-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Allow peering connections to be defined for AWS VPCs and add OTEL sid…
…ecar. (#7) * Allow peering connections to be defined for AWS VPCs. * Define peering ACLs as part of the VPC. * Allow configuration of fargate endpoint ingress rules. * Utilize OTEL rather than the CloudWatch agent. * Added execute command option for fargate. * Allow an optional subdomain for the fargate service. * Enable init process on containers. * Added a security group to allow access to the VPC endpoints. * Allow ECR tags to be mutated. * Place the ALB internally by default.
- Loading branch information
1 parent
74ecc60
commit d47b9d6
Showing
13 changed files
with
235 additions
and
86 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,5 @@ | ||
locals { | ||
fqdn = var.subdomain != "" ? "${var.subdomain}.${var.domain}" : var.domain | ||
prefix = "${var.project}-${var.environment}-${var.service}" | ||
prefix_short = "${var.project_short}-${var.environment}-${var.service_short}" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,42 @@ | ||
locals { | ||
azs = data.aws_availability_zones.available.names | ||
prefix = "${var.project}-${var.environment}" | ||
|
||
# Define inbound and outbound ACL rules for any peering connections. | ||
peer_inbound_acls = [ | ||
for peer in var.peers : { | ||
action = "allow" | ||
cidr_block = peer.cidr | ||
from_port = 0 | ||
protocol = -1 | ||
rule_number = 200 | ||
to_port = 0 | ||
} | ||
] | ||
peer_outbound_acls = [ | ||
for peer in var.peers : { | ||
action = "allow" | ||
cidr_block = peer.cidr | ||
from_port = 0 | ||
protocol = -1 | ||
rule_number = 200 | ||
to_port = 0 | ||
} | ||
] | ||
|
||
# Create a set of peering routes based on the provided peers and the created | ||
# private route tables. | ||
peer_cidrs = [ | ||
for key, value in var.peers : { | ||
key = key | ||
cidr = value.cidr | ||
} | ||
] | ||
peer_routes = [ | ||
for pair in setproduct(local.peer_cidrs, module.vpc.private_route_table_ids) : { | ||
cidr = pair[0].cidr | ||
key = pair[0].key | ||
table_id = pair[1] | ||
} | ||
] | ||
} |
Oops, something went wrong.