-
Notifications
You must be signed in to change notification settings - Fork 3
/
output.tf
206 lines (168 loc) · 5.07 KB
/
output.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
output "gitlab_server_ip" {
value = module.gitlab.server_public_ip
description = "Public IP of the GitLab server"
}
output "gitlab_hostname" {
description = "Public hostname of GitLab Server"
value = module.gitlab.server_hostname
}
output "gitlab_ci_public_ip" {
value = module.gitlab.ci_public_ip
description = "Public IP of the Gitlab CI runner"
}
output "gitlab_ci_private_ip" {
value = module.gitlab.ci_private_ip
description = "Private IP of the Gitlab CI runner"
}
output "gitlab_ssh_private_key" {
description = "Private SSH key for GitLab Server and CI runner"
value = module.gitlab.gitlab_ssh_private_key
}
output "gitlab_root_pw" {
description = "root pw for gitlab"
value = module.gitlab.gitlab_root_pw
sensitive = true
}
output "gitlab_root_token" {
description = "root token for gitlab"
value = module.gitlab.gitlab_root_token
sensitive = true
}
output "gitlab_ssh_public_key" {
description = "Public SSH key for GitLab Server and CI runner"
value = module.gitlab.gitlab_ssh_public_key
}
output "domain" {
value = var.domain
description = "Base domain used for this tenant"
}
output "vpc_id" {
value = module.vpc.vpc_id
description = "VPC ID used as base for this tenant"
}
output "public_subnet_ids" {
description = "Ids of public subnets"
value = module.public_subnets.named_subnet_ids
}
output "private_subnet_ids" {
description = " Ids of private subnets"
value = module.private_subnets.named_subnet_ids
}
output "default_security_group_id" {
description = "Default SG of created VPC"
value = module.vpc.vpc_default_security_group_id
}
output "igw_id" {
description = "Internet Gateway ID"
value = module.vpc.igw_id
}
output "private_zone_id" {
description = "Id of private DNS zone"
value = aws_route53_zone.tenant_private.zone_id
}
output "private_zone_name" {
description = "Private DNS zone. Takes the form of $${var.tenant}.$${var.domain}.internal"
value = aws_route53_zone.tenant_private.name
}
output "public_zone_id" {
description = "Id of public DNS zone"
value = aws_route53_zone.tenant_public.zone_id
}
output "public_zone_name" {
description = "Public DNS zone"
value = aws_route53_zone.tenant_public.name
}
output "main_zone_id" {
description = "Id of var.domain"
value = aws_route53_zone.tenant_public.zone_id
}
output "public_subnets_ngw_id" {
description = "Network Gateway ID"
value = module.public_subnets.ngw_id
}
output "public_subnets" {
description = "Full access to the public subnet objects"
value = module.public_subnets
}
output "private_subnets" {
description = "Full access to the private subnet objects"
value = module.private_subnets
}
#nexus outputs
output "nexus_ssh_private_key" {
description = "Private SSH key for Nexus Server"
value = module.nexus.nexus_ssh_private_key
sensitive = true
}
output "nexus_ssh_public_key" {
description = "Public SSH key for Nexus Server"
value = module.nexus.nexus_ssh_public_key
}
output "nexus_admin_pw" {
description = "nexus admin password"
value = module.nexus.nexus_admin_pw
sensitive = true
}
output "nexus_fqdn" {
description = "FQDN for for Nexus Server"
value = module.nexus.server_hostname
}
output "nexus_docker_repo_listening_port" {
description = "FQDN for for Nexus Server"
value = var.nexus_docker_repo_listening_port
}
output "wireguard_ssh_key_path" {
value = "${path.module}/wireguard_ssh_provisioner_key"
}
output "wireguard_public_ip" {
value = module.wireguard.public_ip
}
output "wireguard_private_ip" {
value = module.wireguard.private_ip
}
output "wireguard_vpn_hostname" {
value = module.wireguard.hostname
description = "Public Wireguard hostname"
}
output "wireguard_ssh_private_key" {
description = "Private SSH key for Wireguard Server"
value = tls_private_key.wireguard_provisioner_key.private_key_pem
sensitive = true
}
output "wireguard_ui_admin_pw" {
description = "admin pw for Wireguard UI"
value = random_password.wireguard_password.result
sensitive = true
}
output "iac_user_key_id" {
description = "key id for iac user"
value = aws_iam_access_key.gitlab_ci_iam_user_key.id
sensitive = false
}
output "iac_user_key_secret" {
description = "key secret for iac user"
value = aws_iam_access_key.gitlab_ci_iam_user_key.secret
sensitive = true
}
output "ses_user" {
description = "ses user"
value = var.smtp_server_enable ? module.ses[0].user_name : "user"
sensitive = false
}
output "ses_pw" {
description = "ses pw"
value = var.smtp_server_enable ? module.ses[0].ses_smtp_password : "pass"
sensitive = true
}
output "availability_zones" {
description = "azs used in tenancy"
value = local.availability_zones
}
output "natgw_public_ip" {
description = "natgw public ip"
value = module.public_subnets.ngw_public_ip
}
output "natgw_private_ip" {
description = "natgw private ip"
value = module.public_subnets.ngw_private_ip
}