resource "aws_vpc" "app_vpc" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "public_subnet" { count = length(var.public_subnets) vpc_id = aws_vpc.app_vpc.id availability_zone = element(keys(var.public_subnets), count.index) cidr_block = element(values(var.public_subnets), count.index) tags = { "Name" = "public | ${element(keys(var.public_subnets), count.index)}" } } resource "aws_subnet" "private_subnet" { count = length(var.private_subnets) vpc_id = aws_vpc.app_vpc.id availability_zone = element(keys(var.private_subnets), count.index) cidr_block = element(values(var.private_subnets), count.index) tags = { "Name" = "private | ${element(keys(var.private_subnets), count.index)}" } } resource "aws_route_table" "public" { vpc_id = aws_vpc.app_vpc.id tags = { "Name" = "public" } } resource "aws_route_table" "private" { vpc_id = aws_vpc.app_vpc.id tags = { "Name" = "private" } } resource "aws_route_table_association" "public_subnet" { subnet_id = aws_subnet.public_subnet[0].id route_table_id = aws_route_table.public.id } resource "aws_route_table_association" "private_subnet" { subnet_id = aws_subnet.private_subnet[0].id route_table_id = aws_route_table.private.id } resource "aws_eip" "nat" { vpc = true } resource "aws_internet_gateway" "igw" { vpc_id = aws_vpc.app_vpc.id } resource "aws_nat_gateway" "ngw" { subnet_id = aws_subnet.private_subnet[0].id allocation_id = aws_eip.nat.id depends_on = [aws_internet_gateway.igw] } resource "aws_route" "igw" { route_table_id = aws_route_table.public.id destination_cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.igw.id } resource "aws_route" "ngw" { route_table_id = aws_route_table.private.id destination_cidr_block = "0.0.0.0/0" nat_gateway_id = aws_nat_gateway.ngw.id } resource "aws_security_group" "http" { name = "http" description = "HTTP traffic" vpc_id = aws_vpc.app_vpc.id ingress { from_port = 80 to_port = 80 protocol = "TCP" cidr_blocks = ["0.0.0.0/0"] } } resource "aws_security_group" "https" { name = "https" description = "HTTPS traffic" vpc_id = aws_vpc.app_vpc.id ingress { from_port = 443 to_port = 443 protocol = "TCP" cidr_blocks = ["0.0.0.0/0"] } } resource "aws_security_group" "egress_all" { name = "egress-all" description = "Allow all outbound traffic" vpc_id = aws_vpc.app_vpc.id egress { from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = ["0.0.0.0/0"] } } resource "aws_security_group" "ingress_api" { name = "ingress-api" description = "Allow ingress to API" vpc_id = aws_vpc.app_vpc.id ingress { from_port = 3000 to_port = 3000 protocol = "TCP" cidr_blocks = ["0.0.0.0/0"] } }