Skip to content

Commit dd247b3

Browse files
Updated with the [latest changes](https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.23.3) from the [email protected] source branch. (#971)
Co-authored-by: docs-sourcer[bot] <99042413+docs-sourcer[bot]@users.noreply.github.com>
1 parent 0453160 commit dd247b3

File tree

15 files changed

+232
-158
lines changed

15 files changed

+232
-158
lines changed

docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
99
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
1010
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
1111

12-
<VersionBadge repoTitle="VPC Modules" version="0.23.2" lastModifiedVersion="0.22.3"/>
12+
<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.3"/>
1313

1414
# Network ACL Inbound Terraform Module
1515

16-
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
16+
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
1717

1818
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>
1919

@@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
2424
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
2525
an ACL, but also the ephemeral outbound ports for return traffic.
2626

27-
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-outbound) module for the analogous version of this module, but for opening
27+
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound) module for the analogous version of this module, but for opening
2828
outbound ports.
2929

3030
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
4747
4848
module "network_acl_inbound" {
4949
50-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.2"
50+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.3"
5151
5252
# ----------------------------------------------------------------------------------------------------
5353
# REQUIRED VARIABLES
@@ -134,7 +134,7 @@ module "network_acl_inbound" {
134134
# ------------------------------------------------------------------------------------------------------
135135
136136
terraform {
137-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.2"
137+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.3"
138138
}
139139
140140
inputs = {
@@ -221,11 +221,11 @@ inputs = {
221221
<!-- ##DOCS-SOURCER-START
222222
{
223223
"originalSources": [
224-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-inbound/readme.md",
225-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-inbound/variables.tf",
226-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-inbound/outputs.tf"
224+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound/readme.md",
225+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound/variables.tf",
226+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound/outputs.tf"
227227
],
228228
"sourcePlugin": "module-catalog-api",
229-
"hash": "db2b80c6c51c5132c0b9c24934500b35"
229+
"hash": "c7f369c7bc947aa801770e67227c7495"
230230
}
231231
##DOCS-SOURCER-END -->

docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
99
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
1010
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
1111

12-
<VersionBadge repoTitle="VPC Modules" version="0.23.2" lastModifiedVersion="0.22.3"/>
12+
<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.3"/>
1313

1414
# Network ACL Outbound Terraform Module
1515

16-
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
16+
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
1717

1818
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>
1919

@@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
2424
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
2525
outbound to an ACL, but also the ephemeral inbound ports for return traffic.
2626

27-
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-inbound) module for the analogous version of this module, but for opening
27+
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound) module for the analogous version of this module, but for opening
2828
inbound ports.
2929

3030
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
4747
4848
module "network_acl_outbound" {
4949
50-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.2"
50+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.3"
5151
5252
# ----------------------------------------------------------------------------------------------------
5353
# REQUIRED VARIABLES
@@ -134,7 +134,7 @@ module "network_acl_outbound" {
134134
# ------------------------------------------------------------------------------------------------------
135135
136136
terraform {
137-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.2"
137+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.3"
138138
}
139139
140140
inputs = {
@@ -221,11 +221,11 @@ inputs = {
221221
<!-- ##DOCS-SOURCER-START
222222
{
223223
"originalSources": [
224-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-outbound/readme.md",
225-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-outbound/variables.tf",
226-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-outbound/outputs.tf"
224+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound/readme.md",
225+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound/variables.tf",
226+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound/outputs.tf"
227227
],
228228
"sourcePlugin": "module-catalog-api",
229-
"hash": "85d339c45160df16146ee45db62035fe"
229+
"hash": "ee3662b3885f074df02a26821f8d7fb2"
230230
}
231231
##DOCS-SOURCER-END -->

docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
99
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
1010
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
1111

12-
<VersionBadge repoTitle="VPC Modules" version="0.23.2" lastModifiedVersion="0.22.3"/>
12+
<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.3"/>
1313

1414
# Port Calculator Module
1515

16-
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
16+
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
1717

1818
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>
1919

@@ -50,7 +50,7 @@ just those ports:
5050
5151
module "port_range_calculator" {
5252
53-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.2"
53+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.3"
5454
5555
# ----------------------------------------------------------------------------------------------------
5656
# REQUIRED VARIABLES
@@ -84,7 +84,7 @@ module "port_range_calculator" {
8484
# ------------------------------------------------------------------------------------------------------
8585
8686
terraform {
87-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.2"
87+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.3"
8888
}
8989
9090
inputs = {
@@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out
178178
<!-- ##DOCS-SOURCER-START
179179
{
180180
"originalSources": [
181-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/port-range-calculator/readme.md",
182-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/port-range-calculator/variables.tf",
183-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/port-range-calculator/outputs.tf"
181+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator/readme.md",
182+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator/variables.tf",
183+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator/outputs.tf"
184184
],
185185
"sourcePlugin": "module-catalog-api",
186-
"hash": "468c13918a8afc2053bad81dce11f2cf"
186+
"hash": "4b78554615b5e3ab47990e53e32ad827"
187187
}
188188
##DOCS-SOURCER-END -->

docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
99
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
1010
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
1111

12-
<VersionBadge repoTitle="VPC Modules" version="0.23.2" lastModifiedVersion="0.22.5"/>
12+
<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.5"/>
1313

1414
# VPC-App Network ACLs Terraform Module
1515

16-
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app-network-acls" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
16+
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
1717

1818
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.5" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>
1919

2020
This Terraform Module adds a default set of [Network
2121
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
22-
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
22+
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
2323
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):
2424

2525
* **Public subnet**: Allow all requests.
@@ -92,7 +92,7 @@ module "network_acls" {
9292
9393
module "vpc_app_network_acls" {
9494
95-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.2"
95+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.3"
9696
9797
# ----------------------------------------------------------------------------------------------------
9898
# REQUIRED VARIABLES
@@ -211,7 +211,7 @@ module "vpc_app_network_acls" {
211211
# ------------------------------------------------------------------------------------------------------
212212
213213
terraform {
214-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.2"
214+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.3"
215215
}
216216
217217
inputs = {
@@ -625,11 +625,11 @@ Use this variable to ensure the Network ACL does not get created until the VPC i
625625
<!-- ##DOCS-SOURCER-START
626626
{
627627
"originalSources": [
628-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app-network-acls/readme.md",
629-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app-network-acls/variables.tf",
630-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app-network-acls/outputs.tf"
628+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls/readme.md",
629+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls/variables.tf",
630+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls/outputs.tf"
631631
],
632632
"sourcePlugin": "module-catalog-api",
633-
"hash": "c8c9e99266808ae869f78e37c68a8668"
633+
"hash": "bab92e14ebf11d2b4a732d13a4315bf8"
634634
}
635635
##DOCS-SOURCER-END -->

docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,16 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
99
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
1010
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
1111

12-
<VersionBadge repoTitle="VPC Modules" version="0.23.2" lastModifiedVersion="0.22.8"/>
12+
<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.8"/>
1313

1414
# VPC-App Terraform Module
1515

16-
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
16+
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
1717

1818
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.8" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>
1919

2020
This Terraform Module launches a single VPC meant to house applications. By contrast, DevOps-related services such as
21-
Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-mgmt) module.)
21+
Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt) module.)
2222

2323
## What's a VPC?
2424

@@ -58,8 +58,8 @@ To summarize:
5858
* In a given subnet tier, there are usually three or four actual subnets, one for each Availability Zone.
5959
* Therefore, if we created a single VPC in the `us-west-2` region, which has Availability Zones `us-west-2a`,`us-west-2b`,
6060
and `us-west-2c`, each subnet tier would have three subnets (one per Availability Zone) for a total of 9 subnets in all.
61-
* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-mgmt),
62-
which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
61+
* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt),
62+
which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
6363
* Philosophically, everything in a VPC should be isolated from all resources in any other VPC. In particular, we want
6464
to ensure that our stage environment is completely independent from prod. This architecture helps to reinforce that.
6565

@@ -74,7 +74,7 @@ nearly all use-cases, and is consistent with many examples and existing document
7474

7575
## Other VPC Core Concepts
7676

77-
Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
77+
Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
7878

7979
## Sample Usage
8080

@@ -89,7 +89,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
8989
9090
module "vpc_app" {
9191
92-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.2"
92+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.3"
9393
9494
# ----------------------------------------------------------------------------------------------------
9595
# REQUIRED VARIABLES
@@ -420,7 +420,7 @@ module "vpc_app" {
420420
# ------------------------------------------------------------------------------------------------------
421421
422422
terraform {
423-
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.2"
423+
source = "git::[email protected]:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.3"
424424
}
425425
426426
inputs = {
@@ -1452,11 +1452,11 @@ A map of all public subnets, with the subnet name as the key, and all `aws-subne
14521452
<!-- ##DOCS-SOURCER-START
14531453
{
14541454
"originalSources": [
1455-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app/readme.md",
1456-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app/variables.tf",
1457-
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app/outputs.tf"
1455+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app/readme.md",
1456+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app/variables.tf",
1457+
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app/outputs.tf"
14581458
],
14591459
"sourcePlugin": "module-catalog-api",
1460-
"hash": "5624c9ed0c15c4e6a968c62ade2ea1d6"
1460+
"hash": "bba36203260707323140f85340469b78"
14611461
}
14621462
##DOCS-SOURCER-END -->

0 commit comments

Comments
 (0)