File tree Expand file tree Collapse file tree 3 files changed +8
-1
lines changed Expand file tree Collapse file tree 3 files changed +8
-1
lines changed Original file line number Diff line number Diff line change @@ -442,6 +442,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
442
442
| enable\_ monitoring\_ endpoint | Should be true if you want to provision a CloudWatch Monitoring endpoint to the VPC | ` bool ` | ` false ` | no |
443
443
| enable\_ nat\_ gateway | Should be true if you want to provision NAT Gateways for each of your private networks | ` bool ` | ` false ` | no |
444
444
| enable\_ public\_ redshift | Controls if redshift should have public routing table | ` bool ` | ` false ` | no |
445
+ | enable\_ public\_ s3\_ endpoint | Whether to enable S3 VPC Endpoint for public subnets | ` bool ` | ` true ` | no |
445
446
| enable\_ qldb\_ session\_ endpoint | Should be true if you want to provision an QLDB Session endpoint to the VPC | ` bool ` | ` false ` | no |
446
447
| enable\_ rds\_ endpoint | Should be true if you want to provision an RDS endpoint to the VPC | ` bool ` | ` false ` | no |
447
448
| enable\_ rekognition\_ endpoint | Should be true if you want to provision a Rekognition endpoint to the VPC | ` bool ` | ` false ` | no |
Original file line number Diff line number Diff line change @@ -304,6 +304,12 @@ variable "external_nat_ips" {
304
304
default = []
305
305
}
306
306
307
+ variable "enable_public_s3_endpoint" {
308
+ description = " Whether to enable S3 VPC Endpoint for public subnets"
309
+ default = true
310
+ type = bool
311
+ }
312
+
307
313
variable "enable_dynamodb_endpoint" {
308
314
description = " Should be true if you want to provision a DynamoDB endpoint to the VPC"
309
315
type = bool
Original file line number Diff line number Diff line change @@ -30,7 +30,7 @@ resource "aws_vpc_endpoint_route_table_association" "intra_s3" {
30
30
}
31
31
32
32
resource "aws_vpc_endpoint_route_table_association" "public_s3" {
33
- count = var. create_vpc && var. enable_s3_endpoint && length (var. public_subnets ) > 0 ? 1 : 0
33
+ count = var. create_vpc && var. enable_s3_endpoint && var . enable_public_s3_endpoint && length (var. public_subnets ) > 0 ? 1 : 0
34
34
35
35
vpc_endpoint_id = aws_vpc_endpoint. s3 [0 ]. id
36
36
route_table_id = aws_route_table. public [0 ]. id
You can’t perform that action at this time.
0 commit comments