Files
integreat/terraform/main.tf
2018-04-08 22:12:27 -07:00

118 lines
2.7 KiB
HCL

provider "aws" {
access_key = "${var.aws_access_key_id}"
secret_key = "${var.aws_secret_access_key}"
region = "us-east-1"
}
variable "aws_secret_access_key" {}
variable "aws_access_key_id" {}
variable "domain" {}
variable "base_url" {}
variable "invoice_address" {}
variable "stage" {}
data "aws_caller_identity" "current" {}
resource "aws_ses_receipt_rule_set" "main" {
rule_set_name = "default-rule-set"
}
resource "aws_ses_receipt_rule" "store" {
depends_on = ["aws_ses_receipt_rule_set.main"]
name = "store-${var.stage}"
rule_set_name = "default-rule-set"
recipients = ["${var.invoice_address}"]
enabled = true
scan_enabled = true
s3_action {
bucket_name = "${aws_s3_bucket.invoices.id}"
position = "1"
}
}
resource "aws_s3_bucket" "invoices" {
bucket = "integreat-mail-${var.stage}"
acl = "private"
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowSESPuts",
"Effect": "Allow",
"Principal": {
"Service": "ses.amazonaws.com"
},
"Action": "s3:PutObject",
"Resource": "arn:aws:s3:::integreat-mail-${var.stage}/*",
"Condition": {
"StringEquals": {
"aws:Referer": "${data.aws_caller_identity.current.account_id}"
}
}
}
]
}
EOF
}
resource "aws_sqs_queue" "integreat-mail" {
name = "integreat-mail-${var.stage}"
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": "*",
"Action": "sqs:SendMessage",
"Resource": "arn:aws:sqs:*:*:integreat-mail-${var.stage}",
"Condition": {
"ArnEquals": { "aws:SourceArn": "${aws_s3_bucket.invoices.arn}" }
}
}
]
}
POLICY
}
resource "aws_s3_bucket_notification" "mail_bucket_notification" {
bucket = "${aws_s3_bucket.invoices.id}"
queue {
queue_arn = "${aws_sqs_queue.integreat-mail.arn}"
events = ["s3:ObjectCreated:*"]
filter_suffix = ""
}
}
resource "aws_iam_user" "app_user" {
name = "integreat-${var.stage}"
}
resource "aws_iam_access_key" "app_user" {
user = "${aws_iam_user.app_user.name}"
}
resource "aws_iam_user_policy_attachment" "app_user_policy" {
user = "${aws_iam_user.app_user.name}"
policy_arn = "arn:aws:iam::aws:policy/AdministratorAccess"
}
output "aws_access_key_id" {
value = "${aws_iam_access_key.app_user.id}"
}
output "aws_secret_access_key" {
value = "${aws_iam_access_key.app_user.secret}"
}
output "aws_default_region" {
value = "us-east-1"
}
output "queue_url" {
value = "${aws_sqs_queue.integreat-mail.id}"
}