Skip to content

Commit 52c2291

Browse files
authored
Merge pull request #10 from opszero/update/tag
update tag
2 parents 34b0017 + 97b8e3c commit 52c2291

File tree

4 files changed

+30
-19
lines changed

4 files changed

+30
-19
lines changed

.github/workflows/pre-commit.yml

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,15 @@ jobs:
99
pre-commit:
1010
runs-on: ubuntu-latest
1111
steps:
12-
- uses: actions/checkout@v5
13-
- uses: actions/setup-python@v6
14-
- uses: pre-commit/action@v3.0.1
12+
- uses: actions/checkout@v4
13+
14+
- uses: actions/setup-python@v5
15+
with:
16+
python-version: "3.x"
17+
18+
- name: Setup Terraform
19+
uses: hashicorp/setup-terraform@v3
20+
with:
21+
terraform_version: 1.9.8
22+
23+
- uses: pre-commit/action@v3.0.1

README.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ To get started, make sure you have configured your AWS provider. You can use the
2323

2424

2525
```hcl
26-
module "vpc" {
27-
source = "git@github.com:opszero/terraform-aws-vpc.git"
28-
name = "test"
29-
cidr_block = "10.0.0.0/16"
30-
additional_cidr_block = ["172.3.0.0/16", "172.2.0.0/16"]
26+
module "vpc" {
27+
source = "git::https://github.com/opszero/terraform-aws-vpc.git?ref=v1.0.1"
28+
name = "test"
29+
cidr_block = "10.0.0.0/16"
30+
additional_cidr_block = ["172.3.0.0/16", "172.2.0.0/16"]
3131
}
32-
```
32+
```
3333

3434
## Examples
3535
For detailed examples on how to use this module, please refer to the [Examples](https://github.com/opszero/terraform-aws-vpc/tree/master/example) directory within this repository.
@@ -47,7 +47,7 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
4747

4848
| Name | Version |
4949
|------|---------|
50-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >=5.67.0 |
50+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.14.0 |
5151
## Inputs
5252

5353
| Name | Description | Type | Default | Required |
@@ -59,13 +59,13 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
5959
| <a name="input_block_http_traffic"></a> [block\_http\_traffic](#input\_block\_http\_traffic) | True when http traffic has to be blocked for S3. | `bool` | `true` | no |
6060
| <a name="input_cidr_block"></a> [cidr\_block](#input\_cidr\_block) | CIDR for the VPC. | `string` | `""` | no |
6161
| <a name="input_create_flow_log_cloudwatch_iam_role"></a> [create\_flow\_log\_cloudwatch\_iam\_role](#input\_create\_flow\_log\_cloudwatch\_iam\_role) | Flag to be set true when cloudwatch iam role is to be created when flow log destination type is set to cloudwatch logs. | `bool` | `true` | no |
62-
| <a name="input_default_network_acl_egress"></a> [default\_network\_acl\_egress](#input\_default\_network\_acl\_egress) | List of maps of egress rules to set on the Default Network ACL | `list(map(string))` | <pre>[<br/> {<br/> "action": "allow",<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_no": 100,<br/> "to_port": 0<br/> },<br/> {<br/> "action": "allow",<br/> "from_port": 0,<br/> "ipv6_cidr_block": "::/0",<br/> "protocol": "-1",<br/> "rule_no": 101,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
63-
| <a name="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress) | List of maps of ingress rules to set on the Default Network ACL | `list(map(string))` | <pre>[<br/> {<br/> "action": "allow",<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_no": 100,<br/> "to_port": 0<br/> },<br/> {<br/> "action": "allow",<br/> "from_port": 0,<br/> "ipv6_cidr_block": "::/0",<br/> "protocol": "-1",<br/> "rule_no": 101,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
62+
| <a name="input_default_network_acl_egress"></a> [default\_network\_acl\_egress](#input\_default\_network\_acl\_egress) | List of maps of egress rules to set on the Default Network ACL | `list(map(string))` | <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
63+
| <a name="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress) | List of maps of ingress rules to set on the Default Network ACL | `list(map(string))` | <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
6464
| <a name="input_default_route_table_routes"></a> [default\_route\_table\_routes](#input\_default\_route\_table\_routes) | Configuration block of routes. | `list(map(string))` | `[]` | no |
6565
| <a name="input_default_security_group_egress"></a> [default\_security\_group\_egress](#input\_default\_security\_group\_egress) | List of maps of egress rules to set on the default security group | `list(map(string))` | `[]` | no |
6666
| <a name="input_default_security_group_ingress"></a> [default\_security\_group\_ingress](#input\_default\_security\_group\_ingress) | List of maps of ingress rules to set on the default security group | `list(map(string))` | `[]` | no |
6767
| <a name="input_dhcp_options_domain_name"></a> [dhcp\_options\_domain\_name](#input\_dhcp\_options\_domain\_name) | Specifies DNS name for DHCP options set (requires enable\_dhcp\_options set to true) | `string` | `"service.consul"` | no |
68-
| <a name="input_dhcp_options_domain_name_servers"></a> [dhcp\_options\_domain\_name\_servers](#input\_dhcp\_options\_domain\_name\_servers) | Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) | `list(string)` | <pre>[<br/> "AmazonProvidedDNS"<br/>]</pre> | no |
68+
| <a name="input_dhcp_options_domain_name_servers"></a> [dhcp\_options\_domain\_name\_servers](#input\_dhcp\_options\_domain\_name\_servers) | Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) | `list(string)` | <pre>[<br> "AmazonProvidedDNS"<br>]</pre> | no |
6969
| <a name="input_dhcp_options_netbios_name_servers"></a> [dhcp\_options\_netbios\_name\_servers](#input\_dhcp\_options\_netbios\_name\_servers) | Specify a list of netbios servers for DHCP options set (requires enable\_dhcp\_options set to true) | `list(string)` | `[]` | no |
7070
| <a name="input_dhcp_options_netbios_node_type"></a> [dhcp\_options\_netbios\_node\_type](#input\_dhcp\_options\_netbios\_node\_type) | Specify netbios node\_type for DHCP options set (requires enable\_dhcp\_options set to true) | `string` | `""` | no |
7171
| <a name="input_dhcp_options_ntp_servers"></a> [dhcp\_options\_ntp\_servers](#input\_dhcp\_options\_ntp\_servers) | Specify a list of NTP servers for DHCP options set (requires enable\_dhcp\_options set to true) | `list(string)` | `[]` | no |
@@ -100,7 +100,7 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
100100
| <a name="input_name"></a> [name](#input\_name) | Default name tag | `string` | n/a | yes |
101101
| <a name="input_restrict_default_sg"></a> [restrict\_default\_sg](#input\_restrict\_default\_sg) | Flag to control the restrict default sg creation. | `bool` | `true` | no |
102102
| <a name="input_s3_sse_algorithm"></a> [s3\_sse\_algorithm](#input\_s3\_sse\_algorithm) | Server-side encryption algorithm to use. Valid values are AES256 and aws:kms | `string` | `"aws:kms"` | no |
103-
| <a name="input_tags"></a> [tags](#input\_tags) | Custom tags (optional) | `map(string)` | <pre>{<br/> "Environment": "dev"<br/>}</pre> | no |
103+
| <a name="input_tags"></a> [tags](#input\_tags) | Custom tags (optional) | `map(string)` | <pre>{<br> "Environment": "dev"<br>}</pre> | no |
104104
| <a name="input_vpc_flow_log_permissions_boundary"></a> [vpc\_flow\_log\_permissions\_boundary](#input\_vpc\_flow\_log\_permissions\_boundary) | The ARN of the Permissions Boundary for the VPC Flow Log IAM Role | `string` | `null` | no |
105105
## Resources
106106

example/versions.tf

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
# Terraform version
22
terraform {
3-
required_version = ">= 1.9.5"
3+
required_version = ">= 1.13.3"
4+
45
required_providers {
56
aws = {
67
source = "hashicorp/aws"
7-
version = ">=5.67.0"
8+
version = ">= 6.14.0"
89
}
910
}
1011
}

versions.tf

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
# Terraform version
22
terraform {
3-
required_version = ">= 1.9.5"
3+
required_version = ">= 1.13.3"
4+
45
required_providers {
56
aws = {
67
source = "hashicorp/aws"
7-
version = ">=5.67.0"
8+
version = ">= 6.14.0"
89
}
910
}
10-
}
11+
}

0 commit comments

Comments
 (0)