-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmain.tf
179 lines (163 loc) · 5.95 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
terraform {
required_version = ">= 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 3.64"
}
}
}
locals {
routes = [
{
path = "/v1"
methods = ["POST"]
config = {
# # Default if not given, but must give to override with null for OPTIONS.
# connection_type = "VPC_LINK"
#
integration_request_parameters = { "integration.request.path.proxy" = "method.request.path.proxy" }
method_request_parameters = { "method.request.path.proxy" = true }
request_templates = {}
responses = []
type = null
uri = "https://example.com/v1"
}
},
{
path = "/lambda"
methods = ["POST"]
config = {
integration_request_parameters = { "integration.request.header.X-Authorization" = "'static'" }
method_request_parameters = {}
request_templates = { "application/xml" = "{\"body\" : $input.json('$')}" }
responses = []
type = "AWS_PROXY"
uri = aws_lambda_function.this.invoke_arn
}
},
{
path = "/mock"
methods = ["GET"]
config = {
integration_request_parameters = { "integration.request.header.X-Authorization" = "'static'" }
method_request_parameters = {}
request_templates = { "application/xml" = "{\"body\" : $input.json('$')}" }
responses = []
type = "MOCK"
uri = null
}
},
{
path = "/v1/{proxy+}"
# Here ["ANY"] could be used except we want to catch all OPTIONS below.
methods = ["DELETE", "GET", "HEAD", "PATCH", "POST", "PUT"]
config = {
integration_request_parameters = { "integration.request.path.proxy" = "method.request.path.proxy" }
method_request_parameters = { "method.request.path.proxy" = true }
request_templates = {}
responses = []
type = null
uri = "https://example.com/v1/{proxy}"
}
},
{
path = "/{proxy+}"
methods = ["OPTIONS"]
config = {
integration_request_parameters = {}
method_request_parameters = {}
request_templates = { "application/json" = jsonencode({ statusCode = 200 }) }
type = "MOCK"
uri = ""
responses = [{
status_code = 200
integration_parameters = {
"method.response.header.Access-Control-Allow-Headers" = "'*'"
"method.response.header.Access-Control-Allow-Methods" = "'*'"
"method.response.header.Access-Control-Allow-Origin" = "'*'"
"method.response.header.Access-Control-Allow-Credentials" = "'true'"
}
method_parameters = {
"method.response.header.Access-Control-Allow-Headers" = true
"method.response.header.Access-Control-Allow-Methods" = true
"method.response.header.Access-Control-Allow-Origin" = true
"method.response.header.Access-Control-Allow-Credentials" = true
}
}]
}
}
]
}
module "builder" {
source = "../../../terraform-aws-apigateway-route-builder"
expand_any = true
generate_base_proxies = false
routes = local.routes
}
module "api" {
source = "../../../terraform-aws-apigateway-proxy"
authorizer = aws_lambda_function.this
certificate_arn = "arn:aws:acm:eu-west-1:123412341234:certificate/id"
description = "A more complex api proxy."
domain_name = "api.example.com"
endpoint_type = "PRIVATE"
name = "h4s-complete"
permissions_boundary = "arn:aws:iam::123412341234:policy/PermissionBoundaryPolicy"
resources = module.builder.resources
stage_name = "dev"
vpc_link_id = "ab3def"
xray_tracing_enabled = true
zone_id = "Z..."
access_log_format = {
"requestId" = "$context.requestId",
"ip" = "$context.identity.sourceIp",
"httpMethod" = "$context.httpMethod",
}
# With the optional implementation in terraform 1.3 this is simply:
# methods = module.builder.methods
methods = { for k, m in module.builder.methods : k => {
depth = m.depth
key = m.key
method = m.method
resource_key = m.resource_key
root = m.root
config = merge({
cache_key_parameters = null
cache_namespace = null
connection_id = null
connection_type = null
content_handling = null
credentials = null
integration_request_parameters = null
method_request_parameters = null
passthrough_behavior = null
request_templates = null
skip_verification = null
timeout_milliseconds = null
type = null
uri = null
}, m.config)
} }
}
data "aws_iam_policy_document" "this_assume_role" {
statement {
actions = ["sts:AssumeRole"]
principals {
type = "Service"
identifiers = ["lambda.amazonaws.com"]
}
}
}
resource "aws_iam_role" "this" {
name = "h4s-example-lambda"
assume_role_policy = data.aws_iam_policy_document.this_assume_role.json
}
resource "aws_lambda_function" "this" {
filename = "lambda.zip"
function_name = "h4s-example"
handler = "exports.example"
role = aws_iam_role.this.arn
runtime = "nodejs16.x"
source_code_hash = filebase64sha256("lambda.zip")
}