Skip to content

Commit a6fa71f

Browse files
authored
Merge pull request #780 from DFE-Digital/remove-cdn-frontdoor
Remove CDN Front Door
2 parents 9b94888 + 0fea166 commit a6fa71f

File tree

5 files changed

+44
-21
lines changed

5 files changed

+44
-21
lines changed

terraform/.terraform.lock.hcl

Lines changed: 13 additions & 13 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

terraform/README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ No providers.
137137

138138
| Name | Source | Version |
139139
|------|--------|---------|
140-
| <a name="module_azure_container_apps_hosting"></a> [azure\_container\_apps\_hosting](#module\_azure\_container\_apps\_hosting) | github.com/DFE-Digital/terraform-azurerm-container-apps-hosting | v1.16.3 |
140+
| <a name="module_azure_container_apps_hosting"></a> [azure\_container\_apps\_hosting](#module\_azure\_container\_apps\_hosting) | github.com/DFE-Digital/terraform-azurerm-container-apps-hosting | v1.16.5 |
141141
| <a name="module_azurerm_key_vault"></a> [azurerm\_key\_vault](#module\_azurerm\_key\_vault) | github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars | v0.5.1 |
142142
| <a name="module_data_protection"></a> [data\_protection](#module\_data\_protection) | github.com/DFE-Digital/terraform-azurerm-aspnet-data-protection | v1.2.0 |
143143
| <a name="module_statuscake-tls-monitor"></a> [statuscake-tls-monitor](#module\_statuscake-tls-monitor) | github.com/dfe-digital/terraform-statuscake-tls-monitor | v0.1.5 |
@@ -176,13 +176,14 @@ No resources.
176176
| <a name="input_container_secret_environment_variables"></a> [container\_secret\_environment\_variables](#input\_container\_secret\_environment\_variables) | Container secret environment variables | `map(string)` | n/a | yes |
177177
| <a name="input_create_container_app_blob_storage_sas"></a> [create\_container\_app\_blob\_storage\_sas](#input\_create\_container\_app\_blob\_storage\_sas) | Generate a SAS connection string that is exposed to your App as an environment variable so that it can connect to the Storage Account | `bool` | `false` | no |
178178
| <a name="input_dns_a_records"></a> [dns\_a\_records](#input\_dns\_a\_records) | DNS A records to add to the DNS Zone | <pre>map(<br/> object({<br/> ttl : optional(number, 300),<br/> records : list(string)<br/> })<br/> )</pre> | n/a | yes |
179+
| <a name="input_dns_alias_records"></a> [dns\_alias\_records](#input\_dns\_alias\_records) | DNS ALIAS records to add to the DNS Zone | <pre>map(<br/> object({<br/> ttl : optional(number, 300),<br/> target_resource_id : string<br/> })<br/> )</pre> | `{}` | no |
179180
| <a name="input_dns_mx_records"></a> [dns\_mx\_records](#input\_dns\_mx\_records) | DNS MX records to add to the DNS Zone | <pre>map(<br/> object({<br/> ttl : optional(number, 300),<br/> records : list(<br/> object({<br/> preference : number,<br/> exchange : string<br/> })<br/> )<br/> })<br/> )</pre> | `{}` | no |
180181
| <a name="input_dns_ns_records"></a> [dns\_ns\_records](#input\_dns\_ns\_records) | DNS NS records to add to the DNS Zone | <pre>map(<br/> object({<br/> ttl : optional(number, 300),<br/> records : list(string)<br/> })<br/> )</pre> | n/a | yes |
181182
| <a name="input_dns_txt_records"></a> [dns\_txt\_records](#input\_dns\_txt\_records) | DNS TXT records to add to the DNS Zone | <pre>map(<br/> object({<br/> ttl : optional(number, 300),<br/> records : list(string)<br/> })<br/> )</pre> | n/a | yes |
182183
| <a name="input_dns_zone_domain_name"></a> [dns\_zone\_domain\_name](#input\_dns\_zone\_domain\_name) | DNS zone domain name. If created, records will automatically be created to point to the CDN. | `string` | n/a | yes |
183184
| <a name="input_enable_cdn_frontdoor"></a> [enable\_cdn\_frontdoor](#input\_enable\_cdn\_frontdoor) | Enable Azure CDN Front Door. This will use the Container Apps endpoint as the origin. | `bool` | n/a | yes |
184185
| <a name="input_enable_cdn_frontdoor_health_probe"></a> [enable\_cdn\_frontdoor\_health\_probe](#input\_enable\_cdn\_frontdoor\_health\_probe) | Enable CDN Front Door health probe | `bool` | `false` | no |
185-
| <a name="input_enable_cdn_frontdoor_vdp_redirects"></a> [enable\_cdn\_frontdoor\_vdp\_redirects](#input\_enable\_cdn\_frontdoor\_vdp\_redirects) | Deploy redirects for security.txt and thanks.txt to an external Vulnerability Disclosure Program service | `bool` | `true` | no |
186+
| <a name="input_enable_cdn_frontdoor_vdp_redirects"></a> [enable\_cdn\_frontdoor\_vdp\_redirects](#input\_enable\_cdn\_frontdoor\_vdp\_redirects) | Deploy redirects for security.txt and thanks.txt to an external Vulnerability Disclosure Program service | `bool` | `false` | no |
186187
| <a name="input_enable_container_app_blob_storage"></a> [enable\_container\_app\_blob\_storage](#input\_enable\_container\_app\_blob\_storage) | Create an Azure Storage Account and Storage Container to be accessed by the Container App | `bool` | n/a | yes |
187188
| <a name="input_enable_container_app_file_share"></a> [enable\_container\_app\_file\_share](#input\_enable\_container\_app\_file\_share) | Create an Azure Storage Account and File Share to be mounted to the Container Apps | `bool` | n/a | yes |
188189
| <a name="input_enable_container_health_probe"></a> [enable\_container\_health\_probe](#input\_enable\_container\_health\_probe) | Enable liveness probes for the Container | `bool` | `true` | no |
@@ -203,6 +204,7 @@ No resources.
203204
| <a name="input_image_name"></a> [image\_name](#input\_image\_name) | Image name | `string` | n/a | yes |
204205
| <a name="input_key_vault_access_ipv4"></a> [key\_vault\_access\_ipv4](#input\_key\_vault\_access\_ipv4) | List of IPv4 Addresses that are permitted to access the Key Vault | `list(string)` | n/a | yes |
205206
| <a name="input_monitor_email_receivers"></a> [monitor\_email\_receivers](#input\_monitor\_email\_receivers) | A list of email addresses that should be notified by monitoring alerts | `list(string)` | n/a | yes |
207+
| <a name="input_monitor_http_availability_fqdn"></a> [monitor\_http\_availability\_fqdn](#input\_monitor\_http\_availability\_fqdn) | Specify a FQDN to monitor for HTTP Availability. Leave unset to dynamically calculate the correct FQDN | `string` | `""` | no |
206208
| <a name="input_project_name"></a> [project\_name](#input\_project\_name) | Project name. Will be used along with `environment` as a prefix for all resources. | `string` | n/a | yes |
207209
| <a name="input_redis_cache_sku"></a> [redis\_cache\_sku](#input\_redis\_cache\_sku) | Redis Cache SKU | `string` | `"Basic"` | no |
208210
| <a name="input_registry_admin_enabled"></a> [registry\_admin\_enabled](#input\_registry\_admin\_enabled) | Do you want to enable access key based authentication for your Container Registry? | `bool` | `true` | no |

terraform/container-apps-hosting.tf

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "azure_container_apps_hosting" {
2-
source = "github.com/DFE-Digital/terraform-azurerm-container-apps-hosting?ref=v1.16.3"
2+
source = "github.com/DFE-Digital/terraform-azurerm-container-apps-hosting?ref=v1.16.5"
33

44
environment = local.environment
55
project_name = local.project_name
@@ -38,6 +38,7 @@ module "azure_container_apps_hosting" {
3838
dns_ns_records = local.dns_ns_records
3939
dns_txt_records = local.dns_txt_records
4040
dns_a_records = local.dns_a_records
41+
dns_alias_records = local.dns_alias_records
4142
dns_mx_records = local.dns_mx_records
4243

4344
enable_cdn_frontdoor = local.enable_cdn_frontdoor
@@ -57,10 +58,11 @@ module "azure_container_apps_hosting" {
5758
enable_cdn_frontdoor_vdp_redirects = local.enable_cdn_frontdoor_vdp_redirects
5859
cdn_frontdoor_vdp_destination_hostname = local.cdn_frontdoor_vdp_destination_hostname
5960

60-
enable_monitoring = local.enable_monitoring
61-
monitor_email_receivers = local.monitor_email_receivers
62-
existing_logic_app_workflow = local.existing_logic_app_workflow
63-
enable_container_health_probe = local.enable_container_health_probe
61+
enable_monitoring = local.enable_monitoring
62+
monitor_email_receivers = local.monitor_email_receivers
63+
existing_logic_app_workflow = local.existing_logic_app_workflow
64+
enable_container_health_probe = local.enable_container_health_probe
65+
monitor_http_availability_fqdn = local.monitor_http_availability_fqdn
6466

6567
enable_container_app_blob_storage = local.enable_container_app_blob_storage
6668
create_container_app_blob_storage_sas = local.create_container_app_blob_storage_sas

terraform/locals.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ locals {
2626
dns_txt_records = var.dns_txt_records
2727
dns_a_records = var.dns_a_records
2828
dns_mx_records = var.dns_mx_records
29+
dns_alias_records = var.dns_alias_records
2930
restrict_container_apps_to_cdn_inbound_only = var.restrict_container_apps_to_cdn_inbound_only
3031
container_apps_allow_ips_inbound = var.container_apps_allow_ips_inbound
3132
cdn_frontdoor_enable_rate_limiting = var.cdn_frontdoor_enable_rate_limiting
@@ -64,4 +65,5 @@ locals {
6465
health_insights_api_ipv4_allow_list = var.health_insights_api_ipv4_allow_list
6566
enable_cdn_frontdoor_vdp_redirects = var.enable_cdn_frontdoor_vdp_redirects
6667
cdn_frontdoor_vdp_destination_hostname = var.cdn_frontdoor_vdp_destination_hostname
68+
monitor_http_availability_fqdn = var.monitor_http_availability_fqdn
6769
}

terraform/variables.tf

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -409,7 +409,7 @@ variable "health_insights_api_ipv4_allow_list" {
409409
variable "enable_cdn_frontdoor_vdp_redirects" {
410410
description = "Deploy redirects for security.txt and thanks.txt to an external Vulnerability Disclosure Program service"
411411
type = bool
412-
default = true
412+
default = false
413413
}
414414

415415
variable "cdn_frontdoor_vdp_destination_hostname" {
@@ -423,3 +423,20 @@ variable "container_port" {
423423
type = number
424424
default = 8080
425425
}
426+
427+
variable "dns_alias_records" {
428+
description = "DNS ALIAS records to add to the DNS Zone"
429+
type = map(
430+
object({
431+
ttl : optional(number, 300),
432+
target_resource_id : string
433+
})
434+
)
435+
default = {}
436+
}
437+
438+
variable "monitor_http_availability_fqdn" {
439+
description = "Specify a FQDN to monitor for HTTP Availability. Leave unset to dynamically calculate the correct FQDN"
440+
type = string
441+
default = ""
442+
}

0 commit comments

Comments
 (0)