Reformat files

This commit is contained in:
Santiago Lo Coco 2022-10-23 16:33:14 -03:00
parent 8008371c15
commit 42eb75fbaa
25 changed files with 109 additions and 136 deletions

6
run.sh
View File

@ -5,6 +5,7 @@ usage() {
usage: ${0##*/} [command] usage: ${0##*/} [command]
-h Print this help message. -h Print this help message.
-v Validate terraform config. -v Validate terraform config.
-p Show changes required by the current terraform config.
-a Create or update infraestructure. -a Create or update infraestructure.
-d Destroy infraestructure. -d Destroy infraestructure.
EOF EOF
@ -12,10 +13,11 @@ EOF
} }
RUN= RUN=
while getopts "hvad" OPTION; do while getopts "hvpad" OPTION; do
case $OPTION in case $OPTION in
a) RUN=apply ;; a) RUN=apply ;;
v) RUN=validate ;; v) RUN=validate ;;
p) RUN=plan ;;
d) RUN=destroy ;; d) RUN=destroy ;;
*) usage ;; *) usage ;;
esac esac
@ -23,7 +25,7 @@ done
dir="$PWD" dir="$PWD"
cd "$dir/terraform/organization/bsmsapp" || exit cd "$dir/terraform/organization" || exit
terraform init terraform init
if [ "$RUN" = 'apply' ]; then if [ "$RUN" = 'apply' ]; then

View File

@ -1,5 +1,5 @@
# --------------------------------------------------------------------------- # ---------------------------------------------------------------------------
# Amazon Cloudfront # Amazon CloudFront
# --------------------------------------------------------------------------- # ---------------------------------------------------------------------------
resource "aws_cloudfront_distribution" "this" { resource "aws_cloudfront_distribution" "this" {

View File

@ -0,0 +1,3 @@
# --------------------------------------------------------------------
# CloudFront outputs
# --------------------------------------------------------------------

View File

@ -1,5 +1,5 @@
# --------------------------------------------------------------------------- # ---------------------------------------------------------------------------
# Amazon Cloudfront variables # Amazon CloudFront variables
# --------------------------------------------------------------------------- # ---------------------------------------------------------------------------
variable "web_acl_id" { variable "web_acl_id" {

View File

@ -8,11 +8,6 @@ resource "aws_dynamodb_table" "this" {
write_capacity = var.write_capacity write_capacity = var.write_capacity
billing_mode = var.billing_mode billing_mode = var.billing_mode
# attribute {
# name = var.hash_key
# type = "S"
# }
dynamic "attribute" { dynamic "attribute" {
for_each = var.attributes for_each = var.attributes

View File

@ -2,13 +2,11 @@
# Amazon S3 # Amazon S3
# ------------------------------------------------------------------------------ # ------------------------------------------------------------------------------
# 1 - S3 bucket
resource "aws_s3_bucket" "this" { resource "aws_s3_bucket" "this" {
bucket = var.bucket_name bucket = var.bucket_name
object_lock_enabled = false object_lock_enabled = false
} }
# 2 -Bucket policy
resource "aws_s3_bucket_policy" "this" { resource "aws_s3_bucket_policy" "this" {
count = var.objects != {} ? 1 : 0 count = var.objects != {} ? 1 : 0
@ -16,7 +14,6 @@ resource "aws_s3_bucket_policy" "this" {
policy = data.aws_iam_policy_document.this.json policy = data.aws_iam_policy_document.this.json
} }
# 3 -Website configuration
resource "aws_s3_bucket_website_configuration" "this" { resource "aws_s3_bucket_website_configuration" "this" {
bucket = aws_s3_bucket.this.id bucket = aws_s3_bucket.this.id
@ -29,19 +26,17 @@ resource "aws_s3_bucket_website_configuration" "this" {
} }
} }
# 4 - Access Control List
resource "aws_s3_bucket_acl" "this" { resource "aws_s3_bucket_acl" "this" {
bucket = aws_s3_bucket.this.id bucket = aws_s3_bucket.this.id
acl = var.bucket_acl acl = var.bucket_acl
} }
# 5 - Upload objects
resource "aws_s3_object" "this" { resource "aws_s3_object" "this" {
for_each = try(var.objects, {}) #{ for object, key in var.objects: object => key if try(var.objects, {}) != {} } for_each = try(var.objects, {})
bucket = aws_s3_bucket.this.id bucket = aws_s3_bucket.this.id
key = try(each.value.rendered, replace(each.value.filename, "html/", "")) # remote path key = try(each.value.rendered, replace(each.value.filename, "html/", ""))
source = try(each.value.rendered, format("./../resources/%s", each.value.filename)) # where is the file located source = try(each.value.rendered, format("./../resources/%s", each.value.filename))
content_type = each.value.content_type content_type = each.value.content_type
storage_class = try(each.value.tier, "STANDARD") storage_class = try(each.value.tier, "STANDARD")
} }

View File

@ -1,5 +1,5 @@
# -------------------------------------------------------------------- # --------------------------------------------------------------------
# Amazon S3 buckets output # Amazon S3 output
# -------------------------------------------------------------------- # --------------------------------------------------------------------
output "id" { output "id" {
@ -14,5 +14,5 @@ output "arn" {
output "website_endpoint" { output "website_endpoint" {
description = "The website endpoint, if the bucket is configured with a website. If not, this will be an empty string." description = "The website endpoint, if the bucket is configured with a website. If not, this will be an empty string."
value = aws_s3_bucket.this.website_endpoint value = aws_s3_bucket_website_configuration.this.website_endpoint
} }

View File

@ -2,18 +2,16 @@
# Amazon Simple Queue Service # Amazon Simple Queue Service
# ------------------------------------------------------------------------------ # ------------------------------------------------------------------------------
resource "aws_sqs_queue" "terraform_queue" { # resource "aws_sqs_queue" "terraform_queue" {
name = "terraform-example-queue" # name = var.name
delay_seconds = 90 # delay_seconds = 90
max_message_size = 2048 # max_message_size = 2048
message_retention_seconds = 86400 # message_retention_seconds = 86400
receive_wait_time_seconds = 10 # receive_wait_time_seconds = 10
redrive_policy = jsonencode({ # redrive_policy = jsonencode({
deadLetterTargetArn = aws_sqs_queue.terraform_queue_deadletter.arn # deadLetterTargetArn = aws_sqs_queue.terraform_queue_deadletter.arn
maxReceiveCount = 4 # maxReceiveCount = 4
}) # })
tags = { # tags = var.tags
Environment = "production" # }
}
}

View File

@ -0,0 +1 @@

View File

@ -1,57 +1,31 @@
# module "vpc" {
# source = "terraform-aws-modules/vpc/aws"
# name = "my-vpc"
# cidr = "10.0.0.0/16"
# azs = ["eu-west-1a", "eu-west-1b", "eu-west-1c"]
# private_subnets = ["10.0.1.0/24", "10.0.2.0/24", "10.0.3.0/24"]
# public_subnets = ["10.0.101.0/24", "10.0.102.0/24", "10.0.103.0/24"]
# enable_nat_gateway = true
# enable_vpn_gateway = true
# tags = {
# Terraform = "true"
# Environment = "dev"
# }
# }
locals {
name = "ex-${replace(basename(path.cwd), "_", "-")}"
region = "us-east-1"
tags = {
Example = local.name
GithubRepo = "terraform-aws-vpc"
GithubOrg = "terraform-aws-modules"
}
}
################################################################################ ################################################################################
# VPC Module # VPC Module (from terraform-aws-modules)
################################################################################ ################################################################################
module "vpc" { module "vpc" {
source = "terraform-aws-modules/vpc/aws" source = "terraform-aws-modules/vpc/aws"
name = local.name providers = {
aws = aws.aws
}
name = "vpc-g3-bsmsapp"
cidr = "10.0.0.0/16" cidr = "10.0.0.0/16"
azs = ["${local.region}a", "${local.region}b"] azs = ["${data.aws_region.current.name}a", "${data.aws_region.current.name}b"]
private_subnets = ["10.0.1.0/24", "10.0.2.0/24"] private_subnets = ["10.0.1.0/24", "10.0.2.0/24"]
public_subnets = ["10.0.3.0/24", "10.0.4.0/24"] public_subnets = ["10.0.3.0/24", "10.0.4.0/24"]
create_database_subnet_group = false create_database_subnet_group = false
manage_default_network_acl = true manage_default_network_acl = true
default_network_acl_tags = { Name = "${local.name}-default" } default_network_acl_tags = { Name = "vpc-g3-bsmsapp-default" }
manage_default_route_table = true manage_default_route_table = true
default_route_table_tags = { Name = "${local.name}-default" } default_route_table_tags = { Name = "vpc-g3-bsmsapp-default" }
manage_default_security_group = true manage_default_security_group = true
default_security_group_tags = { Name = "${local.name}-default" } default_security_group_tags = { Name = "vpc-g3-bsmsapp-default" }
enable_dns_hostnames = true enable_dns_hostnames = true
enable_dns_support = true enable_dns_support = true
@ -59,7 +33,9 @@ module "vpc" {
enable_nat_gateway = true enable_nat_gateway = true
single_nat_gateway = true single_nat_gateway = true
tags = local.tags tags = {
Name = "vpc-g3-bsmsapp"
}
} }
module "vpc_endpoints" { module "vpc_endpoints" {
@ -83,10 +59,11 @@ module "vpc_endpoints" {
}, },
} }
tags = merge(local.tags, { tags = {
Name = "vpc-g3-bsmsapp"
Project = "Secret" Project = "Secret"
Endpoint = "true" Endpoint = "true"
}) }
} }
# module "vpc_endpoints_nocreate" { # module "vpc_endpoints_nocreate" {
@ -145,7 +122,7 @@ data "aws_iam_policy_document" "generic_endpoint_policy" {
} }
resource "aws_security_group" "vpc_tls" { resource "aws_security_group" "vpc_tls" {
name_prefix = "${local.name}-vpc_tls" name_prefix = "vpc-g3-bsmsapp-vpc_tls"
description = "Allow TLS inbound traffic" description = "Allow TLS inbound traffic"
vpc_id = module.vpc.vpc_id vpc_id = module.vpc.vpc_id
@ -157,5 +134,7 @@ resource "aws_security_group" "vpc_tls" {
cidr_blocks = [module.vpc.vpc_cidr_block] cidr_blocks = [module.vpc.vpc_cidr_block]
} }
tags = local.tags tags = {
Name = "vpc-g3-bsmsapp"
}
} }