsonencode(
|
|
[
|
|
{
|
|
command = [
|
|
"s3",
|
|
"sync",
|
|
"s3://sondehub-ws-config/",
|
|
"/config/",
|
|
]
|
|
cpu = 0
|
|
environment = []
|
|
essential = false
|
|
image = "amazon/aws-cli"
|
|
logConfiguration = {
|
|
logDriver = "awslogs"
|
|
options = {
|
|
awslogs-group = "/ecs/ws"
|
|
awslogs-region = "us-east-1"
|
|
awslogs-stream-prefix = "ecs"
|
|
}
|
|
}
|
|
mountPoints = [
|
|
{
|
|
containerPath = "/config"
|
|
sourceVolume = "config"
|
|
},
|
|
]
|
|
name = "config"
|
|
portMappings = []
|
|
volumesFrom = []
|
|
},
|
|
{
|
|
cpu = 0
|
|
dependsOn = [
|
|
{
|
|
condition = "SUCCESS"
|
|
containerName = "config"
|
|
},
|
|
]
|
|
environment = []
|
|
essential = true
|
|
image = "eclipse-mosquitto:2.0.15"
|
|
# logConfiguration = {
|
|
# logDriver = "awslogs"
|
|
# options = {
|
|
# awslogs-group = "/ecs/ws"
|
|
# awslogs-region = "us-east-1"
|
|
# awslogs-stream-prefix = "ecs"
|
|
# }
|
|
# }
|
|
mountPoints = [
|
|
{
|
|
containerPath = "/mosquitto/config"
|
|
sourceVolume = "config"
|
|
},
|
|
]
|
|
name = "mqtt"
|
|
portMappings = [
|
|
{
|
|
containerPort = 8080
|
|
hostPort = 8080
|
|
protocol = "tcp"
|
|
},
|
|
{
|
|
containerPort = 8883
|
|
hostPort = 8883
|
|
protocol = "tcp"
|
|
},
|
|
{
|
|
containerPort = 1883
|
|
hostPort = 1883
|
|
protocol = "tcp"
|
|
},
|
|
]
|
|
ulimits = [
|
|
{
|
|
hardLimit = 50000
|
|
name = "nofile"
|
|
softLimit = 30000
|
|
},
|
|
]
|
|
volumesFrom = []
|
|
},
|
|
]
|
|
)
|
|
cpu = "256"
|
|
execution_role_arn = aws_iam_role.ws.arn
|
|
memory = "512"
|
|
network_mode = "awsvpc"
|
|
requires_compatibilities = [
|
|
"FARGATE",
|
|
]
|
|
tags = {}
|
|
task_role_arn = aws_iam_role.ws.arn
|
|
|
|
|
|
volume {
|
|
name = "config"
|
|
}
|
|
}
|
|
|
|
resource "aws_ecs_cluster" "ws" {
|
|
name = "ws"
|
|
}
|
|
|
|
resource "aws_ecs_cluster_capacity_providers" "ws" {
|
|
cluster_name = aws_ecs_cluster.ws.name
|
|
|
|
capacity_providers = ["FARGATE"]
|
|
|
|
}
|
|
|
|
resource "aws_lb_target_group" "ws" {
|
|
name = "ws"
|
|
port = 8080
|
|
protocol = "HTTP"
|
|
vpc_id = aws_vpc.main.id
|
|
target_type = "ip"
|
|
health_check {
|
|
enabled = true
|
|
healthy_threshold = 5
|
|
interval = 30
|
|
matcher = "200"
|
|
path = "/health"
|
|
port = "traffic-port"
|
|
protocol = "HTTP"
|
|
timeout = 5
|
|
unhealthy_threshold = 2
|
|
}
|
|
}
|
|
resource "aws_lb_target_group" "ws_reader" {
|
|
name = "ws-reader"
|
|
port = 8061
|
|
protocol = "HTTP"
|
|
vpc_id = aws_vpc.main.id
|
|
target_type = "ip"
|
|
health_check {
|
|
enabled = true
|
|
healthy_threshold = 5
|
|
interval = 30
|
|
matcher = "200"
|
|
path = "/health"
|
|
port = "traffic-port"
|
|
protocol = "HTTP"
|
|
timeout = 5
|
|
unhealthy_threshold = 2
|
|
}
|
|
}
|
|
|
|
|
|
resource "aws_ecs_service" "ws_reader_ec2" {
|
|
name = "ws-reader-ec2"
|
|
cluster = aws_ecs_cluster.ws.id
|
|
task_definition = aws_ecs_task_definition.ws_reader_ec2.arn
|
|
enable_ecs_managed_tags = true
|
|
launch_type = "EC2"
|
|
desired_count = 4
|
|
placement_constraints {
|
|
type = "distinctInstance"
|
|
}
|
|
}
|
|
|
|
resource "aws_ecs_service" "ws_writer" {
|
|
name = "ws-writer"
|
|
cluster = aws_ecs_cluster.ws.id
|
|
task_definition = aws_ecs_task_definition.ws.arn
|
|
enable_ecs_managed_tags = true
|
|
health_check_grace_period_seconds = 60
|
|
iam_role = "/aws-service-role/ecs.amazonaws.com/AWSServiceRoleForECS"
|
|
launch_type = "FARGATE"
|
|
platform_version = "LATEST"
|
|
desired_count = 1
|
|
|
|
load_balancer {
|
|
container_name = "mqtt"
|
|
container_port = 8080
|
|
target_group_arn = aws_lb_target_group.ws.arn
|
|
}
|
|
|
|
lifecycle {
|
|
ignore_changes = [desired_count]
|
|
}
|
|
|
|
network_configuration {
|
|
assign_public_ip = true
|
|
security_groups = [
|
|
aws_security_group.ws_writer.id
|
|
]
|
|
subnets = [aws_subnet.ws_main.id]
|
|
}
|
|
}
|
|
|
|
resource "aws_security_group" "ws_reader" {
|
|
ingress = [
|
|
{
|
|
from_port = 0
|
|
to_port = 0
|
|
protocol = "-1"
|
|
cidr_blocks = []
|
|
ipv6_cidr_blocks = []
|
|
description = ""
|
|
prefix_list_ids = []
|
|
self = true
|
|
security_groups = [aws_security_group.ws_writer.id, aws_security_group.lb.id]
|
|
}
|
|
]
|
|
egress = [
|
|
{
|
|
from_port = 0
|
|
to_port = 0
|
|
protocol = "-1"
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
ipv6_cidr_blocks = ["::/0"]
|
|
description = ""
|
|
prefix_list_ids = []
|
|
self = false
|
|
security_groups = []
|
|
}
|
|
]
|
|
vpc_id = aws_vpc.main.id
|
|
|
|
lifecycle {
|
|
ignore_changes = [description, name]
|
|
}
|
|
|
|
}
|
|
|
|
|
|
resource "aws_security_group" "ws_writer" {
|
|
|
|
egress = [
|
|
{
|
|
from_port = 0
|
|
to_port = 0
|
|
protocol = "-1"
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
ipv6_cidr_blocks = ["::/0"]
|
|
description = ""
|
|
prefix_list_ids = []
|
|
self = false
|
|
security_groups = []
|
|
}
|
|
]
|
|
vpc_id = aws_vpc.main.id
|
|
|
|
lifecycle {
|
|
ignore_changes = [description, name]
|
|
}
|
|
|
|
}
|
|
|
|
resource "aws_security_group_rule" "ws_writer_reader" {
|
|
security_group_id = aws_security_group.ws_writer.id
|
|
type = "ingress"
|
|
from_port = 0
|
|
to_port = 0
|
|
protocol = "-1"
|
|
description = ""
|
|
source_security_group_id = aws_security_group.ws_reader.id
|
|
}
|
|
resource "aws_security_group_rule" "ws_writer_lb" {
|
|
security_group_id = aws_security_group.ws_writer.id
|
|
type = "ingress"
|
|
from_port = 0
|
|
to_port = 0
|
|
protocol = "-1"
|
|
description = ""
|
|
source_security_group_id = aws_security_group.lb.id
|
|
}
|
|
|
|
resource "aws_security_group_rule" "ws_writer_lightsail_lb" {
|
|
security_group_id = aws_security_group.ws_writer.id
|
|
type = "ingress"
|
|
from_port = 0
|
|
to_port = 0
|
|
protocol = "-1"
|
|
description = ""
|
|
cidr_blocks = ["172.26.0.0/16"]
|
|
}
|
|
|
|
resource "aws_iam_role" "ecs_execution" {
|
|
name = "ecsTaskExecutionRole"
|
|
assume_role_policy = data.aws_iam_policy_document.ecs_task_assume_role_policy.json
|
|
max_session_duration = 3600
|
|
}
|
|
|
|
resource "aws_iam_role_policy_attachment" "ecs_execution" {
|
|
role = aws_iam_role.ecs_execution.id
|
|
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
|
|
}
|
|
|
|
data "aws_iam_policy_document" "efs" {
|
|
statement {
|
|
resources = ["*"]
|
|
actions = ["elasticfilesystem:*"]
|
|
}
|
|
}
|
|
|
|
resource "aws_iam_role_policy" "efs" {
|
|
name = "EFS"
|
|
role = aws_iam_role.ecs_execution.id
|
|
|
|
policy = data.aws_iam_policy_document.efs.json
|
|
}
|
|
|
|
data "aws_iam_policy_document" "ws_secrets" {
|
|
statement {
|
|
resources = [
|
|
aws_secretsmanager_secret.mqtt.arn,
|
|
aws_secretsmanager_secret.radiosondy.arn,
|
|
]
|
|
|
|
actions = ["secretsmanager:GetSecretValue"]
|
|
}
|
|
}
|
|
|
|
resource "aws_iam_role_policy" "secrets" {
|
|
name = "secrests"
|
|
role = aws_iam_role.ecs_execution.id
|
|
|
|
policy = data.aws_iam_policy_document.ws_secrets.json
|
|
}
|
|
|
|
data "aws_iam_policy_document" "websocket_ssm" {
|
|
statement {
|
|
resources = ["*"]
|
|
|
|
actions = [
|
|
"ssmmessages:CreateControlChannel",
|
|
"ssmmessages:CreateDataChannel",
|
|
"ssmmessages:OpenControlChannel",
|
|
"ssmmessages:OpenDataChannel",
|
|
]
|
|
}
|
|
}
|
|
|
|
resource "aws_iam_role_policy" "ssm" {
|
|
name = "SSM"
|
|
role = aws_iam_role.ecs_execution.id
|
|
|
|
policy = data.aws_iam_policy_document.websocket_ssm.json
|
|
}
|
|
|
|
data "aws_iam_policy_document" "ws_kms" {
|
|
statement {
|
|
resources = ["*"]
|
|
actions = ["kms:*"]
|
|
}
|
|
}
|
|
|
|
resource "aws_iam_role_policy" "kms" {
|
|
name = "kms"
|
|
role = aws_iam_role.ecs_execution.id
|
|
|
|
policy = data.aws_iam_policy_document.ws_kms.json
|
|
}
|
|
|
|
resource "aws_iam_role" "ws" {
|
|
name = "ws"
|
|
description = "Allows EC2 instances to call AWS services on your behalf."
|
|
assume_role_policy = data.aws_iam_policy_document.ecs_task_assume_role_policy.json
|
|
max_session_duration = 3600
|
|
}
|
|
|
|
resource "aws_iam_role_policy_attachment" "ws" {
|
|
role = aws_iam_role.ws.id
|
|
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
|
|
}
|
|
|
|
data "aws_iam_policy_document" "ws_s3_config" {
|
|
statement {
|
|
resources = [
|
|
"arn:aws:s3:::sondehub-ws-config",
|
|
"arn:aws:s3:::sondehub-ws-config/*",
|
|
]
|
|
|
|
actions = [
|
|
"s3:GetObjectAcl",
|
|
"s3:GetObject",
|
|
"s3:ListBucket",
|
|
]
|
|
}
|
|
|
|
statement {
|
|
resources = [
|
|
aws_secretsmanager_secret.mqtt.arn,
|
|
aws_secretsmanager_secret.radiosondy.arn,
|
|
]
|
|
|
|
actions = ["secretsmanager:GetSecretValue"]
|
|
}
|
|
}
|
|
|
|
resource "aws_iam_role_policy" "s3_config" {
|
|
name = "s3-config"
|
|
role = aws_iam_role.ws.id
|
|
|
|
policy = data.aws_iam_policy_document.ws_s3_config.json
|
|
}
|
|
|
|
|
|
resource "aws_route53_record" "ws_reader_CNAME" {
|
|
name = "ws-reader"
|
|
type = "CNAME"
|
|
ttl = 300
|
|
zone_id = aws_route53_zone.Route53HostedZone.zone_id
|
|
records = ["e31a53851c58b6410708e31423860d7d-1304003304.us-east-1.elb.amazonaws.com."]
|
|
}
|
|
|
|
resource "aws_route53_record" "ws_A" {
|
|
name = "ws"
|
|
type = "A"
|
|
alias {
|
|
name = "dualstack.${aws_lb.ws.dns_name}."
|
|
zone_id = aws_lb.ws.zone_id
|
|
evaluate_target_health = true
|
|
}
|
|
zone_id = aws_route53_zone.Route53HostedZone.zone_id
|
|
}
|
|
|
|
resource "aws_route53_record" "ws_AAAA" {
|
|
name = "ws"
|
|
type = "AAAA"
|
|
alias {
|
|
name = "dualstack.${aws_lb.ws.dns_name}."
|
|
zone_id = aws_lb.ws.zone_id
|
|
evaluate_target_health = true
|
|
}
|
|
zone_id = aws_route53_zone.Route53HostedZone.zone_id
|
|
} |