mirror of
https://github.com/cdr/code-server.git
synced 2025-12-07 08:52:16 +01:00
This commit adds complete Terraform infrastructure as code for deploying code-server on both EC2 and EKS platforms with enterprise-grade security and SAML/OIDC authentication. Features: - EC2 deployment with Auto Scaling Groups and Application Load Balancer - EKS deployment with managed node groups and AWS Load Balancer Controller - Private network setup with VPC, private subnets, and NAT gateways - SAML/OIDC authentication using OAuth2 Proxy - Security hardening: - KMS encryption for data at rest - TLS encryption in transit - IAM roles with least privilege - Security groups with minimal access - VPC Flow Logs - IMDSv2 enforcement - Auto-scaling capabilities for both EC2 and EKS - CloudWatch logging and monitoring - Automated deployment scripts Terraform Modules: - modules/vpc: VPC with public/private subnets, NAT, and VPC endpoints - modules/security: Security groups, IAM roles, and KMS keys - modules/ec2: EC2 Auto Scaling deployment with ALB - modules/eks: EKS cluster with managed node groups and addons Deployments: - deployments/ec2: EC2 deployment configuration - deployments/eks: EKS deployment configuration with Kubernetes manifests Documentation: - README.md: Comprehensive deployment and operations guide - QUICK-START.md: Quick reference for fast deployment - SAML-SETUP-GUIDE.md: Step-by-step IdP configuration guide Scripts: - scripts/deploy-ec2.sh: Automated EC2 deployment - scripts/deploy-eks.sh: Automated EKS deployment - scripts/destroy-ec2.sh: EC2 cleanup - scripts/destroy-eks.sh: EKS cleanup
147 lines
3.5 KiB
HCL
147 lines
3.5 KiB
HCL
# EC2 Deployment Variables
|
|
|
|
variable "aws_region" {
|
|
description = "AWS region for deployment"
|
|
type = string
|
|
default = "us-east-1"
|
|
}
|
|
|
|
variable "project_name" {
|
|
description = "Project name"
|
|
type = string
|
|
default = "code-server"
|
|
}
|
|
|
|
variable "environment" {
|
|
description = "Environment name (dev, staging, prod)"
|
|
type = string
|
|
default = "dev"
|
|
}
|
|
|
|
# VPC Configuration
|
|
variable "vpc_cidr" {
|
|
description = "CIDR block for VPC"
|
|
type = string
|
|
default = "10.0.0.0/16"
|
|
}
|
|
|
|
variable "public_subnet_cidrs" {
|
|
description = "CIDR blocks for public subnets"
|
|
type = list(string)
|
|
default = ["10.0.1.0/24", "10.0.2.0/24", "10.0.3.0/24"]
|
|
}
|
|
|
|
variable "private_subnet_cidrs" {
|
|
description = "CIDR blocks for private subnets"
|
|
type = list(string)
|
|
default = ["10.0.11.0/24", "10.0.12.0/24", "10.0.13.0/24"]
|
|
}
|
|
|
|
variable "single_nat_gateway" {
|
|
description = "Use a single NAT gateway (cost optimization)"
|
|
type = bool
|
|
default = false
|
|
}
|
|
|
|
# Security Configuration
|
|
variable "allowed_cidr_blocks" {
|
|
description = "CIDR blocks allowed to access the ALB"
|
|
type = list(string)
|
|
default = ["10.0.0.0/8"] # Restrict to private network
|
|
}
|
|
|
|
variable "ssh_allowed_cidr_blocks" {
|
|
description = "CIDR blocks allowed to SSH into instances"
|
|
type = list(string)
|
|
default = [] # No SSH access by default
|
|
}
|
|
|
|
# EC2 Configuration
|
|
variable "instance_type" {
|
|
description = "EC2 instance type"
|
|
type = string
|
|
default = "t3.medium"
|
|
}
|
|
|
|
variable "ebs_volume_size" {
|
|
description = "Size of EBS volume in GB"
|
|
type = number
|
|
default = 50
|
|
}
|
|
|
|
variable "min_instances" {
|
|
description = "Minimum number of instances"
|
|
type = number
|
|
default = 1
|
|
}
|
|
|
|
variable "max_instances" {
|
|
description = "Maximum number of instances"
|
|
type = number
|
|
default = 3
|
|
}
|
|
|
|
variable "desired_instances" {
|
|
description = "Desired number of instances"
|
|
type = number
|
|
default = 1
|
|
}
|
|
|
|
variable "code_server_version" {
|
|
description = "Version of code-server Docker image"
|
|
type = string
|
|
default = "latest"
|
|
}
|
|
|
|
variable "enable_autoscaling" {
|
|
description = "Enable auto scaling"
|
|
type = bool
|
|
default = true
|
|
}
|
|
|
|
# Load Balancer Configuration
|
|
variable "certificate_arn" {
|
|
description = "ARN of ACM certificate for HTTPS (leave empty to use HTTP)"
|
|
type = string
|
|
default = ""
|
|
}
|
|
|
|
variable "internal_alb" {
|
|
description = "Whether the ALB should be internal (private network only)"
|
|
type = bool
|
|
default = true
|
|
}
|
|
|
|
# OAuth2 / SAML Configuration
|
|
variable "oauth2_client_id" {
|
|
description = "OAuth2 client ID from your SAML/OIDC provider"
|
|
type = string
|
|
}
|
|
|
|
variable "oauth2_client_secret" {
|
|
description = "OAuth2 client secret from your SAML/OIDC provider"
|
|
type = string
|
|
sensitive = true
|
|
}
|
|
|
|
variable "oauth2_issuer_url" {
|
|
description = "OAuth2 issuer URL (OIDC discovery endpoint)"
|
|
type = string
|
|
}
|
|
|
|
variable "oauth2_redirect_url" {
|
|
description = "OAuth2 redirect URL (https://your-domain.com/oauth2/callback)"
|
|
type = string
|
|
}
|
|
|
|
variable "oauth2_cookie_secret" {
|
|
description = "OAuth2 cookie secret (generate with: python -c 'import os,base64; print(base64.urlsafe_b64encode(os.urandom(32)).decode())')"
|
|
type = string
|
|
sensitive = true
|
|
}
|
|
|
|
variable "oauth2_allowed_emails" {
|
|
description = "List of allowed email addresses (leave empty to allow all)"
|
|
type = list(string)
|
|
default = []
|
|
}
|