X-Git-Url: https://gerrit.fd.io/r/gitweb?p=csit.git;a=blobdiff_plain;f=fdio.infra.terraform%2Fterraform-aws-vpc%2FREADME.md;h=52f6d1cfc753350db31d14d83a46e75a43763e84;hp=4903bcb36f3dcf72c15a59ace52d2d526e43157a;hb=944fdd776eb68211a3e58648d1d2ebd9a12f0636;hpb=16ed5ec15f7b966f445e0ef3860a952fcdc6c1c8 diff --git a/fdio.infra.terraform/terraform-aws-vpc/README.md b/fdio.infra.terraform/terraform-aws-vpc/README.md index 4903bcb36f..52f6d1cfc7 100644 --- a/fdio.infra.terraform/terraform-aws-vpc/README.md +++ b/fdio.infra.terraform/terraform-aws-vpc/README.md @@ -3,7 +3,7 @@ | Name | Version | |------|---------| -| [terraform](#requirement\_terraform) | >= 1.1.4 | +| [terraform](#requirement\_terraform) | >= 1.0.4 | | [aws](#requirement\_aws) | ~> 4.3.0 | ## Providers @@ -32,7 +32,7 @@ No modules. |------|-------------|------|---------|:--------:| | [security\_group\_description](#input\_security\_group\_description) | Security group description. | `string` | `"Allow inbound/outbound traffic"` | no | | [security\_group\_egress](#input\_security\_group\_egress) | Egress security group map. | `list(any)` |
[
{
"cidr_blocks": [
"0.0.0.0/0"
],
"from_port": 0,
"ipv6_cidr_blocks": [
"::/0"
],
"protocol": "-1",
"to_port": 0
}
]
| no | -| [security\_group\_ingress](#input\_security\_group\_ingress) | Ingress security group map. | `list(any)` |
[
{
"cidr_blocks": [
"0.0.0.0/0"
],
"from_port": 22,
"ipv6_cidr_blocks": [
"::/0"
],
"protocol": "tcp",
"to_port": 22
}
]
| no | +| [security\_group\_ingress](#input\_security\_group\_ingress) | Ingress security group map. | `list(any)` |
[
{
"cidr_blocks": [
"0.0.0.0/0"
],
"from_port": 22,
"ipv6_cidr_blocks": [
"::/0"
],
"protocol": "tcp",
"self": false,
"to_port": 22
},
{
"cidr_blocks": [
"0.0.0.0/0"
],
"from_port": 0,
"ipv6_cidr_blocks": [
"::/0"
],
"protocol": -1,
"self": true,
"to_port": 0
}
]
| no | | [security\_group\_name](#input\_security\_group\_name) | Name of the security group. | `string` | n/a | yes | | [security\_group\_revoke\_rules\_on\_delete](#input\_security\_group\_revoke\_rules\_on\_delete) | Instruct Terraform to revoke all of the Security Groups attached ingress and egress rules before deleting the rule itself. | `bool` | `false` | no | | [subnet\_assign\_ipv6\_address\_on\_creation](#input\_subnet\_assign\_ipv6\_address\_on\_creation) | Specify true to indicate that network interfaces created in the specified subnet should be assigned an IPv6 address. | `bool` | `false` | no | @@ -50,5 +50,9 @@ No modules. | Name | Description | |------|-------------| -| [vpc\_id](#output\_vpc\_id) | The ID of the VPC | +| [vpc\_id](#output\_vpc\_id) | The ID of the VPC. | +| [vpc\_ipv6\_cidr\_block](#output\_vpc\_ipv6\_cidr\_block) | IPv6 CIDR block. | +| [vpc\_main\_route\_table\_id](#output\_vpc\_main\_route\_table\_id) | The ID of the Main Route Table. | +| [vpc\_security\_group\_id](#output\_vpc\_security\_group\_id) | The ID of the Security Group. | +| [vpc\_subnet\_id](#output\_vpc\_subnet\_id) | The ID of the Subnet. | \ No newline at end of file