You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123 lines
2.9 KiB

resource "aws_vpc" "app_vpc" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "public_subnet" {
count = length(var.public_subnets)
vpc_id = aws_vpc.app_vpc.id
availability_zone = element(keys(var.public_subnets), count.index)
cidr_block = element(values(var.public_subnets), count.index)
tags = {
"Name" = "public | ${element(keys(var.public_subnets), count.index)}"
}
}
resource "aws_subnet" "private_subnet" {
count = length(var.private_subnets)
vpc_id = aws_vpc.app_vpc.id
availability_zone = element(keys(var.private_subnets), count.index)
cidr_block = element(values(var.private_subnets), count.index)
tags = {
"Name" = "private | ${element(keys(var.private_subnets), count.index)}"
}
}
resource "aws_route_table" "public" {
vpc_id = aws_vpc.app_vpc.id
tags = {
"Name" = "public"
}
}
resource "aws_route_table" "private" {
vpc_id = aws_vpc.app_vpc.id
tags = {
"Name" = "private"
}
}
resource "aws_route_table_association" "public_subnet" {
subnet_id = aws_subnet.public_subnet[0].id
route_table_id = aws_route_table.public.id
}
resource "aws_route_table_association" "private_subnet" {
subnet_id = aws_subnet.private_subnet[1].id
route_table_id = aws_route_table.private.id
}
resource "aws_eip" "nat" {
}
resource "aws_internet_gateway" "igw" {
vpc_id = aws_vpc.app_vpc.id
}
resource "aws_nat_gateway" "ngw" {
subnet_id = aws_subnet.public_subnet[0].id
allocation_id = aws_eip.nat.id
depends_on = [aws_internet_gateway.igw]
}
resource "aws_route" "igw" {
route_table_id = aws_route_table.public.id
destination_cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.igw.id
}
resource "aws_route" "ngw" {
route_table_id = aws_route_table.private.id
destination_cidr_block = "0.0.0.0/0"
nat_gateway_id = aws_nat_gateway.ngw.id
}
resource "aws_security_group" "http" {
name = "http"
description = "HTTP traffic"
vpc_id = aws_vpc.app_vpc.id
ingress {
from_port = 80
to_port = 80
protocol = "TCP"
cidr_blocks = ["0.0.0.0/0"]
}
}
resource "aws_security_group" "https" {
name = "https"
description = "HTTPS traffic"
vpc_id = aws_vpc.app_vpc.id
ingress {
from_port = 443
to_port = 443
protocol = "TCP"
cidr_blocks = ["0.0.0.0/0"]
}
}
resource "aws_security_group" "egress_all" {
name = "egress-all"
description = "Allow all outbound traffic"
vpc_id = aws_vpc.app_vpc.id
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
}
resource "aws_security_group" "ingress_api" {
name = "ingress-api"
description = "Allow ingress to API"
vpc_id = aws_vpc.app_vpc.id
ingress {
from_port = var.service_port
to_port = var.service_port
protocol = "TCP"
cidr_blocks = ["0.0.0.0/0"]
}
}