Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -39,3 +39,8 @@ out/
/config.yml
/src/main/resources/logback.xml
docker-compose.yml

### terraform ###
.terraform/
*.tfstate
*.tfstate.*
26 changes: 26 additions & 0 deletions terraform-bootstrap/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

80 changes: 80 additions & 0 deletions terraform-bootstrap/main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,80 @@
terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = "5.54.1"
}
}
}

provider "aws" {
region = "ap-northeast-2"
}

resource "aws_s3_bucket" "issuefy_bucket" {
bucket = "issuefy-prod-terraform-state-ap-northeast-2"
force_destroy = false

tags = {
Name = "issuefy-prod-terraform-state-ap-northeast-2"
Environment = "prod"
Owner = "2024-iris"
Project = "issuefy"
Service = "infrastructure"
}
}

resource "aws_s3_bucket_versioning" "issuefy_bucket_versioning" {
bucket = aws_s3_bucket.issuefy_bucket.id

versioning_configuration {
status = "Enabled"
}
}

resource "aws_s3_bucket_lifecycle_configuration" "issuefy_bucket_lifecycle" {
bucket = aws_s3_bucket.issuefy_bucket.id

rule {
id = "state-file-lifecycle"
status = "Enabled"

abort_incomplete_multipart_upload {
days_after_initiation = 7
}

noncurrent_version_expiration {
noncurrent_days = 90
}
}
}

resource "aws_dynamodb_table" "terraform_lock" {
name = "issuefy-terraform-lock"
billing_mode = "PAY_PER_REQUEST"
hash_key = "LockID"

attribute {
name = "LockID"
type = "S"
}

tags = {
Name = "issuefy-terraform-lock"
Environment = "prod"
Owner = "2024-iris"
Project = "issuefy"
Service = "infrastructure"
}
}

module "ecr" {
source = "../terraform/modules/ecr"

for_each = var.ecr_repositories

repository_name = each.key
scan_on_push = each.value.scan_on_push
image_tag_mutability = each.value.image_tag_mutability
tags = each.value.tags
}
25 changes: 25 additions & 0 deletions terraform-bootstrap/terraform.tfvars
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
ecr_repositories = {
issuefy-was = {
scan_on_push = false
image_tag_mutability = "MUTABLE"
tags = {
Service = "was"
}
}

issuefy-prometheus = {
scan_on_push = false
image_tag_mutability = "MUTABLE"
tags = {
Service = "prometheus"
}
}

issuefy-web = {
scan_on_push = false
image_tag_mutability = "MUTABLE"
tags = {
Service = "web"
}
}
}
7 changes: 7 additions & 0 deletions terraform-bootstrap/variavles.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
variable "ecr_repositories" {
type = map(object({
scan_on_push = bool
image_tag_mutability = string
tags = map(string)
}))
}
26 changes: 26 additions & 0 deletions terraform/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

9 changes: 9 additions & 0 deletions terraform/backend.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
terraform {
backend "s3" {
bucket = "issuefy-prod-terraform-state-ap-northeast-2"
key = "prod/terraform.tfstate"
region = "ap-northeast-2"
encrypt = true
dynamodb_table = "issuefy-terraform-lock"
}
}
Loading
Loading