From 00d4da689f86529e46058f0465e4c34444bfa723 Mon Sep 17 00:00:00 2001 From: Yann Pretot Date: Sun, 7 Jul 2024 13:33:24 +0200 Subject: [PATCH] docs: add missing vpc endpoint requirement --- README.md | 4 ++-- variables.tf | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index c887ac4..c9beb35 100644 --- a/README.md +++ b/README.md @@ -9,7 +9,7 @@ Although designed for seamless use with our [terraform-aws-ssm-tunnel](https://g - Supports all TCP port forwarding use cases through AWS SSM Session Manager - Auto-healing if the bastion task fails or if there are underlying infrastructure issues - Customizable CPU and memory allocation for the Fargate task -- Optionally assign a public IP to the bastion task if you don't have a NAT gateway or SSM & ECR VPC endpoints +- Optionally assign a public IP to the bastion task if you don't have a NAT gateway or ECR, SSM & SSM Messages VPC endpoints - Optionally run multiple concurrent instances of the bastion task for high availability ### Comparisons @@ -71,7 +71,7 @@ No modules. | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| -| [assign\_public\_ip](#input\_assign\_public\_ip) | Whether to assign a public IP to the bastion task. If false, you will need a NAT gateway or at least SSM & ECR VPC endpoints | `bool` | `false` | no | +| [assign\_public\_ip](#input\_assign\_public\_ip) | Whether to assign a public IP to the bastion task. If false, you will need a NAT gateway or at least ECR, SSM & SSM Messages VPC endpoints | `bool` | `false` | no | | [create\_default\_security\_group](#input\_create\_default\_security\_group) | Whether to create a default security group allowing all outbound traffic for the bastion task. If false, you will need to provide your own in `security_groups` | `bool` | `true` | no | | [desired\_count](#input\_desired\_count) | Number of instances of the bastion task to run | `number` | `1` | no | | [name](#input\_name) | The name of this stack. This will be used in the names of all resources created by this module | `string` | n/a | yes | diff --git a/variables.tf b/variables.tf index 77265fc..40f7529 100644 --- a/variables.tf +++ b/variables.tf @@ -40,7 +40,7 @@ variable "desired_count" { variable "assign_public_ip" { type = bool default = false - description = "Whether to assign a public IP to the bastion task. If false, you will need a NAT gateway or at least SSM & ECR VPC endpoints" + description = "Whether to assign a public IP to the bastion task. If false, you will need a NAT gateway or at least ECR, SSM & SSM Messages VPC endpoints" } variable "create_default_security_group" {