You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
129 lines
3.0 KiB
129 lines
3.0 KiB
resource "aws_vpc" "app_vpc" { |
|
cidr_block = "10.0.0.0/16" |
|
} |
|
|
|
resource "aws_subnet" "public_subnet" { |
|
count = length(var.subnets) |
|
|
|
vpc_id = aws_vpc.app_vpc.id |
|
availability_zone = element(keys(var.subnets), count.index) |
|
cidr_block = "10.0.${count.index}.0/25" |
|
tags = { |
|
"Name" = "public | ${element(keys(var.subnets), count.index)}" |
|
} |
|
} |
|
|
|
resource "aws_subnet" "private_subnet" { |
|
count = length(var.subnets) |
|
|
|
vpc_id = aws_vpc.app_vpc.id |
|
availability_zone = element(keys(var.subnets), count.index) |
|
cidr_block = "10.0.${count.index}.128/25" |
|
tags = { |
|
"Name" = "private | ${element(keys(var.subnets), count.index)}" |
|
} |
|
} |
|
|
|
resource "aws_route_table" "public" { |
|
vpc_id = aws_vpc.app_vpc.id |
|
tags = { |
|
"Name" = "public" |
|
} |
|
} |
|
|
|
resource "aws_route_table" "private" { |
|
vpc_id = aws_vpc.app_vpc.id |
|
tags = { |
|
"Name" = "private" |
|
} |
|
} |
|
|
|
resource "aws_route_table_association" "public_subnet" { |
|
count = length(var.subnets) |
|
|
|
subnet_id = element(aws_subnet.public_subnet.*.id, count.index) |
|
route_table_id = aws_route_table.public.id |
|
} |
|
|
|
resource "aws_route_table_association" "private_subnet" { |
|
count = length(var.subnets) |
|
|
|
subnet_id = element(aws_subnet.private_subnet.*.id, count.index) |
|
route_table_id = aws_route_table.private.id |
|
} |
|
|
|
resource "aws_eip" "nat" { |
|
vpc = true |
|
} |
|
|
|
resource "aws_internet_gateway" "igw" { |
|
vpc_id = aws_vpc.app_vpc.id |
|
} |
|
|
|
resource "aws_nat_gateway" "ngw" { |
|
count = length(var.subnets) |
|
|
|
subnet_id = element(aws_subnet.private_subnet.*.id, count.index) |
|
allocation_id = aws_eip.nat.id |
|
depends_on = [aws_internet_gateway.igw] |
|
} |
|
|
|
resource "aws_route" "public_igw" { |
|
route_table_id = aws_route_table.public.id |
|
destination_cidr_block = "0.0.0.0/0" |
|
gateway_id = aws_internet_gateway.igw.id |
|
} |
|
|
|
resource "aws_route" "private_ngw" { |
|
route_table_id = aws_route_table.private.id |
|
destination_cidr_block = "0.0.0.0/0" |
|
nat_gateway_id = aws_nat_gateway.ngw.id |
|
} |
|
|
|
resource "aws_security_group" "http" { |
|
name = "http" |
|
description = "HTTP traffic" |
|
vpc_id = aws_vpc.app_vpc.id |
|
ingress { |
|
from_port = 80 |
|
to_port = 80 |
|
protocol = "TCP" |
|
cidr_blocks = ["0.0.0.0/0"] |
|
} |
|
} |
|
|
|
resource "aws_security_group" "https" { |
|
name = "https" |
|
description = "HTTPS traffic" |
|
vpc_id = aws_vpc.app_vpc.id |
|
ingress { |
|
from_port = 443 |
|
to_port = 443 |
|
protocol = "TCP" |
|
cidr_blocks = ["0.0.0.0/0"] |
|
} |
|
} |
|
|
|
resource "aws_security_group" "egress_all" { |
|
name = "egress-all" |
|
description = "Allow all outbound traffic" |
|
vpc_id = aws_vpc.app_vpc.id |
|
egress { |
|
from_port = 0 |
|
to_port = 0 |
|
protocol = "-1" |
|
cidr_blocks = ["0.0.0.0/0"] |
|
} |
|
} |
|
|
|
resource "aws_security_group" "ingress_api" { |
|
name = "ingress-api" |
|
description = "Allow ingress to API" |
|
vpc_id = aws_vpc.app_vpc.id |
|
ingress { |
|
from_port = 3000 |
|
to_port = 3000 |
|
protocol = "TCP" |
|
cidr_blocks = ["0.0.0.0/0"] |
|
} |
|
}
|
|
|