################################################################################ # VPC Module (from terraform-aws-modules) ################################################################################ module "vpc" { source = "terraform-aws-modules/vpc/aws" providers = { aws = aws.aws } name = "vpc-g3-bsmsapp" cidr = "10.0.0.0/16" azs = ["${data.aws_region.current.name}a", "${data.aws_region.current.name}b"] private_subnets = ["10.0.1.0/24", "10.0.2.0/24"] public_subnets = ["10.0.3.0/24", "10.0.4.0/24"] create_database_subnet_group = false manage_default_network_acl = true default_network_acl_tags = { Name = "vpc-g3-bsmsapp-default" } manage_default_route_table = true default_route_table_tags = { Name = "vpc-g3-bsmsapp-default" } manage_default_security_group = true default_security_group_tags = { Name = "vpc-g3-bsmsapp-default" } enable_dns_hostnames = true enable_dns_support = true enable_nat_gateway = true single_nat_gateway = true tags = { Name = "vpc-g3-bsmsapp" } } module "vpc_endpoints" { source = "terraform-aws-modules/vpc/aws//modules/vpc-endpoints" vpc_id = module.vpc.vpc_id security_group_ids = [data.aws_security_group.default.id] endpoints = { dynamodb = { service = "dynamodb" service_type = "Gateway" route_table_ids = flatten([module.vpc.intra_route_table_ids, module.vpc.private_route_table_ids, module.vpc.public_route_table_ids]) policy = data.aws_iam_policy_document.dynamodb_endpoint_policy.json # TODO: usar policy de abajo: (ahora lo estamos cargando a mano) # { # "Version": "2012-10-17", # "Statement": [ # { # "Principal": "*", # "Effect": "Allow", # "Action": [ # "dynamodb:BatchGetItem", # "dynamodb:GetItem", # "dynamodb:Scan", # "dynamodb:Query", # "dynamodb:BatchWriteItem", # "dynamodb:PutItem", # "dynamodb:UpdateItem", # "dynamodb:DeleteItem" # ], # "Resource": "arn:aws:dynamodb:us-east-1:025685231147:table/AWSDynamoDB-g3" # } # ] # } tags = { Name = "dynamodb-vpc-endpoint" } }, lambda = { service = "lambda" private_dns_enabled = true subnet_ids = module.vpc.private_subnets }, } tags = { Name = "vpc-g3-bsmsapp" Project = "Secret" Endpoint = "true" } } ################################################################################ # Supporting Resources ################################################################################ data "aws_security_group" "default" { name = "default" vpc_id = module.vpc.vpc_id } data "aws_iam_policy_document" "dynamodb_endpoint_policy" { statement { effect = "Deny" actions = ["dynamodb:*"] resources = ["*"] principals { type = "*" identifiers = ["*"] } condition { test = "StringNotEquals" variable = "aws:sourceVpce" values = [module.vpc.vpc_id] } } } data "aws_iam_policy_document" "generic_endpoint_policy" { statement { effect = "Deny" actions = ["*"] resources = ["*"] principals { type = "*" identifiers = ["*"] } condition { test = "StringNotEquals" variable = "aws:SourceVpc" values = [module.vpc.vpc_id] } } } resource "aws_security_group" "vpc_tls" { name_prefix = "vpc-g3-bsmsapp-vpc_tls" description = "Allow TLS inbound traffic" vpc_id = module.vpc.vpc_id ingress { description = "TLS from VPC" from_port = 443 to_port = 443 protocol = "tcp" cidr_blocks = [module.vpc.vpc_cidr_block] } tags = { Name = "vpc-g3-bsmsapp" } }