forked from poush/terraform-aws-pritunl
-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathsecuritygroups.tf
62 lines (54 loc) · 1.29 KB
/
securitygroups.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
data "aws_vpc" "selected" {
id = var.vpc_id
}
resource "aws_security_group" "pritunl" {
name = "${var.resource_name_prefix}-vpn"
description = "${var.resource_name_prefix}-vpn"
vpc_id = var.vpc_id
# SSH access
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = "${length(var.internal_cidrs) == 0 ? [data.aws_vpc.selected.cidr_block] : var.internal_cidrs}"
}
# For Let's Encrypt validation
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
# HTTPS access is required for PIN auth
ingress {
from_port = 443
to_port = 443
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
# VPN WAN access
ingress {
from_port = 10000
to_port = 19999
protocol = "udp"
cidr_blocks = ["0.0.0.0/0"]
}
# ICMP
ingress {
from_port = -1
to_port = -1
protocol = "icmp"
cidr_blocks = "${length(var.internal_cidrs) == 0 ? [data.aws_vpc.selected.cidr_block] : var.internal_cidrs}"
}
# outbound internet access
egress {
from_port = 0
to_port = 0
protocol = -1
cidr_blocks = ["0.0.0.0/0"]
}
tags = merge(
tomap({"Name" = format("%s-%s", var.resource_name_prefix, "vpn")}),
var.tags,
)
}