You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_ami.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ami)| data source |
130
127
|[aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
131
-
|[template_file.ec2_user_data](https://registry.terraform.io/providers/hashicorp/template/latest/docs/data-sources/file)| data source |
132
128
133
129
## Inputs
134
130
@@ -137,7 +133,7 @@ No modules.
137
133
| <aname="input_allowed_cidr_blocks"></a> [allowed\_cidr\_blocks](#input\_allowed\_cidr\_blocks)| List of network subnets that are allowed. According to PCI-DSS, CIS AWS and SOC2 providing a default wide-open CIDR is not secure. |`list(string)`| n/a | yes |
138
134
| <aname="input_ami_id"></a> [ami\_id](#input\_ami\_id)| Optional AMI ID for Tailscale instance. Otherwise latest Amazon Linux will be used. One might want to lock this down to avoid unexpected upgrades. |`string`|`""`| no |
| <aname="input_asg"></a> [asg](#input\_asg)| Scaling settings of an Auto Scaling Group |`map(any)`| <pre>{<br/> "max_size": 1,<br/> "min_size": 1<br/>}</pre> | no |
136
+
| <aname="input_asg"></a> [asg](#input\_asg)| Scaling settings of an Auto Scaling Group |`map(any)`| <pre>{<br> "max_size": 1,<br> "min_size": 1<br>}</pre> | no |
141
137
| <aname="input_ec2_key_pair_name"></a> [ec2\_key\_pair\_name](#input\_ec2\_key\_pair\_name)| EC2 key pair name to use for Tailscale instance |`string`| n/a | yes |
| <aname="input_ext_security_groups"></a> [ext\_security\_groups](#input\_ext\_security\_groups)| External security groups to add to the Tailscale instance |`list(any)`|`[]`| no |
@@ -152,7 +148,7 @@ No modules.
152
148
| <aname="input_ssm_role_arn"></a> [ssm\_role\_arn](#input\_ssm\_role\_arn)| SSM role to attach to a Tailscale instance |`string`|`"arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM"`| no |
153
149
| <aname="input_subnets"></a> [subnets](#input\_subnets)| Subnets where the Taiscale instance will be placed. It is recommended to use a private subnet for better security. |`list(string)`| n/a | yes |
154
150
| <aname="input_tags"></a> [tags](#input\_tags)| AWS tags for the Tailscale instance |`map(string)`|`{}`| no |
155
-
| <aname="input_tailscale_tags"></a> [tailscale\_tags](#input\_tailscale\_tags)| List of Tailscale tags for the Tailnet device. It would be automatically tagged when it is authenticated with this key |`set(string)`|`[]`| no |
151
+
| <aname="input_tailscale_tags"></a> [tailscale\_tags](#input\_tailscale\_tags)| List of Tailscale tags for the Tailnet device. It would be automatically tagged when it is authenticated with this key |`list(string)`|`[]`| no |
156
152
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| VPC ID where the Tailscale instance will be placed |`string`| n/a | yes |
0 commit comments