CI-CD dejo node
This commit is contained in:
25
infrastructure/terraform/dev/.terraform.lock.hcl
generated
Normal file
25
infrastructure/terraform/dev/.terraform.lock.hcl
generated
Normal file
@ -0,0 +1,25 @@
|
||||
# This file is maintained automatically by "terraform init".
|
||||
# Manual edits may be lost in future updates.
|
||||
|
||||
provider "registry.terraform.io/hashicorp/aws" {
|
||||
version = "5.99.1"
|
||||
constraints = ">= 5.43.0, >= 5.83.0"
|
||||
hashes = [
|
||||
"h1:967WCGUW/vgrjUMBvC+HCie1DVgOXHwUkhm2ng3twJw=",
|
||||
"zh:00b0a61c6d295300f0aa7a79a7d40e9f836164f1fff816d38324c148cd846887",
|
||||
"zh:1ee9d5ccb67378704642db62113ac6c0d56d69408a9c1afb9a8e14b095fc0733",
|
||||
"zh:2035977ed418dcb18290785c1eeb79b7133b39f718c470346e043ac48887ffc7",
|
||||
"zh:67e3ca1bf7061900f81cf958d5c771a2fd6048c2b185bec7b27978349b173a90",
|
||||
"zh:87fadbe5de7347ede72ad879ff8d8d9334103cd9aa4a321bb086bfac91654944",
|
||||
"zh:901d170c457c2bff244a2282d9de595bdb3ebecc33a2034c5ce8aafbcff66db9",
|
||||
"zh:92c07d6cf530679565b87934f9f98604652d787968cce6a3d24c148479b7e34b",
|
||||
"zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425",
|
||||
"zh:a7d4803b4c5ff17f029f8b270c91480442ece27cec7922c38548bcfea2ac2d26",
|
||||
"zh:afda848da7993a07d29018ec25ab6feda652e01d4b22721da570ce4fcc005292",
|
||||
"zh:baaf16c98b81bad070e0908f057a97108ecd6e8c9f754d7a79b18df4c8453279",
|
||||
"zh:c3dd496c5014427599d6b6b1c14c7ebb09a15df78918ae0be935e7bfa83b894c",
|
||||
"zh:e2b84c1d40b3f2c4b1d74bf170b9e932983b61bac0e6dab2e36f5057ddcc997f",
|
||||
"zh:e49c92cb29c53b4573ed4d9c946486e6bcfc1b63f1aee0c79cc7626f3d9add03",
|
||||
"zh:efae8e339c4b13f546e0f96c42eb95bf8347de22e941594849b12688574bf380",
|
||||
]
|
||||
}
|
||||
15
infrastructure/terraform/dev/dns.tf
Executable file
15
infrastructure/terraform/dev/dns.tf
Executable file
@ -0,0 +1,15 @@
|
||||
#data "aws_route53_zone" "dev-dejo" {
|
||||
# name = "dev.dejo.digital"
|
||||
# private_zone = false
|
||||
#}
|
||||
|
||||
#resource "aws_route53_record" "this" {
|
||||
# zone_id = data.aws_route53_zone.dev-dejo-be.zone_id
|
||||
# name = local.azion.domain.cname
|
||||
# type = "CNAME"
|
||||
# ttl = 60
|
||||
|
||||
# records = [
|
||||
# module.azion-backend.azion_domain.domain_name
|
||||
# ]
|
||||
#}
|
||||
3
infrastructure/terraform/dev/ecr.tf
Executable file
3
infrastructure/terraform/dev/ecr.tf
Executable file
@ -0,0 +1,3 @@
|
||||
resource "aws_ecr_repository" "this" {
|
||||
name = "dev-dejo/dejo-node"
|
||||
}
|
||||
48
infrastructure/terraform/dev/locals.tf
Executable file
48
infrastructure/terraform/dev/locals.tf
Executable file
@ -0,0 +1,48 @@
|
||||
locals {
|
||||
region = "us-east-1"
|
||||
|
||||
owner = "dejo"
|
||||
env = "dev"
|
||||
maintainer = "dejo"
|
||||
app = "dejo-node"
|
||||
tier = "backend"
|
||||
base_name = "${local.env}-${local.maintainer}-${local.app}"
|
||||
kms_key_name = "alias/${local.base_name}-terraform-bucket-key"
|
||||
|
||||
eks = {
|
||||
# After change cluster_name, change the the secret: DEV_DEJO_KUBE_CONFIG_DATA
|
||||
# The value is a base64 from kubeconfig, example: cat ~/.kubeconfig | base64 -w 0
|
||||
cluster_name = "dev-dejo"
|
||||
lb_name = "a7d3a64e7cd704e17a87740e579df9bc"
|
||||
|
||||
namespace = "dejo-node"
|
||||
service_account_name = "api-app-sa"
|
||||
}
|
||||
|
||||
s3 = {
|
||||
bucket = "${local.owner}-${local.env}-${local.app}-permanent-storage"
|
||||
acl = "private"
|
||||
|
||||
versioning = {
|
||||
enabled = true
|
||||
}
|
||||
}
|
||||
|
||||
# event_bus = {
|
||||
# name = "dev-dejo-event-bus"
|
||||
# }
|
||||
|
||||
custom_tags = {
|
||||
App = upper(local.app)
|
||||
Tier = title(local.tier)
|
||||
}
|
||||
|
||||
default_tags = {
|
||||
Owner = title(local.owner)
|
||||
Env = title(local.env)
|
||||
Maintainer = title(local.maintainer)
|
||||
ManagedBy = "Terraform"
|
||||
BaseName = local.base_name
|
||||
App = "${local.maintainer}-${local.app}"
|
||||
}
|
||||
}
|
||||
4
infrastructure/terraform/dev/output.tf
Executable file
4
infrastructure/terraform/dev/output.tf
Executable file
@ -0,0 +1,4 @@
|
||||
#output "azion_domain_id" {
|
||||
# description = "Azion domain ID"
|
||||
# value = module.azion-backend.azion_domain.id
|
||||
#}
|
||||
25
infrastructure/terraform/dev/provider.tf
Executable file
25
infrastructure/terraform/dev/provider.tf
Executable file
@ -0,0 +1,25 @@
|
||||
provider "aws" {
|
||||
profile = "dejo-dev"
|
||||
region = "us-east-1"
|
||||
|
||||
default_tags {
|
||||
tags = local.default_tags
|
||||
}
|
||||
}
|
||||
|
||||
provider "aws" {
|
||||
alias = "virginia"
|
||||
profile = "dejo-dev"
|
||||
region = "us-east-1"
|
||||
|
||||
default_tags {
|
||||
tags = local.default_tags
|
||||
}
|
||||
}
|
||||
|
||||
#provider "aws" {
|
||||
# alias = "sao_paulo"
|
||||
# profile = "dejo-prd"
|
||||
# region = "sa-east-1"
|
||||
#}
|
||||
|
||||
15
infrastructure/terraform/dev/role.tf
Executable file
15
infrastructure/terraform/dev/role.tf
Executable file
@ -0,0 +1,15 @@
|
||||
module "kubernetes-backend-role" {
|
||||
source = "../../../../iac/aws/dejo-terraform/modules/kubernetes-backend-role/"
|
||||
|
||||
env = local.env
|
||||
app = local.app
|
||||
|
||||
eks_cluster_name = local.eks.cluster_name
|
||||
eks_namespace = local.eks.namespace
|
||||
eks_service_account_name = local.eks.service_account_name
|
||||
|
||||
allowed_event_names = [
|
||||
"ProductUserPublished"
|
||||
]
|
||||
}
|
||||
|
||||
41
infrastructure/terraform/dev/s3.tf
Executable file
41
infrastructure/terraform/dev/s3.tf
Executable file
@ -0,0 +1,41 @@
|
||||
# Criação da chave KMS para criptografia do bucket
|
||||
resource "aws_kms_key" "dev_dejo_node" {
|
||||
description = "KMS key to encrypt S3 bucket objects for ${local.base_name}"
|
||||
deletion_window_in_days = 7
|
||||
enable_key_rotation = true
|
||||
|
||||
tags = merge(
|
||||
local.default_tags,
|
||||
{
|
||||
Name = "${local.base_name}-bucket-key"
|
||||
}
|
||||
)
|
||||
}
|
||||
|
||||
# Alias para facilitar referência à chave KMS
|
||||
resource "aws_kms_alias" "dev_dejo_node" {
|
||||
name = local.kms_key_name
|
||||
target_key_id = aws_kms_key.dev_dejo_node.key_id
|
||||
}
|
||||
|
||||
# Bucket S3 criptografado com KMS
|
||||
module "s3_bucket" {
|
||||
source = "terraform-aws-modules/s3-bucket/aws"
|
||||
version = "~> 4.0"
|
||||
|
||||
bucket = local.s3.bucket
|
||||
# acl = local.s3.acl
|
||||
versioning = local.s3.versioning
|
||||
|
||||
server_side_encryption_configuration = {
|
||||
rule = {
|
||||
apply_server_side_encryption_by_default = {
|
||||
kms_master_key_id = aws_kms_key.dev_dejo_node.arn
|
||||
sse_algorithm = "aws:kms"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
tags = local.default_tags
|
||||
}
|
||||
|
||||
11
infrastructure/terraform/dev/state.tf
Executable file
11
infrastructure/terraform/dev/state.tf
Executable file
@ -0,0 +1,11 @@
|
||||
terraform {
|
||||
backend "s3" {
|
||||
profile = "dejo-dev"
|
||||
bucket = "dev-dejo-terraform"
|
||||
key = "state/dejo-node/infrastructure/dev.tfstate"
|
||||
region = "us-east-1"
|
||||
encrypt = true
|
||||
kms_key_id = "alias/dev-dejo-terraform-bucket-key"
|
||||
use_lockfile = true
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user