├── .editorconfig
├── .github
└── workflows
│ ├── lock.yml
│ ├── pr-title.yml
│ ├── pre-commit.yml
│ ├── release.yml
│ └── stale-actions.yaml
├── .gitignore
├── .pre-commit-config.yaml
├── .releaserc.json
├── CHANGELOG.md
├── LICENSE
├── README.md
├── examples
├── complete
│ ├── README.md
│ ├── main.tf
│ ├── outputs.tf
│ └── versions.tf
├── computed
│ ├── README.md
│ ├── main.tf
│ ├── outputs.tf
│ └── versions.tf
├── disabled
│ ├── README.md
│ ├── main.tf
│ ├── outputs.tf
│ └── versions.tf
├── dynamic
│ ├── README.md
│ ├── main.tf
│ ├── outputs.tf
│ └── versions.tf
├── http
│ ├── README.md
│ ├── main.tf
│ ├── outputs.tf
│ └── versions.tf
└── rules-only
│ ├── README.md
│ ├── main.tf
│ ├── outputs.tf
│ └── versions.tf
├── main.tf
├── modules
├── README.md
├── _templates
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── activemq
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── alertmanager
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── carbon-relay-ng
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── cassandra
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── consul
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── dax-cluster
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── docker-swarm
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── elasticsearch
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── etcd
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── grafana
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── graphite-statsd
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── http-80
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── http-8080
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── https-443
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── https-8443
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── ipsec-4500
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── ipsec-500
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── kafka
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── kibana
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── kubernetes-api
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── ldap
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── ldaps
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── logstash
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── loki
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── memcached
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── minio
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── mongodb
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── mssql
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── mysql
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── nfs
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── nomad
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── ntp
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── openvpn
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── oracle-db
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── postgresql
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── prometheus
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── promtail
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── puppet
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── rabbitmq
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── rdp
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── redis
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── redshift
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── smtp-submission
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── smtp
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── smtps
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── solr
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── splunk
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── squid
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── ssh
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── storm
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── vault
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── wazuh
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── web
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── winrm
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── zabbix
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── zipkin
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
└── zookeeper
│ ├── README.md
│ ├── auto_values.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
│ └── versions.tf
├── outputs.tf
├── rules.tf
├── update_groups.sh
├── variables.tf
├── versions.tf
└── wrappers
├── README.md
├── _templates
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── activemq
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── alertmanager
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── carbon-relay-ng
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── cassandra
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── consul
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── dax-cluster
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── docker-swarm
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── elasticsearch
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── etcd
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── grafana
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── graphite-statsd
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── http-80
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── http-8080
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── https-443
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── https-8443
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── ipsec-4500
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── ipsec-500
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── kafka
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── kibana
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── kubernetes-api
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── ldap
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── ldaps
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── logstash
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── loki
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── main.tf
├── memcached
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── minio
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── mongodb
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── mssql
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── mysql
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── nfs
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── nomad
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── ntp
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── openvpn
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── oracle-db
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── outputs.tf
├── postgresql
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── prometheus
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── promtail
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── puppet
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── rabbitmq
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── rdp
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── redis
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── redshift
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── smtp-submission
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── smtp
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── smtps
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── solr
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── splunk
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── squid
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── ssh
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── storm
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── variables.tf
├── vault
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── versions.tf
├── wazuh
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── web
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── winrm
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── zabbix
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
├── zipkin
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
└── zookeeper
├── README.md
├── main.tf
├── outputs.tf
├── variables.tf
└── versions.tf
/.editorconfig:
--------------------------------------------------------------------------------
1 | # EditorConfig is awesome: http://EditorConfig.org
2 | # Uses editorconfig to maintain consistent coding styles
3 |
4 | # top-most EditorConfig file
5 | root = true
6 |
7 | # Unix-style newlines with a newline ending every file
8 | [*]
9 | charset = utf-8
10 | end_of_line = lf
11 | indent_size = 2
12 | indent_style = space
13 | insert_final_newline = true
14 | max_line_length = 80
15 | trim_trailing_whitespace = true
16 |
17 | [*.{tf,tfvars}]
18 | indent_size = 2
19 | indent_style = space
20 |
21 | [*.md]
22 | max_line_length = 0
23 | trim_trailing_whitespace = false
24 |
25 | [Makefile]
26 | tab_width = 2
27 | indent_style = tab
28 |
29 | [COMMIT_EDITMSG]
30 | max_line_length = 0
31 |
--------------------------------------------------------------------------------
/.github/workflows/lock.yml:
--------------------------------------------------------------------------------
1 | name: 'Lock Threads'
2 |
3 | on:
4 | schedule:
5 | - cron: '50 1 * * *'
6 |
7 | jobs:
8 | lock:
9 | runs-on: ubuntu-latest
10 | steps:
11 | - uses: dessant/lock-threads@v5
12 | with:
13 | github-token: ${{ secrets.GITHUB_TOKEN }}
14 | issue-comment: >
15 | I'm going to lock this issue because it has been closed for _30 days_ ⏳. This helps our maintainers find and focus on the active issues.
16 | If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
17 | issue-inactive-days: '30'
18 | pr-comment: >
19 | I'm going to lock this pull request because it has been closed for _30 days_ ⏳. This helps our maintainers find and focus on the active issues.
20 | If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
21 | pr-inactive-days: '30'
22 |
--------------------------------------------------------------------------------
/.github/workflows/pr-title.yml:
--------------------------------------------------------------------------------
1 | name: 'Validate PR title'
2 |
3 | on:
4 | pull_request_target:
5 | types:
6 | - opened
7 | - edited
8 | - synchronize
9 |
10 | jobs:
11 | main:
12 | name: Validate PR title
13 | runs-on: ubuntu-latest
14 | steps:
15 | # Please look up the latest version from
16 | # https://github.com/amannn/action-semantic-pull-request/releases
17 | - uses: amannn/action-semantic-pull-request@v5.5.3
18 | env:
19 | GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
20 | with:
21 | # Configure which types are allowed.
22 | # Default: https://github.com/commitizen/conventional-commit-types
23 | types: |
24 | fix
25 | feat
26 | docs
27 | ci
28 | chore
29 | # Configure that a scope must always be provided.
30 | requireScope: false
31 | # Configure additional validation for the subject based on a regex.
32 | # This example ensures the subject starts with an uppercase character.
33 | subjectPattern: ^[A-Z].+$
34 | # If `subjectPattern` is configured, you can use this property to override
35 | # the default error message that is shown when the pattern doesn't match.
36 | # The variables `subject` and `title` can be used within the message.
37 | subjectPatternError: |
38 | The subject "{subject}" found in the pull request title "{title}"
39 | didn't match the configured pattern. Please ensure that the subject
40 | starts with an uppercase character.
41 | # For work-in-progress PRs you can typically use draft pull requests
42 | # from Github. However, private repositories on the free plan don't have
43 | # this option and therefore this action allows you to opt-in to using the
44 | # special "[WIP]" prefix to indicate this state. This will avoid the
45 | # validation of the PR title and the pull request checks remain pending.
46 | # Note that a second check will be reported if this is enabled.
47 | wip: true
48 | # When using "Squash and merge" on a PR with only one commit, GitHub
49 | # will suggest using that commit message instead of the PR title for the
50 | # merge commit, and it's easy to commit this by mistake. Enable this option
51 | # to also validate the commit message for one commit PRs.
52 | validateSingleCommit: false
53 |
--------------------------------------------------------------------------------
/.github/workflows/release.yml:
--------------------------------------------------------------------------------
1 | name: Release
2 |
3 | on:
4 | workflow_dispatch:
5 | push:
6 | branches:
7 | - main
8 | - master
9 | paths:
10 | - '**/*.tpl'
11 | - '**/*.py'
12 | - '**/*.tf'
13 | - '.github/workflows/release.yml'
14 |
15 | jobs:
16 | release:
17 | name: Release
18 | runs-on: ubuntu-latest
19 | # Skip running release workflow on forks
20 | if: github.repository_owner == 'terraform-aws-modules'
21 | steps:
22 | - name: Checkout
23 | uses: actions/checkout@v4
24 | with:
25 | persist-credentials: false
26 | fetch-depth: 0
27 |
28 | - name: Release
29 | uses: cycjimmy/semantic-release-action@v4
30 | with:
31 | semantic_version: 23.0.2
32 | extra_plugins: |
33 | @semantic-release/changelog@6.0.3
34 | @semantic-release/git@10.0.1
35 | conventional-changelog-conventionalcommits@7.0.2
36 | env:
37 | GITHUB_TOKEN: ${{ secrets.SEMANTIC_RELEASE_TOKEN }}
38 |
--------------------------------------------------------------------------------
/.github/workflows/stale-actions.yaml:
--------------------------------------------------------------------------------
1 | name: 'Mark or close stale issues and PRs'
2 | on:
3 | schedule:
4 | - cron: '0 0 * * *'
5 |
6 | jobs:
7 | stale:
8 | runs-on: ubuntu-latest
9 | steps:
10 | - uses: actions/stale@v9
11 | with:
12 | repo-token: ${{ secrets.GITHUB_TOKEN }}
13 | # Staling issues and PR's
14 | days-before-stale: 30
15 | stale-issue-label: stale
16 | stale-pr-label: stale
17 | stale-issue-message: |
18 | This issue has been automatically marked as stale because it has been open 30 days
19 | with no activity. Remove stale label or comment or this issue will be closed in 10 days
20 | stale-pr-message: |
21 | This PR has been automatically marked as stale because it has been open 30 days
22 | with no activity. Remove stale label or comment or this PR will be closed in 10 days
23 | # Not stale if have this labels or part of milestone
24 | exempt-issue-labels: bug,wip,on-hold
25 | exempt-pr-labels: bug,wip,on-hold
26 | exempt-all-milestones: true
27 | # Close issue operations
28 | # Label will be automatically removed if the issues are no longer closed nor locked.
29 | days-before-close: 10
30 | delete-branch: true
31 | close-issue-message: This issue was automatically closed because of stale in 10 days
32 | close-pr-message: This PR was automatically closed because of stale in 10 days
33 |
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | # Local .terraform directories
2 | **/.terraform/*
3 |
4 | # Terraform lockfile
5 | .terraform.lock.hcl
6 |
7 | # .tfstate files
8 | *.tfstate
9 | *.tfstate.*
10 |
11 | # Crash log files
12 | crash.log
13 |
14 | # Exclude all .tfvars files, which are likely to contain sentitive data, such as
15 | # password, private keys, and other secrets. These should not be part of version
16 | # control as they are data points which are potentially sensitive and subject
17 | # to change depending on the environment.
18 | *.tfvars
19 |
20 | # Ignore override files as they are usually used to override resources locally and so
21 | # are not checked in
22 | override.tf
23 | override.tf.json
24 | *_override.tf
25 | *_override.tf.json
26 |
27 | # Ignore CLI configuration files
28 | .terraformrc
29 | terraform.rc
30 |
--------------------------------------------------------------------------------
/.pre-commit-config.yaml:
--------------------------------------------------------------------------------
1 | repos:
2 | - repo: https://github.com/antonbabenko/pre-commit-terraform
3 | rev: v1.96.1
4 | hooks:
5 | - id: terraform_fmt
6 | - id: terraform_wrapper_module_for_each
7 | - id: terraform_docs
8 | args:
9 | - '--args=--lockfile=false'
10 | - id: terraform_validate
11 | exclude: '^modules/_templates/[^/]+$|^wrappers/.+$'
12 | - repo: https://github.com/pre-commit/pre-commit-hooks
13 | rev: v5.0.0
14 | hooks:
15 | - id: check-merge-conflict
16 | - id: end-of-file-fixer
17 | - id: trailing-whitespace
18 | - id: mixed-line-ending
19 | args: [--fix=lf]
20 |
--------------------------------------------------------------------------------
/.releaserc.json:
--------------------------------------------------------------------------------
1 | {
2 | "branches": [
3 | "main",
4 | "master"
5 | ],
6 | "ci": false,
7 | "plugins": [
8 | [
9 | "@semantic-release/commit-analyzer",
10 | {
11 | "preset": "conventionalcommits"
12 | }
13 | ],
14 | [
15 | "@semantic-release/release-notes-generator",
16 | {
17 | "preset": "conventionalcommits"
18 | }
19 | ],
20 | [
21 | "@semantic-release/github",
22 | {
23 | "successComment": "This ${issue.pull_request ? 'PR is included' : 'issue has been resolved'} in version ${nextRelease.version} :tada:",
24 | "labels": false,
25 | "releasedLabels": false
26 | }
27 | ],
28 | [
29 | "@semantic-release/changelog",
30 | {
31 | "changelogFile": "CHANGELOG.md",
32 | "changelogTitle": "# Changelog\n\nAll notable changes to this project will be documented in this file."
33 | }
34 | ],
35 | [
36 | "@semantic-release/git",
37 | {
38 | "assets": [
39 | "CHANGELOG.md"
40 | ],
41 | "message": "chore(release): version ${nextRelease.version} [skip ci]\n\n${nextRelease.notes}"
42 | }
43 | ]
44 | ]
45 | }
46 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | Licensed under the Apache License, Version 2.0 (the "License");
2 | you may not use this file except in compliance with the License.
3 | You may obtain a copy of the License at
4 |
5 | http://www.apache.org/licenses/LICENSE-2.0
6 |
7 | Unless required by applicable law or agreed to in writing, software
8 | distributed under the License is distributed on an "AS IS" BASIS,
9 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
10 | See the License for the specific language governing permissions and
11 | limitations under the License.
12 |
--------------------------------------------------------------------------------
/examples/complete/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.complete_sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.complete_sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.complete_sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.complete_sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.complete_sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.complete_sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/examples/complete/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/examples/computed/README.md:
--------------------------------------------------------------------------------
1 | # Computed Security Group rules example
2 |
3 | Configuration in this directory creates set of Security Group and Security Group Rules resources in various combination.
4 |
5 | ## Usage
6 |
7 | To run this example you need to execute:
8 |
9 | ```bash
10 | $ terraform init
11 | $ terraform plan
12 | $ terraform apply
13 | ```
14 |
15 | Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources.
16 |
17 |
18 | ## Requirements
19 |
20 | | Name | Version |
21 | |------|---------|
22 | | [terraform](#requirement\_terraform) | >= 1.0 |
23 | | [aws](#requirement\_aws) | >= 3.29 |
24 |
25 | ## Providers
26 |
27 | | Name | Version |
28 | |------|---------|
29 | | [aws](#provider\_aws) | >= 3.29 |
30 |
31 | ## Modules
32 |
33 | | Name | Source | Version |
34 | |------|--------|---------|
35 | | [http\_sg](#module\_http\_sg) | ../../modules/https-443 | n/a |
36 | | [mysql\_sg](#module\_mysql\_sg) | ../../modules/mysql | n/a |
37 |
38 | ## Resources
39 |
40 | | Name | Type |
41 | |------|------|
42 | | [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
43 | | [aws_vpc.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc) | data source |
44 |
45 | ## Inputs
46 |
47 | No inputs.
48 |
49 | ## Outputs
50 |
51 | | Name | Description |
52 | |------|-------------|
53 | | [security\_group\_arn](#output\_security\_group\_arn) | The ARN of the security group |
54 | | [security\_group\_description](#output\_security\_group\_description) | The description of the security group |
55 | | [security\_group\_id](#output\_security\_group\_id) | The ID of the security group |
56 | | [security\_group\_name](#output\_security\_group\_name) | The name of the security group |
57 | | [security\_group\_owner\_id](#output\_security\_group\_owner\_id) | The owner ID |
58 | | [security\_group\_vpc\_id](#output\_security\_group\_vpc\_id) | The VPC ID |
59 |
60 |
--------------------------------------------------------------------------------
/examples/computed/main.tf:
--------------------------------------------------------------------------------
1 | provider "aws" {
2 | region = "eu-west-1"
3 | }
4 |
5 | #############################################################
6 | # Data sources to get VPC and default security group details
7 | #############################################################
8 | data "aws_vpc" "default" {
9 | default = true
10 | }
11 |
12 | data "aws_security_group" "default" {
13 | name = "default"
14 | vpc_id = data.aws_vpc.default.id
15 | }
16 |
17 | ###########################
18 | # Security groups examples
19 | ###########################
20 | module "http_sg" {
21 | source = "../../modules/https-443"
22 |
23 | name = "computed-http-sg"
24 | description = "Security group with HTTP port open for everyone, and HTTPS open just for the default security group"
25 | vpc_id = data.aws_vpc.default.id
26 |
27 | ingress_cidr_blocks = ["0.0.0.0/0"]
28 |
29 | ingress_with_source_security_group_id = [
30 | {
31 | rule = "https-443-tcp"
32 | source_security_group_id = data.aws_security_group.default.id
33 | },
34 | ]
35 | }
36 |
37 | module "mysql_sg" {
38 | source = "../../modules/mysql"
39 |
40 | name = "computed-mysql-sg"
41 | description = "Security group with MySQL/Aurora port open for HTTP security group created above (computed)"
42 | vpc_id = data.aws_vpc.default.id
43 |
44 | ingress_cidr_blocks = ["0.0.0.0/0"]
45 |
46 | computed_ingress_with_source_security_group_id = [
47 | {
48 | rule = "mysql-tcp"
49 | source_security_group_id = module.http_sg.security_group_id
50 | },
51 | ]
52 |
53 | number_of_computed_ingress_with_source_security_group_id = 1
54 | }
55 |
--------------------------------------------------------------------------------
/examples/computed/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.mysql_sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.mysql_sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.mysql_sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.mysql_sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.mysql_sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.mysql_sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/examples/computed/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/examples/disabled/README.md:
--------------------------------------------------------------------------------
1 | # HTTP Security Group example
2 |
3 | Configuration in this directory creates set of Security Group and Security Group Rules resources in various combination.
4 |
5 | Data sources are used to discover existing VPC resources (VPC and default security group).
6 |
7 | ## Usage
8 |
9 | To run this example you need to execute:
10 |
11 | ```bash
12 | $ terraform init
13 | $ terraform plan
14 | $ terraform apply
15 | ```
16 |
17 | Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources.
18 |
19 |
20 | ## Requirements
21 |
22 | | Name | Version |
23 | |------|---------|
24 | | [terraform](#requirement\_terraform) | >= 1.0 |
25 | | [aws](#requirement\_aws) | >= 3.29 |
26 |
27 | ## Providers
28 |
29 | | Name | Version |
30 | |------|---------|
31 | | [aws](#provider\_aws) | >= 3.29 |
32 |
33 | ## Modules
34 |
35 | | Name | Source | Version |
36 | |------|--------|---------|
37 | | [complete\_sg\_disabled](#module\_complete\_sg\_disabled) | ../../ | n/a |
38 | | [http\_sg\_disabled](#module\_http\_sg\_disabled) | ../../modules/http-80 | n/a |
39 |
40 | ## Resources
41 |
42 | | Name | Type |
43 | |------|------|
44 | | [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
45 | | [aws_vpc.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc) | data source |
46 |
47 | ## Inputs
48 |
49 | No inputs.
50 |
51 | ## Outputs
52 |
53 | | Name | Description |
54 | |------|-------------|
55 | | [security\_group\_arn](#output\_security\_group\_arn) | The ARN of the security group |
56 | | [security\_group\_id](#output\_security\_group\_id) | The ID of the security group |
57 |
58 |
--------------------------------------------------------------------------------
/examples/disabled/main.tf:
--------------------------------------------------------------------------------
1 | provider "aws" {
2 | region = "eu-west-1"
3 | }
4 |
5 | #############################################################
6 | # Data sources to get VPC and default security group details
7 | #############################################################
8 | data "aws_vpc" "default" {
9 | default = true
10 | }
11 |
12 | data "aws_security_group" "default" {
13 | name = "default"
14 | vpc_id = data.aws_vpc.default.id
15 | }
16 |
17 | ########################################################
18 | # Security groups WILL NOT be created by these examples
19 | ########################################################
20 | module "complete_sg_disabled" {
21 | source = "../../"
22 |
23 | create = false
24 | name = "complete-sg"
25 | description = "Security group with all available arguments set (this is just an example)"
26 | vpc_id = data.aws_vpc.default.id
27 |
28 | ingress_cidr_blocks = ["0.0.0.0/0"]
29 | }
30 |
31 | module "http_sg_disabled" {
32 | source = "../../modules/http-80"
33 |
34 | create = false
35 | name = "http-sg"
36 | description = "Security group with HTTP ports open for everybody (IPv4 CIDR), egress ports are all world open"
37 | vpc_id = data.aws_vpc.default.id
38 |
39 | ingress_cidr_blocks = ["0.0.0.0/0"]
40 | }
41 |
--------------------------------------------------------------------------------
/examples/disabled/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.complete_sg_disabled.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.complete_sg_disabled.security_group_id
9 | }
10 |
--------------------------------------------------------------------------------
/examples/disabled/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/examples/dynamic/README.md:
--------------------------------------------------------------------------------
1 | # Dynamic Security Group rules example
2 |
3 | Configuration in this directory creates set of Security Group and Security Group Rules resources in various combination.
4 |
5 | Data sources are used to discover existing VPC resources (VPC and default security group).
6 |
7 | ## Usage
8 |
9 | To run this example you need to execute:
10 |
11 | ```bash
12 | $ terraform init
13 | $ terraform plan
14 | $ terraform apply
15 | ```
16 |
17 | Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources.
18 |
19 |
20 | ## Requirements
21 |
22 | | Name | Version |
23 | |------|---------|
24 | | [terraform](#requirement\_terraform) | >= 1.0 |
25 | | [aws](#requirement\_aws) | >= 3.29 |
26 |
27 | ## Providers
28 |
29 | | Name | Version |
30 | |------|---------|
31 | | [aws](#provider\_aws) | >= 3.29 |
32 |
33 | ## Modules
34 |
35 | | Name | Source | Version |
36 | |------|--------|---------|
37 | | [http\_sg](#module\_http\_sg) | ../../modules/http-80 | n/a |
38 |
39 | ## Resources
40 |
41 | | Name | Type |
42 | |------|------|
43 | | [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
44 | | [aws_vpc.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc) | data source |
45 |
46 | ## Inputs
47 |
48 | No inputs.
49 |
50 | ## Outputs
51 |
52 | | Name | Description |
53 | |------|-------------|
54 | | [security\_group\_arn](#output\_security\_group\_arn) | The ARN of the security group |
55 | | [security\_group\_description](#output\_security\_group\_description) | The description of the security group |
56 | | [security\_group\_id](#output\_security\_group\_id) | The ID of the security group |
57 | | [security\_group\_name](#output\_security\_group\_name) | The name of the security group |
58 | | [security\_group\_owner\_id](#output\_security\_group\_owner\_id) | The owner ID |
59 | | [security\_group\_vpc\_id](#output\_security\_group\_vpc\_id) | The VPC ID |
60 |
61 |
--------------------------------------------------------------------------------
/examples/dynamic/main.tf:
--------------------------------------------------------------------------------
1 | provider "aws" {
2 | region = "eu-west-1"
3 | }
4 |
5 | #############################################################
6 | # Data sources to get VPC and default security group details
7 | #############################################################
8 | data "aws_vpc" "default" {
9 | default = true
10 | }
11 |
12 | data "aws_security_group" "default" {
13 | name = "default"
14 | vpc_id = data.aws_vpc.default.id
15 | }
16 |
17 | ###########################
18 | # Security groups examples
19 | ###########################
20 |
21 | #######
22 | # HTTP
23 | #######
24 | module "http_sg" {
25 | source = "../../modules/http-80"
26 |
27 | name = "dynamic-http-sg"
28 | description = "Security group with HTTP port open for everyone, and HTTPS open just for the default security group"
29 | vpc_id = data.aws_vpc.default.id
30 |
31 | ingress_cidr_blocks = ["0.0.0.0/0"]
32 |
33 | ingress_with_source_security_group_id = [
34 | {
35 | rule = "https-443-tcp"
36 | source_security_group_id = data.aws_security_group.default.id
37 | },
38 | ]
39 | }
40 |
--------------------------------------------------------------------------------
/examples/dynamic/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.http_sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.http_sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.http_sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.http_sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.http_sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.http_sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/examples/dynamic/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/examples/http/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.http_sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.http_sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.http_sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.http_sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.http_sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.http_sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/examples/http/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/examples/rules-only/main.tf:
--------------------------------------------------------------------------------
1 | provider "aws" {
2 | region = "eu-west-1"
3 | }
4 |
5 | #############################################################
6 | # Data sources to get VPC and default security group details
7 | #############################################################
8 | data "aws_vpc" "default" {
9 | default = true
10 | }
11 |
12 | data "aws_security_group" "default" {
13 | name = "default"
14 | vpc_id = data.aws_vpc.default.id
15 | }
16 |
17 | ########################################################
18 | # Create SGs
19 | ########################################################
20 |
21 | resource "aws_security_group" "service_one" {
22 | name = "service_one"
23 | description = "Allow access from service two"
24 | }
25 |
26 | resource "aws_security_group" "service_two" {
27 | name = "service_two"
28 | description = "Allow access from service one"
29 | }
30 |
31 | ########################################################
32 | # Add SG rules
33 | ########################################################
34 |
35 | module "rules_one" {
36 | source = "../../"
37 |
38 | create_sg = false
39 | security_group_id = aws_security_group.service_one.id
40 | ingress_with_source_security_group_id = [
41 | {
42 | description = "http from service two"
43 | rule = "http-80-tcp"
44 | source_security_group_id = aws_security_group.service_two.id
45 | },
46 | ]
47 | }
48 |
49 | module "rules_two" {
50 | source = "../../"
51 |
52 | create_sg = false
53 | security_group_id = aws_security_group.service_two.id
54 | ingress_with_source_security_group_id = [
55 | {
56 | description = "http from service one"
57 | rule = "http-80-tcp"
58 | source_security_group_id = aws_security_group.service_one.id
59 | },
60 | ]
61 | }
62 |
--------------------------------------------------------------------------------
/examples/rules-only/outputs.tf:
--------------------------------------------------------------------------------
1 | output "service_one_security_group_arn" {
2 | description = "The ARN of the security group for service one"
3 | value = aws_security_group.service_one.arn
4 | }
5 |
6 | output "service_one_security_group_id" {
7 | description = "The ID of the security group for service one"
8 | value = aws_security_group.service_one.id
9 | }
10 |
11 | output "service_tow_security_group_arn" {
12 | description = "The ARN of the security group for service two"
13 | value = aws_security_group.service_two.arn
14 | }
15 |
16 | output "service_two_security_group_id" {
17 | description = "The ID of the security group for service two"
18 | value = aws_security_group.service_two.id
19 | }
20 |
--------------------------------------------------------------------------------
/examples/rules-only/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/_templates/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/_templates/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/activemq/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/activemq/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/alertmanager/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/alertmanager/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/carbon-relay-ng/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/carbon-relay-ng/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/cassandra/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/cassandra/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/consul/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/consul/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/dax-cluster/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/dax-cluster/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/docker-swarm/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/docker-swarm/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/elasticsearch/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/elasticsearch/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/etcd/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/etcd/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/grafana/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["grafana-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/grafana/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/grafana/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/graphite-statsd/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/graphite-statsd/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/http-80/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["http-80-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/http-80/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/http-80/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/http-8080/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["http-8080-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/http-8080/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/http-8080/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/https-443/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["https-443-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/https-443/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/https-443/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/https-8443/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/https-8443/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/ipsec-4500/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/ipsec-4500/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/ipsec-500/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/ipsec-500/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/kafka/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/kafka/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/kibana/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["kibana-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/kibana/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/kibana/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/kubernetes-api/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/kubernetes-api/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/ldap/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["ldap-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/ldap/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/ldap/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/ldaps/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["ldaps-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/ldaps/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/ldaps/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/logstash/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/logstash/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/loki/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/loki/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/memcached/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/memcached/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/minio/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["minio-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/minio/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/minio/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/mongodb/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/mongodb/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/mssql/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/mssql/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/mysql/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["mysql-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/mysql/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/mysql/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/nfs/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["nfs-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/nfs/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/nfs/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/nomad/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/nomad/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/ntp/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["ntp-udp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/ntp/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/ntp/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/openvpn/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/openvpn/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/oracle-db/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/oracle-db/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/postgresql/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/postgresql/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/prometheus/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/prometheus/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/promtail/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/promtail/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/puppet/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/puppet/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/rabbitmq/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/rabbitmq/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/rdp/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/rdp/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/redis/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["redis-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/redis/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/redis/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/redshift/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/redshift/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/smtp-submission/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/smtp-submission/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/smtp/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["smtp-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/smtp/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/smtp/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/smtps/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/smtps/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/solr/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["solr-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/solr/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/solr/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/splunk/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/splunk/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/squid/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/squid/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/ssh/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["ssh-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/ssh/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/ssh/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/storm/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/storm/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/vault/auto_values.tf:
--------------------------------------------------------------------------------
1 | # This file was generated from values defined in rules.tf using update_groups.sh.
2 | ###################################
3 | # DO NOT CHANGE THIS FILE MANUALLY
4 | ###################################
5 |
6 | variable "auto_ingress_rules" {
7 | description = "List of ingress rules to add automatically"
8 | type = list(string)
9 | default = ["vault-tcp"]
10 | }
11 |
12 | variable "auto_ingress_with_self" {
13 | description = "List of maps defining ingress rules with self to add automatically"
14 | type = list(map(string))
15 | default = [{ "rule" = "all-all" }]
16 | }
17 |
18 | variable "auto_egress_rules" {
19 | description = "List of egress rules to add automatically"
20 | type = list(string)
21 | default = ["all-all"]
22 | }
23 |
24 | variable "auto_egress_with_self" {
25 | description = "List of maps defining egress rules with self to add automatically"
26 | type = list(map(string))
27 | default = []
28 | }
29 |
30 | # Computed
31 | variable "auto_computed_ingress_rules" {
32 | description = "List of ingress rules to add automatically"
33 | type = list(string)
34 | default = []
35 | }
36 |
37 | variable "auto_computed_ingress_with_self" {
38 | description = "List of maps defining computed ingress rules with self to add automatically"
39 | type = list(map(string))
40 | default = []
41 | }
42 |
43 | variable "auto_computed_egress_rules" {
44 | description = "List of computed egress rules to add automatically"
45 | type = list(string)
46 | default = []
47 | }
48 |
49 | variable "auto_computed_egress_with_self" {
50 | description = "List of maps defining computed egress rules with self to add automatically"
51 | type = list(map(string))
52 | default = []
53 | }
54 |
55 | # Number of computed rules
56 | variable "auto_number_of_computed_ingress_rules" {
57 | description = "Number of computed ingress rules to create by name"
58 | type = number
59 | default = 0
60 | }
61 |
62 | variable "auto_number_of_computed_ingress_with_self" {
63 | description = "Number of computed ingress rules to create where 'self' is defined"
64 | type = number
65 | default = 0
66 | }
67 |
68 | variable "auto_number_of_computed_egress_rules" {
69 | description = "Number of computed egress rules to create by name"
70 | type = number
71 | default = 0
72 | }
73 |
74 | variable "auto_number_of_computed_egress_with_self" {
75 | description = "Number of computed egress rules to create where 'self' is defined"
76 | type = number
77 | default = 0
78 | }
79 |
--------------------------------------------------------------------------------
/modules/vault/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/vault/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/wazuh/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/wazuh/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/web/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/web/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/winrm/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/winrm/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/zabbix/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/zabbix/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/zipkin/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/zipkin/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/modules/zookeeper/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = module.sg.security_group_arn
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = module.sg.security_group_id
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = module.sg.security_group_vpc_id
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = module.sg.security_group_owner_id
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = module.sg.security_group_name
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = module.sg.security_group_description
29 | }
30 |
--------------------------------------------------------------------------------
/modules/zookeeper/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/outputs.tf:
--------------------------------------------------------------------------------
1 | output "security_group_arn" {
2 | description = "The ARN of the security group"
3 | value = try(aws_security_group.this[0].arn, aws_security_group.this_name_prefix[0].arn, "")
4 | }
5 |
6 | output "security_group_id" {
7 | description = "The ID of the security group"
8 | value = try(aws_security_group.this[0].id, aws_security_group.this_name_prefix[0].id, "")
9 | }
10 |
11 | output "security_group_vpc_id" {
12 | description = "The VPC ID"
13 | value = try(aws_security_group.this[0].vpc_id, aws_security_group.this_name_prefix[0].vpc_id, "")
14 | }
15 |
16 | output "security_group_owner_id" {
17 | description = "The owner ID"
18 | value = try(aws_security_group.this[0].owner_id, aws_security_group.this_name_prefix[0].owner_id, "")
19 | }
20 |
21 | output "security_group_name" {
22 | description = "The name of the security group"
23 | value = try(aws_security_group.this[0].name, aws_security_group.this_name_prefix[0].name, "")
24 | }
25 |
26 | output "security_group_description" {
27 | description = "The description of the security group"
28 | value = try(aws_security_group.this[0].description, aws_security_group.this_name_prefix[0].description, "")
29 | }
30 |
--------------------------------------------------------------------------------
/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/_templates/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/_templates/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/_templates/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/activemq/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/activemq/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/activemq/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/alertmanager/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/alertmanager/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/alertmanager/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/carbon-relay-ng/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/carbon-relay-ng/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/carbon-relay-ng/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/cassandra/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/cassandra/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/cassandra/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/consul/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/consul/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/consul/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/dax-cluster/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/dax-cluster/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/dax-cluster/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/docker-swarm/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/docker-swarm/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/docker-swarm/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/elasticsearch/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/elasticsearch/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/elasticsearch/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/etcd/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/etcd/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/etcd/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/grafana/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/grafana/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/grafana/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/graphite-statsd/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/graphite-statsd/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/graphite-statsd/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/http-80/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/http-80/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/http-80/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/http-8080/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/http-8080/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/http-8080/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/https-443/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/https-443/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/https-443/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/https-8443/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/https-8443/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/https-8443/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/ipsec-4500/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/ipsec-4500/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/ipsec-4500/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/ipsec-500/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/ipsec-500/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/ipsec-500/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/kafka/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/kafka/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/kafka/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/kibana/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/kibana/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/kibana/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/kubernetes-api/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/kubernetes-api/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/kubernetes-api/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/ldap/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/ldap/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/ldap/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/ldaps/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/ldaps/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/ldaps/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/logstash/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/logstash/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/logstash/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/loki/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/loki/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/loki/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/memcached/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/memcached/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/memcached/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/minio/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/minio/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/minio/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/mongodb/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/mongodb/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/mongodb/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/mssql/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/mssql/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/mssql/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/mysql/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/mysql/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/mysql/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/nfs/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/nfs/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/nfs/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/nomad/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/nomad/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/nomad/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/ntp/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/ntp/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/ntp/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/openvpn/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/openvpn/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/openvpn/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/oracle-db/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/oracle-db/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/oracle-db/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/postgresql/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/postgresql/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/postgresql/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/prometheus/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/prometheus/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/prometheus/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/promtail/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/promtail/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/promtail/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/puppet/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/puppet/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/puppet/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/rabbitmq/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/rabbitmq/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/rabbitmq/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/rdp/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/rdp/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/rdp/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/redis/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/redis/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/redis/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/redshift/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/redshift/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/redshift/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/smtp-submission/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/smtp-submission/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/smtp-submission/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/smtp/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/smtp/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/smtp/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/smtps/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/smtps/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/smtps/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/solr/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/solr/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/solr/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/splunk/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/splunk/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/splunk/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/squid/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/squid/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/squid/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/ssh/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/ssh/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/ssh/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/storm/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/storm/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/storm/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/vault/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/vault/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/vault/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/wazuh/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/wazuh/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/wazuh/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/web/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/web/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/web/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/winrm/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/winrm/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/winrm/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/zabbix/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/zabbix/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/zabbix/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/zipkin/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/zipkin/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/zipkin/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------
/wrappers/zookeeper/outputs.tf:
--------------------------------------------------------------------------------
1 | output "wrapper" {
2 | description = "Map of outputs of a wrapper."
3 | value = module.wrapper
4 | # sensitive = false # No sensitive module output found
5 | }
6 |
--------------------------------------------------------------------------------
/wrappers/zookeeper/variables.tf:
--------------------------------------------------------------------------------
1 | variable "defaults" {
2 | description = "Map of default values which will be used for each item."
3 | type = any
4 | default = {}
5 | }
6 |
7 | variable "items" {
8 | description = "Maps of items to create a wrapper from. Values are passed through to the module."
9 | type = any
10 | default = {}
11 | }
12 |
--------------------------------------------------------------------------------
/wrappers/zookeeper/versions.tf:
--------------------------------------------------------------------------------
1 | terraform {
2 | required_version = ">= 1.0"
3 |
4 | required_providers {
5 | aws = {
6 | source = "hashicorp/aws"
7 | version = ">= 3.29"
8 | }
9 | }
10 | }
11 |
--------------------------------------------------------------------------------