This terraform module creates a Route53 Hosted Zone/s in AWS. This module can be used to provision both private and public hosted zones. A non empty vpc input variable indicates that the zone is private else it will be provisioned as public.
A sample input variable for deploying public zones would look like:
zones = {
"<first_zone_domain_name>" = {
domain_name = "<first_zone_domain_name>"
comment = "<description>"
force_destroy = true
tags = { "key" = "value" }
vpc = {
vpc_id = <vpc id>
vpc_region = <vpc region>
}
},
"<second_zone_domain_name>" = {
domain_name = "<first_zone_domain_name>"
comment = "<description>"
force_destroy = true
tags = { "key" = "value" }
vpc = {
vpc_id = <vpc id>
vpc_region = <vpc region>
}
}
}
A sample input variable for deploying public zones would look like:
zones = {
"<first_zone_domain_name>" = {
domain_name = "<first_zone_domain_name>"
comment = "<description>"
force_destroy = true
tags = {}
vpc = {}
},
"<second_zone_domain_name>" = {
domain_name = "<second_zone_domain_name>"
comment = "<description>"
force_destroy = true
tags = {}
vpc = {}
}
}
A sample variable file example.tfvars is available in the root directory which can be used to test this module. User needs to follow the below steps to execute this module
- Update the
example.tfvarsto manually enter values for all fields marked within<>to make the variable file usable - Create a file
provider.tfwith the below contentsIf usingprovider "aws" { profile = "<profile_name>" region = "<region_name>" }SSO, make sure you are logged inaws sso login --profile <profile_name> - Make sure terraform binary is installed on your local. Use command
type terraformto find the installation location. If you are usingasdf, you can runasfd installand it will install the correct terraform version for you..tool-versioncontains all the dependencies. - Run the
terraformto provision infrastructure on AWS# Initialize terraform init # Plan terraform plan -var-file example.tfvars # Apply (this is create the actual infrastructure) terraform apply -var-file example.tfvars -auto-approve
- Not yet tested to provision public hosted zone
.pre-commit-config.yaml file defines certain pre-commit hooks that are relevant to terraform, golang and common linting tasks. There are no custom hooks added.
commitlint hook enforces commit message in certain format. The commit contains the following structural elements, to communicate intent to the consumers of your commit messages:
- fix: a commit of the type
fixpatches a bug in your codebase (this correlates with PATCH in Semantic Versioning). - feat: a commit of the type
featintroduces a new feature to the codebase (this correlates with MINOR in Semantic Versioning). - BREAKING CHANGE: a commit that has a footer
BREAKING CHANGE:, or appends a!after the type/scope, introduces a breaking API change (correlating with MAJOR in Semantic Versioning). A BREAKING CHANGE can be part of commits of any type. footers other than BREAKING CHANGE: may be provided and follow a convention similar to git trailer format. - build: a commit of the type
buildadds changes that affect the build system or external dependencies (example scopes: gulp, broccoli, npm) - chore: a commit of the type
choreadds changes that don't modify src or test files - ci: a commit of the type
ciadds changes to our CI configuration files and scripts (example scopes: Travis, Circle, BrowserStack, SauceLabs) - docs: a commit of the type
docsadds documentation only changes - perf: a commit of the type
perfadds code change that improves performance - refactor: a commit of the type
refactoradds code change that neither fixes a bug nor adds a feature - revert: a commit of the type
revertreverts a previous commit - style: a commit of the type
styleadds code changes that do not affect the meaning of the code (white-space, formatting, missing semi-colons, etc) - test: a commit of the type
testadds missing tests or correcting existing tests
Base configuration used for this project is commitlint-config-conventional (based on the Angular convention)
If you are a developer using vscode, this plugin may be helpful.
detect-secrets-hook prevents new secrets from being introduced into the baseline. TODO: INSERT DOC LINK ABOUT HOOKS
In order for pre-commit hooks to work properly
- You need to have the pre-commit package manager installed. Here are the installation instructions.
pre-commitwould install all the hooks when commit message is added by default except forcommitlinthook.commitlinthook would need to be installed manually using the command below
pre-commit install --hook-type commit-msg
- For development/enhancements to this module locally, you'll need to install all of its components. This is controlled by the
configuretarget in the project'sMakefile. Before you can runconfigure, familiarize yourself with the variables in theMakefileand ensure they're pointing to the right places.
make configure
This adds in several files and directories that are ignored by git. They expose many new Make targets.
- The first target you care about is
env. This is the common interface for setting up environment variables. The values of the environment variables will be used to authenticate with cloud provider from local development workstation.
make configure command will bring down aws_env.sh file on local workstation. Developer would need to modify this file, replace the environment variable values with relevant values.
These environment variables are used by terratest integration suit.
Then run this make target to set the environment variables on developer workstation.
make env
- The first target you care about is
check.
Pre-requisites
Before running this target it is important to ensure that, developer has created files mentioned below on local workstation under root directory of git repository that contains code for primitives/segments. Note that these files are aws specific. If primitive/segment under development uses any other cloud provider than AWS, this section may not be relevant.
- A file named
provider.tfwith contents below
provider "aws" {
profile = "<profile_name>"
region = "<region_name>"
}
- A file named
terraform.tfvarswhich contains key value pair of variables used.
Note that since these files are added in gitignore they would not be checked in into primitive/segment's git repo.
After creating these files, for running tests associated with the primitive/segment, run
make check
If make check target is successful, developer is good to commit the code to primitive/segment's git repo.
make check target
- runs
terraform commandstolint,validateandplanterraform code. - runs
conftests.conftestsmake surepolicychecks are successful. - runs
terratest. This is integration test suit. - runs
opatests
Currently, the encrypt at transit is not supported in terraform. There is an open issue for this logged with Hashicorp - hashicorp/terraform-provider-aws#26987
| Name | Version |
|---|---|
| terraform | ~> 1.0 |
| aws | ~> 5.0 |
No providers.
| Name | Source | Version |
|---|---|---|
| zone | terraform-aws-modules/route53/aws//modules/zones | ~> 2.11.0 |
No resources.
| Name | Description | Type | Default | Required |
|---|---|---|---|---|
| zones | Map of Route53 zone parameters | map(object({ |
{} |
no |
| tags | Tags added to all zones. Will take precedence over tags from the 'zones' variable | map(string) |
{} |
no |
| Name | Description |
|---|---|
| route53_zone_zone_ids | Zone IDs of Route53 zones |
| route53_zone_zone_arns | Zone ARNs of Route53 zone |
| route53_zone_name_servers | Name servers of Route53 zone |
| route53_zone_names | Names of Route53 zone |
| route53_static_zone_names | Names of Route53 zone created statically to avoid invalid count argument error when creating records and zones simmultaneously |