Skip to content

Commit

Permalink
api gateway - rota clientes
Browse files Browse the repository at this point in the history
  • Loading branch information
jacksonwc2 authored Nov 23, 2024
1 parent 06f3272 commit 65c4b65
Show file tree
Hide file tree
Showing 3 changed files with 31 additions and 38 deletions.
63 changes: 28 additions & 35 deletions infra/apigateway.tf
Original file line number Diff line number Diff line change
@@ -1,45 +1,38 @@
# # VPC Link para integração do load balancer interno com api gateway
# resource "aws_apigatewayv2_vpc_link" "fiap_vpc_link" {
# name = "FiapVpcLink"
# security_group_ids = [aws_security_group.eks_security_group.id]
# subnet_ids = concat(module.vpc.private_subnets, module.vpc.public_subnets)
# }

# # API Gateway para acesso a aplicação
# resource "aws_apigatewayv2_api" "fiap_api" {
# name = "Fiap Self Service API"
# protocol_type = "HTTP"
# }

# # Integracao com load balance do EKS
# resource "aws_apigatewayv2_integration" "fiap_api" {
# api_id = aws_apigatewayv2_api.fiap_api.id
# integration_type = "HTTP_PROXY"

# integration_method = "ANY"
# integration_uri = var.url_load_balance
# }

# # Rota default que serve como proxy, redirecionando a chamada do API Gateway para os endpoints expostos pelo load balance
# resource "aws_apigatewayv2_route" "fiap_api" {
# api_id = aws_apigatewayv2_api.fiap_api.id
# route_key = "$default"
# API Gateway para acesso a aplicação
resource "aws_apigatewayv2_api" "fiap_api" {
name = "Fiap Self Service API"
protocol_type = "HTTP"
}

# Integracao com load balance do EKS
resource "aws_apigatewayv2_integration" "fiap_api_clientes" {
api_id = aws_apigatewayv2_api.fiap_api.id
integration_type = "HTTP_PROXY"

integration_method = "ANY"
integration_uri = var.url_load_balance_clientes
}

# Rota default que serve como proxy, redirecionando a chamada do API Gateway para os endpoints expostos pelo load balance
resource "aws_apigatewayv2_route" "fiap_api_clientes" {
api_id = aws_apigatewayv2_api.fiap_api.id
route_key = "/clientes/$default"

# # Vinculando o Authorizer à Rota
# authorization_type = "JWT"
# authorizer_id = aws_apigatewayv2_authorizer.cognito_authorizer.id

# target = "integrations/${aws_apigatewayv2_integration.fiap_api.id}"
# }
target = "integrations/${aws_apigatewayv2_integration.fiap_api_clientes.id}"
}

# # Stage (prefixo, anterior ao path/endpoint que será acionado pelo load balance )
# resource "aws_apigatewayv2_stage" "fiap_api" {
# api_id = aws_apigatewayv2_api.fiap_api.id
# name = "v1"
# auto_deploy = true
# }
# Stage (prefixo, anterior ao path/endpoint que será acionado pelo load balance )
resource "aws_apigatewayv2_stage" "fiap_api" {
api_id = aws_apigatewayv2_api.fiap_api.id
name = "v1"
auto_deploy = true
}

# # Criação do Authorizer
# Criação do Authorizer
# resource "aws_apigatewayv2_authorizer" "cognito_authorizer" {
# api_id = aws_apigatewayv2_api.fiap_api.id
# name = "CognitoAuthorizer"
Expand Down
2 changes: 1 addition & 1 deletion infra/variaveis.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,6 @@ variable "iam_role_arn" {
type = string
}

variable "url_load_balance" {
variable "url_load_balance_clientes" {
type = string
}
4 changes: 2 additions & 2 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,5 +6,5 @@ module "k8s" {
zone_az1 = "us-east-1a"
zone_az2 = "us-east-1b"
iam_role_arn = "arn:aws:iam::629468475927:role/LabRole"
url_load_balance = "http://aadfa33dba232459c953a70b3381a909-617e9a439eaa8419.elb.us-east-1.amazonaws.com:3000"
}
url_load_balance_clientes = "http://ab2d76323dda749e2a825b9d7eb44e5e-95224636.us-east-1.elb.amazonaws.com:3000"
}

0 comments on commit 65c4b65

Please sign in to comment.