workadventure/deeployer.libsonnet

169 lines
5.7 KiB
Plaintext
Raw Normal View History

2020-04-13 15:07:04 +02:00
{
local env = std.extVar("env"),
2020-04-13 15:44:33 +02:00
local namespace = env.GITHUB_REF_SLUG,
2020-05-03 18:51:25 +02:00
local tag = namespace,
2020-05-13 16:17:58 +02:00
local url = if namespace == "master" then "workadventu.re" else namespace+".workadventure.test.thecodingmachine.com",
// develop branch does not use admin because of issue with SSL certificate of admin as of now.
local adminUrl = if namespace == "master" || namespace == "develop" || std.startsWith(namespace, "admin") then "https://"+url else null,
2020-04-13 15:07:04 +02:00
"$schema": "https://raw.githubusercontent.com/thecodingmachine/deeployer/master/deeployer.schema.json",
2020-06-25 12:07:43 +02:00
"version": "1.0",
2020-04-13 15:07:04 +02:00
"containers": {
"back1": {
2020-04-13 15:44:33 +02:00
"image": "thecodingmachine/workadventure-back:"+tag,
2020-04-22 12:31:17 +02:00
"host": {
"url": "api1."+url,
2020-12-09 17:37:52 +01:00
"https": "enable",
2020-12-09 17:45:05 +01:00
"containerPort": 8080
2020-04-22 12:31:17 +02:00
},
2020-12-09 17:25:10 +01:00
"ports": [8080, 50051],
2020-04-13 15:07:04 +02:00
"env": {
2020-10-14 12:00:23 +02:00
"SECRET_KEY": "tempSecretKeyNeedsToChange",
"ADMIN_API_TOKEN": env.ADMIN_API_TOKEN,
"JITSI_ISS": env.JITSI_ISS,
"JITSI_URL": env.JITSI_URL,
"SECRET_JITSI_KEY": env.SECRET_JITSI_KEY,
"TURN_STATIC_AUTH_SECRET": env.TURN_STATIC_AUTH_SECRET,
} + (if adminUrl != null then {
"ADMIN_API_URL": adminUrl,
} else {}) + if namespace != "master" then {
// Absolutely ugly WorkAround to circumvent broken certificates on the K8S test cluster. Don't do this in production kids!
"NODE_TLS_REJECT_UNAUTHORIZED": "0"
}
2020-04-13 15:07:04 +02:00
},
"back2": {
"image": "thecodingmachine/workadventure-back:"+tag,
"host": {
"url": "api2."+url,
"https": "enable",
"containerPort": 8080
},
"ports": [8080, 50051],
"env": {
"SECRET_KEY": "tempSecretKeyNeedsToChange",
"ADMIN_API_TOKEN": env.ADMIN_API_TOKEN,
"JITSI_ISS": env.JITSI_ISS,
"JITSI_URL": env.JITSI_URL,
"SECRET_JITSI_KEY": env.SECRET_JITSI_KEY,
"TURN_STATIC_AUTH_SECRET": env.TURN_STATIC_AUTH_SECRET,
} + (if adminUrl != null then {
"ADMIN_API_URL": adminUrl,
} else {}) + if namespace != "master" then {
// Absolutely ugly WorkAround to circumvent broken certificates on the K8S test cluster. Don't do this in production kids!
"NODE_TLS_REJECT_UNAUTHORIZED": "0"
}
},
2020-12-04 15:13:35 +01:00
"pusher": {
"replicas": 2,
2020-12-04 15:13:35 +01:00
"image": "thecodingmachine/workadventure-pusher:"+tag,
"host": {
"url": "pusher."+url,
"https": "enable"
},
"ports": [8080],
"env": {
"SECRET_KEY": "tempSecretKeyNeedsToChange",
"ADMIN_API_TOKEN": env.ADMIN_API_TOKEN,
"JITSI_ISS": env.JITSI_ISS,
"JITSI_URL": env.JITSI_URL,
"API_URL": "back1:50051,back2:50051",
2020-12-04 15:13:35 +01:00
"SECRET_JITSI_KEY": env.SECRET_JITSI_KEY,
} + (if adminUrl != null then {
2020-12-04 15:13:35 +01:00
"ADMIN_API_URL": adminUrl,
} else {}) + if namespace != "master" then {
// Absolutely ugly WorkAround to circumvent broken certificates on the K8S test cluster. Don't do this in production kids!
"NODE_TLS_REJECT_UNAUTHORIZED": "0"
}
2020-12-04 15:13:35 +01:00
},
2020-04-13 15:07:04 +02:00
"front": {
2020-04-13 15:44:33 +02:00
"image": "thecodingmachine/workadventure-front:"+tag,
2020-04-22 12:31:17 +02:00
"host": {
"url": "play."+url,
2020-04-22 19:16:04 +02:00
"https": "enable"
2020-04-22 12:31:17 +02:00
},
2020-04-13 15:07:04 +02:00
"ports": [80],
"env": {
2020-12-09 15:27:52 +01:00
"API_URL": "pusher."+url,
"UPLOADER_URL": "uploader."+url,
2021-01-20 10:34:26 +01:00
"ADMIN_URL": url,
"JITSI_URL": env.JITSI_URL,
"SECRET_JITSI_KEY": env.SECRET_JITSI_KEY,
2020-08-28 17:30:33 +02:00
"TURN_SERVER": "turn:coturn.workadventu.re:443,turns:coturn.workadventu.re:443",
2020-08-28 13:52:25 +02:00
"TURN_USER": "workadventure",
"TURN_PASSWORD": "WorkAdventure123",
2021-01-20 16:57:30 +01:00
"JITSI_PRIVATE_MODE": if env.SECRET_JITSI_KEY != '' then "true" else "false",
2021-01-25 22:42:44 +01:00
"START_ROOM_URL": "/_/global/maps."+url+"/Floor0/floor0.json"
//"GA_TRACKING_ID": "UA-10196481-11"
2020-04-13 15:07:04 +02:00
}
},
"uploader": {
"image": "thecodingmachine/workadventure-uploader:"+tag,
"host": {
"url": "uploader."+url,
"https": "enable",
"containerPort": 8080
},
"ports": [8080],
"env": {
}
},
2020-07-23 18:43:51 +02:00
"maps": {
"image": "thecodingmachine/workadventure-maps:"+tag,
"host": {
"url": "maps."+url,
"https": "enable"
},
"ports": [80]
},
2020-04-22 19:16:04 +02:00
},
"config": {
"https": {
"mail": "d.negrier@thecodingmachine.com"
},
k8sextension(k8sConf)::
k8sConf + {
back1+: {
deployment+: {
spec+: {
template+: {
metadata+: {
annotations+: {
"prometheus.io/port": "8080",
"prometheus.io/scrape": "true"
}
}
}
}
}
},
back2+: {
deployment+: {
spec+: {
template+: {
metadata+: {
annotations+: {
"prometheus.io/port": "8080",
"prometheus.io/scrape": "true"
}
}
}
}
}
},
pusher+: {
deployment+: {
spec+: {
template+: {
metadata+: {
annotations+: {
"prometheus.io/port": "8080",
"prometheus.io/scrape": "true"
}
}
}
}
}
}
}
2020-04-13 15:07:04 +02:00
}
}