|
@@ -65,6 +65,39 @@ resource "aws_security_group_rule" "ping_outbound" {
|
|
|
cidr_blocks = [ "0.0.0.0/0" ]
|
|
|
}
|
|
|
|
|
|
+resource "aws_security_group_rule" "github_access_ssh" {
|
|
|
+ security_group_id = aws_security_group.security_group.id
|
|
|
+ type = "egress"
|
|
|
+ description = "Outbound GitHub"
|
|
|
+ from_port = 22
|
|
|
+ to_port = 22
|
|
|
+ protocol = "tcp"
|
|
|
+ cidr_blocks = var.cidr_map["vpc-public"]
|
|
|
+ count = length(var.cidr_map["vpc-public"]) > 0 ? 1 : 0
|
|
|
+}
|
|
|
+
|
|
|
+resource "aws_security_group_rule" "github_access_http" {
|
|
|
+ security_group_id = aws_security_group.security_group.id
|
|
|
+ type = "egress"
|
|
|
+ description = "Outbound GitHub"
|
|
|
+ from_port = 80
|
|
|
+ to_port = 80
|
|
|
+ protocol = "tcp"
|
|
|
+ cidr_blocks = var.cidr_map["vpc-public"]
|
|
|
+ count = length(var.cidr_map["vpc-public"]) > 0 ? 1 : 0
|
|
|
+}
|
|
|
+
|
|
|
+resource "aws_security_group_rule" "github_access_https" {
|
|
|
+ security_group_id = aws_security_group.security_group.id
|
|
|
+ type = "egress"
|
|
|
+ description = "Outbound GitHub"
|
|
|
+ from_port = 443
|
|
|
+ to_port = 443
|
|
|
+ protocol = "tcp"
|
|
|
+ cidr_blocks = var.cidr_map["vpc-public"]
|
|
|
+ count = length(var.cidr_map["vpc-public"]) > 0 ? 1 : 0
|
|
|
+}
|
|
|
+
|
|
|
resource "aws_security_group_rule" "dns_access_tcp" {
|
|
|
security_group_id = aws_security_group.security_group.id
|
|
|
type = "egress"
|