-
-
Notifications
You must be signed in to change notification settings - Fork 356
/
security-group.tf
37 lines (30 loc) · 1.73 KB
/
security-group.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
# -----------------------------------------------------------------------
# Rules for EKS-managed Security Group
# -----------------------------------------------------------------------
locals {
cluster_security_group_id = one(aws_eks_cluster.default[*].vpc_config[0].cluster_security_group_id)
managed_security_group_rules_enabled = local.enabled && var.managed_security_group_rules_enabled
}
resource "aws_vpc_security_group_ingress_rule" "managed_ingress_security_groups" {
count = local.managed_security_group_rules_enabled ? length(var.allowed_security_group_ids) : 0
description = "Allow inbound traffic from existing Security Groups"
ip_protocol = "-1"
referenced_security_group_id = var.allowed_security_group_ids[count.index]
security_group_id = local.cluster_security_group_id
}
resource "aws_vpc_security_group_ingress_rule" "managed_ingress_cidr_blocks" {
count = local.managed_security_group_rules_enabled ? length(var.allowed_cidr_blocks) : 0
description = "Allow inbound traffic from CIDR blocks"
ip_protocol = "-1"
cidr_ipv4 = var.allowed_cidr_blocks[count.index]
security_group_id = local.cluster_security_group_id
}
resource "aws_vpc_security_group_ingress_rule" "custom_ingress_rules" {
for_each = { for sg_rule in var.custom_ingress_rules : sg_rule.source_security_group_id => sg_rule }
description = each.value.description
from_port = each.value.from_port
to_port = each.value.to_port
ip_protocol = each.value.protocol
referenced_security_group_id = each.value.source_security_group_id
security_group_id = local.cluster_security_group_id
}