adding dev deployment
This commit is contained in:
@@ -36,13 +36,15 @@ module "cloudfront_s3_cdn" {
|
||||
tags = local.tags
|
||||
aliases = var.aliases
|
||||
index_document = "index.html"
|
||||
lambda_function_association = [
|
||||
{
|
||||
event_type : "origin-request",
|
||||
lambda_arn : aws_lambda_function.directory_indexes.qualified_arn,
|
||||
include_body : false
|
||||
}
|
||||
]
|
||||
error_document = "index.html"
|
||||
website_enabled = true
|
||||
# lambda_function_association = [
|
||||
# {
|
||||
# event_type : "origin-request",
|
||||
# lambda_arn : aws_lambda_function.directory_indexes.qualified_arn,
|
||||
# include_body : false
|
||||
# }
|
||||
# ]
|
||||
|
||||
# this policy sets the bucket to be public for all newly created files
|
||||
additional_bucket_policy = <<-EOT
|
||||
@@ -61,74 +63,74 @@ module "cloudfront_s3_cdn" {
|
||||
EOT
|
||||
}
|
||||
|
||||
data "archive_file" "lambda_main" {
|
||||
type = "zip"
|
||||
source_file = var.source_file
|
||||
output_path = "${var.source_file}.zip"
|
||||
}
|
||||
# data "archive_file" "lambda_main" {
|
||||
# type = "zip"
|
||||
# source_file = var.source_file
|
||||
# output_path = "${var.source_file}.zip"
|
||||
# }
|
||||
|
||||
resource "aws_lambda_function" "directory_indexes" {
|
||||
provider = aws.us_east_1
|
||||
function_name = "${var.stage}-${var.name}-directory_indexes"
|
||||
filename = "${var.source_file}.zip"
|
||||
source_code_hash = data.archive_file.lambda_main.output_base64sha256
|
||||
# s3_bucket = aws_s3_bucket.lambda_s3.id
|
||||
# s3_key = var.lambda_key
|
||||
handler = var.handler
|
||||
runtime = var.runtime
|
||||
role = aws_iam_role.lambda_role.arn
|
||||
publish = true
|
||||
tags = local.tags
|
||||
# resource "aws_lambda_function" "directory_indexes" {
|
||||
# provider = aws.us_east_1
|
||||
# function_name = "${var.stage}-${var.name}-directory_indexes"
|
||||
# filename = "${var.source_file}.zip"
|
||||
# source_code_hash = data.archive_file.lambda_main.output_base64sha256
|
||||
# # s3_bucket = aws_s3_bucket.lambda_s3.id
|
||||
# # s3_key = var.lambda_key
|
||||
# handler = var.handler
|
||||
# runtime = var.runtime
|
||||
# role = aws_iam_role.lambda_role.arn
|
||||
# publish = true
|
||||
# tags = local.tags
|
||||
|
||||
depends_on = [aws_iam_role_policy_attachment.lambda_logging]
|
||||
}
|
||||
# depends_on = [aws_iam_role_policy_attachment.lambda_logging]
|
||||
# }
|
||||
|
||||
## Lambda iam role & policies
|
||||
# ## Lambda iam role & policies
|
||||
|
||||
resource "aws_iam_role" "lambda_role" {
|
||||
name = "${var.stage}-${var.name}-lambda"
|
||||
tags = local.tags
|
||||
# resource "aws_iam_role" "lambda_role" {
|
||||
# name = "${var.stage}-${var.name}-lambda"
|
||||
# tags = local.tags
|
||||
|
||||
assume_role_policy = <<-EOT
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"Service": [
|
||||
"lambda.amazonaws.com",
|
||||
"edgelambda.amazonaws.com"
|
||||
]
|
||||
},
|
||||
"Action": "sts:AssumeRole"
|
||||
}
|
||||
]
|
||||
}
|
||||
EOT
|
||||
}
|
||||
# assume_role_policy = <<-EOT
|
||||
# {
|
||||
# "Version": "2012-10-17",
|
||||
# "Statement": [
|
||||
# {
|
||||
# "Effect": "Allow",
|
||||
# "Principal": {
|
||||
# "Service": [
|
||||
# "lambda.amazonaws.com",
|
||||
# "edgelambda.amazonaws.com"
|
||||
# ]
|
||||
# },
|
||||
# "Action": "sts:AssumeRole"
|
||||
# }
|
||||
# ]
|
||||
# }
|
||||
# EOT
|
||||
# }
|
||||
|
||||
resource "aws_iam_policy" "lambda_logging" {
|
||||
name = "${var.stage}-${var.name}-lambda_logging"
|
||||
policy = <<-EOT
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Action": [
|
||||
"logs:CreateLogGroup",
|
||||
"logs:CreateLogStream",
|
||||
"logs:PutLogEvents"
|
||||
],
|
||||
"Resource": "arn:aws:logs:*:*:*",
|
||||
"Effect": "Allow"
|
||||
}
|
||||
]
|
||||
}
|
||||
EOT
|
||||
}
|
||||
# resource "aws_iam_policy" "lambda_logging" {
|
||||
# name = "${var.stage}-${var.name}-lambda_logging"
|
||||
# policy = <<-EOT
|
||||
# {
|
||||
# "Version": "2012-10-17",
|
||||
# "Statement": [
|
||||
# {
|
||||
# "Action": [
|
||||
# "logs:CreateLogGroup",
|
||||
# "logs:CreateLogStream",
|
||||
# "logs:PutLogEvents"
|
||||
# ],
|
||||
# "Resource": "arn:aws:logs:*:*:*",
|
||||
# "Effect": "Allow"
|
||||
# }
|
||||
# ]
|
||||
# }
|
||||
# EOT
|
||||
# }
|
||||
|
||||
resource "aws_iam_role_policy_attachment" "lambda_logging" {
|
||||
role = aws_iam_role.lambda_role.name
|
||||
policy_arn = aws_iam_policy.lambda_logging.arn
|
||||
}
|
||||
# resource "aws_iam_role_policy_attachment" "lambda_logging" {
|
||||
# role = aws_iam_role.lambda_role.name
|
||||
# policy_arn = aws_iam_policy.lambda_logging.arn
|
||||
# }
|
||||
|
||||
Reference in New Issue
Block a user