File tree Expand file tree Collapse file tree 4 files changed +10
-15
lines changed
Expand file tree Collapse file tree 4 files changed +10
-15
lines changed Original file line number Diff line number Diff line change @@ -210,8 +210,8 @@ resource "aws_security_group" "elb_security_group" {
210210 description = " ELB security group"
211211 vpc_id = var. vpc_id
212212 egress {
213- from_port = 0
214- to_port = 0
213+ from_port = 0
214+ to_port = 0
215215 protocol = " -1"
216216 cidr_blocks = [" 0.0.0.0/0" ]
217217 }
Original file line number Diff line number Diff line change @@ -16,35 +16,27 @@ resource "aws_security_group" "permissive_sg" {
1616resource "aws_vpc_security_group_ingress_rule" "ingress_rule_ipv4" {
1717 security_group_id = aws_security_group. permissive_sg . id
1818 cidr_ipv4 = " 0.0.0.0/0"
19- from_port = 0
2019 ip_protocol = " -1"
21- to_port = 0
2220 }
2321
2422resource "aws_vpc_security_group_egress_rule" "egress_rule_ipv4" {
2523 security_group_id = aws_security_group. permissive_sg . id
2624 cidr_ipv4 = " 0.0.0.0/0"
27- from_port = 0
2825 ip_protocol = " -1"
29- to_port = 0
3026 }
3127
3228resource "aws_vpc_security_group_ingress_rule" "ingress_rule_ipv6" {
3329 count = var. enable_ipv6 ? 1 : 0
3430 security_group_id = aws_security_group. permissive_sg . id
3531 cidr_ipv6 = " ::/0"
36- from_port = 0
3732 ip_protocol = " -1"
38- to_port = 0
3933 }
4034
4135resource "aws_vpc_security_group_egress_rule" "egress_rule_ipv6" {
4236 count = var. enable_ipv6 ? 1 : 0
4337 security_group_id = aws_security_group. permissive_sg . id
4438 cidr_ipv6 = " ::/0"
45- from_port = 0
4639 ip_protocol = " -1"
47- to_port = 0
4840}
4941
5042resource "aws_launch_template" "asg_launch_template" {
@@ -60,8 +52,11 @@ resource "aws_launch_template" "asg_launch_template" {
6052 http_tokens = var. metadata_imdsv2_required ? " required" : " optional"
6153 }
6254
63- iam_instance_profile {
64- name = ( var. enable_cloudwatch ? aws_iam_instance_profile. instance_profile [0 ]. name : " " )
55+ dynamic "iam_instance_profile" {
56+ for_each = var. enable_cloudwatch ? [1 ] : []
57+ content {
58+ name = aws_iam_instance_profile. instance_profile [0 ]. name
59+ }
6560 }
6661
6762 monitoring {
Original file line number Diff line number Diff line change @@ -5,8 +5,8 @@ resource "aws_security_group" "servers_security_group" {
55 vpc_id = var. vpc_id
66
77 ingress {
8- from_port = 0
9- to_port = 0
8+ from_port = 0
9+ to_port = 0
1010 protocol = " -1"
1111 cidr_blocks = [" 0.0.0.0/0" ]
1212 }
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ provider "aws" {}
3131
3232module "example_module" {
3333
34- source = "CheckPointSW/cloudguard-network-security/aws//modules/tgw_gwlb "
34+ source = "CheckPointSW/cloudguard-network-security/aws//modules/tgw_gwlb_master "
3535 version = "1.0.4"
3636
3737 // --- VPC Network Configuration --
You can’t perform that action at this time.
0 commit comments