forked from TryGhost/gatsby-starter-ghost
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathtemplate.yaml
423 lines (423 loc) · 14.5 KB
/
template.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
AWSTemplateFormatVersion: 2010-09-09
Transform: AWS::Serverless-2016-10-31
Resources:
ghostFS:
Type: AWS::EFS::FileSystem
Properties:
PerformanceMode: generalPurpose
Encrypted: true
LifecyclePolicies:
- TransitionToIA: AFTER_14_DAYS
ghostMount0:
Type: AWS::EFS::MountTarget
Properties:
FileSystemId: !GetAtt ghostFS.FileSystemId
SecurityGroups:
- !GetAtt ghostEFSSecurityGroup.GroupId
SubnetId: !Select
- 0
- !Ref DefaultVPCSubnets
ghostMount1:
Type: AWS::EFS::MountTarget
Properties:
FileSystemId: !GetAtt ghostFS.FileSystemId
SecurityGroups:
- !GetAtt ghostEFSSecurityGroup.GroupId
SubnetId: !Select
- 1
- !Ref DefaultVPCSubnets
ghostAPI:
Type: AWS::ECS::TaskDefinition
Properties:
ContainerDefinitions:
- Name: ghost
Image: registry.hub.docker.com/library/ghost
PortMappings:
- ContainerPort: 2368
LogConfiguration:
LogDriver: awslogs
Options:
awslogs-group: !Ref ghostAPILogGroup
awslogs-region: !Ref AWS::Region
awslogs-stream-prefix: logs
MountPoints:
- ContainerPath: /var/lib/ghost/content
SourceVolume: ghostVolume
Environment:
- Name: url
Value: !Join [ '', [ 'http://', !GetAtt Loadbalancer.DNSName ] ]
- Name: database__client
Value: !If
- GhostAuroraDB
- mysql
- sqlite3
- Name: database__connection__filename
Value: !If
- GhostAuroraDB
- !Ref AWS::NoValue
- /var/lib/ghost/content/data/ghost-efs.db
- Name: paths__contentPath
Value: /var/lib/ghost/content
- Name: database__connection__host
Value: !If
- GhostAuroraDB
- !GetAtt ghostDB.Endpoint.Address
- !Ref AWS::NoValue
- Name: database__connection__user
Value: !If
- GhostAuroraDB
- root
- !Ref AWS::NoValue
- Name: database__connection__password
Value: !If
- GhostAuroraDB
- !Join
- ''
- - '{{resolve:secretsmanager:'
- !Ref ghostDBRootUserSecret
- ':SecretString:password}}'
- !Ref AWS::NoValue
- Name: database__pool__min
Value: !If
- GhostAuroraDB
- '0'
- !Ref AWS::NoValue
- Name: database__connection__port
Value: !If
- GhostAuroraDB
- '3306'
- !Ref AWS::NoValue
- Name: database__connection__database
Value: !If
- GhostAuroraDB
- !Ref ghostDB
- !Ref AWS::NoValue
- Name: database__connection__ssl__ca
Value: !If
- GhostAuroraDB
- |
-----BEGIN CERTIFICATE-----
MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
rqXRfboQnoZsG4q5WTP468SQvvG5
-----END CERTIFICATE-----
- !Ref AWS::NoValue
Cpu: '256'
ExecutionRoleArn: !GetAtt ghostAPIExecutionRole.Arn
Memory: '512'
NetworkMode: awsvpc
RequiresCompatibilities:
- FARGATE
TaskRoleArn: !If
- GhostAuroraDB
- !GetAtt ghostAPITaskRoleAurora.Arn
- !GetAtt ghostAPITaskRoleEFS.Arn
Volumes:
- Name: ghostVolume
EFSVolumeConfiguration:
FilesystemId: !GetAtt ghostFS.FileSystemId
AuthorizationConfig:
IAM: ENABLED
TransitEncryption: ENABLED
CloudMap:
Type: AWS::ServiceDiscovery::Service
Properties:
DnsConfig:
RoutingPolicy: MULTIVALUE
DnsRecords:
- TTL: 60
Type: A
- TTL: 60
Type: SRV
Name: 'ghost-cms'
NamespaceId: !Ref CloudMapNamespace
CloudMapNamespace:
Type: AWS::ServiceDiscovery::PrivateDnsNamespace
Properties:
Name: !Sub ${AWS::StackName}-${AWS::Region}-jamstackery.io
Vpc: !Ref DefaultVPCId
Service:
Type: AWS::ECS::Service
Properties:
PlatformVersion: 1.4.0
Cluster: default
TaskDefinition: !Ref ghostAPI
DesiredCount: 2
DeploymentConfiguration:
MaximumPercent: 200
MinimumHealthyPercent: 100
LaunchType: FARGATE
NetworkConfiguration:
AwsvpcConfiguration:
AssignPublicIp: ENABLED
Subnets:
- !Select
- 0
- !Ref DefaultVPCSubnets
- !Select
- 1
- !Ref DefaultVPCSubnets
SecurityGroups:
- !GetAtt ghostAPISecurityGroup.GroupId
LoadBalancers:
- TargetGroupArn: !Ref TargetGroup
ContainerPort: 2368
ContainerName: ghost
Loadbalancer:
Type: AWS::ElasticLoadBalancingV2::LoadBalancer
Properties:
IpAddressType: ipv4
Name: ghostAPILB
SecurityGroups:
- !GetAtt ghostLBSecurityGroup.GroupId
Subnets: !Ref DefaultVPCSubnets
Type: application
LoadBalancerListener:
Type: AWS::ElasticLoadBalancingV2::Listener
Properties:
LoadBalancerArn: !Ref Loadbalancer
Port: 80
Protocol: HTTP
DefaultActions:
- Type: forward
TargetGroupArn: !Ref TargetGroup
TargetGroup:
Type: AWS::ElasticLoadBalancingV2::TargetGroup
Properties:
TargetType: ip
Name: ghostAPILBTG
Port: 80
Protocol: HTTP
VpcId: !Ref DefaultVPCId
ghostAPIExecutionRole:
Type: AWS::IAM::Role
Properties:
RoleName: !Sub ${AWS::StackName}-ghostAPI-execution
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
Effect: Allow
Principal:
Service: ecs-tasks.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: DownloadDockerImagesFromECR
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action:
- logs:CreateLogStream
- logs:PutLogEvents
Resource: !Sub arn:aws:logs:*:*:log-group:/stackery/task/${AWS::StackName}-*
- Effect: Allow
Action:
- ecr:GetAuthorizationToken
- ecr:BatchCheckLayerAvailability
- ecr:GetDownloadUrlForLayer
- ecr:BatchGetImage
Resource: '*'
- PolicyName: MountEFS
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action:
- elasticfilesystem:ClientMount
- elasticfilesystem:ClientWrite
- elasticfilesystem:ClientRootAccess
Resource: '*'
ghostAPITaskRoleEFS:
Type: AWS::IAM::Role
Properties:
RoleName: !Sub ${AWS::StackName}-ghostAPI-task-EFS
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
Effect: Allow
Principal:
Service: ecs-tasks.amazonaws.com
Action: sts:AssumeRole
ghostAPITaskRoleAurora:
Type: AWS::IAM::Role
Condition: GhostAuroraDB
Properties:
RoleName: !Sub ${AWS::StackName}-ghostAPI-task-Aurora
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
Effect: Allow
Principal:
Service: ecs-tasks.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: SecretPolicy
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action:
- secretsmanager:GetSecretValue
Resource:
- !Ref ghostDBRootUserSecret
- PolicyName: StackeryPolicy
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action:
- rds-data:BatchExecuteStatement
- rds-data:BeginTransaction
- rds-data:CommitTransaction
- rds-data:ExecuteStatement
- rds-data:RollbackTransaction
Resource:
- !Sub arn:aws:rds:${AWS::Region}:${AWS::AccountId}:cluster:${ghostDB}
ghostAPILogGroup:
Type: AWS::Logs::LogGroup
Properties:
LogGroupName: !Sub /stackery/task/${AWS::StackName}-ghostAPI/logs
ghostDB:
Type: AWS::RDS::DBCluster
Condition: GhostAuroraDB
Properties:
BackupRetentionPeriod: 1
DBSubnetGroupName: !Ref ghostDBSubnetGroup
Engine: aurora
EngineMode: serverless
MasterUsername: !Sub '{{resolve:secretsmanager:${ghostDBRootUserSecret}:SecretString:username}}'
MasterUserPassword: !Sub '{{resolve:secretsmanager:${ghostDBRootUserSecret}:SecretString:password}}'
EnableHttpEndpoint: true
ScalingConfiguration:
AutoPause: true
MinCapacity: 1
MaxCapacity: 2
StorageEncrypted: true
VpcSecurityGroupIds:
- !Ref ghostDBSecurityGroup
ghostDBRootUserSecretAttachment:
Type: AWS::SecretsManager::SecretTargetAttachment
Condition: GhostAuroraDB
Properties:
SecretId: !Ref ghostDBRootUserSecret
TargetId: !Ref ghostDB
TargetType: AWS::RDS::DBCluster
ghostDBSubnetGroup:
Type: AWS::RDS::DBSubnetGroup
Condition: GhostAuroraDB
Properties:
DBSubnetGroupDescription: !Sub
- Stack ${StackTagName} Environment ${EnvironmentTagName} Database ${ResourceName} VPC Subnets
- ResourceName: ghostDB
SubnetIds: !Ref DefaultVPCSubnets
Tags:
- Key: Name
Value: !Sub
- Stack ${StackTagName} Environment ${EnvironmentTagName} Database ${ResourceName} VPC Subnets
- ResourceName: ghostDB
ghostDBRootUserSecret:
Type: AWS::SecretsManager::Secret
Condition: GhostAuroraDB
Properties:
Description: !Sub
- Root user login info for Stack ${StackTagName} Environment ${EnvironmentTagName} Database ${ResourceName}
- ResourceName: ghostDB
GenerateSecretString:
SecretStringTemplate: '{"username": "root"}'
GenerateStringKey: password
PasswordLength: 16
ExcludeCharacters: '"@/\'
Name: !Sub /${EnvironmentTagName}/${StackTagName}/ghostDB/RootUser
ghostDBSecurityGroup:
Type: AWS::EC2::SecurityGroup
Condition: GhostAuroraDB
Properties:
GroupDescription: Database Security Group
SecurityGroupIngress:
- SourceSecurityGroupId: !Ref ghostAPISecurityGroup
IpProtocol: tcp
FromPort: 3306
ToPort: 3306
Tags:
- Key: Name
Value: !Sub
- Stack ${StackTagName} Environment ${EnvironmentTagName} Database ${ResourceName} VPC Security Group
- ResourceName: ghostDB
VpcId: !Ref DefaultVPCId
ghostAPISecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: API Security Group
SecurityGroupIngress:
- SourceSecurityGroupId: !Ref ghostLBSecurityGroup
IpProtocol: tcp
FromPort: 2368
ToPort: 2368
Tags:
- Key: Name
Value: !Sub
- Stack ${StackTagName} Environment ${EnvironmentTagName} API ${ResourceName} VPC Security Group
- ResourceName: ghostAPI
VpcId: !Ref DefaultVPCId
ghostEFSSecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: EFS Security Group
SecurityGroupIngress:
- SourceSecurityGroupId: !Ref ghostAPISecurityGroup
IpProtocol: tcp
FromPort: 2049
ToPort: 2049
Tags:
- Key: Name
Value: !Sub
- Stack ${StackTagName} Environment ${EnvironmentTagName} EFS ${ResourceName} VPC Security Group
- ResourceName: ghostAPI
VpcId: !Ref DefaultVPCId
ghostLBSecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: Load Balancer Security Group
SecurityGroupIngress:
CidrIp: 0.0.0.0/0
FromPort: 80
IpProtocol: tcp
ToPort: 80
Tags:
- Key: Name
Value: !Sub
- Stack ${StackTagName} Environment ${EnvironmentTagName} API ${ResourceName} VPC Security Group
- ResourceName: ghostLB
VpcId: !Ref DefaultVPCId
Parameters:
StackTagName:
Type: String
Description: Stack Name (injected by Stackery at deployment time)
EnvironmentTagName:
Type: String
Description: Environment Name (injected by Stackery at deployment time)
DefaultVPCId:
Type: AWS::EC2::VPC::Id
Description: AWS account-specific default VPC ID (injected by Stackery at deployment time)
DefaultVPCSubnets:
Type: List<AWS::EC2::Subnet::Id>
Description: AWS account-specific default VPC subnets (injected by Stackery at deployment time)
Conditions:
GhostAuroraDB: !Equals
- !Ref EnvironmentTagName
- prod