Skip to content

Commit b42631e

Browse files
committed
docs(infra): edit readme for infra and use default hotosm certs
1 parent 419ce94 commit b42631e

3 files changed

Lines changed: 19 additions & 18 deletions

File tree

scripts/aws/infra/develop/non-purgeable/cloudfront/terragrunt.hcl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ inputs = {
2121
s3_bucket_name = dependency.s3.outputs.bucket_name
2222
create_s3_bucket_policy = true
2323

24-
aliases = split(" ", get_env("CLOUDFRONT_DIST_ALIASES", "tm-ecs-frontend.naxa.com.np"))
24+
aliases = split(" ", get_env("CLOUDFRONT_DIST_ALIASES", "tasks-dev.hotosm.org"))
2525

2626
# CloudFront configuration
2727
enabled = true
@@ -68,5 +68,5 @@ inputs = {
6868
# SSL/TLS configuration
6969
use_default_certificate = false
7070
# If use_default_certificate is false, provide these:
71-
acm_certificate_arn = get_env("ACM_TLS_CERT_FRONTEND_ARN", "arn:aws:acm:us-east-1:685797548389:certificate/586132c9-5170-4cf9-85a0-68168e1387c4")
71+
acm_certificate_arn = get_env("ACM_TLS_CERT_FRONTEND_ARN", "arn:aws:acm:us-east-1:670261699094:certificate/1d74321b-1e5b-4e31-b97a-580deb39c539")
7272
}
Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1+
# ================ GHActions-START ================
12
# Environment required for CICD pipeline. Env here is not used for app but rather Infra deployment via CI or manual run.
23

3-
# GHActions
4-
5-
# ==== VARIABLES ====
6-
IMAGE_NAME=hotosm/tasking-manager-backend
7-
AWS_REGION=us-east-1
8-
9-
# INFRA_TEAM=hotosm # optional if you want to override the team name
4+
# ==== VARIABLES-START ====
5+
# Env-Variables (Redundant per environment) START
6+
IMAGE_NAME=hotosm/tasking-manager-backend # [optional] image name for CI
7+
FE_S3_BUCKET="your-s3-bucket-name" # mandatory frontend bucket name for CI
8+
FE_CLOUDFRONT_DISTRIBUTION_ID = 'EXxxxxxxxxx' # your cloudfront distribution id for CI
9+
# Env-Variables (Redundant per environment) END
1010

1111
# ==== VARIABLES-END ====
1212

@@ -16,11 +16,12 @@ AWS_OIDC_ROLE_ARN=arn:aws:iam::123456789012:role/YOUR_ROLE_NAME
1616
PLAN_FILE_ENCRYPTION_SECRET=UNSAFESTRINGUSEDUSECUSTOMSECRETKEY
1717
# ==== SECRETS-END ====
1818

19-
# Env-Variables (Redundant per environment)
20-
FE_S3_BUCKET="your-s3-bucket-name" # frontend bucket name for ci
21-
FE_CLOUDFRONT_DISTRIBUTION_ID = 'EXxxxxxxxxx' #your cloudfront distribution id
22-
ACM_TLS_CERT_BACKEND_ARN=arn:aws:acm:EU-east-66:123456789:certificate/ARN_EXAMPLE
23-
ACM_TLS_CERT_FRONTEND_ARN=arn:aws:acm:EU-east-66:123456789:certificate/ARN_EXAMPLE
24-
# Env-Variables (Redundant per environment) END
19+
# ================ GHActions-END ================
2520

26-
# GHActions-END
21+
# ================ INFRA-START ================
22+
# Environment here are for infra application via CI
23+
INFRA_TEAM=hotosm # [optional] if you want to override the team name
24+
ACM_TLS_CERT_FRONTEND_ARN=arn:aws:acm:EU-east-66:123456789:certificate/ARN_EXAMPLE # [optional] ACM certificate for FRONTEND
25+
ACM_TLS_CERT_BACKEND_ARN=arn:aws:acm:EU-east-66:123456789:certificate/ARN_EXAMPLE # [optional] ACM certificate for BACKEND
26+
CLOUDFRONT_DIST_ALIASES="tasks.example.com more.example.com more2.example.com" # [optional] hostname for cloudfront. Your ACM should support it else fails.
27+
# ================ INFRA-END ================

scripts/aws/infra/staging/non-purgeable/cloudfront/terragrunt.hcl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ inputs = {
2121
s3_bucket_name = dependency.s3.outputs.bucket_name
2222
create_s3_bucket_policy = true
2323

24-
aliases = split(" ", get_env("CLOUDFRONT_DIST_ALIASES", "tm-ecs-frontend.naxa.com.np"))
24+
aliases = split(" ", get_env("CLOUDFRONT_DIST_ALIASES", "tasks-stage.hotosm.org"))
2525

2626
# CloudFront configuration
2727
enabled = true
@@ -68,5 +68,5 @@ inputs = {
6868
# SSL/TLS configuration
6969
use_default_certificate = false
7070
# If use_default_certificate is false, provide these:
71-
acm_certificate_arn = get_env("ACM_TLS_CERT_FRONTEND_ARN", "arn:aws:acm:us-east-1:685797548389:certificate/586132c9-5170-4cf9-85a0-68168e1387c4")
71+
acm_certificate_arn = get_env("ACM_TLS_CERT_FRONTEND_ARN", "arn:aws:acm:us-east-1:670261699094:certificate/1d74321b-1e5b-4e31-b97a-580deb39c539")
7272
}

0 commit comments

Comments
 (0)