You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/pre-commit.yml
+19-19Lines changed: 19 additions & 19 deletions
Original file line number
Diff line number
Diff line change
@@ -7,30 +7,30 @@ on:
7
7
- master
8
8
9
9
jobs:
10
-
# Min Terraform version(s)
10
+
# Min Terraform version(s)
11
11
getDirectories:
12
-
name: Get root directories
13
-
runs-on: ubuntu-latest
14
-
steps:
15
-
- name: Checkout
16
-
uses: actions/checkout@v2
17
-
- name: Install Python
18
-
uses: actions/setup-python@v2
19
-
- name: Build matrix
20
-
id: matrix
21
-
run: |
22
-
DIRS=$(python -c "import json; import glob; print(json.dumps([x.replace('/versions.tf', '') for x in glob.glob('./**/versions.tf', recursive=True)]))")
DIRS=$(python -c "import json; import glob; print(json.dumps([x.replace('/versions.tf', '') for x in glob.glob('./**/versions.tf', recursive=True)]))")
* Few tests and edge cases examples: [#46](https://github.com/terraform-aws-modules/terraform-aws-vpc/tree/master/examples/issue-46-no-private-subnets), [#44](https://github.com/terraform-aws-modules/terraform-aws-vpc/tree/master/examples/issue-44-asymmetric-private-subnets), [#108](https://github.com/terraform-aws-modules/terraform-aws-vpc/tree/master/examples/issue-108-route-already-exists)
| <aname="input_nat_eip_tags"></a> [nat\_eip\_tags](#input\_nat\_eip\_tags)| Additional tags for the NAT EIP |`map(string)`|`{}`| no |
800
806
| <aname="input_nat_gateway_tags"></a> [nat\_gateway\_tags](#input\_nat\_gateway\_tags)| Additional tags for the NAT gateways |`map(string)`|`{}`| no |
801
807
| <aname="input_one_nat_gateway_per_az"></a> [one\_nat\_gateway\_per\_az](#input\_one\_nat\_gateway\_per\_az)| Should be true if you want only one NAT Gateway per availability zone. Requires `var.azs` to be set, and the number of `public_subnets` created to be greater than or equal to the number of availability zones specified in `var.azs`. |`bool`|`false`| no |
808
+
| <aname="input_outpost_acl_tags"></a> [outpost\_acl\_tags](#input\_outpost\_acl\_tags)| Additional tags for the outpost subnets network ACL |`map(string)`|`{}`| no |
809
+
| <aname="input_outpost_arn"></a> [outpost\_arn](#input\_outpost\_arn)| ARN of Outpost you want to create a subnet in. |`string`|`null`| no |
810
+
| <aname="input_outpost_az"></a> [outpost\_az](#input\_outpost\_az)| AZ where Outpost is anchored. |`string`|`null`| no |
811
+
| <aname="input_outpost_dedicated_network_acl"></a> [outpost\_dedicated\_network\_acl](#input\_outpost\_dedicated\_network\_acl)| Whether to use dedicated network ACL (not default) and custom rules for outpost subnets |`bool`|`false`| no |
| <aname="input_outpost_subnet_assign_ipv6_address_on_creation"></a> [outpost\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_outpost\_subnet\_assign\_ipv6\_address\_on\_creation)| Assign IPv6 address on outpost subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`| no |
815
+
| <aname="input_outpost_subnet_ipv6_prefixes"></a> [outpost\_subnet\_ipv6\_prefixes](#input\_outpost\_subnet\_ipv6\_prefixes)| Assigns IPv6 outpost subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list(string)`|`[]`| no |
816
+
| <aname="input_outpost_subnet_suffix"></a> [outpost\_subnet\_suffix](#input\_outpost\_subnet\_suffix)| Suffix to append to outpost subnets name |`string`|`"outpost"`| no |
817
+
| <aname="input_outpost_subnet_tags"></a> [outpost\_subnet\_tags](#input\_outpost\_subnet\_tags)| Additional tags for the outpost subnets |`map(string)`|`{}`| no |
818
+
| <aname="input_outpost_subnets"></a> [outpost\_subnets](#input\_outpost\_subnets)| A list of outpost subnets inside the VPC |`list(string)`|`[]`| no |
802
819
| <aname="input_private_acl_tags"></a> [private\_acl\_tags](#input\_private\_acl\_tags)| Additional tags for the private subnets network ACL |`map(string)`|`{}`| no |
803
820
| <aname="input_private_dedicated_network_acl"></a> [private\_dedicated\_network\_acl](#input\_private\_dedicated\_network\_acl)| Whether to use dedicated network ACL (not default) and custom rules for private subnets |`bool`|`false`| no |
| <aname="output_nat_ids"></a> [nat\_ids](#output\_nat\_ids)| List of allocation ID of Elastic IPs created for AWS NAT Gateway |
983
1000
| <aname="output_nat_public_ips"></a> [nat\_public\_ips](#output\_nat\_public\_ips)| List of public Elastic IPs created for AWS NAT Gateway |
984
1001
| <aname="output_natgw_ids"></a> [natgw\_ids](#output\_natgw\_ids)| List of NAT Gateway IDs |
1002
+
| <aname="output_outpost_network_acl_arn"></a> [outpost\_network\_acl\_arn](#output\_outpost\_network\_acl\_arn)| ARN of the outpost network ACL |
1003
+
| <aname="output_outpost_network_acl_id"></a> [outpost\_network\_acl\_id](#output\_outpost\_network\_acl\_id)| ID of the outpost network ACL |
1004
+
| <aname="output_outpost_subnet_arns"></a> [outpost\_subnet\_arns](#output\_outpost\_subnet\_arns)| List of ARNs of outpost subnets |
1005
+
| <aname="output_outpost_subnets"></a> [outpost\_subnets](#output\_outpost\_subnets)| List of IDs of outpost subnets |
1006
+
| <aname="output_outpost_subnets_cidr_blocks"></a> [outpost\_subnets\_cidr\_blocks](#output\_outpost\_subnets\_cidr\_blocks)| List of cidr\_blocks of outpost subnets |
1007
+
| <aname="output_outpost_subnets_ipv6_cidr_blocks"></a> [outpost\_subnets\_ipv6\_cidr\_blocks](#output\_outpost\_subnets\_ipv6\_cidr\_blocks)| List of IPv6 cidr\_blocks of outpost subnets in an IPv6 enabled VPC |
985
1008
| <aname="output_private_ipv6_egress_route_ids"></a> [private\_ipv6\_egress\_route\_ids](#output\_private\_ipv6\_egress\_route\_ids)| List of IDs of the ipv6 egress route. |
986
1009
| <aname="output_private_nat_gateway_route_ids"></a> [private\_nat\_gateway\_route\_ids](#output\_private\_nat\_gateway\_route\_ids)| List of IDs of the private nat gateway route. |
987
1010
| <aname="output_private_network_acl_arn"></a> [private\_network\_acl\_arn](#output\_private\_network\_acl\_arn)| ARN of the private network ACL |
Configuration in this directory creates a VPC with public, private, and private outpost subnets.
4
+
5
+
This configuration uses data-source to find an available Outpost by name. Change it according to your needs in order to run this example.
6
+
7
+
[Read more about AWS regions, availability zones and local zones](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#concepts-regions-availability-zones).
8
+
9
+
## Usage
10
+
11
+
To run this example you need to execute:
12
+
13
+
```bash
14
+
$ terraform init
15
+
$ terraform plan
16
+
$ terraform apply
17
+
```
18
+
19
+
Note that this example may create resources which can cost money (AWS Elastic IP, for example). Run `terraform destroy` when you don't need these resources.
20
+
21
+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
0 commit comments