You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_flow_log_traffic_type"></a> [flow\_log\_traffic\_type](#input\_flow\_log\_traffic\_type)| The type of traffic to capture. Valid values: ACCEPT, REJECT, ALL |`string`|`"ALL"`| no |
471
473
| <aname="input_igw_tags"></a> [igw\_tags](#input\_igw\_tags)| Additional tags for the internet gateway |`map(string)`|`{}`| no |
472
474
| <aname="input_instance_tenancy"></a> [instance\_tenancy](#input\_instance\_tenancy)| A tenancy option for instances launched into the VPC |`string`|`"default"`| no |
475
+
| <aname="input_internet_gateway_block_enabled"></a> [internet\_gateway\_block\_enabled](#input\_internet\_gateway\_block\_enabled)| Enable AWS VPC Block Public Access Options. Default is `false`|`bool`|`false`| no |
476
+
| <aname="input_internet_gateway_block_mode"></a> [internet\_gateway\_block\_mode](#input\_internet\_gateway\_block\_mode)| Block mode. Needs to be one of `block-bidirectional`, `block-ingress`, `off`. Default is `off`|`string`|`"off"`| no |
473
477
| <aname="input_intra_acl_tags"></a> [intra\_acl\_tags](#input\_intra\_acl\_tags)| Additional tags for the intra subnets network ACL |`map(string)`|`{}`| no |
474
478
| <aname="input_intra_dedicated_network_acl"></a> [intra\_dedicated\_network\_acl](#input\_intra\_dedicated\_network\_acl)| Whether to use dedicated network ACL (not default) and custom rules for intra subnets |`bool`|`false`| no |
| <aname="input_single_nat_gateway"></a> [single\_nat\_gateway](#input\_single\_nat\_gateway)| Should be true if you want to provision a single shared NAT Gateway across all of your private networks |`bool`|`false`| no |
582
586
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
583
587
| <aname="input_use_ipam_pool"></a> [use\_ipam\_pool](#input\_use\_ipam\_pool)| Determines whether IPAM pool is used for CIDR allocation |`bool`|`false`| no |
588
+
| <aname="input_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#input\_vpc\_block\_public\_access\_exclusions)| List of VPC Block Public Access Exclusions |`map(any)`|`{}`| no |
584
589
| <aname="input_vpc_flow_log_iam_policy_name"></a> [vpc\_flow\_log\_iam\_policy\_name](#input\_vpc\_flow\_log\_iam\_policy\_name)| Name of the IAM policy |`string`|`"vpc-flow-log-to-cloudwatch"`| no |
585
590
| <aname="input_vpc_flow_log_iam_policy_use_name_prefix"></a> [vpc\_flow\_log\_iam\_policy\_use\_name\_prefix](#input\_vpc\_flow\_log\_iam\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`vpc_flow_log_iam_policy_name`) is used as a prefix |`bool`|`true`| no |
586
591
| <aname="input_vpc_flow_log_iam_role_name"></a> [vpc\_flow\_log\_iam\_role\_name](#input\_vpc\_flow\_log\_iam\_role\_name)| Name to use on the VPC Flow Log IAM role created |`string`|`"vpc-flow-log-role"`| no |
0 commit comments