Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.0" lastModifiedVersion="0.22.3"/>

# Network ACL Inbound Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand All @@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
an ACL, but also the ephemeral outbound ports for return traffic.

See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening
outbound ports.

## What's a Network ACL?
Expand All @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow

module "network_acl_inbound" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -134,7 +134,7 @@ module "network_acl_inbound" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.0"
}

inputs = {
Expand Down Expand Up @@ -221,11 +221,11 @@ inputs = {
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-inbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-inbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-inbound/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "97f140b6551117baf77a4dd67d61ff81"
"hash": "00fe132003e9ad9814131799145389a8"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.0" lastModifiedVersion="0.22.3"/>

# Network ACL Outbound Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand All @@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
outbound to an ACL, but also the ephemeral inbound ports for return traffic.

See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening
inbound ports.

## What's a Network ACL?
Expand All @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow

module "network_acl_outbound" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -134,7 +134,7 @@ module "network_acl_outbound" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.0"
}

inputs = {
Expand Down Expand Up @@ -221,11 +221,11 @@ inputs = {
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-outbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-outbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-outbound/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "eac4ab274f9f275e391be84f8a8edeb9"
"hash": "869f8e09722683937a8e4b71a91a8ed0"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.0" lastModifiedVersion="0.22.3"/>

# Port Calculator Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand Down Expand Up @@ -50,7 +50,7 @@ just those ports:

module "port_range_calculator" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -84,7 +84,7 @@ module "port_range_calculator" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.0"
}

inputs = {
Expand Down Expand Up @@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/port-range-calculator/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/port-range-calculator/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/port-range-calculator/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "1c169b636305afd4f82161bf21dd7b53"
"hash": "cff9ea9a076c5c0de41f46a99695d1aa"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.5"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.0" lastModifiedVersion="0.22.5"/>

# VPC-App Network ACLs Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app-network-acls" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.5" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

This Terraform Module adds a default set of [Network
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):

* **Public subnet**: Allow all requests.
Expand Down Expand Up @@ -92,7 +92,7 @@ module "network_acls" {

module "vpc_app_network_acls" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.26.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -211,7 +211,7 @@ module "vpc_app_network_acls" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.26.0"
}

inputs = {
Expand Down Expand Up @@ -625,11 +625,11 @@ Use this variable to ensure the Network ACL does not get created until the VPC i
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app-network-acls/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app-network-acls/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app-network-acls/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "e49d6bf1606fca84588abc2d6d4f32b7"
"hash": "4ef77d20a1f30d8429e8b0d27642467a"
}
##DOCS-SOURCER-END -->
Loading