Skip to content

Commit cdec874

Browse files
committed
update tag
1 parent 4379d53 commit cdec874

File tree

7 files changed

+25
-27
lines changed

7 files changed

+25
-27
lines changed

README.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ To use this module, include it in your Terraform configuration file and provide
2121

2222
```hcl
2323
module "private-subnets" {
24-
source = "https://github.com/opszero/terraform-aws-subnet.git"
24+
source = "git::https://github.com/opszero/terraform-aws-subnets.git?ref=v1.0.0"
2525
name = "app"
2626
environment = "test"
2727
nat_gateway_enabled = true
@@ -31,16 +31,15 @@ module "private-subnets" {
3131
cidr_block = module.vpc.vpc_cidr_block
3232
ipv6_cidr_block = module.vpc.ipv6_cidr_block
3333
ipv4_private_cidrs = ["10.0.3.0/24"]
34-
public_subnet_ids = ["subnet-07962e9e61ad3bcd3"]
35-
enable_ipv6 = true
34+
public_subnet_ids = ["subnet-01ef5b61799cc9943", "subnet-0542749d02b264baa"]
35+
enable_ipv6 = false
3636
}
3737
```
38-
3938
# Example: public-private-subnet-single-nat-gateway
4039

4140
```hcl
4241
module "subnets" {
43-
source = "https://github.com/opszero/terraform-aws-subnet.git"
42+
source = "git::https://github.com/opszero/terraform-aws-subnets.git?ref=v1.0.0"
4443
name = "app"
4544
environment = "test"
4645
nat_gateway_enabled = true
@@ -55,16 +54,15 @@ module "subnets" {
5554
}
5655
5756
```
58-
5957
# Example: public-private
6058

6159
```hcl
6260
module "subnets" {
63-
source = "https://github.com/opszero/terraform-aws-subnet.git"
61+
source = "git::https://github.com/opszero/terraform-aws-subnets.git?ref=v1.0.0"
6462
name = "app"
6563
environment = "test"
6664
nat_gateway_enabled = true
67-
availability_zones = ["us-east-1a", "us-east-1b"]
65+
availability_zones = ["eu-west-1a", "eu-west-1b"]
6866
vpc_id = module.vpc.vpc_id
6967
type = "public-private"
7068
igw_id = module.vpc.igw_id
@@ -78,7 +76,7 @@ module "subnets" {
7876

7977
```hcl
8078
module "subnet" {
81-
source = "https://github.com/opszero/terraform-aws-subnet.git"
79+
source = "git::https://github.com/opszero/terraform-aws-subnets.git?ref=v1.0.0"
8280
name = "app"
8381
environment = "test"
8482
availability_zones = ["eu-west-1a", "eu-west-1b", ]
@@ -91,12 +89,11 @@ module "subnet" {
9189
}
9290
```
9391

94-
9592
# Example: database-subnet
9693

9794
```hcl
9895
module "subnet" {
99-
source = "https://github.com/opszero/terraform-aws-subnet.git"
96+
source = "git::https://github.com/opszero/terraform-aws-subnets.git?ref=v1.0.0"
10097
name = "app"
10198
environment = "test"
10299
availability_zones = ["eu-west-1a", "eu-west-1b", "eu-west-1c"]
@@ -113,7 +110,7 @@ You can customize the input variables according to your specific requirements.
113110

114111
```hcl
115112
module "subnet" {
116-
source = "https://github.com/opszero/terraform-aws-subnet.git"
113+
source = "git::https://github.com/opszero/terraform-aws-subnets.git?ref=v1.0.0"
117114
name = "app"
118115
environment = "test"
119116
availability_zones = ["eu-west-1a", "eu-west-1b", ]
@@ -124,17 +121,18 @@ module "subnet" {
124121
cidr_block = module.vpc.vpc_cidr_block
125122
ipv6_cidr_block = module.vpc.ipv6_cidr_block
126123
igw_id = module.vpc.igw_id
124+
enable_ipv6 = true
127125
}
128126
```
129127

130128
## Examples
131-
For detailed examples on how to use this module, please refer to the [Examples](https://github.com/opszero/terraform-aws-subnet/tree/master/_example) directory within this repository.
129+
For detailed examples on how to use this module, please refer to the [Examples](https://github.com/opszero/terraform-aws-subnets/tree/master/_example) directory within this repository.
132130

133131
## Author
134132
Your Name Replace **MIT** and **opszero** with the appropriate license and your information. Feel free to expand this README with additional details or usage instructions as needed for your specific use case.
135133

136134
## License
137-
This project is licensed under the **MIT** License - see the [LICENSE](https://github.com/opszero/terraform-aws-subnet/blob/master/LICENSE) file for details.
135+
This project is licensed under the **MIT** License - see the [LICENSE](https://github.com/opszero/terraform-aws-subnets/blob/master/LICENSE) file for details.
138136

139137
<!-- BEGIN_TF_DOCS -->
140138

@@ -150,9 +148,9 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
150148
| <a name="input_availability_zones"></a> [availability\_zones](#input\_availability\_zones) | List of Availability Zones (e.g. `['us-east-1a', 'us-east-1b', 'us-east-1c']`). | `list(string)` | `[]` | no |
151149
| <a name="input_cidr_block"></a> [cidr\_block](#input\_cidr\_block) | Base CIDR block which is divided into subnet CIDR blocks (e.g. `10.0.0.0/16`). | `string` | `null` | no |
152150
| <a name="input_customer_owned_ipv4_pool"></a> [customer\_owned\_ipv4\_pool](#input\_customer\_owned\_ipv4\_pool) | The customer-owned IPv4 address pool for the subnet | `string` | `""` | no |
153-
| <a name="input_database_inbound_acl_rules"></a> [database\_inbound\_acl\_rules](#input\_database\_inbound\_acl\_rules) | database subnets inbound network ACLs | `list(map(string))` | <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_action": "allow",<br/> "rule_number": 100,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
151+
| <a name="input_database_inbound_acl_rules"></a> [database\_inbound\_acl\_rules](#input\_database\_inbound\_acl\_rules) | database subnets inbound network ACLs | `list(map(string))` | <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_action": "allow",<br> "rule_number": 100,<br> "to_port": 0<br> }<br>]</pre> | no |
154152
| <a name="input_database_ipv6_cidrs"></a> [database\_ipv6\_cidrs](#input\_database\_ipv6\_cidrs) | database Subnet CIDR blocks (e.g. `2a05:d018:832:ca02::/64`). | `list(any)` | `[]` | no |
155-
| <a name="input_database_outbound_acl_rules"></a> [database\_outbound\_acl\_rules](#input\_database\_outbound\_acl\_rules) | database subnets outbound network ACLs | `list(map(string))` | <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_action": "allow",<br/> "rule_number": 100,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
153+
| <a name="input_database_outbound_acl_rules"></a> [database\_outbound\_acl\_rules](#input\_database\_outbound\_acl\_rules) | database subnets outbound network ACLs | `list(map(string))` | <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_action": "allow",<br> "rule_number": 100,<br> "to_port": 0<br> }<br>]</pre> | no |
156154
| <a name="input_database_subnet_assign_ipv6_address_on_creation"></a> [database\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_database\_subnet\_assign\_ipv6\_address\_on\_creation) | Specify true to indicate that network interfaces created in the specified subnet should be assigned an IPv6 address. | `bool` | `false` | no |
157155
| <a name="input_database_subnet_enable_dns64"></a> [database\_subnet\_enable\_dns64](#input\_database\_subnet\_enable\_dns64) | Indicates whether DNS queries made to the Amazon-provided DNS Resolver in this subnet should return synthetic IPv6 addresses for IPv4-only destinations. Default: `true` | `bool` | `false` | no |
158156
| <a name="input_database_subnet_enable_resource_name_dns_a_record_on_launch"></a> [database\_subnet\_enable\_resource\_name\_dns\_a\_record\_on\_launch](#input\_database\_subnet\_enable\_resource\_name\_dns\_a\_record\_on\_launch) | Indicates whether to respond to DNS queries for instance hostnames with DNS A records. Default: `false` | `bool` | `false` | no |
@@ -200,18 +198,18 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
200198
| <a name="input_nat_gateway_destination_cidr_block"></a> [nat\_gateway\_destination\_cidr\_block](#input\_nat\_gateway\_destination\_cidr\_block) | The CIDR block for the NAT gateway route. | `string` | `"0.0.0.0/0"` | no |
201199
| <a name="input_nat_gateway_enabled"></a> [nat\_gateway\_enabled](#input\_nat\_gateway\_enabled) | Flag to enable/disable NAT Gateways creation in public subnets. | `bool` | `false` | no |
202200
| <a name="input_outpost_arn"></a> [outpost\_arn](#input\_outpost\_arn) | The ARN of the Outpost to create the subnet in | `string` | `""` | no |
203-
| <a name="input_private_inbound_acl_rules"></a> [private\_inbound\_acl\_rules](#input\_private\_inbound\_acl\_rules) | Private subnets inbound network ACLs | `list(map(string))` | <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_action": "allow",<br/> "rule_number": 100,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
201+
| <a name="input_private_inbound_acl_rules"></a> [private\_inbound\_acl\_rules](#input\_private\_inbound\_acl\_rules) | Private subnets inbound network ACLs | `list(map(string))` | <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_action": "allow",<br> "rule_number": 100,<br> "to_port": 0<br> }<br>]</pre> | no |
204202
| <a name="input_private_ipv6_cidrs"></a> [private\_ipv6\_cidrs](#input\_private\_ipv6\_cidrs) | Private Subnet CIDR blocks (e.g. `2a05:d018:832:ca02::/64`). | `list(any)` | `[]` | no |
205-
| <a name="input_private_outbound_acl_rules"></a> [private\_outbound\_acl\_rules](#input\_private\_outbound\_acl\_rules) | Private subnets outbound network ACLs | `list(map(string))` | <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_action": "allow",<br/> "rule_number": 100,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
203+
| <a name="input_private_outbound_acl_rules"></a> [private\_outbound\_acl\_rules](#input\_private\_outbound\_acl\_rules) | Private subnets outbound network ACLs | `list(map(string))` | <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_action": "allow",<br> "rule_number": 100,<br> "to_port": 0<br> }<br>]</pre> | no |
206204
| <a name="input_private_subnet_assign_ipv6_address_on_creation"></a> [private\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_private\_subnet\_assign\_ipv6\_address\_on\_creation) | Specify true to indicate that network interfaces created in the specified subnet should be assigned an IPv6 address. | `bool` | `false` | no |
207205
| <a name="input_private_subnet_enable_dns64"></a> [private\_subnet\_enable\_dns64](#input\_private\_subnet\_enable\_dns64) | Indicates whether DNS queries made to the Amazon-provided DNS Resolver in this subnet should return synthetic IPv6 addresses for IPv4-only destinations. Default: `true` | `bool` | `false` | no |
208206
| <a name="input_private_subnet_enable_resource_name_dns_a_record_on_launch"></a> [private\_subnet\_enable\_resource\_name\_dns\_a\_record\_on\_launch](#input\_private\_subnet\_enable\_resource\_name\_dns\_a\_record\_on\_launch) | Indicates whether to respond to DNS queries for instance hostnames with DNS A records. Default: `false` | `bool` | `false` | no |
209207
| <a name="input_private_subnet_enable_resource_name_dns_aaaa_record_on_launch"></a> [private\_subnet\_enable\_resource\_name\_dns\_aaaa\_record\_on\_launch](#input\_private\_subnet\_enable\_resource\_name\_dns\_aaaa\_record\_on\_launch) | Indicates whether to respond to DNS queries for instance hostnames with DNS AAAA records. Default: `true` | `bool` | `false` | no |
210208
| <a name="input_private_subnet_ipv6_native"></a> [private\_subnet\_ipv6\_native](#input\_private\_subnet\_ipv6\_native) | Indicates whether to create an IPv6-only private subnet. Default: `false` | `bool` | `false` | no |
211209
| <a name="input_private_subnet_private_dns_hostname_type_on_launch"></a> [private\_subnet\_private\_dns\_hostname\_type\_on\_launch](#input\_private\_subnet\_private\_dns\_hostname\_type\_on\_launch) | The type of hostnames to assign to instances in the subnet at launch. For IPv6-only subnets, an instance DNS name must be based on the instance ID. For dual-stack and IPv4-only subnets, you can specify whether DNS names use the instance IPv4 address or the instance ID. Valid values: `ip-name`, `resource-name` | `string` | `null` | no |
212-
| <a name="input_public_inbound_acl_rules"></a> [public\_inbound\_acl\_rules](#input\_public\_inbound\_acl\_rules) | Public subnets inbound network ACLs | `list(map(string))` | <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_action": "allow",<br/> "rule_number": 100,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
210+
| <a name="input_public_inbound_acl_rules"></a> [public\_inbound\_acl\_rules](#input\_public\_inbound\_acl\_rules) | Public subnets inbound network ACLs | `list(map(string))` | <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_action": "allow",<br> "rule_number": 100,<br> "to_port": 0<br> }<br>]</pre> | no |
213211
| <a name="input_public_ipv6_cidrs"></a> [public\_ipv6\_cidrs](#input\_public\_ipv6\_cidrs) | Public Subnet CIDR blocks (e.g. `2a05:d018:832:ca02::/64`). | `list(any)` | `[]` | no |
214-
| <a name="input_public_outbound_acl_rules"></a> [public\_outbound\_acl\_rules](#input\_public\_outbound\_acl\_rules) | Public subnets outbound network ACLs | `list(map(string))` | <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_action": "allow",<br/> "rule_number": 100,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
212+
| <a name="input_public_outbound_acl_rules"></a> [public\_outbound\_acl\_rules](#input\_public\_outbound\_acl\_rules) | Public subnets outbound network ACLs | `list(map(string))` | <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_action": "allow",<br> "rule_number": 100,<br> "to_port": 0<br> }<br>]</pre> | no |
215213
| <a name="input_public_rt_ipv4_destination_cidr"></a> [public\_rt\_ipv4\_destination\_cidr](#input\_public\_rt\_ipv4\_destination\_cidr) | The destination ipv4 CIDR block. | `string` | `"0.0.0.0/0"` | no |
216214
| <a name="input_public_rt_ipv6_destination_cidr"></a> [public\_rt\_ipv6\_destination\_cidr](#input\_public\_rt\_ipv6\_destination\_cidr) | The destination ipv6 CIDR block. | `string` | `"::/0"` | no |
217215
| <a name="input_public_subnet_assign_ipv6_address_on_creation"></a> [public\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_public\_subnet\_assign\_ipv6\_address\_on\_creation) | Specify true to indicate that network interfaces created in the specified subnet should be assigned an IPv6 address. | `bool` | `false` | no |
@@ -222,7 +220,7 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
222220
| <a name="input_public_subnet_ipv6_native"></a> [public\_subnet\_ipv6\_native](#input\_public\_subnet\_ipv6\_native) | Indicates whether to create an IPv6-only public subnet. Default: `false` | `bool` | `false` | no |
223221
| <a name="input_public_subnet_private_dns_hostname_type_on_launch"></a> [public\_subnet\_private\_dns\_hostname\_type\_on\_launch](#input\_public\_subnet\_private\_dns\_hostname\_type\_on\_launch) | The type of private DNS hostname to assign to instances in this subnet at launch. Must be either 'ip-name' or 'resource-name'. | `string` | `"ip-name"` | no |
224222
| <a name="input_single_nat_gateway"></a> [single\_nat\_gateway](#input\_single\_nat\_gateway) | Enable for only single NAT Gateway in one Availability Zone | `bool` | `false` | no |
225-
| <a name="input_tags"></a> [tags](#input\_tags) | Global tags to apply to resources. | `map(string)` | <pre>{<br/> "Environment": "production",<br/> "ManagedBy": "Terraform",<br/> "Name": "my-resource-name"<br/>}</pre> | no |
223+
| <a name="input_tags"></a> [tags](#input\_tags) | Global tags to apply to resources. | `map(string)` | <pre>{<br> "Environment": "production",<br> "ManagedBy": "Terraform",<br> "Name": "my-resource-name"<br>}</pre> | no |
226224
| <a name="input_transit_gateway_id"></a> [transit\_gateway\_id](#input\_transit\_gateway\_id) | Transit Gateway ID to attach to. | `string` | `null` | no |
227225
| <a name="input_type"></a> [type](#input\_type) | Type of subnets to create (`private` or `public`). | `string` | `""` | no |
228226
| <a name="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id) | The VPC ID where the public and private subnets will be created. | `string` | n/a | yes |

example/database-subnet/example.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ provider "aws" {
66
## Vpc Module call.
77
##======================================================================
88
module "vpc" {
9-
source = "git@github.com:opszero/terraform-aws-vpc?ref=v1.0.0"
9+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
1010
name = "test"
1111
cidr_block = "10.0.0.0/16"
1212
}

example/private-subnet/example.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ provider "aws" {
66
## Vpc Module call.
77
##===========================================================================
88
module "vpc" {
9-
source = "git@github.com:opszero/terraform-aws-vpc?ref=v1.0.0"
9+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
1010
name = "test"
1111
cidr_block = "10.0.0.0/16"
1212
}

example/public-private-database-subnet/example.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ provider "aws" {
77
## Vpc Module call.
88
##=============================================================================
99
module "vpc" {
10-
source = "git@github.com:opszero/terraform-aws-vpc?ref=v1.0.0"
10+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
1111
name = "test"
1212
cidr_block = "10.0.0.0/16"
1313
}

example/public-private-subnet-single-nat-gateway/example.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ provider "aws" {
66
## Vpc Module call.
77
##============================================================================
88
module "vpc" {
9-
source = "git@github.com:opszero/terraform-aws-vpc?ref=v1.0.0"
9+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
1010
name = "test"
1111
cidr_block = "10.0.0.0/16"
1212
}

example/public-private/example.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ provider "aws" {
66
## Vpc Module call.
77
##============================================================================
88
module "vpc" {
9-
source = "git@github.com:opszero/terraform-aws-vpc?ref=v1.0.0"
9+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
1010
name = "test"
1111
cidr_block = "10.0.0.0/16"
1212
}

example/public-subnet/example.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ provider "aws" {
66
## Vpc Module call.
77
##=======================================================================
88
module "vpc" {
9-
source = "git@github.com:opszero/terraform-aws-vpc?ref=v1.0.0"
9+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
1010
name = "test"
1111
cidr_block = "10.0.0.0/16"
1212
}

0 commit comments

Comments
 (0)