# Inspired by https://gist.github.com/danihodovic/a51eb0d9d4b29649c2d094f4251827dd provider "aws" { profile = "${var.aws_profile}" region = "${var.aws_region}" } provider "aws" { alias = "nvirginia" profile = "${var.aws_profile}" region = "us-east-1" } terraform { backend "s3" { region = "us-east-1" encrypt = true bucket = "terraform-state-bucket.rtfpessoa.xyz" dynamodb_table = "terraform-state-table" key = "diff2html.xyz" } } resource "aws_acm_certificate" "cert" { provider = "aws.nvirginia" domain_name = "${var.domain}" subject_alternative_names = ["*.${var.domain}"] validation_method = "DNS" lifecycle { create_before_destroy = true } } resource "aws_route53_record" "root_domain" { zone_id = "${var.hosted_zone_id}" name = "${var.domain}" type = "A" alias { name = "${aws_cloudfront_distribution.cdn.domain_name}" zone_id = "${aws_cloudfront_distribution.cdn.hosted_zone_id}" evaluate_target_health = false } } resource "aws_route53_record" "www_domain" { zone_id = "${var.hosted_zone_id}" name = "${local.www_domain}" type = "A" alias { name = "${aws_cloudfront_distribution.www_cdn.domain_name}" zone_id = "${aws_cloudfront_distribution.www_cdn.hosted_zone_id}" evaluate_target_health = false } } resource "aws_route53_record" "cert_validation" { zone_id = "${var.hosted_zone_id}" name = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_name}" type = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_type}" records = ["${aws_acm_certificate.cert.domain_validation_options.0.resource_record_value}"] ttl = 60 } resource "aws_acm_certificate_validation" "cert" { provider = "aws.nvirginia" certificate_arn = "${aws_acm_certificate.cert.arn}" validation_record_fqdns = ["${aws_route53_record.cert_validation.fqdn}"] } resource "aws_cloudfront_origin_access_identity" "origin_access_identity" { comment = "${var.domain} origin access identity" } locals { s3_origin_id = "S3-${var.domain}" s3_www_origin_id = "S3-www-${var.domain}" www_domain = "www.${var.domain}" } resource "aws_s3_bucket" "site" { bucket = "${var.domain}" acl = "private" policy = <