diff --git a/terraform/organization/datasources.tf b/terraform/organization/datasources.tf index 3048773..ead099e 100644 --- a/terraform/organization/datasources.tf +++ b/terraform/organization/datasources.tf @@ -16,3 +16,15 @@ data "template_file" "userdata" { ENDPOINT = "${module.apigw.api_endpoint}" } } + +data "aws_iam_policy_document" "this" { + statement { + effect = "Allow" + actions = ["dynamodb:PutItem"] + principals { + type = "AWS" + identifiers = ["*"] + } + resources = ["arn:aws:dynamodb:us-east-1:478157316333:table/AWSDynamoDB-g3"] + } +} diff --git a/terraform/organization/html/index.html b/terraform/organization/html/index.html index 43eca9a..39a1923 100644 --- a/terraform/organization/html/index.html +++ b/terraform/organization/html/index.html @@ -2,34 +2,49 @@ - ITBA - Cloud + BSMSapp
- - -

-

Bienvenidos, estimados Alumnos.

- - -

- +

BSMSapp

-

Este lab está desarrollado por la cátedra de Cloud Computing

+
+ +
+ +

+ +
- \ No newline at end of file + + + \ No newline at end of file diff --git a/terraform/organization/provider.tf b/terraform/organization/provider.tf index 443395e..3e61171 100644 --- a/terraform/organization/provider.tf +++ b/terraform/organization/provider.tf @@ -5,6 +5,12 @@ provider "aws" { shared_credentials_files = ["~/.aws/credentials"] profile = "default" + skip_requesting_account_id = true + skip_get_ec2_platforms = true + skip_metadata_api_check = true + skip_region_validation = true + skip_credentials_validation = true + default_tags { tags = { author = "g3" diff --git a/terraform/organization/vpc.tf b/terraform/organization/vpc.tf index 3e64ac3..e21583d 100644 --- a/terraform/organization/vpc.tf +++ b/terraform/organization/vpc.tf @@ -1,3 +1,42 @@ +locals { + private_inbound = [ + { + rule_number = 100 + rule_action = "allow" + from_port = 80 + to_port = 80 + protocol = "tcp" + cidr_block = "10.0.1.0/24" + }, + { + rule_number = 110 + rule_action = "allow" + from_port = 80 + to_port = 80 + protocol = "tcp" + cidr_block = "10.0.2.0/24" + }, + ] + private_outbound = [ + { + rule_number = 100 + rule_action = "allow" + from_port = 443 + to_port = 443 + protocol = "tcp" + cidr_block = "10.0.1.0/24" + }, + { + rule_number = 110 + rule_action = "allow" + from_port = 443 + to_port = 443 + protocol = "tcp" + cidr_block = "10.0.2.0/24" + }, + ] +} + ################################################################################ # VPC Module (from terraform-aws-modules) ################################################################################ @@ -24,6 +63,10 @@ module "vpc" { manage_default_route_table = true default_route_table_tags = { Name = "vpc-g3-bsmsapp-default" } + private_dedicated_network_acl = true + private_inbound_acl_rules = local.private_inbound + private_outbound_acl_rules = local.private_outbound + manage_default_security_group = true default_security_group_tags = { Name = "vpc-g3-bsmsapp-default" } @@ -49,28 +92,9 @@ module "vpc_endpoints" { service = "dynamodb" service_type = "Gateway" route_table_ids = flatten([module.vpc.intra_route_table_ids, module.vpc.private_route_table_ids, module.vpc.public_route_table_ids]) - policy = data.aws_iam_policy_document.dynamodb_endpoint_policy.json # TODO: usar policy de abajo: (ahora lo estamos cargando a mano) -# { -# "Version": "2012-10-17", -# "Statement": [ -# { -# "Principal": "*", -# "Effect": "Allow", -# "Action": [ -# "dynamodb:BatchGetItem", -# "dynamodb:GetItem", -# "dynamodb:Scan", -# "dynamodb:Query", -# "dynamodb:BatchWriteItem", -# "dynamodb:PutItem", -# "dynamodb:UpdateItem", -# "dynamodb:DeleteItem" -# ], -# "Resource": "arn:aws:dynamodb:us-east-1:025685231147:table/AWSDynamoDB-g3" -# } -# ] -# } + policy = data.aws_iam_policy_document.this.json tags = { Name = "dynamodb-vpc-endpoint" } + security_group_ids = [aws_security_group.dynamodb_sg.id] }, lambda = { service = "lambda" @@ -90,11 +114,60 @@ module "vpc_endpoints" { # Supporting Resources ################################################################################ +resource "aws_vpc_endpoint" "dynamodb_endpoint" { + vpc_id = module.vpc.vpc_id + service_name = "com.amazonaws.us-east-1.dynamodb" +} + data "aws_security_group" "default" { name = "default" vpc_id = module.vpc.vpc_id } +resource "aws_security_group" "dynamodb_sg" { + name_prefix = "vpc-g3-bsmsapp-dsg" + description = "Allow HTTPs outbound traffic" + vpc_id = module.vpc.vpc_id + + egress { + description = "HTTPs to DynamoDB" + from_port = 443 + to_port = 443 + protocol = "tcp" + prefix_list_ids = [aws_vpc_endpoint.dynamodb_endpoint.prefix_list_id] + } + + tags = { + Name = "vpc-g3-bsmsapp" + } +} + +# resource "aws_network_acl" "private_nacl" { +# vpc_id = module.vpc.vpc_id + +# egress { +# protocol = "tcp" +# rule_no = 200 +# action = "allow" +# cidr_block = ["10.0.1.0/24", "10.0.2.0/24"] +# from_port = 443 +# to_port = 443 +# } + +# ingress { +# protocol = "tcp" +# rule_no = 100 +# action = "allow" +# cidr_block = ["10.0.1.0/24", "10.0.2.0/24"] +# from_port = 80 +# to_port = 80 +# } + +# tags = { +# Name = "vpc-g3-bsmsapp" +# } +# } + data "aws_iam_policy_document" "dynamodb_endpoint_policy" { statement { effect = "Deny" @@ -152,3 +225,4 @@ resource "aws_security_group" "vpc_tls" { Name = "vpc-g3-bsmsapp" } } + diff --git a/terraform/resources/lambda/lambda.zip b/terraform/resources/lambda/lambda.zip deleted file mode 100644 index 37185da..0000000 Binary files a/terraform/resources/lambda/lambda.zip and /dev/null differ diff --git a/terraform/resources/lambda/lambda_handler.py b/terraform/resources/lambda/lambda_handler.py index 19e0352..2e45239 100644 --- a/terraform/resources/lambda/lambda_handler.py +++ b/terraform/resources/lambda/lambda_handler.py @@ -1,35 +1,26 @@ import json import boto3 + def main (event, context): payload = event payload = payload["Records"][0] body = payload["body"] body = body.replace('\n', '') - print(body) - #body = json.dumps(body) body = json.loads(body) query = body["body-json"] - print("payload-> " + str(query) ) - + client = boto3.resource('dynamodb', region_name="us-east-1") table = client.Table("AWSDynamoDB-g3") - table.put_item(Item={ - "id": { - "N": "1" - }, - "stock": { - "N": "2212" - }, - }) + table.put_item(Item=query) resp = { "statusCode": 200, "headers": { "Access-Control-Allow-Origin": "*", }, - "body": "El lab ha sido finalizado correctamente" + "body": "El elemento fue agregado." } return resp \ No newline at end of file