mirror of
https://github.com/projecthorus/sondehub-infra.git
synced 2025-01-18 10:46:24 +00:00
more refactoring
This commit is contained in:
parent
b5cde53546
commit
3b17da4be4
40
api.tf
Normal file
40
api.tf
Normal file
@ -0,0 +1,40 @@
|
||||
resource "aws_apigatewayv2_api" "main" {
|
||||
name = "sondehub-v2"
|
||||
disable_execute_api_endpoint = true
|
||||
api_key_selection_expression = "$request.header.x-api-key"
|
||||
protocol_type = "HTTP"
|
||||
route_selection_expression = "$request.method $request.path"
|
||||
|
||||
cors_configuration {
|
||||
allow_credentials = false
|
||||
allow_headers = [
|
||||
"*",
|
||||
]
|
||||
allow_methods = [
|
||||
"*",
|
||||
]
|
||||
allow_origins = [
|
||||
"*",
|
||||
]
|
||||
expose_headers = []
|
||||
max_age = 0
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
resource "aws_apigatewayv2_stage" "default" {
|
||||
name = "$default"
|
||||
api_id = aws_apigatewayv2_api.main.id
|
||||
default_route_settings {
|
||||
detailed_metrics_enabled = false
|
||||
}
|
||||
auto_deploy = true
|
||||
lifecycle {
|
||||
ignore_changes = [deployment_id]
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_iam_service_linked_role" "IAMServiceLinkedRole3" {
|
||||
aws_service_name = "ops.apigateway.amazonaws.com"
|
||||
description = "The Service Linked Role is used by Amazon API Gateway."
|
||||
}
|
285
es.tf
Normal file
285
es.tf
Normal file
@ -0,0 +1,285 @@
|
||||
|
||||
|
||||
resource "aws_elasticsearch_domain" "ElasticsearchDomain" {
|
||||
domain_name = "sondes-v2"
|
||||
elasticsearch_version = "OpenSearch_1.0"
|
||||
cluster_config {
|
||||
dedicated_master_count = 3
|
||||
dedicated_master_enabled = false
|
||||
dedicated_master_type = "t3.small.elasticsearch"
|
||||
instance_count = 1
|
||||
instance_type = "r5.xlarge.elasticsearch"
|
||||
zone_awareness_enabled = false
|
||||
}
|
||||
cognito_options {
|
||||
enabled = true
|
||||
identity_pool_id = aws_cognito_identity_pool.CognitoIdentityPool.id
|
||||
role_arn = aws_iam_role.IAMRole3.arn
|
||||
user_pool_id = aws_cognito_user_pool.CognitoUserPool.id
|
||||
}
|
||||
|
||||
access_policies = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"AWS": "*"
|
||||
},
|
||||
"Action": "es:*",
|
||||
"Resource": "arn:aws:es:us-east-1:${data.aws_caller_identity.current.account_id}:domain/sondes-v2/*"
|
||||
}
|
||||
]
|
||||
}
|
||||
EOF
|
||||
encrypt_at_rest {
|
||||
enabled = true
|
||||
kms_key_id = data.aws_kms_key.es.arn
|
||||
}
|
||||
node_to_node_encryption {
|
||||
enabled = true
|
||||
}
|
||||
advanced_options = {
|
||||
"rest.action.multi.allow_explicit_index" = "true"
|
||||
"override_main_response_version" = "true"
|
||||
}
|
||||
ebs_options {
|
||||
ebs_enabled = true
|
||||
volume_type = "gp2"
|
||||
volume_size = 250
|
||||
}
|
||||
log_publishing_options {
|
||||
cloudwatch_log_group_arn = "arn:aws:logs:us-east-1:143841941773:log-group:/aws/aes/domains/sondes-v2/application-logs"
|
||||
enabled = true
|
||||
log_type = "ES_APPLICATION_LOGS"
|
||||
}
|
||||
log_publishing_options {
|
||||
cloudwatch_log_group_arn = "arn:aws:logs:us-east-1:143841941773:log-group:/aws/aes/domains/sondes-v2/index-logs"
|
||||
enabled = true
|
||||
log_type = "INDEX_SLOW_LOGS"
|
||||
}
|
||||
log_publishing_options {
|
||||
cloudwatch_log_group_arn = "arn:aws:logs:us-east-1:143841941773:log-group:/aws/aes/domains/sondes-v2/search-logs"
|
||||
enabled = true
|
||||
log_type = "SEARCH_SLOW_LOGS"
|
||||
}
|
||||
}
|
||||
data "aws_kms_key" "es" {
|
||||
key_id = "alias/aws/es"
|
||||
}
|
||||
|
||||
resource "aws_cognito_identity_pool" "CognitoIdentityPool" {
|
||||
identity_pool_name = "sondes"
|
||||
allow_unauthenticated_identities = true
|
||||
|
||||
supported_login_providers = {
|
||||
"accounts.google.com" = "575970424139-vkk7scicbdd1igj04riqjh2bbs0oa6vj.apps.googleusercontent.com"
|
||||
}
|
||||
cognito_identity_providers {
|
||||
client_id = aws_cognito_user_pool_client.CognitoUserPoolClient.id
|
||||
provider_name = aws_cognito_user_pool.CognitoUserPool.endpoint
|
||||
server_side_token_check = false
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
resource "aws_cognito_identity_pool_roles_attachment" "CognitoIdentityPoolRoleAttachment" {
|
||||
identity_pool_id = aws_cognito_identity_pool.CognitoIdentityPool.id
|
||||
roles = {
|
||||
authenticated = aws_iam_role.auth_role.arn
|
||||
unauthenticated = aws_iam_role.unauth_role.arn
|
||||
}
|
||||
role_mapping {
|
||||
ambiguous_role_resolution = "AuthenticatedRole"
|
||||
identity_provider = "cognito-idp.us-east-1.amazonaws.com/us-east-1_G4H7NMniM:62uut02s5ts991uhpf4fbuvrtj"
|
||||
type = "Token"
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_cognito_user_pool" "CognitoUserPool" {
|
||||
name = "sondes"
|
||||
password_policy {
|
||||
temporary_password_validity_days = 7
|
||||
minimum_length = 8
|
||||
require_lowercase = true
|
||||
require_numbers = true
|
||||
require_symbols = true
|
||||
require_uppercase = true
|
||||
}
|
||||
|
||||
schema {
|
||||
attribute_data_type = "String"
|
||||
developer_only_attribute = false
|
||||
mutable = true
|
||||
name = "email"
|
||||
string_attribute_constraints {
|
||||
max_length = "2048"
|
||||
min_length = "0"
|
||||
}
|
||||
required = true
|
||||
}
|
||||
username_configuration {
|
||||
case_sensitive = false
|
||||
}
|
||||
|
||||
auto_verified_attributes = [
|
||||
"email"
|
||||
]
|
||||
alias_attributes = [
|
||||
"email",
|
||||
"preferred_username"
|
||||
]
|
||||
sms_verification_message = "Your verification code is {####}. "
|
||||
email_verification_message = "Your verification code is {####}. "
|
||||
email_verification_subject = "Your verification code"
|
||||
sms_authentication_message = "Your authentication code is {####}. "
|
||||
mfa_configuration = "OFF"
|
||||
device_configuration {
|
||||
challenge_required_on_new_device = false
|
||||
device_only_remembered_on_user_prompt = false
|
||||
}
|
||||
email_configuration {
|
||||
|
||||
}
|
||||
admin_create_user_config {
|
||||
allow_admin_create_user_only = false
|
||||
invite_message_template {
|
||||
email_message = "Your username is {username} and temporary password is {####}. "
|
||||
email_subject = "Your temporary password"
|
||||
sms_message = "Your username is {username} and temporary password is {####}. "
|
||||
}
|
||||
}
|
||||
account_recovery_setting {
|
||||
recovery_mechanism {
|
||||
name = "verified_email"
|
||||
priority = 1
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_cognito_user_pool_client" "CognitoUserPoolClient" {
|
||||
user_pool_id = aws_cognito_user_pool.CognitoUserPool.id
|
||||
name = "AWSElasticsearch-sondes-v2-us-east-1-hiwdpmnjbuckpbwfhhx65mweee"
|
||||
refresh_token_validity = 30
|
||||
allowed_oauth_flows = ["code"]
|
||||
allowed_oauth_flows_user_pool_client = true
|
||||
allowed_oauth_scopes = ["email", "openid", "phone", "profile"]
|
||||
callback_urls = ["https://es.${local.domain_name}/_dashboards/app/home"]
|
||||
logout_urls = ["https://es.${local.domain_name}/_dashboards/app/home"]
|
||||
supported_identity_providers = ["COGNITO", "Google"]
|
||||
explicit_auth_flows = ["ALLOW_CUSTOM_AUTH", "ALLOW_REFRESH_TOKEN_AUTH", "ALLOW_USER_SRP_AUTH"]
|
||||
|
||||
access_token_validity = 60
|
||||
id_token_validity = 60
|
||||
token_validity_units {
|
||||
access_token = "minutes"
|
||||
id_token = "minutes"
|
||||
refresh_token = "days"
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_cognito_user_pool_domain" "main" {
|
||||
domain = "auth.${local.domain_name}"
|
||||
user_pool_id = aws_cognito_user_pool.CognitoUserPool.id
|
||||
certificate_arn = aws_acm_certificate_validation.CertificateManagerCertificate.certificate_arn
|
||||
}
|
||||
|
||||
|
||||
resource "aws_route53_record" "auth" {
|
||||
for_each = toset(["A", "AAAA"])
|
||||
name = "auth"
|
||||
type = each.key
|
||||
alias {
|
||||
name = "${aws_cognito_user_pool_domain.main.cloudfront_distribution_arn}."
|
||||
zone_id = "Z2FDTNDATAQYW2"
|
||||
evaluate_target_health = false
|
||||
}
|
||||
zone_id = aws_route53_zone.Route53HostedZone.zone_id
|
||||
}
|
||||
|
||||
resource "aws_route53_record" "es" {
|
||||
name = "es"
|
||||
type = "CNAME"
|
||||
ttl = 300
|
||||
records = [
|
||||
aws_elasticsearch_domain.ElasticsearchDomain.endpoint
|
||||
]
|
||||
zone_id = aws_route53_zone.Route53HostedZone.zone_id
|
||||
}
|
||||
|
||||
|
||||
resource "aws_iam_role" "auth_role" {
|
||||
path = "/"
|
||||
name = "Cognito_sondesAuth_Role"
|
||||
assume_role_policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"Federated": "cognito-identity.amazonaws.com"
|
||||
},
|
||||
"Action": "sts:AssumeRoleWithWebIdentity",
|
||||
"Condition": {
|
||||
"StringEquals": {
|
||||
"cognito-identity.amazonaws.com:aud": "${aws_cognito_identity_pool.CognitoIdentityPool.id}"
|
||||
},
|
||||
"ForAnyValue:StringLike": {
|
||||
"cognito-identity.amazonaws.com:amr": "authenticated"
|
||||
}
|
||||
}
|
||||
}]
|
||||
}
|
||||
EOF
|
||||
max_session_duration = 3600
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "unauth_role" {
|
||||
path = "/"
|
||||
name = "Cognito_sondesUnauth_Role"
|
||||
assume_role_policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"Federated": "cognito-identity.amazonaws.com"
|
||||
},
|
||||
"Action": "sts:AssumeRoleWithWebIdentity",
|
||||
"Condition": {
|
||||
"StringEquals": {
|
||||
"cognito-identity.amazonaws.com:aud": "${aws_cognito_identity_pool.CognitoIdentityPool.id}"
|
||||
},
|
||||
"ForAnyValue:StringLike": {
|
||||
"cognito-identity.amazonaws.com:amr": "unauthenticated"
|
||||
}
|
||||
}
|
||||
}]
|
||||
}
|
||||
EOF
|
||||
max_session_duration = 3600
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "IAMRole3" {
|
||||
path = "/service-role/"
|
||||
name = "CognitoAccessForAmazonES"
|
||||
assume_role_policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"Service": "es.amazonaws.com"
|
||||
},
|
||||
"Action": "sts:AssumeRole"
|
||||
}]
|
||||
}
|
||||
EOF
|
||||
max_session_duration = 3600
|
||||
}
|
||||
|
||||
|
||||
resource "aws_iam_service_linked_role" "IAMServiceLinkedRole" {
|
||||
aws_service_name = "es.amazonaws.com"
|
||||
}
|
17
historic.tf
17
historic.tf
@ -132,4 +132,21 @@ resource "aws_lambda_permission" "history_cron" {
|
||||
function_name = aws_lambda_function.queue_data_update.function_name
|
||||
principal = "events.amazonaws.com"
|
||||
source_arn = aws_cloudwatch_event_rule.history.arn
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "history" {
|
||||
name = "history"
|
||||
assume_role_policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"Service": "lambda.amazonaws.com"
|
||||
},
|
||||
"Action": "sts:AssumeRole"
|
||||
}]
|
||||
}
|
||||
EOF
|
||||
max_session_duration = 3600
|
||||
}
|
24
main.tf
24
main.tf
@ -57,31 +57,9 @@ EOF
|
||||
max_session_duration = 3600
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "history" {
|
||||
name = "history"
|
||||
assume_role_policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"Service": "lambda.amazonaws.com"
|
||||
},
|
||||
"Action": "sts:AssumeRole"
|
||||
}]
|
||||
}
|
||||
EOF
|
||||
max_session_duration = 3600
|
||||
}
|
||||
|
||||
resource "aws_iam_service_linked_role" "IAMServiceLinkedRole" {
|
||||
aws_service_name = "es.amazonaws.com"
|
||||
}
|
||||
|
||||
resource "aws_iam_service_linked_role" "IAMServiceLinkedRole3" {
|
||||
aws_service_name = "ops.apigateway.amazonaws.com"
|
||||
description = "The Service Linked Role is used by Amazon API Gateway."
|
||||
}
|
||||
|
||||
|
||||
resource "aws_iam_policy" "IAMManagedPolicy" {
|
||||
name = "AWSLambdaBasicExecutionRole-01b38736-6769-4407-9515-93d653f4db5f"
|
||||
|
Loading…
Reference in New Issue
Block a user