mirror of
https://github.com/projecthorus/sondehub-infra.git
synced 2024-12-18 20:57:56 +00:00
81830c2d74
Co-authored-by: xss <michaela@michaela.lgbt>
160 lines
4.0 KiB
HCL
160 lines
4.0 KiB
HCL
terraform {
|
|
backend "s3" {
|
|
bucket = "sondehub-terraform"
|
|
key = "sondehub-main"
|
|
region = "us-east-1"
|
|
}
|
|
}
|
|
provider "aws" {
|
|
region = "us-east-1"
|
|
}
|
|
|
|
locals {
|
|
domain_name = "v2.sondehub.org"
|
|
}
|
|
data "aws_caller_identity" "current" {}
|
|
|
|
|
|
|
|
resource "aws_iam_role" "basic_lambda_role" {
|
|
path = "/service-role/"
|
|
name = "sonde-api-to-iot-core-role-z9zes3f5"
|
|
assume_role_policy = <<EOF
|
|
{
|
|
"Version": "2012-10-17",
|
|
"Statement": [{
|
|
"Effect": "Allow",
|
|
"Principal": {
|
|
"Service": "lambda.amazonaws.com"
|
|
},
|
|
"Action": "sts:AssumeRole"
|
|
},
|
|
{
|
|
"Effect": "Allow",
|
|
"Principal": {
|
|
"Service": "edgelambda.amazonaws.com"
|
|
},
|
|
"Action": "sts:AssumeRole"
|
|
}]
|
|
}
|
|
EOF
|
|
max_session_duration = 3600
|
|
}
|
|
|
|
|
|
|
|
|
|
resource "aws_iam_role_policy" "basic_lambda_role" {
|
|
policy = <<EOF
|
|
{
|
|
"Version": "2012-10-17",
|
|
"Statement": [
|
|
{
|
|
"Effect": "Allow",
|
|
"Action": "s3:*",
|
|
"Resource": "*"
|
|
},
|
|
{
|
|
"Effect": "Allow",
|
|
"Action": "sns:*",
|
|
"Resource": "*"
|
|
},
|
|
{
|
|
"Effect": "Allow",
|
|
"Action": "logs:CreateLogGroup",
|
|
"Resource": "arn:aws:logs:us-east-1:${data.aws_caller_identity.current.account_id}:*"
|
|
},
|
|
{
|
|
"Effect": "Allow",
|
|
"Action": [
|
|
"logs:CreateLogStream",
|
|
"logs:PutLogEvents"
|
|
],
|
|
"Resource": [
|
|
"arn:aws:logs:us-east-1:${data.aws_caller_identity.current.account_id}:log-group:/aws/lambda/*"
|
|
]
|
|
},
|
|
{
|
|
"Action": [
|
|
"ec2:DescribeNetworkInterfaces",
|
|
"ec2:CreateNetworkInterface",
|
|
"ec2:DeleteNetworkInterface",
|
|
"ec2:DescribeInstances",
|
|
"ec2:AttachNetworkInterface"
|
|
],
|
|
"Effect": "Allow",
|
|
"Resource": "*"
|
|
},
|
|
{
|
|
"Action": [
|
|
"secretsmanager:GetSecretValue"
|
|
],
|
|
"Effect": "Allow",
|
|
"Resource": ["${aws_secretsmanager_secret.mqtt.arn}", "${aws_secretsmanager_secret.radiosondy.arn}"]
|
|
}
|
|
]
|
|
}
|
|
EOF
|
|
role = aws_iam_role.basic_lambda_role.name
|
|
}
|
|
|
|
|
|
|
|
resource "aws_route53_zone" "Route53HostedZone" {
|
|
name = "${local.domain_name}."
|
|
}
|
|
|
|
resource "aws_route53_record" "cert_validation" {
|
|
for_each = {
|
|
for dvo in aws_acm_certificate.CertificateManagerCertificate.domain_validation_options : dvo.domain_name => {
|
|
name = dvo.resource_record_name
|
|
record = dvo.resource_record_value
|
|
type = dvo.resource_record_type
|
|
}
|
|
}
|
|
|
|
allow_overwrite = true
|
|
name = each.value.name
|
|
records = [each.value.record]
|
|
ttl = 60
|
|
type = each.value.type
|
|
zone_id = aws_route53_zone.Route53HostedZone.zone_id
|
|
}
|
|
resource "aws_acm_certificate_validation" "CertificateManagerCertificate" {
|
|
certificate_arn = aws_acm_certificate.CertificateManagerCertificate.arn
|
|
validation_record_fqdns = [for record in aws_route53_record.cert_validation : record.fqdn]
|
|
}
|
|
resource "aws_acm_certificate" "CertificateManagerCertificate" {
|
|
domain_name = local.domain_name
|
|
subject_alternative_names = [
|
|
"*.${local.domain_name}"
|
|
]
|
|
validation_method = "DNS"
|
|
}
|
|
|
|
|
|
resource "aws_acm_certificate" "CertificateManagerCertificate_root" {
|
|
domain_name = local.domain_name
|
|
subject_alternative_names = [
|
|
"*.${local.domain_name}",
|
|
"sondehub.org",
|
|
"*.sondehub.org"
|
|
]
|
|
validation_method = "DNS"
|
|
}
|
|
|
|
data "archive_file" "lambda" {
|
|
type = "zip"
|
|
source_dir = "lambda/"
|
|
output_path = "${path.module}/build/lambda.zip"
|
|
}
|
|
|
|
resource "aws_s3_bucket" "lambda_functions" {
|
|
}
|
|
|
|
resource "aws_s3_bucket_object" "lambda" {
|
|
bucket = aws_s3_bucket.lambda_functions.bucket
|
|
key = "lambda.zip"
|
|
source = data.archive_file.lambda.output_path
|
|
etag = data.archive_file.lambda.output_md5
|
|
} |