diff --git a/README.md b/README.md index 3c76c6a2..e30afe04 100644 --- a/README.md +++ b/README.md @@ -226,14 +226,14 @@ allow_github_webhooks = true | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 0.13.1 | -| [aws](#requirement\_aws) | >= 3.45 | +| [aws](#requirement\_aws) | ~> 3.45 | | [random](#requirement\_random) | >= 2.0 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 3.45 | +| [aws](#provider\_aws) | ~> 3.45 | | [random](#provider\_random) | >= 2.0 | ## Modules @@ -372,6 +372,7 @@ allow_github_webhooks = true | [public\_subnets](#input\_public\_subnets) | A list of public subnets inside the VPC | `list(string)` | `[]` | no | | [readonly\_root\_filesystem](#input\_readonly\_root\_filesystem) | Determines whether a container is given read-only access to its root filesystem. Due to how Terraform type casts booleans in json it is required to double quote this value | `bool` | `false` | no | | [repository\_credentials](#input\_repository\_credentials) | Container repository credentials; required when using a private repo. This map currently supports a single key; "credentialsParameter", which should be the ARN of a Secrets Manager's secret holding the credentials | `map(string)` | `null` | no | +| [route53\_private\_zone](#input\_route53\_private\_zone) | Enable to use a private Route53 zone | `bool` | `false` | no | | [route53\_record\_name](#input\_route53\_record\_name) | Name of Route53 record to create ACM certificate in and main A-record. If null is specified, var.name is used instead. Provide empty string to point root domain name to ALB. | `string` | `null` | no | | [route53\_zone\_name](#input\_route53\_zone\_name) | Route53 zone name to create ACM certificate in and main A-record, without trailing dot | `string` | `""` | no | | [security\_group\_ids](#input\_security\_group\_ids) | List of one or more security groups to be added to the load balancer | `list(string)` | `[]` | no | diff --git a/examples/github-complete/README.md b/examples/github-complete/README.md index 4d4b7383..976807af 100644 --- a/examples/github-complete/README.md +++ b/examples/github-complete/README.md @@ -30,14 +30,14 @@ Go to https://eu-west-1.console.aws.amazon.com/ecs/home?region=eu-west-1#/settin | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 0.13.1 | -| [aws](#requirement\_aws) | >= 3.45 | +| [aws](#requirement\_aws) | ~> 3.45 | | [github](#requirement\_github) | >= 4.8 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 3.45 | +| [aws](#provider\_aws) | ~> 3.45 | ## Modules diff --git a/examples/github-complete/versions.tf b/examples/github-complete/versions.tf index 28ce680e..815437b6 100644 --- a/examples/github-complete/versions.tf +++ b/examples/github-complete/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 3.45" + version = "~> 3.45" } github = { diff --git a/main.tf b/main.tf index dea43f09..d1ecdc9b 100644 --- a/main.tf +++ b/main.tf @@ -131,7 +131,7 @@ data "aws_route53_zone" "this" { count = var.create_route53_record ? 1 : 0 name = var.route53_zone_name - private_zone = false + private_zone = var.route53_private_zone } ################################################################################ diff --git a/variables.tf b/variables.tf index 1b0c2a76..a9fb29a4 100644 --- a/variables.tf +++ b/variables.tf @@ -224,6 +224,12 @@ variable "route53_record_name" { default = null } +variable "route53_private_zone" { + description = "Enable to use a private Route53 zone" + type = bool + default = false +} + variable "create_route53_record" { description = "Whether to create Route53 record for Atlantis" type = bool diff --git a/versions.tf b/versions.tf index 8009c97e..013b6aeb 100644 --- a/versions.tf +++ b/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 3.45" + version = "~> 3.45" } random = {