provider "aws" { region = "us-west-2" } data "aws_caller_identity" "current" {} locals { name = "unicorn-ui" region = "us-west-2" container_port = 7007 # Container port is specific to this app example container_name = "unicorn-ui" tags = { Blueprint = local.name GithubRepo = "github.com/${var.repository_owner}/ecs-blueprints" } } ################################################################################ # RDS Aurora for Backstage backend db ################################################################################ module "aurora_postgresdb" { source = "terraform-aws-modules/rds-aurora/aws" version = "~> 8.0" name = "backstage-db" engine = "aurora-postgresql" engine_mode = "serverless" vpc_id = data.aws_vpc.vpc.id subnets = data.aws_subnets.private.ids security_group_rules = { private_subnets_ingress = { description = "Allow ingress from VPC private subnets" cidr_blocks = [for s in data.aws_subnet.private_cidr : s.cidr_block] } } storage_encrypted = true apply_immediately = true monitoring_interval = 60 scaling_configuration = { min_capacity = 2 max_capacity = 2 } master_username = "postgres" master_password = data.aws_secretsmanager_secret_version.postgresdb_master_password.secret_string port = 5432 tags = local.tags } ################################################################################ # ECS Blueprint ################################################################################ module "service_alb" { source = "terraform-aws-modules/alb/aws" version = "~> 8.3" name = "${local.name}-alb" load_balancer_type = "application" vpc_id = data.aws_vpc.vpc.id subnets = data.aws_subnets.public.ids security_group_rules = { ingress_all_http = { type = "ingress" from_port = 80 to_port = 80 protocol = "tcp" description = "HTTP web traffic" cidr_blocks = ["0.0.0.0/0"] } egress_all = { type = "egress" from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = [for s in data.aws_subnet.private_cidr : s.cidr_block] } } http_tcp_listeners = [ { port = "80" protocol = "HTTP" target_group_index = 0 }, ] target_groups = [ { name = "${local.name}-tg" backend_protocol = "HTTP" backend_port = local.container_port target_type = "ip" health_check = { path = "/" port = local.container_port matcher = "200-299" } }, ] tags = local.tags } module "container_image_ecr" { source = "terraform-aws-modules/ecr/aws" version = "~> 1.4" repository_name = local.container_name repository_force_delete = true create_lifecycle_policy = false repository_read_access_arns = [one(data.aws_iam_roles.ecs_core_infra_exec_role.arns)] repository_read_write_access_arns = [module.codepipeline_ci_cd.codepipeline_role_arn] tags = local.tags } resource "aws_service_discovery_service" "this" { name = local.name dns_config { namespace_id = data.aws_service_discovery_dns_namespace.this.id dns_records { ttl = 10 type = "A" } routing_policy = "MULTIVALUE" } health_check_custom_config { failure_threshold = 1 } } module "ecs_service_definition" { source = "terraform-aws-modules/ecs/aws//modules/service" version = "~> 5.0" name = local.name desired_count = 3 cluster_arn = data.aws_ecs_cluster.core_infra.arn subnet_ids = data.aws_subnets.private.ids security_group_rules = { ingress_alb_service = { type = "ingress" from_port = local.container_port to_port = local.container_port protocol = "tcp" description = "Service port" source_security_group_id = module.service_alb.security_group_id } egress_all = { type = "egress" from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = ["0.0.0.0/0"] } } load_balancer = [{ container_name = local.container_name container_port = local.container_port target_group_arn = element(module.service_alb.target_group_arns, 0) }] service_registries = { registry_arn = aws_service_discovery_service.this.arn } # Task Definition enable_execute_command = true create_iam_role = false task_exec_iam_role_arn = one(data.aws_iam_roles.ecs_core_infra_exec_role.arns) task_exec_secret_arns = [ data.aws_secretsmanager_secret.github_token.arn, data.aws_secretsmanager_secret.postgresdb_master_password.arn, ] task_exec_ssm_param_arns = [ aws_ssm_parameter.base_url.arn, aws_ssm_parameter.postgres_host.arn, aws_ssm_parameter.postgres_port.arn, aws_ssm_parameter.postgres_user.arn, ] container_definitions = { main_container = { name = local.container_name image = module.container_image_ecr.repository_url readonly_root_filesystem = false secrets = [ { name = "GITHUB_TOKEN", valueFrom = data.aws_secretsmanager_secret.github_token.arn }, { name = "BASE_URL", valueFrom = aws_ssm_parameter.base_url.name }, { name = "POSTGRES_HOST", valueFrom = aws_ssm_parameter.postgres_host.name }, { name = "POSTGRES_PORT", valueFrom = aws_ssm_parameter.postgres_port.name }, { name = "POSTGRES_USER", valueFrom = aws_ssm_parameter.postgres_user.name }, { name = "POSTGRES_PASSWORD", valueFrom = data.aws_secretsmanager_secret.postgresdb_master_password.arn } ] port_mappings = [{ protocol : "tcp", containerPort : local.container_port hostPort : local.container_port }] } } ignore_task_definition_changes = true tags = local.tags } ################################################################################ # CodePipeline and CodeBuild for CI/CD ################################################################################ module "codepipeline_s3_bucket" { source = "terraform-aws-modules/s3-bucket/aws" version = "~> 3.0" bucket = "codepipeline-${local.region}-${random_id.this.hex}" acl = "private" # For example only - please re-evaluate for your environment force_destroy = true attach_deny_insecure_transport_policy = true attach_require_latest_tls_policy = true block_public_acls = true block_public_policy = true ignore_public_acls = true restrict_public_buckets = true server_side_encryption_configuration = { rule = { apply_server_side_encryption_by_default = { sse_algorithm = "AES256" } } } tags = local.tags } resource "aws_sns_topic" "codestar_notification" { name = local.name policy = jsonencode({ Version = "2012-10-17" Statement = [ { Sid = "WriteAccess" Effect = "Allow" Action = "sns:Publish" Resource = "arn:aws:sns:${local.region}:${data.aws_caller_identity.current.account_id}:${local.name}" Principal = { Service = "codestar-notifications.amazonaws.com" } }, ] }) tags = local.tags } module "codebuild_ci" { source = "../../modules/codebuild" name = "codebuild-${module.ecs_service_definition.name}" service_role = module.codebuild_ci.codebuild_role_arn buildspec_path = "./templates/buildspec.yml" s3_bucket = module.codepipeline_s3_bucket environment = { image = "aws/codebuild/standard:5.0" privileged_mode = true environment_variables = [ { name = "REPO_URL" value = module.container_image_ecr.repository_url }, { name = "CONTAINER_NAME" value = local.container_name }, { name = "BASE_URL" value = "http://${module.service_alb.lb_dns_name}" }, ] } create_iam_role = true iam_role_name = "${module.ecs_service_definition.name}-codebuild-${random_id.this.hex}" ecr_repository = module.container_image_ecr.repository_arn tags = local.tags } module "codepipeline_ci_cd" { source = "../../modules/codepipeline" name = "pipeline-${module.ecs_service_definition.name}" service_role = module.codepipeline_ci_cd.codepipeline_role_arn s3_bucket = module.codepipeline_s3_bucket sns_topic = aws_sns_topic.codestar_notification.arn stage = [{ name = "Source" action = [{ name = "Source" category = "Source" owner = "ThirdParty" provider = "GitHub" version = "1" input_artifacts = [] output_artifacts = ["SourceArtifact"] configuration = { OAuthToken = data.aws_secretsmanager_secret_version.github_token.secret_string Owner = var.repository_owner Repo = var.repository_name Branch = var.repository_branch PollForSourceChanges = true } }], }, { name = "Build" action = [{ name = "Build_app" category = "Build" owner = "AWS" provider = "CodeBuild" version = "1" input_artifacts = ["SourceArtifact"] output_artifacts = ["BuildArtifact_app"] configuration = { ProjectName = module.codebuild_ci.project_id } }], }, { name = "Deploy" action = [{ name = "Deploy_app" category = "Deploy" owner = "AWS" provider = "ECS" version = "1" input_artifacts = ["BuildArtifact_app"] configuration = { ClusterName = data.aws_ecs_cluster.core_infra.cluster_name ServiceName = module.ecs_service_definition.name FileName = "imagedefinition.json" } }], }] create_iam_role = true iam_role_name = "${module.ecs_service_definition.name}-pipeline-${random_id.this.hex}" tags = local.tags } ################################################################################ # Supporting Resources ################################################################################ resource "random_id" "this" { byte_length = "2" } resource "aws_ssm_parameter" "postgres_host" { name = "postgres_host" type = "String" value = module.aurora_postgresdb.cluster_endpoint } resource "aws_ssm_parameter" "postgres_port" { name = "postgres_port" type = "String" value = 5432 } resource "aws_ssm_parameter" "postgres_user" { name = "postgres_user" type = "String" value = "postgres" } resource "aws_ssm_parameter" "base_url" { name = "base_url" type = "String" value = "http://${module.service_alb.lb_dns_name}" } data "aws_secretsmanager_secret" "postgresdb_master_password" { name = var.postgresdb_master_password } data "aws_secretsmanager_secret_version" "postgresdb_master_password" { secret_id = data.aws_secretsmanager_secret.postgresdb_master_password.id } data "aws_secretsmanager_secret" "github_token" { name = var.github_token_secret_name } data "aws_secretsmanager_secret_version" "github_token" { secret_id = data.aws_secretsmanager_secret.github_token.id } data "aws_vpc" "vpc" { filter { name = "tag:Name" values = ["core-infra"] } } data "aws_subnets" "public" { filter { name = "tag:Name" values = ["core-infra-public-*"] } } data "aws_subnets" "private" { filter { name = "tag:Name" values = ["core-infra-private-*"] } } data "aws_subnet" "private_cidr" { for_each = toset(data.aws_subnets.private.ids) id = each.value } data "aws_ecs_cluster" "core_infra" { cluster_name = "core-infra" } data "aws_iam_roles" "ecs_core_infra_exec_role" { name_regex = "core-infra-*" } data "aws_service_discovery_dns_namespace" "this" { name = "default.${data.aws_ecs_cluster.core_infra.cluster_name}.local" type = "DNS_PRIVATE" }