Jelajahi Sumber

Renames required_security_group to 'typical-host' to match legacy

To be tagged v0.6.3
Fred Damstra 5 tahun lalu
induk
melakukan
ff6bf1edc0

+ 3 - 3
base/dns/resolver_instance/main.tf

@@ -4,14 +4,14 @@ locals {
 
 # Rather than pass in the aws security group, we just look it up. This will
 # probably be useful other places, as well.
-data "aws_security_group" "required" {
-  name   = "required_group"
+data "aws_security_group" "typical-host" {
+  name   = "typical-host"
   vpc_id = var.vpc_id
 }
 
 resource "aws_network_interface" "instance" {
   subnet_id = var.subnet_id
-  security_groups = [ data.aws_security_group.required.id, aws_security_group.dns_security_group.id ]
+  security_groups = [ data.aws_security_group.typical-host.id, aws_security_group.dns_security_group.id ]
   description = local.instance_name
   tags = merge(var.standard_tags, var.tags, { Name = local.instance_name })
 }

+ 3 - 3
base/interconnects/main.tf

@@ -4,8 +4,8 @@ resource "aws_placement_group" "interconnects" {
   strategy = "spread"
 }
 
-module "required_security_group" {
-  source = "../../submodules/security_group/required_group"
+module "typical_host_security_group" {
+  source = "../../submodules/security_group/typical_host"
 
   vpc_id = var.security_vpc
   cidr_map = var.cidr_map
@@ -17,7 +17,7 @@ module "required_security_group" {
 resource "aws_network_interface" "interconnects" {
   count = var.interconnects_count
   subnet_id = var.subnet_id_map["untrusted"][count.index % 2]
-  security_groups = [ module.required_security_group.id, aws_security_group.interconnects_sg.id ]
+  security_groups = [ module.typical_host_security_group.id, aws_security_group.interconnects_sg.id ]
   source_dest_check = false
   private_ips_count = 0
   description = "XDR Interconnect ${count.index}"

+ 2 - 2
base/standard_vpc/security-groups.tf

@@ -88,8 +88,8 @@ module "allow_all_outbound_sg" {
 #  ingress_rules = [ "ssh-tcp", "all-icmp" ]
 #}
 
-module "required_security_group" {
-  source = "../../submodules/security_group/required_group"
+module "typical_host_security_group" {
+  source = "../../submodules/security_group/typical_host"
 
   vpc_id = module.vpc.vpc_id
   cidr_map = var.cidr_map

+ 0 - 0
submodules/security_group/required_group/README.md → submodules/security_group/typical_host/README.md


+ 3 - 3
submodules/security_group/required_group/main.tf → submodules/security_group/typical_host/main.tf

@@ -14,10 +14,10 @@ locals {
 }
 
 resource "aws_security_group" "security_group" {
-  name = "required_group"
-  description = "Required Security Group for VPC ${local.vpc_name} (${var.vpc_id})"
+  name = "typical-host"
+  description = "Required typical-host SG for VPC ${local.vpc_name} (${var.vpc_id})"
   vpc_id = var.vpc_id
-  tags = merge(var.tags, { "Name" = "required_group", "vpc_name" = local.vpc_name })
+  tags = merge(var.tags, { "Name" = "typical-host", "vpc_name" = local.vpc_name })
 }
 
 ## Ingress

+ 0 - 0
submodules/security_group/required_group/outputs.tf → submodules/security_group/typical_host/outputs.tf


+ 0 - 0
submodules/security_group/required_group/vars.tf → submodules/security_group/typical_host/vars.tf