Terraform module which creates a security group with the latest IPs CIDRs from Cloudflare
module "vpc" {
source = "github.com/nickyamanaka/terraform-cloudflare-sg?ref=v1.0.1"
name = "cloudflare"
vpc_id = "vpc-xxxxxxxxxxxxxxxxx"
tags = {
Terraform = "true"
Environment = "dev"
}
}
No requirements.
Name | Version |
---|---|
aws | n/a |
No modules.
Name | Type |
---|---|
aws_ec2_managed_prefix_list.cloudflare_ipv4 | resource |
aws_ec2_managed_prefix_list.cloudflare_ipv6 | resource |
aws_security_group.cloudflare | resource |
aws_security_group_rule.cloudflare_sg_ingress_ipv4 | resource |
aws_security_group_rule.cloudflare_sg_ingress_ipv6 | resource |
Name | Description | Type | Default | Required |
---|---|---|---|---|
cloudflare_ipv4_pl_name | Name for the pl | string |
"Cloudflare IPv4" |
no |
cloudflare_ipv6_pl_name | Name for the pl | string |
"Cloudflare IPv6" |
no |
description | Security Group description | string |
"Cloudflare" |
no |
from_port | Start port to allow, defaults to all | number |
0 |
no |
name | Name for the security group, conflicts with name_prefix |
string |
"" |
no |
name_prefix | Name prefix for the security group, conflicts with name |
string |
"" |
no |
protocol | Protocol to allow, defaults to all | string |
"-1" |
no |
revoke_rules_on_delete | Instruct Terraform to revoke all of the Security Groups attached ingress and egress rules before deleting the rule itself | bool |
true |
no |
tags | A map of tags to add to all resources | map(string) |
{} |
no |
to_port | End port to allow, defaults to all | number |
0 |
no |
vpc_id | VPC ID to attach the security group | string |
n/a | yes |
Name | Description |
---|---|
cloudflare_ipv4_pl | Cloudflare IPv4 pl |
cloudflare_ipv6_pl | Cloudflare IPv6 pl |
cloudflare_sg | Cloudflare Security Group |
cloudflare_sg_id | Cloudflare Security Group ID |