diff --git a/README.md b/README.md
index 3c76c6a2..e30afe04 100644
--- a/README.md
+++ b/README.md
@@ -226,14 +226,14 @@ allow_github_webhooks = true
| Name | Version |
|------|---------|
| [terraform](#requirement\_terraform) | >= 0.13.1 |
-| [aws](#requirement\_aws) | >= 3.45 |
+| [aws](#requirement\_aws) | ~> 3.45 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 3.45 |
+| [aws](#provider\_aws) | ~> 3.45 |
| [random](#provider\_random) | >= 2.0 |
## Modules
@@ -372,6 +372,7 @@ allow_github_webhooks = true
| [public\_subnets](#input\_public\_subnets) | A list of public subnets inside the VPC | `list(string)` | `[]` | no |
| [readonly\_root\_filesystem](#input\_readonly\_root\_filesystem) | Determines whether a container is given read-only access to its root filesystem. Due to how Terraform type casts booleans in json it is required to double quote this value | `bool` | `false` | no |
| [repository\_credentials](#input\_repository\_credentials) | Container repository credentials; required when using a private repo. This map currently supports a single key; "credentialsParameter", which should be the ARN of a Secrets Manager's secret holding the credentials | `map(string)` | `null` | no |
+| [route53\_private\_zone](#input\_route53\_private\_zone) | Enable to use a private Route53 zone | `bool` | `false` | no |
| [route53\_record\_name](#input\_route53\_record\_name) | Name of Route53 record to create ACM certificate in and main A-record. If null is specified, var.name is used instead. Provide empty string to point root domain name to ALB. | `string` | `null` | no |
| [route53\_zone\_name](#input\_route53\_zone\_name) | Route53 zone name to create ACM certificate in and main A-record, without trailing dot | `string` | `""` | no |
| [security\_group\_ids](#input\_security\_group\_ids) | List of one or more security groups to be added to the load balancer | `list(string)` | `[]` | no |
diff --git a/examples/github-complete/README.md b/examples/github-complete/README.md
index 4d4b7383..976807af 100644
--- a/examples/github-complete/README.md
+++ b/examples/github-complete/README.md
@@ -30,14 +30,14 @@ Go to https://eu-west-1.console.aws.amazon.com/ecs/home?region=eu-west-1#/settin
| Name | Version |
|------|---------|
| [terraform](#requirement\_terraform) | >= 0.13.1 |
-| [aws](#requirement\_aws) | >= 3.45 |
+| [aws](#requirement\_aws) | ~> 3.45 |
| [github](#requirement\_github) | >= 4.8 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 3.45 |
+| [aws](#provider\_aws) | ~> 3.45 |
## Modules
diff --git a/examples/github-complete/versions.tf b/examples/github-complete/versions.tf
index 28ce680e..815437b6 100644
--- a/examples/github-complete/versions.tf
+++ b/examples/github-complete/versions.tf
@@ -4,7 +4,7 @@ terraform {
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 3.45"
+ version = "~> 3.45"
}
github = {
diff --git a/main.tf b/main.tf
index dea43f09..d1ecdc9b 100644
--- a/main.tf
+++ b/main.tf
@@ -131,7 +131,7 @@ data "aws_route53_zone" "this" {
count = var.create_route53_record ? 1 : 0
name = var.route53_zone_name
- private_zone = false
+ private_zone = var.route53_private_zone
}
################################################################################
diff --git a/variables.tf b/variables.tf
index 1b0c2a76..a9fb29a4 100644
--- a/variables.tf
+++ b/variables.tf
@@ -224,6 +224,12 @@ variable "route53_record_name" {
default = null
}
+variable "route53_private_zone" {
+ description = "Enable to use a private Route53 zone"
+ type = bool
+ default = false
+}
+
variable "create_route53_record" {
description = "Whether to create Route53 record for Atlantis"
type = bool
diff --git a/versions.tf b/versions.tf
index 8009c97e..013b6aeb 100644
--- a/versions.tf
+++ b/versions.tf
@@ -4,7 +4,7 @@ terraform {
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 3.45"
+ version = "~> 3.45"
}
random = {