-
Notifications
You must be signed in to change notification settings - Fork 1
/
variables.tf
148 lines (136 loc) · 3.47 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
variable "name_prefix" {
description = "Prefix to attach to the name of every resource."
}
# VPC variables
variable "vpc_cidr" {
description = "CIDR range for the created VPC."
}
variable "dedicated_instances" {
type = bool
default = false
description = "Whether instances in the VPC are dedicated by default or not."
}
variable "enable_dns_support" {
type = bool
default = true
description = "Flag to enable/disable an AWS-provided DNS server within the VPC."
}
variable "enable_dns_hostnames" {
type = bool
default = false
description = "Flag to enable/disable public DNS hostnames for public IP addresses of instances in the VPC."
}
# Subnet variables
variable "availability_zones" {
type = list(string)
default = []
description = "Availability zones for subnets. Defaults to all availability zones in the current region."
}
variable "create_public" {
type = bool
default = true
description = "Creates public subnets in the given availability zones. Will create a NAT gateway per availability zone if private subnets enabled."
}
variable "map_public_subnet_public_ips" {
type = bool
default = false
description = "Maps public subnets with public IPv4 addresses on launch."
}
variable "create_private" {
type = bool
default = true
description = "Creates private subnets in the given availability zones. Will connect to public NAT gateways if public subnets also enabled."
}
# ACL Rules
variable "acl_ingress_private" {
type = list(any)
default = [
{
rule_no = 100
from_port = 0
to_port = 0
cidr_block = "0.0.0.0/0"
action = "ALLOW"
protocol = -1
}
]
description = "Ingress ACL rules for all private subnets"
}
variable "acl_egress_private" {
type = list(any)
default = [
{
rule_no = 100
from_port = 0
to_port = 0
cidr_block = "0.0.0.0/0"
action = "ALLOW"
protocol = -1
}
]
description = "Egress ACL rules for all private subnets"
}
variable "acl_ingress_public" {
type = list(any)
default = [
{
rule_no = 100
from_port = 0
to_port = 0
cidr_block = "0.0.0.0/0"
action = "ALLOW"
protocol = -1
}
]
description = "Ingress ACL rules for all public subnets"
}
variable "acl_egress_public" {
type = list(any)
default = [
{
rule_no = 100
from_port = 0
to_port = 0
cidr_block = "0.0.0.0/0"
action = "ALLOW"
protocol = -1
}
]
description = "Egress ACL rules for all public subnets"
}
# Tags
variable "tags_default" {
type = map(string)
default = {}
description = "Tags to apply to all resources."
}
variable "tags_vpc" {
type = map(string)
default = {}
description = "Tags to apply to the VPC resource."
}
variable "tags_subnets" {
type = map(string)
default = {}
description = "Tags to apply to all subnets"
}
variable "tags_route_table" {
type = map(string)
default = {}
description = "Tags to apply to all route tables"
}
variable "tags_ngw" {
type = map(string)
default = {}
description = "Tags to apply to all NAT gateways"
}
variable "tags_igw" {
type = map(string)
default = {}
description = "Tags to apply to the internet gateway"
}
variable "tags_acl" {
type = map(string)
default = {}
description = "Tags to apply to any ACL rules created"
}