-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmain.tf
More file actions
214 lines (187 loc) · 6.81 KB
/
main.tf
File metadata and controls
214 lines (187 loc) · 6.81 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
# Local Variables
locals {
firewall_rule_name = "AllowAllIPs"
resource_group_name = "${var.prefix}-rg"
sql_server_name = "${var.prefix}-sqlserver-${var.suffix}"
app_service_plan_name = "${var.prefix}-app-service-plan-${var.suffix}"
web_app_name = "${var.prefix}-webapp-${var.suffix}"
key_vault_name = "${var.prefix}-kv-${var.suffix}"
}
# Retrieve the current Azure client configuration
data "azurerm_client_config" "current" {}
# Create a resource group
resource "azurerm_resource_group" "example" {
name = local.resource_group_name
location = var.location
tags = var.tags
}
# Create a SQL server
resource "azurerm_mssql_server" "example" {
name = local.sql_server_name
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
administrator_login = var.administrator_login
administrator_login_password = var.administrator_login_password
minimum_tls_version = var.minimum_tls_version
public_network_access_enabled = var.public_network_access_enabled
outbound_network_restriction_enabled = var.outbound_network_restriction_enabled
version = var.sql_version
tags = var.tags
lifecycle {
ignore_changes = [
tags
]
}
}
# Create a firewall rule
resource "azurerm_mssql_firewall_rule" "example" {
name = local.firewall_rule_name
server_id = azurerm_mssql_server.example.id
start_ip_address = var.start_ip_address
end_ip_address = var.end_ip_address
}
# Create a database
resource "azurerm_mssql_database" "example" {
name = var.sql_database_name
server_id = azurerm_mssql_server.example.id
sku_name = var.sku.name
auto_pause_delay_in_minutes = var.auto_pause_delay
collation = var.collation
create_mode = var.create_mode
elastic_pool_id = var.elastic_pool_resource_id
max_size_gb = var.max_size_gb
min_capacity = var.min_capacity != "0" ? tonumber(var.min_capacity) : null
read_replica_count = var.high_availability_replica_count
read_scale = var.read_scale == "Enabled" ? true : false
zone_redundant = var.sql_database_zone_redundant
license_type = var.license_type
ledger_enabled = var.is_ledger_on
tags = var.tags
lifecycle {
ignore_changes = [
tags
]
}
}
# Create a service plan
resource "azurerm_service_plan" "example" {
name = local.app_service_plan_name
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
sku_name = var.sku_name
os_type = var.os_type
zone_balancing_enabled = var.zone_balancing_enabled
tags = var.tags
lifecycle {
ignore_changes = [
tags
]
}
}
# Create a web app
resource "azurerm_linux_web_app" "example" {
name = local.web_app_name
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
service_plan_id = azurerm_service_plan.example.id
https_only = var.https_only
public_network_access_enabled = var.webapp_public_network_access_enabled
client_affinity_enabled = false
tags = var.tags
identity {
type = "SystemAssigned"
}
site_config {
always_on = var.always_on
http2_enabled = var.http2_enabled
minimum_tls_version = var.minimum_tls_version
application_stack {
python_version = var.python_version
}
}
app_settings = {
SCM_DO_BUILD_DURING_DEPLOYMENT = "true"
ENABLE_ORYX_BUILD = "true"
KEY_VAULT_NAME = azurerm_key_vault.example.name
SECRET_NAME = azurerm_key_vault_secret.sql_connection_string.name
KEYVAULT_URI = azurerm_key_vault.example.vault_uri
CERT_NAME = azurerm_key_vault_certificate.example.name
LOGIN_NAME = var.login_name
}
lifecycle {
ignore_changes = [
tags
]
}
}
# Create a Key Vault
resource "azurerm_key_vault" "example" {
name = local.key_vault_name
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "standard"
enable_rbac_authorization = false
soft_delete_retention_days = 7
tags = var.tags
lifecycle {
ignore_changes = [
tags
]
}
}
# Grant the Web App managed identity access to Key Vault secrets and certificates
resource "azurerm_key_vault_access_policy" "web_app" {
key_vault_id = azurerm_key_vault.example.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = azurerm_linux_web_app.example.identity[0].principal_id
secret_permissions = [
"Get",
"List",
]
certificate_permissions = [
"Get",
]
}
# Create a Key Vault secret for SQL connection string
resource "azurerm_key_vault_secret" "sql_connection_string" {
name = var.secret_name
value = "Server=tcp:${azurerm_mssql_server.example.fully_qualified_domain_name},1433;Database=${azurerm_mssql_database.example.name};User ID=${var.sql_database_username};Password=${var.sql_database_password};Encrypt=yes;TrustServerCertificate=no;Connection Timeout=30;"
key_vault_id = azurerm_key_vault.example.id
}
# Create a self-signed certificate in Key Vault
resource "azurerm_key_vault_certificate" "example" {
name = var.cert_name
key_vault_id = azurerm_key_vault.example.id
certificate_policy {
issuer_parameters {
name = "Self"
}
key_properties {
exportable = true
key_size = 2048
key_type = "RSA"
reuse_key = false
}
secret_properties {
content_type = "application/x-pkcs12"
}
x509_certificate_properties {
subject = "CN=${var.cert_subject}"
validity_in_months = 12
key_usage = [
"digitalSignature",
"keyEncipherment",
]
}
}
}
# Deploy code from a public GitHub repo
resource "azurerm_app_service_source_control" "example" {
count = var.repo_url == "" ? 0 : 1
app_id = azurerm_linux_web_app.example.id
repo_url = var.repo_url
branch = "main"
use_manual_integration = true
use_mercurial = false
}