mirror of https://github.com/pulumi/pulumi.git
101 lines
3.1 KiB
TypeScript
101 lines
3.1 KiB
TypeScript
import * as pulumi from "@pulumi/pulumi";
|
|
import * as aws from "@pulumi/aws";
|
|
|
|
// Read the default VPC and public subnets, which we will use.
|
|
const vpc = aws.ec2.getVpc({
|
|
"default": true,
|
|
});
|
|
const subnets = vpc.then(vpc => aws.ec2.getSubnetIds({
|
|
vpcId: vpc.id,
|
|
}));
|
|
// Create a security group that permits HTTP ingress and unrestricted egress.
|
|
const webSecurityGroup = new aws.ec2.SecurityGroup("webSecurityGroup", {
|
|
vpcId: vpc.then(vpc => vpc.id),
|
|
egress: [{
|
|
protocol: "-1",
|
|
fromPort: 0,
|
|
toPort: 0,
|
|
cidrBlocks: ["0.0.0.0/0"],
|
|
}],
|
|
ingress: [{
|
|
protocol: "tcp",
|
|
fromPort: 80,
|
|
toPort: 80,
|
|
cidrBlocks: ["0.0.0.0/0"],
|
|
}],
|
|
});
|
|
// Create an ECS cluster to run a container-based service.
|
|
const cluster = new aws.ecs.Cluster("cluster", {});
|
|
// Create an IAM role that can be used by our service's task.
|
|
const taskExecRole = new aws.iam.Role("taskExecRole", {assumeRolePolicy: JSON.stringify({
|
|
Version: "2008-10-17",
|
|
Statement: [{
|
|
Sid: "",
|
|
Effect: "Allow",
|
|
Principal: {
|
|
Service: "ecs-tasks.amazonaws.com",
|
|
},
|
|
Action: "sts:AssumeRole",
|
|
}],
|
|
})});
|
|
const taskExecRolePolicyAttachment = new aws.iam.RolePolicyAttachment("taskExecRolePolicyAttachment", {
|
|
role: taskExecRole.name,
|
|
policyArn: "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy",
|
|
});
|
|
// Create a load balancer to listen for HTTP traffic on port 80.
|
|
const webLoadBalancer = new aws.elasticloadbalancingv2.LoadBalancer("webLoadBalancer", {
|
|
subnets: subnets.then(subnets => subnets.ids),
|
|
securityGroups: [webSecurityGroup.id],
|
|
});
|
|
const webTargetGroup = new aws.elasticloadbalancingv2.TargetGroup("webTargetGroup", {
|
|
port: 80,
|
|
protocol: "HTTP",
|
|
targetType: "ip",
|
|
vpcId: vpc.then(vpc => vpc.id),
|
|
});
|
|
const webListener = new aws.elasticloadbalancingv2.Listener("webListener", {
|
|
loadBalancerArn: webLoadBalancer.arn,
|
|
port: 80,
|
|
defaultActions: [{
|
|
type: "forward",
|
|
targetGroupArn: webTargetGroup.arn,
|
|
}],
|
|
});
|
|
// Spin up a load balanced service running NGINX
|
|
const appTask = new aws.ecs.TaskDefinition("appTask", {
|
|
family: "fargate-task-definition",
|
|
cpu: "256",
|
|
memory: "512",
|
|
networkMode: "awsvpc",
|
|
requiresCompatibilities: ["FARGATE"],
|
|
executionRoleArn: taskExecRole.arn,
|
|
containerDefinitions: JSON.stringify([{
|
|
name: "my-app",
|
|
image: "nginx",
|
|
portMappings: [{
|
|
containerPort: 80,
|
|
hostPort: 80,
|
|
protocol: "tcp",
|
|
}],
|
|
}]),
|
|
});
|
|
const appService = new aws.ecs.Service("appService", {
|
|
cluster: cluster.arn,
|
|
desiredCount: 5,
|
|
launchType: "FARGATE",
|
|
taskDefinition: appTask.arn,
|
|
networkConfiguration: {
|
|
assignPublicIp: true,
|
|
subnets: subnets.then(subnets => subnets.ids),
|
|
securityGroups: [webSecurityGroup.id],
|
|
},
|
|
loadBalancers: [{
|
|
targetGroupArn: webTargetGroup.arn,
|
|
containerName: "my-app",
|
|
containerPort: 80,
|
|
}],
|
|
}, {
|
|
dependsOn: [webListener],
|
|
});
|
|
export const url = webLoadBalancer.dnsName;
|