You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* fix: uses correct type with var.vpn_connection_static_routes_only (bool > string)
I could not find why this was originally implemented this way... Maybe a 0.11 holdover? It was bugging me.
* fix: vpc_id should not be required (not required if doing a TGW <> VPN connection)
* feat: adds tagging the TGW attachment + associating / propagating TGW RTB + creating TGW routes
* chore: readme updates
* chore: cleans up tflint issues 🎉
* fix: adds sensitive = true for gateway_config output (fixes#36)
| <aname="input_tags"></a> [tags](#input\_tags)| Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).<br>Neither the tag keys nor the tag values will be modified by this module. |`map(string)`|`{}`| no |
57
60
| <aname="input_tenant"></a> [tenant](#input\_tenant)| ID element \_(Rarely used, not included by default)\_. A customer identifier, indicating who this instance of a resource is for |`string`|`null`| no |
58
61
| <aname="input_transit_gateway_enabled"></a> [transit\_gateway\_enabled](#input\_transit\_gateway\_enabled)| Set to true to enable VPN connection to transit gateway and then pass in the existing\_transit\_gateway\_id |`bool`|`false`| no |
59
-
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| The ID of the VPC to which the Virtual Private Gateway will be attached |`string`| n/a | yes |
62
+
| <aname="input_transit_gateway_route_table_id"></a> [transit\_gateway\_route\_table\_id](#input\_transit\_gateway\_route\_table\_id)| The ID of the route table for the transit gateway that you want to associate + propogate the VPN connection's TGW attachment |`string`|`null`| no |
63
+
| <aname="input_transit_gateway_routes"></a> [transit\_gateway\_routes](#input\_transit\_gateway\_routes)| A map of transit gateway routes to create on the given TGW route table (via `transit_gateway_route_table_id`) for the created VPN Attachment. Use the key in the map to describe the route. | <pre>map(object({<br> blackhole = optional(bool, false)<br> destination_cidr_block = string<br> }))</pre> |`{}`| no |
64
+
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| The ID of the VPC to which the Virtual Private Gateway will be attached |`string`|`null`| no |
60
65
| <aname="input_vpn_connection_local_ipv4_network_cidr"></a> [vpn\_connection\_local\_ipv4\_network\_cidr](#input\_vpn\_connection\_local\_ipv4\_network\_cidr)| The IPv4 CIDR on the customer gateway (on-premises) side of the VPN connection. |`string`|`"0.0.0.0/0"`| no |
61
66
| <aname="input_vpn_connection_remote_ipv4_network_cidr"></a> [vpn\_connection\_remote\_ipv4\_network\_cidr](#input\_vpn\_connection\_remote\_ipv4\_network\_cidr)| The IPv4 CIDR on the AWS side of the VPN connection. |`string`|`"0.0.0.0/0"`| no |
62
67
| <aname="input_vpn_connection_static_routes_destinations"></a> [vpn\_connection\_static\_routes\_destinations](#input\_vpn\_connection\_static\_routes\_destinations)| List of CIDR blocks to be used as destination for static routes. Routes to destinations will be propagated to the route tables defined in `route_table_ids`|`list(string)`|`[]`| no |
63
-
| <aname="input_vpn_connection_static_routes_only"></a> [vpn\_connection\_static\_routes\_only](#input\_vpn\_connection\_static\_routes\_only)| If set to `true`, the VPN connection will use static routes exclusively. Static routes must be used for devices that don't support BGP |`string`|`"true"`| no |
68
+
| <aname="input_vpn_connection_static_routes_only"></a> [vpn\_connection\_static\_routes\_only](#input\_vpn\_connection\_static\_routes\_only)| If set to `true`, the VPN connection will use static routes exclusively. Static routes must be used for devices that don't support BGP |`bool`|`false`| no |
64
69
| <aname="input_vpn_connection_tunnel1_dpd_timeout_action"></a> [vpn\_connection\_tunnel1\_dpd\_timeout\_action](#input\_vpn\_connection\_tunnel1\_dpd\_timeout\_action)| The action to take after DPD timeout occurs for the first VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear \| none \| restart. |`string`|`"clear"`| no |
65
70
| <aname="input_vpn_connection_tunnel1_ike_versions"></a> [vpn\_connection\_tunnel1\_ike\_versions](#input\_vpn\_connection\_tunnel1\_ike\_versions)| The IKE versions that are permitted for the first VPN tunnel. Valid values are ikev1 \| ikev2. |`list(string)`|`[]`| no |
66
71
| <aname="input_vpn_connection_tunnel1_inside_cidr"></a> [vpn\_connection\_tunnel1\_inside\_cidr](#input\_vpn\_connection\_tunnel1\_inside\_cidr)| The CIDR block of the inside IP addresses for the first VPN tunnel |`string`|`null`| no |
@@ -90,6 +95,7 @@
90
95
| Name | Description |
91
96
|------|-------------|
92
97
| <aname="output_customer_gateway_id"></a> [customer\_gateway\_id](#output\_customer\_gateway\_id)| Customer Gateway ID |
98
+
| <aname="output_transit_gateway_attachment_id"></a> [transit\_gateway\_attachment\_id](#output\_transit\_gateway\_attachment\_id)| The ID of the transit gateway attachment for the VPN connection (if a TGW connection) |
93
99
| <aname="output_vpn_connection_customer_gateway_configuration"></a> [vpn\_connection\_customer\_gateway\_configuration](#output\_vpn\_connection\_customer\_gateway\_configuration)| The configuration information for the VPN connection's Customer Gateway (in the native XML format) |
94
100
| <aname="output_vpn_connection_id"></a> [vpn\_connection\_id](#output\_vpn\_connection\_id)| VPN Connection ID |
95
101
| <aname="output_vpn_connection_tunnel1_address"></a> [vpn\_connection\_tunnel1\_address](#output\_vpn\_connection\_tunnel1\_address)| The public IP address of the first VPN tunnel |
Copy file name to clipboardExpand all lines: variables.tf
+19-2
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,11 @@
1
1
variable"vpc_id" {
2
2
type=string
3
3
description="The ID of the VPC to which the Virtual Private Gateway will be attached"
4
+
default=null
4
5
}
5
6
6
7
variable"vpn_gateway_amazon_side_asn" {
8
+
type=number
7
9
description="The Autonomous System Number (ASN) for the Amazon side of the VPN gateway. If you don't specify an ASN, the Virtual Private Gateway is created with the default ASN"
8
10
default=64512
9
11
}
@@ -25,9 +27,9 @@ variable "route_table_ids" {
25
27
}
26
28
27
29
variable"vpn_connection_static_routes_only" {
28
-
type=string
30
+
type=bool
29
31
description="If set to `true`, the VPN connection will use static routes exclusively. Static routes must be used for devices that don't support BGP"
description="Set to true to enable VPN connection to transit gateway and then pass in the existing_transit_gateway_id"
193
195
}
196
+
197
+
variable"transit_gateway_route_table_id" {
198
+
type=string
199
+
default=null
200
+
description="The ID of the route table for the transit gateway that you want to associate + propogate the VPN connection's TGW attachment"
201
+
}
202
+
203
+
variable"transit_gateway_routes" {
204
+
type=map(object({
205
+
blackhole =optional(bool, false)
206
+
destination_cidr_block =string
207
+
}))
208
+
description="A map of transit gateway routes to create on the given TGW route table (via `transit_gateway_route_table_id`) for the created VPN Attachment. Use the key in the map to describe the route."
0 commit comments