blob: fc92a9325974132360e9a1da311e6a8ad53b928c [file] [log] [blame]
Sergiusz Bazanski6f773e02019-10-02 20:46:48 +02001local mirko = import "../../kube/mirko.libsonnet";
2local kube = import "../../kube/kube.libsonnet";
3
4{
5 hswaw(name):: mirko.Environment(name) {
6 local env = self,
7 local cfg = self.cfg,
8
9 cfg+: {
10 smsgw: {
11 secret: {
12 twilio_token: error "twilio_token must be set",
13 },
14 image: "registry.k0.hswaw.net/q3k/smsgs:1570049853-05c5b491c45de6d960979d4aee8635768f3178e9",
15 webhookFQDN: error "webhookFQDN must be set",
16 },
17 },
18
19 components: {
20 smsgw: mirko.Component(env, "smsgw") {
21 local smsgw = self,
22 cfg+: {
23 image: cfg.smsgw.image,
24 container: smsgw.GoContainer("main", "/smsgw/smsgw") {
25 env_: {
26 TWILIO_TOKEN: kube.SecretKeyRef(smsgw.secret, "twilio_token"),
27 },
28 command+: [
29 "-twilio_friendly_phone", "48732168371",
30 "-twilio_sid", "AC806ed4bf4b6c80c8f8ea686379b69518",
31 "-twilio_token", "$(TWILIO_TOKEN)",
32 "-webhook_listen", "0.0.0.0:5000",
33 "-webhook_public", "https://%s/" % [ env.cfg.smsgw.webhookFQDN ],
34 ],
35 },
36 ports+: {
37 publicHTTP: {
38 webhook: {
39 port: 5000,
40 dns: env.cfg.smsgw.webhookFQDN,
41 }
42 },
43 },
44 },
45
46 secret: kube.Secret("smsgw") {
47 metadata+: smsgw.metadata,
48 data: env.cfg.smsgw.secret,
49 },
50
51 // Temporary machinery to access gRPC from outsite.
52 // In the future, this will be handled by a proxy/API gateway.
53 // For now, we need this running.
54 // TODO(q3k): remove this when we have an API GW or proxy.
55 stopgap: {
Sergiusz Bazanskicccf5ec2019-10-17 19:56:15 +020056 local stopgap = self,
57
Sergiusz Bazanski6f773e02019-10-02 20:46:48 +020058 rpcLB: kube.Service("smsgw-tcp-rpc") {
59 metadata+: smsgw.metadata,
60 target_pod: smsgw.deployment.spec.template,
61 spec+: {
62 type: "LoadBalancer",
63 ports: [
64 { name: "grpc-external", port: 443, targetPort: 4200 },
65 ],
66 },
67 },
68
Sergiusz Bazanskicccf5ec2019-10-17 19:56:15 +020069 mkClientCert(name, cn):: kube.Certificate(name) {
Sergiusz Bazanski6f773e02019-10-02 20:46:48 +020070 metadata+: smsgw.metadata,
71 spec: {
Sergiusz Bazanskicccf5ec2019-10-17 19:56:15 +020072 secretName: name,
Sergiusz Bazanski6f773e02019-10-02 20:46:48 +020073 duration: "35040h0m0s", // 4 years
74 issuerRef: {
75 // Contract with cluster/lib/pki.libsonnet.
76 // Copied over.
77 name: "pki-ca",
78 kind: "ClusterIssuer",
79 },
Sergiusz Bazanskicccf5ec2019-10-17 19:56:15 +020080 commonName: cn,
Sergiusz Bazanski6f773e02019-10-02 20:46:48 +020081 },
82 },
Sergiusz Bazanskicccf5ec2019-10-17 19:56:15 +020083
84 kasownikCert: stopgap.mkClientCert("smsgw-tcp-rpc-consumer", "kasownik.external.hswaw.net"),
85 piorekfCert: stopgap.mkClientCert("smsgw-tcp-rpc-piorekf", "piorekf.person.hswaw.net"),
Sergiusz Bazanski6f773e02019-10-02 20:46:48 +020086 }
87 },
88 },
89 },
90
91 prod: self.hswaw("hswaw-prod") {
92 cfg+: {
93 smsgw+: {
94 secret+: {
95 twilio_token: std.base64(std.split(importstr "secrets/plain/prod-twilio-token", "\n")[0]),
96 },
97 webhookFQDN: "smsgw-webhook-prod.hswaw.net",
98 }
99 },
100 },
101}