Skip to content

Commit d7d7a8f

Browse files
renovate[bot]renovate-botjnonino
authored
Update Terraform cn-terraform/ecs-alb/aws to v1.0.21 (#47)
* Update Terraform cn-terraform/ecs-alb/aws to v1.0.21 * Add missing variables Co-authored-by: Renovate Bot <[email protected]> Co-authored-by: Julian Nonino <[email protected]>
1 parent dee7347 commit d7d7a8f

File tree

4 files changed

+61
-10
lines changed

4 files changed

+61
-10
lines changed

.terraform.lock.hcl

Lines changed: 20 additions & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

README.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,19 +54,19 @@ In order to run all checks at any point run the following command:
5454
|------|---------|
5555
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13 |
5656
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 4 |
57-
| <a name="requirement_local"></a> [local](#requirement\_local) | 2.1.0 |
57+
| <a name="requirement_local"></a> [local](#requirement\_local) | >= 2 |
5858

5959
## Providers
6060

6161
| Name | Version |
6262
|------|---------|
63-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.1.0 |
63+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.14.0 |
6464

6565
## Modules
6666

6767
| Name | Source | Version |
6868
|------|--------|---------|
69-
| <a name="module_ecs-alb"></a> [ecs-alb](#module\_ecs-alb) | cn-terraform/ecs-alb/aws | 1.0.16 |
69+
| <a name="module_ecs-alb"></a> [ecs-alb](#module\_ecs-alb) | cn-terraform/ecs-alb/aws | 1.0.21 |
7070
| <a name="module_ecs-autoscaling"></a> [ecs-autoscaling](#module\_ecs-autoscaling) | cn-terraform/ecs-service-autoscaling/aws | 1.0.6 |
7171

7272
## Resources
@@ -85,7 +85,7 @@ In order to run all checks at any point run the following command:
8585
|------|-------------|------|---------|:--------:|
8686
| <a name="input_additional_certificates_arn_for_https_listeners"></a> [additional\_certificates\_arn\_for\_https\_listeners](#input\_additional\_certificates\_arn\_for\_https\_listeners) | (Optional) List of SSL server certificate ARNs for HTTPS listener. Use it if you need to set additional certificates besides default\_certificate\_arn | `list(any)` | `[]` | no |
8787
| <a name="input_assign_public_ip"></a> [assign\_public\_ip](#input\_assign\_public\_ip) | (Optional) Assign a public IP address to the ENI (Fargate launch type only). If true service will be associated with public subnets. Default false. | `bool` | `false` | no |
88-
| <a name="input_block_s3_bucket_public_access"></a> [block\_s3\_bucket\_public\_access](#input\_block\_s3\_bucket\_public\_access) | (Optional) If true, public access to the S3 bucket will be blocked. | `bool` | `false` | no |
88+
| <a name="input_block_s3_bucket_public_access"></a> [block\_s3\_bucket\_public\_access](#input\_block\_s3\_bucket\_public\_access) | (Optional) If true, public access to the S3 bucket will be blocked. | `bool` | `true` | no |
8989
| <a name="input_container_name"></a> [container\_name](#input\_container\_name) | Name of the running container | `any` | n/a | yes |
9090
| <a name="input_default_certificate_arn"></a> [default\_certificate\_arn](#input\_default\_certificate\_arn) | (Optional) The ARN of the default SSL server certificate. Required if var.https\_ports is set. | `string` | `null` | no |
9191
| <a name="input_deployment_controller"></a> [deployment\_controller](#input\_deployment\_controller) | (Optional) Deployment controller | `list(string)` | `[]` | no |
@@ -98,6 +98,8 @@ In order to run all checks at any point run the following command:
9898
| <a name="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling) | (Optional) If true, autoscaling alarms will be created. | `bool` | `true` | no |
9999
| <a name="input_enable_ecs_managed_tags"></a> [enable\_ecs\_managed\_tags](#input\_enable\_ecs\_managed\_tags) | (Optional) Specifies whether to enable Amazon ECS managed tags for the tasks within the service. | `bool` | `false` | no |
100100
| <a name="input_enable_execute_command"></a> [enable\_execute\_command](#input\_enable\_execute\_command) | (Optional) Specifies whether to enable Amazon ECS Exec for the tasks within the service. | `bool` | `false` | no |
101+
| <a name="input_enable_s3_bucket_server_side_encryption"></a> [enable\_s3\_bucket\_server\_side\_encryption](#input\_enable\_s3\_bucket\_server\_side\_encryption) | (Optional) If true, server side encryption will be applied. | `bool` | `true` | no |
102+
| <a name="input_enable_s3_logs"></a> [enable\_s3\_logs](#input\_enable\_s3\_logs) | (Optional) If true, all resources to send LB logs to S3 will be created | `bool` | `true` | no |
101103
| <a name="input_force_new_deployment"></a> [force\_new\_deployment](#input\_force\_new\_deployment) | (Optional) Enable to force a new task deployment of the service. This can be used to update tasks to use a newer Docker image with same image/tag combination (e.g. myimage:latest), roll Fargate tasks onto a newer platform version, or immediately deploy ordered\_placement\_strategy and placement\_constraints updates. | `bool` | `false` | no |
102104
| <a name="input_health_check_grace_period_seconds"></a> [health\_check\_grace\_period\_seconds](#input\_health\_check\_grace\_period\_seconds) | (Optional) Seconds to ignore failing load balancer health checks on newly instantiated tasks to prevent premature shutdown, up to 2147483647. Only valid for services configured to use load balancers. | `number` | `0` | no |
103105
| <a name="input_lb_deregistration_delay"></a> [lb\_deregistration\_delay](#input\_lb\_deregistration\_delay) | (Optional) The amount time for Elastic Load Balancing to wait before changing the state of a deregistering target from draining to unused. The range is 0-3600 seconds. The default value is 300 seconds. | `number` | `300` | no |
@@ -138,6 +140,8 @@ In order to run all checks at any point run the following command:
138140
| <a name="input_private_subnets"></a> [private\_subnets](#input\_private\_subnets) | The private subnets associated with the task or service. | `list(any)` | n/a | yes |
139141
| <a name="input_propagate_tags"></a> [propagate\_tags](#input\_propagate\_tags) | (Optional) Specifies whether to propagate the tags from the task definition or the service to the tasks. The valid values are SERVICE and TASK\_DEFINITION. Default to SERVICE | `string` | `"SERVICE"` | no |
140142
| <a name="input_public_subnets"></a> [public\_subnets](#input\_public\_subnets) | The public subnets associated with the task or service. | `list(any)` | n/a | yes |
143+
| <a name="input_s3_bucket_server_side_encryption_key"></a> [s3\_bucket\_server\_side\_encryption\_key](#input\_s3\_bucket\_server\_side\_encryption\_key) | (Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. | `string` | `"aws/s3"` | no |
144+
| <a name="input_s3_bucket_server_side_encryption_sse_algorithm"></a> [s3\_bucket\_server\_side\_encryption\_sse\_algorithm](#input\_s3\_bucket\_server\_side\_encryption\_sse\_algorithm) | (Optional) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms | `string` | `"aws:kms"` | no |
141145
| <a name="input_scale_target_max_capacity"></a> [scale\_target\_max\_capacity](#input\_scale\_target\_max\_capacity) | The max capacity of the scalable target | `number` | `5` | no |
142146
| <a name="input_scale_target_min_capacity"></a> [scale\_target\_min\_capacity](#input\_scale\_target\_min\_capacity) | The min capacity of the scalable target | `number` | `1` | no |
143147
| <a name="input_security_groups"></a> [security\_groups](#input\_security\_groups) | (Optional) The security groups associated with the task or service. If you do not specify a security group, the default security group for the VPC is used. | `list(any)` | `[]` | no |

main.tf

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,17 @@
33
#------------------------------------------------------------------------------
44
module "ecs-alb" {
55
source = "cn-terraform/ecs-alb/aws"
6-
version = "1.0.20"
6+
version = "1.0.21"
77

88
name_prefix = var.name_prefix
99
vpc_id = var.vpc_id
1010

11-
# S3 Bucket
12-
block_s3_bucket_public_access = var.block_s3_bucket_public_access
11+
# Application Load Balancer Logs S3 Bucket
12+
enable_s3_logs = var.enable_s3_logs
13+
block_s3_bucket_public_access = var.block_s3_bucket_public_access
14+
enable_s3_bucket_server_side_encryption = var.enable_s3_bucket_server_side_encryption
15+
s3_bucket_server_side_encryption_sse_algorithm = var.s3_bucket_server_side_encryption_sse_algorithm
16+
s3_bucket_server_side_encryption_key = var.s3_bucket_server_side_encryption_key
1317

1418
# Application Load Balancer
1519
internal = var.lb_internal

variables.tf

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -404,10 +404,34 @@ variable "additional_certificates_arn_for_https_listeners" {
404404
}
405405

406406
#------------------------------------------------------------------------------
407-
# S3 bucket
407+
# Load Balancer Logs S3 bucket
408408
#------------------------------------------------------------------------------
409+
variable "enable_s3_logs" {
410+
description = "(Optional) If true, all resources to send LB logs to S3 will be created"
411+
type = bool
412+
default = true
413+
}
414+
409415
variable "block_s3_bucket_public_access" {
410416
description = "(Optional) If true, public access to the S3 bucket will be blocked."
411417
type = bool
412-
default = false
418+
default = true
419+
}
420+
421+
variable "enable_s3_bucket_server_side_encryption" {
422+
description = "(Optional) If true, server side encryption will be applied."
423+
type = bool
424+
default = true
425+
}
426+
427+
variable "s3_bucket_server_side_encryption_sse_algorithm" {
428+
description = "(Optional) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms"
429+
type = string
430+
default = "aws:kms"
431+
}
432+
433+
variable "s3_bucket_server_side_encryption_key" {
434+
description = "(Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse_algorithm is aws:kms."
435+
type = string
436+
default = "aws/s3"
413437
}

0 commit comments

Comments
 (0)