Merge pull request #181 from rtfpessoa/terraform

Initial terraform setup
This commit is contained in:
Rodrigo Fernandes 2018-11-24 21:21:33 +00:00 committed by GitHub
commit 1906abd0e5
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 180 additions and 1 deletions

View file

@ -88,7 +88,7 @@ jobs:
- run:
name: Deploy
working_directory: ~/diff2html/docs
command: aws s3 sync . s3://diff2html.rtfpessoa.xyz --region eu-west-1
command: aws s3 sync . s3://diff2html.xyz --region eu-west-1
workflows:
version: 2

3
.gitignore vendored
View file

@ -25,3 +25,6 @@ coverage/
# Bower
bower_components/
# Terraform
/terraform/.terraform

150
terraform/main.tf Normal file
View file

@ -0,0 +1,150 @@
# Inspired by https://gist.github.com/danihodovic/a51eb0d9d4b29649c2d094f4251827dd
provider "aws" {
profile = "${var.aws_profile}"
region = "${var.aws_region}"
}
provider "aws" {
alias = "nvirginia"
profile = "${var.aws_profile}"
region = "us-east-1"
}
terraform {
backend "s3" {
region = "us-east-1"
encrypt = true
bucket = "terraform-state-bucket.rtfpessoa.xyz"
dynamodb_table = "terraform-state-table"
key = "diff2html.xyz"
}
}
resource "aws_acm_certificate" "cert" {
provider = "aws.nvirginia"
domain_name = "${var.domain}"
subject_alternative_names = ["*.${var.domain}"]
validation_method = "DNS"
lifecycle {
create_before_destroy = true
}
}
resource "aws_route53_record" "root_domain" {
zone_id = "${var.hosted_zone_id}"
name = "${var.domain}"
type = "A"
alias {
name = "${aws_cloudfront_distribution.cdn.domain_name}"
zone_id = "${aws_cloudfront_distribution.cdn.hosted_zone_id}"
evaluate_target_health = false
}
}
resource "aws_route53_record" "www_domain" {
zone_id = "${var.hosted_zone_id}"
name = "www.${var.domain}"
type = "A"
alias {
name = "${aws_cloudfront_distribution.cdn.domain_name}"
zone_id = "${aws_cloudfront_distribution.cdn.hosted_zone_id}"
evaluate_target_health = false
}
}
resource "aws_route53_record" "cert_validation" {
zone_id = "${var.hosted_zone_id}"
name = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_name}"
type = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_type}"
records = ["${aws_acm_certificate.cert.domain_validation_options.0.resource_record_value}"]
ttl = 60
}
resource "aws_acm_certificate_validation" "cert" {
provider = "aws.nvirginia"
certificate_arn = "${aws_acm_certificate.cert.arn}"
validation_record_fqdns = ["${aws_route53_record.cert_validation.fqdn}"]
}
resource "aws_cloudfront_origin_access_identity" "origin_access_identity" {
comment = "${var.domain} origin access identity"
}
resource "aws_s3_bucket" "site" {
bucket = "${var.domain}"
acl = "private"
policy = <<EOF
{
"Version": "2008-10-17",
"Statement": [{
"Sid": "AllowCloudFrontRead",
"Effect": "Allow",
"Principal": { "AWS": "${aws_cloudfront_origin_access_identity.origin_access_identity.iam_arn}" },
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::${var.domain}/*"
}]
}
EOF
}
locals {
s3_origin_id = "S3-${var.domain}"
}
resource "aws_cloudfront_distribution" "cdn" {
origin {
domain_name = "${aws_s3_bucket.site.bucket_regional_domain_name}"
origin_id = "${local.s3_origin_id}"
s3_origin_config {
origin_access_identity = "${aws_cloudfront_origin_access_identity.origin_access_identity.cloudfront_access_identity_path}"
}
}
# If using route53 aliases for DNS we need to declare it here too, otherwise we'll get 403s.
aliases = ["${var.domain}", "www.${var.domain}"]
enabled = true
is_ipv6_enabled = true
default_root_object = "index.html"
default_cache_behavior {
allowed_methods = ["GET", "HEAD", "OPTIONS"]
cached_methods = ["GET", "HEAD"]
target_origin_id = "${local.s3_origin_id}"
forwarded_values {
query_string = true
cookies {
forward = "none"
}
}
min_ttl = 0
default_ttl = 86400
max_ttl = 31536000
compress = true
viewer_protocol_policy = "redirect-to-https"
}
price_class = "PriceClass_All"
restrictions {
geo_restriction {
restriction_type = "none"
locations = []
}
}
viewer_certificate {
acm_certificate_arn = "${aws_acm_certificate_validation.cert.certificate_arn}"
minimum_protocol_version = "TLSv1.1_2016"
ssl_support_method = "sni-only"
}
}

7
terraform/outputs.tf Normal file
View file

@ -0,0 +1,7 @@
output "route53_domain" {
value = "${aws_route53_record.root_domain.fqdn}"
}
output "cdn_domain" {
value = "${aws_cloudfront_distribution.cdn.domain_name}"
}

19
terraform/variables.tf Normal file
View file

@ -0,0 +1,19 @@
variable "aws_region" {
description = "The aws region to deploy"
default = "eu-west-1"
}
variable "aws_profile" {
description = "The aws profile to use"
default = "personal"
}
variable "domain" {
description = "The domain to deploy this page"
default = "diff2html.xyz"
}
variable "hosted_zone_id" {
description = "The hosted zone id where the domain will be created"
default = "Z2T76N7UKY0XQI"
}