CI-CD dejo node

This commit is contained in:
2025-06-10 02:28:50 -03:00
parent fde5a46664
commit 0ea56e2596
25 changed files with 608 additions and 0 deletions

View File

@ -0,0 +1,25 @@
# This file is maintained automatically by "terraform init".
# Manual edits may be lost in future updates.
provider "registry.terraform.io/hashicorp/aws" {
version = "5.99.1"
constraints = ">= 5.43.0, >= 5.83.0"
hashes = [
"h1:967WCGUW/vgrjUMBvC+HCie1DVgOXHwUkhm2ng3twJw=",
"zh:00b0a61c6d295300f0aa7a79a7d40e9f836164f1fff816d38324c148cd846887",
"zh:1ee9d5ccb67378704642db62113ac6c0d56d69408a9c1afb9a8e14b095fc0733",
"zh:2035977ed418dcb18290785c1eeb79b7133b39f718c470346e043ac48887ffc7",
"zh:67e3ca1bf7061900f81cf958d5c771a2fd6048c2b185bec7b27978349b173a90",
"zh:87fadbe5de7347ede72ad879ff8d8d9334103cd9aa4a321bb086bfac91654944",
"zh:901d170c457c2bff244a2282d9de595bdb3ebecc33a2034c5ce8aafbcff66db9",
"zh:92c07d6cf530679565b87934f9f98604652d787968cce6a3d24c148479b7e34b",
"zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425",
"zh:a7d4803b4c5ff17f029f8b270c91480442ece27cec7922c38548bcfea2ac2d26",
"zh:afda848da7993a07d29018ec25ab6feda652e01d4b22721da570ce4fcc005292",
"zh:baaf16c98b81bad070e0908f057a97108ecd6e8c9f754d7a79b18df4c8453279",
"zh:c3dd496c5014427599d6b6b1c14c7ebb09a15df78918ae0be935e7bfa83b894c",
"zh:e2b84c1d40b3f2c4b1d74bf170b9e932983b61bac0e6dab2e36f5057ddcc997f",
"zh:e49c92cb29c53b4573ed4d9c946486e6bcfc1b63f1aee0c79cc7626f3d9add03",
"zh:efae8e339c4b13f546e0f96c42eb95bf8347de22e941594849b12688574bf380",
]
}

View File

@ -0,0 +1,15 @@
#data "aws_route53_zone" "dev-dejo" {
# name = "dev.dejo.digital"
# private_zone = false
#}
#resource "aws_route53_record" "this" {
# zone_id = data.aws_route53_zone.dev-dejo-be.zone_id
# name = local.azion.domain.cname
# type = "CNAME"
# ttl = 60
# records = [
# module.azion-backend.azion_domain.domain_name
# ]
#}

View File

@ -0,0 +1,3 @@
resource "aws_ecr_repository" "this" {
name = "dev-dejo/dejo-node"
}

View File

@ -0,0 +1,48 @@
locals {
region = "us-east-1"
owner = "dejo"
env = "dev"
maintainer = "dejo"
app = "dejo-node"
tier = "backend"
base_name = "${local.env}-${local.maintainer}-${local.app}"
kms_key_name = "alias/${local.base_name}-terraform-bucket-key"
eks = {
# After change cluster_name, change the the secret: DEV_DEJO_KUBE_CONFIG_DATA
# The value is a base64 from kubeconfig, example: cat ~/.kubeconfig | base64 -w 0
cluster_name = "dev-dejo"
lb_name = "a7d3a64e7cd704e17a87740e579df9bc"
namespace = "dejo-node"
service_account_name = "api-app-sa"
}
s3 = {
bucket = "${local.owner}-${local.env}-${local.app}-permanent-storage"
acl = "private"
versioning = {
enabled = true
}
}
# event_bus = {
# name = "dev-dejo-event-bus"
# }
custom_tags = {
App = upper(local.app)
Tier = title(local.tier)
}
default_tags = {
Owner = title(local.owner)
Env = title(local.env)
Maintainer = title(local.maintainer)
ManagedBy = "Terraform"
BaseName = local.base_name
App = "${local.maintainer}-${local.app}"
}
}

View File

@ -0,0 +1,4 @@
#output "azion_domain_id" {
# description = "Azion domain ID"
# value = module.azion-backend.azion_domain.id
#}

View File

@ -0,0 +1,25 @@
provider "aws" {
profile = "dejo-dev"
region = "us-east-1"
default_tags {
tags = local.default_tags
}
}
provider "aws" {
alias = "virginia"
profile = "dejo-dev"
region = "us-east-1"
default_tags {
tags = local.default_tags
}
}
#provider "aws" {
# alias = "sao_paulo"
# profile = "dejo-prd"
# region = "sa-east-1"
#}

View File

@ -0,0 +1,15 @@
module "kubernetes-backend-role" {
source = "../../../../iac/aws/dejo-terraform/modules/kubernetes-backend-role/"
env = local.env
app = local.app
eks_cluster_name = local.eks.cluster_name
eks_namespace = local.eks.namespace
eks_service_account_name = local.eks.service_account_name
allowed_event_names = [
"ProductUserPublished"
]
}

View File

@ -0,0 +1,41 @@
# Criação da chave KMS para criptografia do bucket
resource "aws_kms_key" "dev_dejo_node" {
description = "KMS key to encrypt S3 bucket objects for ${local.base_name}"
deletion_window_in_days = 7
enable_key_rotation = true
tags = merge(
local.default_tags,
{
Name = "${local.base_name}-bucket-key"
}
)
}
# Alias para facilitar referência à chave KMS
resource "aws_kms_alias" "dev_dejo_node" {
name = local.kms_key_name
target_key_id = aws_kms_key.dev_dejo_node.key_id
}
# Bucket S3 criptografado com KMS
module "s3_bucket" {
source = "terraform-aws-modules/s3-bucket/aws"
version = "~> 4.0"
bucket = local.s3.bucket
# acl = local.s3.acl
versioning = local.s3.versioning
server_side_encryption_configuration = {
rule = {
apply_server_side_encryption_by_default = {
kms_master_key_id = aws_kms_key.dev_dejo_node.arn
sse_algorithm = "aws:kms"
}
}
}
tags = local.default_tags
}

View File

@ -0,0 +1,11 @@
terraform {
backend "s3" {
profile = "dejo-dev"
bucket = "dev-dejo-terraform"
key = "state/dejo-node/infrastructure/dev.tfstate"
region = "us-east-1"
encrypt = true
kms_key_id = "alias/dev-dejo-terraform-bucket-key"
use_lockfile = true
}
}