Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
T
terraform-aws-vpc
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Container Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Terraform Modules
terraform-aws-vpc
Commits
6b765ba0
Unverified
Commit
6b765ba0
authored
Sep 15, 2020
by
Ilia Lazebnik
Committed by
GitHub
Sep 15, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
feat: add enable_public_s3_endpoint variable for S3 VPC Endpoint for public subnets (#502)
parent
5c60272e
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
8 additions
and
1 deletion
+8
-1
README.md
README.md
+1
-0
variables.tf
variables.tf
+6
-0
vpc-endpoints.tf
vpc-endpoints.tf
+1
-1
No files found.
README.md
View file @
6b765ba0
...
@@ -442,6 +442,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
...
@@ -442,6 +442,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| enable
\_
monitoring
\_
endpoint | Should be true if you want to provision a CloudWatch Monitoring endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
monitoring
\_
endpoint | Should be true if you want to provision a CloudWatch Monitoring endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
nat
\_
gateway | Should be true if you want to provision NAT Gateways for each of your private networks |
`bool`
|
`false`
| no |
| enable
\_
nat
\_
gateway | Should be true if you want to provision NAT Gateways for each of your private networks |
`bool`
|
`false`
| no |
| enable
\_
public
\_
redshift | Controls if redshift should have public routing table |
`bool`
|
`false`
| no |
| enable
\_
public
\_
redshift | Controls if redshift should have public routing table |
`bool`
|
`false`
| no |
| enable
\_
public
\_
s3
\_
endpoint | Whether to enable S3 VPC Endpoint for public subnets |
`bool`
|
`true`
| no |
| enable
\_
qldb
\_
session
\_
endpoint | Should be true if you want to provision an QLDB Session endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
qldb
\_
session
\_
endpoint | Should be true if you want to provision an QLDB Session endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
rds
\_
endpoint | Should be true if you want to provision an RDS endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
rds
\_
endpoint | Should be true if you want to provision an RDS endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
rekognition
\_
endpoint | Should be true if you want to provision a Rekognition endpoint to the VPC |
`bool`
|
`false`
| no |
| enable
\_
rekognition
\_
endpoint | Should be true if you want to provision a Rekognition endpoint to the VPC |
`bool`
|
`false`
| no |
...
...
variables.tf
View file @
6b765ba0
...
@@ -304,6 +304,12 @@ variable "external_nat_ips" {
...
@@ -304,6 +304,12 @@ variable "external_nat_ips" {
default
=
[]
default
=
[]
}
}
variable
"enable_public_s3_endpoint"
{
description
=
"Whether to enable S3 VPC Endpoint for public subnets"
default
=
true
type
=
bool
}
variable
"enable_dynamodb_endpoint"
{
variable
"enable_dynamodb_endpoint"
{
description
=
"Should be true if you want to provision a DynamoDB endpoint to the VPC"
description
=
"Should be true if you want to provision a DynamoDB endpoint to the VPC"
type
=
bool
type
=
bool
...
...
vpc-endpoints.tf
View file @
6b765ba0
...
@@ -30,7 +30,7 @@ resource "aws_vpc_endpoint_route_table_association" "intra_s3" {
...
@@ -30,7 +30,7 @@ resource "aws_vpc_endpoint_route_table_association" "intra_s3" {
}
}
resource
"aws_vpc_endpoint_route_table_association"
"public_s3"
{
resource
"aws_vpc_endpoint_route_table_association"
"public_s3"
{
count
=
var
.
create_vpc
&&
var
.
enable_s3_endpoint
&&
length
(
var
.
public_subnets
)
>
0
?
1
:
0
count
=
var
.
create_vpc
&&
var
.
enable_s3_endpoint
&&
var
.
enable_public_s3_endpoint
&&
length
(
var
.
public_subnets
)
>
0
?
1
:
0
vpc_endpoint_id
=
aws_vpc_endpoint
.
s3
[
0
]
.
id
vpc_endpoint_id
=
aws_vpc_endpoint
.
s3
[
0
]
.
id
route_table_id
=
aws_route_table
.
public
[
0
]
.
id
route_table_id
=
aws_route_table
.
public
[
0
]
.
id
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment