-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcloudfront.tf
More file actions
71 lines (61 loc) · 2.32 KB
/
cloudfront.tf
File metadata and controls
71 lines (61 loc) · 2.32 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
# tfsec:ignore:AWS045 - CloudFront access logging not required for simple redirect use case
# tfsec:ignore:AWS071 - WAF not required for simple redirect distributions
resource "aws_cloudfront_distribution" "records_wr" {
for_each = var.records_wr
enabled = true
http_version = "http2"
aliases = [each.key]
price_class = "PriceClass_100" # US, Canada, and Europe
origin {
origin_id = "origin-${each.key}"
domain_name = aws_s3_bucket_website_configuration.records_wr[each.key].website_endpoint
# Use custom_origin_config instead of s3_origin_config because:
# 1. S3 website endpoints don't support HTTPS origins
# 2. S3 website hosting is required for proper redirect behavior
# 3. This allows CloudFront to fetch from the S3 website endpoint over HTTP
custom_origin_config {
origin_protocol_policy = "http-only"
http_port = "80"
https_port = "443"
origin_ssl_protocols = ["TLSv1.2"]
}
# Authenticate CloudFront requests to S3 using custom User-Agent header
# This acts as a shared secret between CloudFront and S3 bucket policy
custom_header {
name = "User-Agent"
value = base64sha512("REFER-SECRET-19265125-${each.key}-43568442")
}
}
default_cache_behavior {
target_origin_id = "origin-${each.key}"
allowed_methods = ["DELETE", "GET", "HEAD", "OPTIONS", "PATCH", "POST", "PUT"]
cached_methods = ["GET", "HEAD"]
compress = true
# tfsec:ignore:AWS020 - Allow HTTP for redirect use case (CloudFront handles HTTPS)
# tfsec:ignore:AWS072 - Same as AWS020
viewer_protocol_policy = "allow-all"
min_ttl = 0
default_ttl = 300 # 5 minutes
max_ttl = 1200 # 20 minutes
forwarded_values {
query_string = false
cookies {
forward = "none"
}
}
}
restrictions {
geo_restriction {
restriction_type = "none"
}
}
viewer_certificate {
acm_certificate_arn = aws_acm_certificate_validation.records_wr[each.key].certificate_arn
ssl_support_method = "sni-only"
minimum_protocol_version = "TLSv1.2_2021" # tfsec:ignore:AWS021 - TLSv1.2 is acceptable for this use case
}
depends_on = [
aws_acm_certificate.records_wr,
aws_acm_certificate_validation.records_wr
]
}