Skip to content

Commit

Permalink
feat(infra): add ability to provision dev tunnel
Browse files Browse the repository at this point in the history
  • Loading branch information
NathanFlurry committed Apr 18, 2024
1 parent fc17cee commit bf86254
Show file tree
Hide file tree
Showing 11 changed files with 263 additions and 0 deletions.
7 changes: 7 additions & 0 deletions Taskfile.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
version: '3'

includes:
dev-tunnel:
taskfile: infra/dev-tunnel
dir: infra/dev-tunnel

6 changes: 6 additions & 0 deletions docs/getting_started/DEVELOPMENT.md
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,12 @@ and run "Remote-Containers: Reopen in Container".

You can now skip to the [Common steps](#common-steps) section.

### Step 5: Setup dev tunnel (optional)

Rivet needs a publicly accessible IP in order to be able to deploy servers. Without it, you can still run Rivet, but you won't be able to access servers.

Read the guide on setting up a dev tunnel (similar to ngrok) [here](/docs/infrastructure/dev-tunnel/SETUP.md).

## Method 2: Virtual Machine

This is best if running a small deployment of Rivet on a cloud provider.
Expand Down
71 changes: 71 additions & 0 deletions docs/infrastructure/dev-tunnel/SETUP.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
# Setup Dev Tunnel

This guide will show you how to set up a dev tunnel (similar to [ngrok](https://ngrok.com/)) for developing Rivet locally.

This will run a Terraform plan to deploy two components:

- A server on Linode that will forward traffic to your local machine
- A Docker container that will connect to the remote server over SSH and expose a reverse tunnel

## Prerequisites

Make sure to run `nix-shell` for all subsequent commands.

- Docker
- Linode API Key

## Step 1: Create Dev Tunnel

```sh
task dev-tunnel:up
```

This will prompt you to past your Linode API token.

Once complete, this will print an IP to your console like:

```toml
ip = "1.2.3.4"
```

## Step 2: Update public IP

Open your namespace config in `namespaces/dev.toml`.

- Update `cluter.single_node.public_ip` to the IP from the last step. By default, the config is generated with `public_ip = "127.0.0.1"`.
- If exists, delete the line that says `api_http_port = 8080`.
- Validate that there are no ports overridden (i.e. `cluter.single_node.api_http_port`).

If you need your IP again, run `task dev-tunnel:get-ip`.

## Step 3: Update infrastructure

To deploy the new DNS records & configs, run:

```sh
bolt infra up
```

## Step 4: Valdiate deployment

Validate you can reach your local server on the public IP, replace `MY_TUNNEL_IP` with the IP from the last step:

```sh
curl MY_TUNNEL_IP:80
```

This should return a 404 response:

```
404 page not found
```

This means your server is now accessible.

If you have DNS configured, you should be able to reach your server from `api.my

## Cleanup

```sh
task dev-tunnel:down
```
14 changes: 14 additions & 0 deletions infra/dev-tunnel/Taskfile.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
version: '3'

tasks:
up:
cmds:
- terraform apply

down:
cmds:
- terraform destroy

get-ip:
cmds:
- terraform output
16 changes: 16 additions & 0 deletions infra/dev-tunnel/main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
terraform {
required_providers {
linode = {
source = "linode/linode"
version = "~> 1.23.0"
}
docker = {
source = "kreuzwerker/docker"
version = "~> 2.15.0"
}
}
}

output "ip" {
value = linode_instance.tunnel.ip_address
}
3 changes: 3 additions & 0 deletions infra/dev-tunnel/providers.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
provider "linode" {
token = var.linode_token
}
69 changes: 69 additions & 0 deletions infra/dev-tunnel/server.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
resource "random_password" "password" {
length = 16
special = true
override_special = "_%@"
}

resource "linode_instance" "tunnel" {
image = "linode/debian11"
label = "dev-tunnel"
region = "us-west"
type = "g6-nanode-1"
authorized_keys = [trimspace(tls_private_key.ssh_key.public_key_openssh)]
root_pass = random_password.password.result
}

resource "linode_firewall" "tunnel_firewall" {
label = "dev-tunnel"

inbound_policy = "DROP"
outbound_policy = "ACCEPT"

inbound {
label = "ssh"
action = "ACCEPT"
protocol = "TCP"
ports = "22"
ipv4 = ["0.0.0.0/0"]
ipv6 = ["::/0"]
}

inbound {
label = "http"
action = "ACCEPT"
protocol = "TCP"
ports = "80"
ipv4 = ["0.0.0.0/0"]
ipv6 = ["::/0"]
}

inbound {
label = "https"
action = "ACCEPT"
protocol = "TCP"
ports = "443"
ipv4 = ["0.0.0.0/0"]
ipv6 = ["::/0"]
}

inbound {
label = "tunnel"
action = "ACCEPT"
protocol = "TCP"
ports = "5000"
ipv4 = ["0.0.0.0/0"]
ipv6 = ["::/0"]
}

inbound {
label = "minio"
action = "ACCEPT"
protocol = "TCP"
ports = "9000"
ipv4 = ["0.0.0.0/0"]
ipv6 = ["::/0"]
}

linodes = [linode_instance.tunnel.id]
}

10 changes: 10 additions & 0 deletions infra/dev-tunnel/tls.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
resource "tls_private_key" "ssh_key" {
algorithm = "RSA"
rsa_bits = 2048
}

resource "local_file" "ssh_key_file" {
filename = "/tmp/tunnel_id_rsa"
content = tls_private_key.ssh_key.private_key_pem
file_permission = "0600"
}
59 changes: 59 additions & 0 deletions infra/dev-tunnel/tunnel.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
resource "null_resource" "update_sshd_config" {
depends_on = [linode_instance.tunnel]
triggers = {
override = 2
}

connection {
type = "ssh"
user = "root"
private_key = tls_private_key.ssh_key.private_key_pem
host = linode_instance.tunnel.ip_address
}

provisioner "local-exec" {
command = <<-EOT
# Wait for SSH
while ! nc -z ${linode_instance.tunnel.ip_address} 22; do
echo "Waiting for SSH to be available..."
sleep 2
done
# Update config
ssh -o StrictHostKeyChecking=no -i ${local_file.ssh_key_file.filename} root@${linode_instance.tunnel.ip_address} \
"echo 'GatewayPorts yes' > /etc/ssh/sshd_config.d/dev_tunnel.conf && \
systemctl restart ssh"
EOT
}
}

resource "docker_container" "ssh_tunnel" {
depends_on = [ null_resource.update_sshd_config]

image = "debian:11"
name = "rivet-tunnel"
restart = "unless-stopped"
network_mode = "host"
command = [
"sh",
"-c",
# StrictHostKeyChecking=no = disables prompting before adding remote host to hosts file
# -v = verbose
# -N = don't execute command
# -T = no TTY
# -R = reverse proxy
<<EOF
apt-get update -y
apt-get install -y openssh-client
while true; do
echo 'Connecting...'
ssh -o StrictHostKeyChecking=no -i /root/.ssh/id_rsa -vNT -R 0.0.0.0:80:127.0.0.1:80 -R 0.0.0.0:443:127.0.0.1:443 -R 0.0.0.0:5000:127.0.0.1:5000 -R 0.0.0.0:9000:127.0.0.1:9000 root@${linode_instance.tunnel.ip_address}
sleep 5
done
EOF
]
volumes {
host_path = local_file.ssh_key_file.filename
container_path = "/root/.ssh/id_rsa"
}
}
4 changes: 4 additions & 0 deletions infra/dev-tunnel/vars.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
variable "linode_token" {
type = string
sensitive = true
}
4 changes: 4 additions & 0 deletions shell.nix
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,10 @@ in
bashInteractive
bash-completion

# Utilities
go-task
netcat

# Fixes "cannot change locale" warning
glibcLocales
]
Expand Down

0 comments on commit bf86254

Please sign in to comment.