diff --git a/terraform/modules/acm/README.md b/terraform/modules/acm/README.md new file mode 100644 index 0000000..14155bf --- /dev/null +++ b/terraform/modules/acm/README.md @@ -0,0 +1,45 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.3.1 | +| [aws](#requirement\_aws) | >= 4.10.0 | + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | 4.43.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_acm_certificate.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/acm_certificate) | resource | +| [aws_acm_certificate_validation.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/acm_certificate_validation) | resource | +| [aws_route53_record.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | resource | +| [aws_route53_zone.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [dns\_ttl](#input\_dns\_ttl) | The TTL of DNS recursive resolvers to cache information about this record. | `number` | `60` | no | +| [domain\_name](#input\_domain\_name) | A domain name for which the certificate should be issued | `string` | `""` | no | +| [subject\_alternative\_names](#input\_subject\_alternative\_names) | A list of domains that should be SANs in the issued certificate | `list(string)` | `[]` | no | +| [tags](#input\_tags) | A mapping of tags to assign to the resource | `map(string)` | `{}` | no | +| [validation\_allow\_overwrite\_records](#input\_validation\_allow\_overwrite\_records) | Whether to allow overwrite of Route53 records | `bool` | `true` | no | +| [validation\_method](#input\_validation\_method) | Which method to use for validation. DNS or EMAIL are valid, NONE can be used for certificates that were imported into ACM and then into Terraform. | `string` | `"DNS"` | no | +| [validation\_timeout](#input\_validation\_timeout) | Define maximum timeout to wait for the validation to complete | `string` | `null` | no | + +## Outputs + +| Name | Description | +|------|-------------| +| [certificate\_arn](#output\_certificate\_arn) | The ARN of the certificate. | + \ No newline at end of file diff --git a/terraform/modules/apigw/README.md b/terraform/modules/apigw/README.md index d699785..8e6145b 100644 --- a/terraform/modules/apigw/README.md +++ b/terraform/modules/apigw/README.md @@ -36,7 +36,7 @@ No modules. |------|-------------|------|---------|:--------:| | [integration](#input\_integration) | Map of API gateway integrations. | `map(any)` | n/a | yes | | [integration\_response](#input\_integration\_response) | Map of API gateway method integrations. | `map(any)` | n/a | yes | -| [lambda](#input\_lambda) | List of lambdas the API will execute. | `list(any)` | n/a | yes | +| [lambda](#input\_lambda) | Map of lambdas the API will execute. | `map(any)` | n/a | yes | | [method](#input\_method) | Map of API gateway methods. | `map(any)` | n/a | yes | | [method\_response](#input\_method\_response) | Map of API gateway method response. | `map(any)` | n/a | yes | | [name](#input\_name) | The name of the API. | `string` | n/a | yes | diff --git a/terraform/modules/cognito/README.md b/terraform/modules/cognito/README.md new file mode 100644 index 0000000..aebeac6 --- /dev/null +++ b/terraform/modules/cognito/README.md @@ -0,0 +1,51 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.3.1 | +| [aws](#requirement\_aws) | >= 4.10.0 | + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | 4.43.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_cognito_user_pool.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cognito_user_pool) | resource | +| [aws_cognito_user_pool_client.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cognito_user_pool_client) | resource | +| [aws_cognito_user_pool_domain.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cognito_user_pool_domain) | resource | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [account\_recovery\_mechanisms](#input\_account\_recovery\_mechanisms) | (Optional) A list of recovery\_mechanisms which are defined by a `name` and its `priority`. Valid values for `name` are veri fied\_email, verified\_phone\_number, and admin\_only. | `any` | `[]` | no | +| [alias\_attributes](#input\_alias\_attributes) | (Optional) Attributes supported as an alias for this user pool. Possible values: 'phone\_number', 'email', or 'preferred\_username'. Conflicts with username\_attributes. | `set(string)` | `null` | no | +| [auto\_verified\_attributes](#input\_auto\_verified\_attributes) | (Optional) The attributes to be auto-verified. Possible values: 'email', 'phone\_number'. | `set(string)` |
[
"email"
]
| no | +| [client\_name](#input\_client\_name) | (Required) The name of the client user pool. | `string` | n/a | yes | +| [domain](#input\_domain) | (Optional) Type a domain prefix to use for the sign-up and sign-in pages that are hosted by Amazon Cognito, e.g. 'https://{YOUR_PREFIX}.auth.eu-west-1.amazoncognito.com'. The prefix must be unique across the selected AWS Region. Domain names can only contain lower-case letters, numbers, and hyphens. | `string` | `null` | no | +| [enable\_username\_case\_sensitivity](#input\_enable\_username\_case\_sensitivity) | (Optional) Specifies whether username case sensitivity will be applied for all users in the user pool through Cognito APIs. | `bool` | `false` | no | +| [name](#input\_name) | (Required) The name of the user pool. | `string` | n/a | yes | +| [password\_minimum\_length](#input\_password\_minimum\_length) | (Optional) The minimum length of the password policy that you have set. | `number` | `20` | no | +| [password\_require\_lowercase](#input\_password\_require\_lowercase) | (Optional) Whether you have required users to use at least one lowercase letter in their password. | `bool` | `true` | no | +| [password\_require\_numbers](#input\_password\_require\_numbers) | (Optional) Whether you have required users to use at least one number in their password. | `bool` | `true` | no | +| [password\_require\_symbols](#input\_password\_require\_symbols) | (Optional) Whether you have required users to use at least one symbol in their password. | `bool` | `true` | no | +| [password\_require\_uppercase](#input\_password\_require\_uppercase) | (Optional) Whether you have required users to use at least one uppercase letter in their password. | `bool` | `true` | no | +| [redirect\_url](#input\_redirect\_url) | Redirect URL. | `string` | `null` | no | +| [schema\_attributes](#input\_schema\_attributes) | (Optional) A list of schema attributes of a user pool. You can add a maximum of 25 custom attributes. | `any` | `[]` | no | +| [tags](#input\_tags) | (Optional) A mapping of tags to assign to the resource. | `map(string)` | `{}` | no | +| [temporary\_password\_validity\_days](#input\_temporary\_password\_validity\_days) | (Optional) In the password policy you have set, refers to the number of days a temporary password is valid. If the user does not sign-in during this time, their password will need to be reset by an administrator. | `number` | `1` | no | + +## Outputs + +No outputs. + \ No newline at end of file diff --git a/terraform/modules/lambda/README.md b/terraform/modules/lambda/README.md index 7edf878..9ceb037 100644 --- a/terraform/modules/lambda/README.md +++ b/terraform/modules/lambda/README.md @@ -26,12 +26,14 @@ No modules. | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| +| [environment\_variables](#input\_environment\_variables) | A map that defines environment variables for the Lambda Function. | `map(string)` | `{}` | no | | [function\_name](#input\_function\_name) | A unique name for your Lambda Function. | `string` | n/a | yes | | [handler](#input\_handler) | Lambda Function entrypoint in your code. | `string` | n/a | yes | | [iam\_role](#input\_iam\_role) | IAM role ARN attached to the Lambda Function. | `string` | n/a | yes | | [package](#input\_package) | The absolute path to an existing zip-file to use. | `string` | `null` | no | | [runtime](#input\_runtime) | Lambda Function runtime. | `string` | n/a | yes | | [source\_arn](#input\_source\_arn) | Lambda source ARN. | `string` | `""` | no | +| [source\_code\_hash](#input\_source\_code\_hash) | The zip hash. | `string` | n/a | yes | | [tags](#input\_tags) | A mapping of tags to assign to API gateway resources. | `map(string)` | `{}` | no | | [vpc\_security\_group\_ids](#input\_vpc\_security\_group\_ids) | List of security group ids when Lambda Function should run in the VPC. | `list(string)` | `null` | no | | [vpc\_subnet\_ids](#input\_vpc\_subnet\_ids) | List of subnet ids when Lambda Function should run in the VPC. | `list(string)` | `null` | no | diff --git a/terraform/modules/lambda/main.tf b/terraform/modules/lambda/main.tf index 3c1eb07..e7f87c6 100644 --- a/terraform/modules/lambda/main.tf +++ b/terraform/modules/lambda/main.tf @@ -3,13 +3,13 @@ # ------------------------------------------------------------------------------ resource "aws_lambda_function" "this" { - filename = var.package - function_name = var.function_name - role = var.iam_role - handler = var.handler - runtime = var.runtime - tags = var.tags - timeout = 30 + filename = var.package + function_name = var.function_name + role = var.iam_role + handler = var.handler + runtime = var.runtime + tags = var.tags + timeout = 30 source_code_hash = var.source_code_hash dynamic "vpc_config" { diff --git a/terraform/modules/route53/README.md b/terraform/modules/route53/README.md new file mode 100644 index 0000000..2972037 --- /dev/null +++ b/terraform/modules/route53/README.md @@ -0,0 +1,39 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.3.1 | +| [aws](#requirement\_aws) | >= 4.10.0 | + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | 4.43.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_route53_record.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | resource | +| [aws_route53_zone.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [private\_zone](#input\_private\_zone) | Whether Route53 zone is private or public | `bool` | `false` | no | +| [records](#input\_records) | List of objects of DNS records | `any` | `{}` | no | +| [zone\_name](#input\_zone\_name) | Name of DNS zone | `string` | n/a | yes | + +## Outputs + +| Name | Description | +|------|-------------| +| [zone\_id](#output\_zone\_id) | The route 53 zone ID. | + \ No newline at end of file diff --git a/terraform/modules/sns/README.md b/terraform/modules/sns/README.md new file mode 100644 index 0000000..e51a159 --- /dev/null +++ b/terraform/modules/sns/README.md @@ -0,0 +1,40 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.3.1 | +| [aws](#requirement\_aws) | >= 4.10.0 | + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | 4.43.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_sns_topic.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic_subscription.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [delivery](#input\_delivery) | The topic delivery json. | `any` | n/a | yes | +| [emails](#input\_emails) | The subscription emails. | `any` | n/a | yes | +| [name](#input\_name) | The topic name. | `string` | n/a | yes | +| [protocol](#input\_protocol) | The subscription protocol. | `string` | n/a | yes | + +## Outputs + +| Name | Description | +|------|-------------| +| [name](#output\_name) | The topic name. | + \ No newline at end of file diff --git a/terraform/modules/stepfunctions/README.md b/terraform/modules/stepfunctions/README.md new file mode 100644 index 0000000..c125792 --- /dev/null +++ b/terraform/modules/stepfunctions/README.md @@ -0,0 +1,40 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.3.1 | +| [aws](#requirement\_aws) | >= 4.10.0 | + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | 4.44.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_sfn_state_machine.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sfn_state_machine) | resource | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [definition](#input\_definition) | The Step Function definition. | `string` | n/a | yes | +| [name](#input\_name) | The state machine name. | `string` | n/a | yes | +| [role\_arn](#input\_role\_arn) | The Step Function role. | `string` | n/a | yes | +| [tags](#input\_tags) | A mapping of tags to assign to the resource | `map(string)` | `{}` | no | +| [type](#input\_type) | Determines whether a Standard or Express state machine is created.. | `string` | n/a | yes | + +## Outputs + +| Name | Description | +|------|-------------| +| [name](#output\_name) | The name of the Step Function | + \ No newline at end of file diff --git a/terraform/resources/lambda/lambdaDB.zip b/terraform/resources/lambda/lambdaDB.zip index b0d6d4f..c25b027 100644 Binary files a/terraform/resources/lambda/lambdaDB.zip and b/terraform/resources/lambda/lambdaDB.zip differ diff --git a/terraform/resources/lambda/lambdaError.zip b/terraform/resources/lambda/lambdaError.zip index 8208a82..9f9aa39 100644 Binary files a/terraform/resources/lambda/lambdaError.zip and b/terraform/resources/lambda/lambdaError.zip differ diff --git a/terraform/resources/lambda/lambdaGET.zip b/terraform/resources/lambda/lambdaGET.zip index bafdca7..6fd201b 100644 Binary files a/terraform/resources/lambda/lambdaGET.zip and b/terraform/resources/lambda/lambdaGET.zip differ diff --git a/terraform/resources/lambda/lambdaGET/lambda_handler.py b/terraform/resources/lambda/lambdaGET/lambda_handler.py index 1b26305..91c65b4 100644 --- a/terraform/resources/lambda/lambdaGET/lambda_handler.py +++ b/terraform/resources/lambda/lambdaGET/lambda_handler.py @@ -1,13 +1,13 @@ import json import boto3 import requests +import os def main(event, context): - print("hago el get y comparo el resultado con el post que tengo en {event}") print(event) - response = requests.get("http://181.46.186.8:2555/events/10") + response = requests.get("http://api.slococo.com.ar:2555/items") print(response.json()) return event diff --git a/terraform/resources/lambda/lambdaRemove.zip b/terraform/resources/lambda/lambdaRemove.zip new file mode 100644 index 0000000..55598a1 Binary files /dev/null and b/terraform/resources/lambda/lambdaRemove.zip differ diff --git a/terraform/resources/lambda/lambdaRemove/lambda_handler.py b/terraform/resources/lambda/lambdaRemove/lambda_handler.py new file mode 100644 index 0000000..e240072 --- /dev/null +++ b/terraform/resources/lambda/lambdaRemove/lambda_handler.py @@ -0,0 +1,26 @@ +import json +import boto3 + + +def main(event, context): + payload = event + body = payload["body"] + body = body.replace('\n', '') + query = json.loads(body) + + client = boto3.resource('dynamodb', region_name="us-east-1") + table = client.Table("AWSDynamoDB-g3") + + table.delete_item(Key={ + 'id': query["id"] + }) + + resp = { + "statusCode": 200, + "headers": { + "Access-Control-Allow-Origin": "*", + }, + "body": "El elemento fue eliminado." + } + + return resp diff --git a/terraform/resources/lambda/lambdaSNS.zip b/terraform/resources/lambda/lambdaSNS.zip index 37e05ba..d4132c1 100644 Binary files a/terraform/resources/lambda/lambdaSNS.zip and b/terraform/resources/lambda/lambdaSNS.zip differ diff --git a/terraform/resources/lambda/lambdaSQS.zip b/terraform/resources/lambda/lambdaSQS.zip index 184b1db..6e3c2cb 100644 Binary files a/terraform/resources/lambda/lambdaSQS.zip and b/terraform/resources/lambda/lambdaSQS.zip differ diff --git a/terraform/resources/lambda/lambdaUpdate.zip b/terraform/resources/lambda/lambdaUpdate.zip index 45f145b..6cc5c8b 100644 Binary files a/terraform/resources/lambda/lambdaUpdate.zip and b/terraform/resources/lambda/lambdaUpdate.zip differ diff --git a/terraform/resources/lambda/lambdaUpdate/lambda_handler.py b/terraform/resources/lambda/lambdaUpdate/lambda_handler.py index 8cea4cd..6bcf9a8 100644 --- a/terraform/resources/lambda/lambdaUpdate/lambda_handler.py +++ b/terraform/resources/lambda/lambdaUpdate/lambda_handler.py @@ -15,13 +15,4 @@ def main(event, context): table.put_item(Item=query) - # resp = { - # "statusCode": 200, - # "headers": { - # "Access-Control-Allow-Origin": "*", - # }, - # "body": "El elemento fue agregado." - # } - - # return resp return event diff --git a/terraform/resources/lambda/lambdaUpdateAPI.zip b/terraform/resources/lambda/lambdaUpdateAPI.zip new file mode 100644 index 0000000..d14c095 Binary files /dev/null and b/terraform/resources/lambda/lambdaUpdateAPI.zip differ diff --git a/terraform/resources/lambda/lambdaUpdateAPI/lambda_handler.py b/terraform/resources/lambda/lambdaUpdateAPI/lambda_handler.py new file mode 100644 index 0000000..69f463e --- /dev/null +++ b/terraform/resources/lambda/lambdaUpdateAPI/lambda_handler.py @@ -0,0 +1,24 @@ +import json +import boto3 + + +def main(event, context): + payload = event + body = payload["body"] + body = body.replace('\n', '') + query = json.loads(body) + + client = boto3.resource('dynamodb', region_name="us-east-1") + table = client.Table("AWSDynamoDB-g3") + + table.put_item(Item=query) + + resp = { + "statusCode": 200, + "headers": { + "Access-Control-Allow-Origin": "*", + }, + "body": "El elemento fue agregado." + } + + return resp