From 7549567beb7491dbf1dc72206e8a23ffe9822c6d Mon Sep 17 00:00:00 2001 From: "docs-sourcer[bot]" <99042413+docs-sourcer[bot]@users.noreply.github.com> Date: Wed, 19 Jul 2023 00:54:25 +0000 Subject: [PATCH] Updated with the [latest changes](https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.25.0) from the `terraform-aws-vpc@v0.25.0` source branch. --- .../network-acl-inbound.md | 18 +++---- .../network-acl-outbound.md | 18 +++---- .../port-range-calculator.md | 16 +++--- .../vpc-app-network-acls.md | 18 +++---- .../terraform-aws-vpc/vpc-app/vpc-app.md | 24 ++++----- .../vpc-dns-forwarder-rules.md | 20 ++++---- .../vpc-dns-forwarder/vpc-dns-forwarder.md | 18 +++---- .../vpc-flow-logs/vpc-flow-logs.md | 16 +++--- .../vpc-interface-endpoint.md | 18 +++---- .../vpc-mgmt-network-acls.md | 18 +++---- .../terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md | 22 ++++---- .../vpc-peering-cross-accounts-accepter.md | 50 +++---------------- .../vpc-peering-cross-accounts-requester.md | 16 +++--- .../vpc-peering-external.md | 16 +++--- .../vpc-peering/vpc-peering.md | 38 ++++---------- 15 files changed, 138 insertions(+), 188 deletions(-) diff --git a/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md b/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md index 50c592e08b..2fca4da4ad 100644 --- a/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md +++ b/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Network ACL Inbound Terraform Module -View Source +View Source Release Notes @@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to an ACL, but also the ephemeral outbound ports for return traffic. -See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound) module for the analogous version of this module, but for opening +See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening outbound ports. ## What's a Network ACL? @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow module "network_acl_inbound" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -134,7 +134,7 @@ module "network_acl_inbound" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0" } inputs = { @@ -221,11 +221,11 @@ inputs = { diff --git a/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md b/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md index 521d78c373..57cf9a5a94 100644 --- a/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md +++ b/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Network ACL Outbound Terraform Module -View Source +View Source Release Notes @@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n which the remote services can use to respond. This can be very easy to forget, so this module adds not only the outbound to an ACL, but also the ephemeral inbound ports for return traffic. -See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound) module for the analogous version of this module, but for opening +See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening inbound ports. ## What's a Network ACL? @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow module "network_acl_outbound" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -134,7 +134,7 @@ module "network_acl_outbound" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0" } inputs = { @@ -221,11 +221,11 @@ inputs = { diff --git a/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md b/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md index 8ee7823e7c..ede700f621 100644 --- a/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md +++ b/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Port Calculator Module -View Source +View Source Release Notes @@ -50,7 +50,7 @@ just those ports: module "port_range_calculator" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -84,7 +84,7 @@ module "port_range_calculator" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0" } inputs = { @@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md b/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md index 5d6b23ef2d..f955b8f6e4 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md @@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC-App Network ACLs Terraform Module -View Source +View Source Release Notes This Terraform Module adds a default set of [Network ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the -[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC +[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)): * **Public subnet**: Allow all requests. @@ -92,7 +92,7 @@ module "network_acls" { module "vpc_app_network_acls" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -211,7 +211,7 @@ module "vpc_app_network_acls" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0" } inputs = { @@ -625,11 +625,11 @@ Use this variable to ensure the Network ACL does not get created until the VPC i diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md b/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md index 4a473fb14a..30d9e82a9a 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md @@ -9,16 +9,16 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC-App Terraform Module -View Source +View Source Release Notes This Terraform Module launches a single VPC meant to house applications. By contrast, DevOps-related services such as -Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt) module.) +Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt) module.) ## What's a VPC? @@ -58,8 +58,8 @@ To summarize: * In a given subnet tier, there are usually three or four actual subnets, one for each Availability Zone. * Therefore, if we created a single VPC in the `us-west-2` region, which has Availability Zones `us-west-2a`,`us-west-2b`, and `us-west-2c`, each subnet tier would have three subnets (one per Availability Zone) for a total of 9 subnets in all. -* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt), - which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-peering) to make this VPC accessible from the mgmt VPC. +* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt), + which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-peering) to make this VPC accessible from the mgmt VPC. * Philosophically, everything in a VPC should be isolated from all resources in any other VPC. In particular, we want to ensure that our stage environment is completely independent from prod. This architecture helps to reinforce that. @@ -74,7 +74,7 @@ nearly all use-cases, and is consistent with many examples and existing document ## Other VPC Core Concepts -Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints. +Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints. ## Sample Usage @@ -89,7 +89,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform- module "vpc_app" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -420,7 +420,7 @@ module "vpc_app" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.25.0" } inputs = { @@ -1452,11 +1452,11 @@ A map of all public subnets, with the subnet name as the key, and all `aws-subne diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md index 83e93f82f9..8fb52149b2 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md @@ -9,23 +9,23 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC DNS Forwarder Rules Terraform Module -View Source +View Source Release Notes This Terraform Module creates [Route 53 Resolver Forwarding Rules](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver-rules-managing.html) for a VPC that will -utilize Route 53 Resolver Endpoints created with the [vpc-dns-forwarder module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-dns-forwarder). These forwarding +utilize Route 53 Resolver Endpoints created with the [vpc-dns-forwarder module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-dns-forwarder). These forwarding rules, combined with Route 53 Resolvers, allow DNS queries for specific domains to be resolved by peered VPCs. ## How do you specify the hostnames that use the forwarder? By default, no DNS query will be routed through the Route 53 Resolvers created by the [vpc-dns-forwarder -module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-dns-forwarder). You need to create forwarding rules that specify which specific domains should be +module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-dns-forwarder). You need to create forwarding rules that specify which specific domains should be resolved through the Route 53 Resolvers so that they are resolved over the peering connection. You can use this module to construct the forwarding rules. @@ -72,7 +72,7 @@ forwarder rule, it will match any domain that ends with `.local` (note the dot), module "vpc_dns_forwarder_rules" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -126,7 +126,7 @@ module "vpc_dns_forwarder_rules" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.25.0" } inputs = { @@ -180,11 +180,11 @@ inputs = { diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md index b4d5492cad..b2d9cd4480 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC DNS Forwarder Terraform Module -View Source +View Source Release Notes @@ -47,7 +47,7 @@ private endpoints internal to the target VPC. By default, no DNS query will be routed through the Route 53 Resolvers created by this module. You need to create forwarding rules that specify which specific domains should be resolved through the Route 53 Resolvers created by this -module. You can use the [vpc-dns-forwarder-rules module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-dns-forwarder-rules) to construct the forwarding rules. +module. You can use the [vpc-dns-forwarder-rules module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-dns-forwarder-rules) to construct the forwarding rules. ## Sample Usage @@ -62,7 +62,7 @@ module. You can use the [vpc-dns-forwarder-rules module](https://github.com/grun module "vpc_dns_forwarder" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -138,7 +138,7 @@ module "vpc_dns_forwarder" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.25.0" } inputs = { @@ -380,11 +380,11 @@ The secondary IP address of the DNS resolver in the origin VPC. This is the IP t diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md b/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md index d681d1e4d8..4b4d6065d0 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC Flow Logs Terraform Module -View Source +View Source Release Notes @@ -86,7 +86,7 @@ TODO: Publish flow logs to an S3 bucket or CloudWatch Logs group in another acco module "vpc_flow_logs" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # OPTIONAL VARIABLES @@ -232,7 +232,7 @@ module "vpc_flow_logs" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.25.0" } inputs = { @@ -784,11 +784,11 @@ The name of the S3 bucket where flow logs are published. diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md b/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md index 1505ead112..2325669147 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Interface VPC Endpoint -View Source +View Source Release Notes @@ -193,7 +193,7 @@ Not specifying a rule allows all traffic. ## Other VPC Core Concepts -Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules//_docs/vpc-core-concepts.md) like subnets and NAT Gateways. +Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets and NAT Gateways. ## Sample Usage @@ -208,7 +208,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform- module "vpc_interface_endpoint" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -2023,7 +2023,7 @@ module "vpc_interface_endpoint" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.25.0" } inputs = { @@ -8331,11 +8331,11 @@ If you have private dns enabled, then your streaming calls would automatically g diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md index 4617d7da57..c4085fd848 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # \[DEPRECATED] VPC-Mgmt Network ACLs Terraform Module -View Source +View Source Release Notes @@ -28,7 +28,7 @@ aware that, in a future release, once we feel the new functionality in `vpc-app` This Terraform Module adds a default set of [Network ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the -[vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt) module. The ACLs enforce the following security settings (based on [A Reference VPC +[vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt) module. The ACLs enforce the following security settings (based on [A Reference VPC Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)): * **Public subnet**: Allow all requests. @@ -63,7 +63,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow module "vpc_mgmt_network_acls" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -142,7 +142,7 @@ module "vpc_mgmt_network_acls" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.25.0" } inputs = { @@ -345,11 +345,11 @@ The number to use for the first rule that is created by this module. All rules i diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md index bb1db8a9bd..e555ee853d 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # \[DEPRECATED] VPC-Mgmt Terraform Module -View Source +View Source Release Notes @@ -27,7 +27,7 @@ aware that, in a future release, once we feel the new functionality in `vpc-app` `vpc-mgmt` entirely. This Terraform Module launches a single VPC meant to house DevOps and other management services. By contrast, the apps -that power your business should run in an "app" VPC. (See the [vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app) module.) +that power your business should run in an "app" VPC. (See the [vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module.) ## What's a VPC? @@ -65,7 +65,7 @@ To summarize: ## VPC Peering -Learn more about VPC Peering in the [vpc-peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-peering) module. +Learn more about VPC Peering in the [vpc-peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-peering) module. ## SSH Access via the Bastion Host @@ -79,7 +79,7 @@ examples](https://github.com/gruntwork-io/terraform-aws-server/tree/main/example ## Other VPC Core Concepts -Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints. +Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints. ## Sample Usage @@ -94,7 +94,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform- module "vpc_mgmt" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -301,7 +301,7 @@ module "vpc_mgmt" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.25.0" } inputs = { @@ -1011,11 +1011,11 @@ A null_resource that indicates that the VPC is ready, including all of its resou diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md index 5144158c28..e43cf6af10 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # vpc-peering-cross-accounts-accepter -View Source +View Source Release Notes @@ -78,7 +78,7 @@ No modules. module "vpc_peering_cross_accounts_accepter" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -101,14 +101,6 @@ module "vpc_peering_cross_accounts_accepter" { # when queried from instances in the peer VPC. dns_resolution = false - # Allow a local linked EC2-Classic instance to communicate with instances in a - # peer VPC. - link_to_local_classic = false - - # Allow a local VPC to communicate with a linked EC2-Classic instance in a - # peer VPC. - link_to_remote_classic = false - # The timeout for the creation of the Route Tables. It defines how long to # wait for a route table to be created before considering the operation # failed. Ref: @@ -144,7 +136,7 @@ module "vpc_peering_cross_accounts_accepter" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.25.0" } inputs = { @@ -170,14 +162,6 @@ inputs = { # when queried from instances in the peer VPC. dns_resolution = false - # Allow a local linked EC2-Classic instance to communicate with instances in a - # peer VPC. - link_to_local_classic = false - - # Allow a local VPC to communicate with a linked EC2-Classic instance in a - # peer VPC. - link_to_remote_classic = false - # The timeout for the creation of the Route Tables. It defines how long to # wait for a route table to be created before considering the operation # failed. Ref: @@ -251,24 +235,6 @@ Allow a local VPC to resolve public DNS hostnames to private IP addresses when q - - - -Allow a local linked EC2-Classic instance to communicate with instances in a peer VPC. - - - - - - - - -Allow a local VPC to communicate with a linked EC2-Classic instance in a peer VPC. - - - - - @@ -331,11 +297,11 @@ Peering connection ID. diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md index 97d50c5c32..4d48d5b52a 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # vpc-peering-cross-accounts-requester -View Source +View Source Release Notes @@ -73,7 +73,7 @@ No modules. module "vpc_peering_cross_accounts_requester" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -131,7 +131,7 @@ module "vpc_peering_cross_accounts_requester" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.25.0" } inputs = { @@ -299,11 +299,11 @@ Peering connection ID. diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md index 174c603799..1bb1124ac5 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC Peering For External VPCs Module -View Source +View Source Release Notes @@ -87,7 +87,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow module "vpc_peering_external" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -202,7 +202,7 @@ module "vpc_peering_external" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.25.0" } inputs = { @@ -317,11 +317,11 @@ inputs = { diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md index ec68e9837e..f98fcb482e 100644 --- a/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md +++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md @@ -9,19 +9,19 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # VPC-Peering Terraform Module -View Source +View Source -Release Notes +Release Notes This Terraform Module creates [VPC Peering Connections](http://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/Welcome.html) between VPCs. Normally, VPCs are completely isolated from each other, but sometimes, you want to allow traffic to flow between them, such as allowing -DevOps tools running in a Mgmt VPC (see [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt)) to talk to apps running in a Stage or Prod VPC (see -[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app)). This module can create peering connections and route table entries that make this sort of +DevOps tools running in a Mgmt VPC (see [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt)) to talk to apps running in a Stage or Prod VPC (see +[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app)). This module can create peering connections and route table entries that make this sort of cross-VPC communication possible. ## What's a VPC? @@ -57,7 +57,7 @@ and production, someone in staging *cannot* access production. module "vpc_peering" { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.25.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -107,18 +107,10 @@ module "vpc_peering" { # OPTIONAL VARIABLES # ---------------------------------------------------------------------------------------------------- - # A boolean parameter to allow connection from the classic link to VPC over - # the peering connection. - allow_classic_link_to_remote_vpc = false - # A boolean parameter to enable or disable DNS resolution on both accepter and # requester side of the connection peering. allow_remote_vpc_dns_resolution = false - # A boolean parameter to allow connection from the VPC to the classic link - # over the peering connection. - allow_vpc_to_remote_classic_link = false - # A boolean parameter to auto-accept the VPC peering connection. auto_accept = true @@ -149,7 +141,7 @@ module "vpc_peering" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.23.3" + source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.25.0" } inputs = { @@ -202,18 +194,10 @@ inputs = { # OPTIONAL VARIABLES # ---------------------------------------------------------------------------------------------------- - # A boolean parameter to allow connection from the classic link to VPC over - # the peering connection. - allow_classic_link_to_remote_vpc = false - # A boolean parameter to enable or disable DNS resolution on both accepter and # requester side of the connection peering. allow_remote_vpc_dns_resolution = false - # A boolean parameter to allow connection from the VPC to the classic link - # over the peering connection. - allow_vpc_to_remote_classic_link = false - # A boolean parameter to auto-accept the VPC peering connection. auto_accept = true @@ -241,11 +225,11 @@ inputs = {