diff --git a/README.md b/README.md
index d7629ed..2636566 100644
--- a/README.md
+++ b/README.md
@@ -167,6 +167,7 @@ Available targets:
| [aws_api_gateway_rest_api.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_rest_api) | resource |
| [aws_api_gateway_rest_api_policy.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_rest_api_policy) | resource |
| [aws_api_gateway_stage.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage) | resource |
+| [aws_api_gateway_vpc_link.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_vpc_link) | resource |
## Inputs
@@ -191,6 +192,7 @@ Available targets:
| [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a `tag`.
The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `null` | no |
| [namespace](#input\_namespace) | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique | `string` | `null` | no |
| [openapi\_config](#input\_openapi\_config) | The OpenAPI specification for the API | `any` | `{}` | no |
+| [private\_link\_target\_arns](#input\_private\_link\_target\_arns) | A list of target ARNs for VPC Private Link | `list(string)` | `[]` | no |
| [regex\_replace\_chars](#input\_regex\_replace\_chars) | Terraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. | `string` | `null` | no |
| [rest\_api\_policy](#input\_rest\_api\_policy) | The IAM policy document for the API. | `string` | `null` | no |
| [stage](#input\_stage) | ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no |
@@ -310,7 +312,7 @@ In general, PRs are welcome. We follow the typical "fork-and-pull" Git workflow.
## Copyright
-Copyright © 2017-2021 [Cloud Posse, LLC](https://cpco.io/copyright)
+Copyright © 2017-2022 [Cloud Posse, LLC](https://cpco.io/copyright)
diff --git a/docs/terraform.md b/docs/terraform.md
index a959779..260a403 100644
--- a/docs/terraform.md
+++ b/docs/terraform.md
@@ -28,6 +28,7 @@
| [aws_api_gateway_rest_api.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_rest_api) | resource |
| [aws_api_gateway_rest_api_policy.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_rest_api_policy) | resource |
| [aws_api_gateway_stage.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage) | resource |
+| [aws_api_gateway_vpc_link.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_vpc_link) | resource |
## Inputs
@@ -52,6 +53,7 @@
| [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a `tag`.
The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `null` | no |
| [namespace](#input\_namespace) | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique | `string` | `null` | no |
| [openapi\_config](#input\_openapi\_config) | The OpenAPI specification for the API | `any` | `{}` | no |
+| [private\_link\_target\_arns](#input\_private\_link\_target\_arns) | A list of target ARNs for VPC Private Link | `list(string)` | `[]` | no |
| [regex\_replace\_chars](#input\_regex\_replace\_chars) | Terraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. | `string` | `null` | no |
| [rest\_api\_policy](#input\_rest\_api\_policy) | The IAM policy document for the API. | `string` | `null` | no |
| [stage](#input\_stage) | ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no |
diff --git a/examples/private-link/context.tf b/examples/private-link/context.tf
new file mode 100644
index 0000000..5e0ef88
--- /dev/null
+++ b/examples/private-link/context.tf
@@ -0,0 +1,279 @@
+#
+# ONLY EDIT THIS FILE IN github.com/cloudposse/terraform-null-label
+# All other instances of this file should be a copy of that one
+#
+#
+# Copy this file from https://github.com/cloudposse/terraform-null-label/blob/master/exports/context.tf
+# and then place it in your Terraform module to automatically get
+# Cloud Posse's standard configuration inputs suitable for passing
+# to Cloud Posse modules.
+#
+# curl -sL https://raw.githubusercontent.com/cloudposse/terraform-null-label/master/exports/context.tf -o context.tf
+#
+# Modules should access the whole context as `module.this.context`
+# to get the input variables with nulls for defaults,
+# for example `context = module.this.context`,
+# and access individual variables as `module.this.`,
+# with final values filled in.
+#
+# For example, when using defaults, `module.this.context.delimiter`
+# will be null, and `module.this.delimiter` will be `-` (hyphen).
+#
+
+module "this" {
+ source = "cloudposse/label/null"
+ version = "0.25.0" # requires Terraform >= 0.13.0
+
+ enabled = var.enabled
+ namespace = var.namespace
+ tenant = var.tenant
+ environment = var.environment
+ stage = var.stage
+ name = var.name
+ delimiter = var.delimiter
+ attributes = var.attributes
+ tags = var.tags
+ additional_tag_map = var.additional_tag_map
+ label_order = var.label_order
+ regex_replace_chars = var.regex_replace_chars
+ id_length_limit = var.id_length_limit
+ label_key_case = var.label_key_case
+ label_value_case = var.label_value_case
+ descriptor_formats = var.descriptor_formats
+ labels_as_tags = var.labels_as_tags
+
+ context = var.context
+}
+
+# Copy contents of cloudposse/terraform-null-label/variables.tf here
+
+variable "context" {
+ type = any
+ default = {
+ enabled = true
+ namespace = null
+ tenant = null
+ environment = null
+ stage = null
+ name = null
+ delimiter = null
+ attributes = []
+ tags = {}
+ additional_tag_map = {}
+ regex_replace_chars = null
+ label_order = []
+ id_length_limit = null
+ label_key_case = null
+ label_value_case = null
+ descriptor_formats = {}
+ # Note: we have to use [] instead of null for unset lists due to
+ # https://github.com/hashicorp/terraform/issues/28137
+ # which was not fixed until Terraform 1.0.0,
+ # but we want the default to be all the labels in `label_order`
+ # and we want users to be able to prevent all tag generation
+ # by setting `labels_as_tags` to `[]`, so we need
+ # a different sentinel to indicate "default"
+ labels_as_tags = ["unset"]
+ }
+ description = <<-EOT
+ Single object for setting entire context at once.
+ See description of individual variables for details.
+ Leave string and numeric variables as `null` to use default value.
+ Individual variable settings (non-null) override settings in context object,
+ except for attributes, tags, and additional_tag_map, which are merged.
+ EOT
+
+ validation {
+ condition = lookup(var.context, "label_key_case", null) == null ? true : contains(["lower", "title", "upper"], var.context["label_key_case"])
+ error_message = "Allowed values: `lower`, `title`, `upper`."
+ }
+
+ validation {
+ condition = lookup(var.context, "label_value_case", null) == null ? true : contains(["lower", "title", "upper", "none"], var.context["label_value_case"])
+ error_message = "Allowed values: `lower`, `title`, `upper`, `none`."
+ }
+}
+
+variable "enabled" {
+ type = bool
+ default = null
+ description = "Set to false to prevent the module from creating any resources"
+}
+
+variable "namespace" {
+ type = string
+ default = null
+ description = "ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique"
+}
+
+variable "tenant" {
+ type = string
+ default = null
+ description = "ID element _(Rarely used, not included by default)_. A customer identifier, indicating who this instance of a resource is for"
+}
+
+variable "environment" {
+ type = string
+ default = null
+ description = "ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'"
+}
+
+variable "stage" {
+ type = string
+ default = null
+ description = "ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'"
+}
+
+variable "name" {
+ type = string
+ default = null
+ description = <<-EOT
+ ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
+ This is the only ID element not also included as a `tag`.
+ The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input.
+ EOT
+}
+
+variable "delimiter" {
+ type = string
+ default = null
+ description = <<-EOT
+ Delimiter to be used between ID elements.
+ Defaults to `-` (hyphen). Set to `""` to use no delimiter at all.
+ EOT
+}
+
+variable "attributes" {
+ type = list(string)
+ default = []
+ description = <<-EOT
+ ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,
+ in the order they appear in the list. New attributes are appended to the
+ end of the list. The elements of the list are joined by the `delimiter`
+ and treated as a single ID element.
+ EOT
+}
+
+variable "labels_as_tags" {
+ type = set(string)
+ default = ["default"]
+ description = <<-EOT
+ Set of labels (ID elements) to include as tags in the `tags` output.
+ Default is to include all labels.
+ Tags with empty values will not be included in the `tags` output.
+ Set to `[]` to suppress all generated tags.
+ **Notes:**
+ The value of the `name` tag, if included, will be the `id`, not the `name`.
+ Unlike other `null-label` inputs, the initial setting of `labels_as_tags` cannot be
+ changed in later chained modules. Attempts to change it will be silently ignored.
+ EOT
+}
+
+variable "tags" {
+ type = map(string)
+ default = {}
+ description = <<-EOT
+ Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).
+ Neither the tag keys nor the tag values will be modified by this module.
+ EOT
+}
+
+variable "additional_tag_map" {
+ type = map(string)
+ default = {}
+ description = <<-EOT
+ Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.
+ This is for some rare cases where resources want additional configuration of tags
+ and therefore take a list of maps with tag key, value, and additional configuration.
+ EOT
+}
+
+variable "label_order" {
+ type = list(string)
+ default = null
+ description = <<-EOT
+ The order in which the labels (ID elements) appear in the `id`.
+ Defaults to ["namespace", "environment", "stage", "name", "attributes"].
+ You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.
+ EOT
+}
+
+variable "regex_replace_chars" {
+ type = string
+ default = null
+ description = <<-EOT
+ Terraform regular expression (regex) string.
+ Characters matching the regex will be removed from the ID elements.
+ If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits.
+ EOT
+}
+
+variable "id_length_limit" {
+ type = number
+ default = null
+ description = <<-EOT
+ Limit `id` to this many characters (minimum 6).
+ Set to `0` for unlimited length.
+ Set to `null` for keep the existing setting, which defaults to `0`.
+ Does not affect `id_full`.
+ EOT
+ validation {
+ condition = var.id_length_limit == null ? true : var.id_length_limit >= 6 || var.id_length_limit == 0
+ error_message = "The id_length_limit must be >= 6 if supplied (not null), or 0 for unlimited length."
+ }
+}
+
+variable "label_key_case" {
+ type = string
+ default = null
+ description = <<-EOT
+ Controls the letter case of the `tags` keys (label names) for tags generated by this module.
+ Does not affect keys of tags passed in via the `tags` input.
+ Possible values: `lower`, `title`, `upper`.
+ Default value: `title`.
+ EOT
+
+ validation {
+ condition = var.label_key_case == null ? true : contains(["lower", "title", "upper"], var.label_key_case)
+ error_message = "Allowed values: `lower`, `title`, `upper`."
+ }
+}
+
+variable "label_value_case" {
+ type = string
+ default = null
+ description = <<-EOT
+ Controls the letter case of ID elements (labels) as included in `id`,
+ set as tag values, and output by this module individually.
+ Does not affect values of tags passed in via the `tags` input.
+ Possible values: `lower`, `title`, `upper` and `none` (no transformation).
+ Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs.
+ Default value: `lower`.
+ EOT
+
+ validation {
+ condition = var.label_value_case == null ? true : contains(["lower", "title", "upper", "none"], var.label_value_case)
+ error_message = "Allowed values: `lower`, `title`, `upper`, `none`."
+ }
+}
+
+variable "descriptor_formats" {
+ type = any
+ default = {}
+ description = <<-EOT
+ Describe additional descriptors to be output in the `descriptors` output map.
+ Map of maps. Keys are names of descriptors. Values are maps of the form
+ `{
+ format = string
+ labels = list(string)
+ }`
+ (Type is `any` so the map values can later be enhanced to provide additional options.)
+ `format` is a Terraform format string to be passed to the `format()` function.
+ `labels` is a list of labels, in order, to pass to `format()` function.
+ Label values will be normalized before being passed to `format()` so they will be
+ identical to how they appear in `id`.
+ Default is `{}` (`descriptors` output will be empty).
+ EOT
+}
+
+#### End of copy of cloudposse/terraform-null-label/variables.tf
diff --git a/examples/private-link/fixtures.us-east-2.tfvars b/examples/private-link/fixtures.us-east-2.tfvars
new file mode 100644
index 0000000..4d5e4fa
--- /dev/null
+++ b/examples/private-link/fixtures.us-east-2.tfvars
@@ -0,0 +1,5 @@
+region = "us-east-2"
+namespace = "eg"
+environment = "ue2"
+stage = "test"
+logging_level = "OFF"
diff --git a/examples/private-link/main.tf b/examples/private-link/main.tf
new file mode 100644
index 0000000..6e47217
--- /dev/null
+++ b/examples/private-link/main.tf
@@ -0,0 +1,80 @@
+provider "aws" {
+ region = var.region
+}
+
+resource "aws_vpc" "this" {
+ cidr_block = "10.99.0.0/16"
+ instance_tenancy = "default"
+}
+
+resource "aws_subnet" "private1" {
+ vpc_id = aws_vpc.this.id
+ cidr_block = "10.99.1.0/24"
+}
+
+resource "aws_subnet" "private2" {
+ vpc_id = aws_vpc.this.id
+ cidr_block = "10.99.2.0/24"
+}
+
+resource "aws_security_group" "this" {
+ name = "allow_http"
+ description = "Allow HTTP inbound traffic"
+ vpc_id = aws_vpc.this.id
+
+ ingress {
+ description = "HTTP from VPC"
+ from_port = 80
+ to_port = 80
+ protocol = "tcp"
+ cidr_blocks = ["0.0.0.0/0"]
+ }
+
+ egress {
+ from_port = 0
+ to_port = 0
+ protocol = "-1"
+ cidr_blocks = ["0.0.0.0/0"]
+ ipv6_cidr_blocks = ["::/0"]
+ }
+
+
+}
+
+resource "aws_lb" "this" {
+ name = module.this.id
+ internal = true
+ load_balancer_type = "network"
+ subnets = [aws_subnet.private1.id, aws_subnet.private2.id]
+
+ enable_deletion_protection = false
+}
+
+module "api_gateway" {
+ source = "../../"
+
+ openapi_config = {
+ openapi = "3.0.1"
+ info = {
+ title = "example"
+ version = "1.0"
+ }
+ paths = {
+ "/path1" = {
+ get = {
+ x-amazon-apigateway-integration = {
+ httpMethod = "GET"
+ payloadFormatVersion = "1.0"
+ type = "HTTP_PROXY"
+ connectionType = "VPC_LINK"
+ connectionId = "$${stageVariables.vpc_link_id}"
+ uri = "https://ip-ranges.amazonaws.com/ip-ranges.json"
+ }
+ }
+ }
+ }
+ }
+ logging_level = var.logging_level
+ private_link_target_arns = [aws_lb.this.arn]
+ context = module.this.context
+}
diff --git a/examples/private-link/outputs.tf b/examples/private-link/outputs.tf
new file mode 100644
index 0000000..1e595bb
--- /dev/null
+++ b/examples/private-link/outputs.tf
@@ -0,0 +1,9 @@
+output "created_date" {
+ description = "The date the REST API was created"
+ value = module.api_gateway.created_date
+}
+
+output "invoke_url" {
+ description = "The URL to invoke the REST API"
+ value = module.api_gateway.invoke_url
+}
diff --git a/examples/private-link/variables.tf b/examples/private-link/variables.tf
new file mode 100644
index 0000000..6d93f69
--- /dev/null
+++ b/examples/private-link/variables.tf
@@ -0,0 +1,14 @@
+variable "region" {
+ type = string
+ description = "AWS Region"
+}
+
+variable "logging_level" {
+ type = string
+ default = "INFO"
+
+ validation {
+ condition = contains(["OFF", "INFO", "ERROR"], var.logging_level)
+ error_message = "Valid values for var: logging_level are (OFF, INFO, ERROR)."
+ }
+}
diff --git a/examples/private-link/versions.tf b/examples/private-link/versions.tf
new file mode 100644
index 0000000..34260e6
--- /dev/null
+++ b/examples/private-link/versions.tf
@@ -0,0 +1,10 @@
+terraform {
+ required_version = ">= 0.13"
+
+ required_providers {
+ aws = {
+ source = "hashicorp/aws"
+ version = ">= 3.0"
+ }
+ }
+}
diff --git a/main.tf b/main.tf
index d5667d8..86c38a6 100644
--- a/main.tf
+++ b/main.tf
@@ -3,6 +3,7 @@ locals {
create_rest_api_policy = local.enabled && var.rest_api_policy != null
create_log_group = local.enabled && var.logging_level != "OFF"
log_group_arn = local.create_log_group ? module.cloudwatch_log_group.log_group_arn : null
+ vpc_link_enabled = local.enabled && length(var.private_link_target_arns) > 0
}
resource "aws_api_gateway_rest_api" "this" {
@@ -53,6 +54,10 @@ resource "aws_api_gateway_stage" "this" {
xray_tracing_enabled = var.xray_tracing_enabled
tags = module.this.tags
+ variables = {
+ vpc_link_id = local.vpc_link_enabled ? aws_api_gateway_vpc_link.this[0].id : null
+ }
+
dynamic "access_log_settings" {
for_each = local.create_log_group ? [1] : []
@@ -75,3 +80,11 @@ resource "aws_api_gateway_method_settings" "all" {
logging_level = var.logging_level
}
}
+
+# Optionally create a VPC Link to allow the API Gateway to communicate with private resources (e.g. ALB)
+resource "aws_api_gateway_vpc_link" "this" {
+ count = local.vpc_link_enabled ? 1 : 0
+ name = module.this.id
+ description = "VPC Link for ${module.this.id}"
+ target_arns = var.private_link_target_arns
+}
diff --git a/test/src/examples_private_link.go b/test/src/examples_private_link.go
new file mode 100644
index 0000000..af06984
--- /dev/null
+++ b/test/src/examples_private_link.go
@@ -0,0 +1,69 @@
+package test
+
+import (
+ "crypto/tls"
+ "fmt"
+ "math/rand"
+ "strconv"
+ "testing"
+ "time"
+
+ http_helper "github.com/gruntwork-io/terratest/modules/http-helper"
+ "github.com/gruntwork-io/terratest/modules/terraform"
+ "github.com/stretchr/testify/assert"
+)
+
+// Test the Terraform module in examples/complete using Terratest.
+func TestExamplesPrivateLink(t *testing.T) {
+ t.Parallel()
+
+ rand.Seed(time.Now().UnixNano())
+ randID := strconv.Itoa(rand.Intn(100000))
+ attributes := []string{randID}
+
+ terraformOptions := terraform.WithDefaultRetryableErrors(t, &terraform.Options{
+ // The path to where our Terraform code is located
+ TerraformDir: "../../examples/private-link",
+ Upgrade: true,
+ // Variables to pass to our Terraform code using -var-file options
+ VarFiles: []string{"fixtures.us-east-2.tfvars"},
+ // We always include a random attribute so that parallel tests
+ // and AWS resources do not interfere with each other
+ Vars: map[string]interface{}{
+ "attributes": attributes,
+ "enabled": true,
+ },
+ })
+
+ // At the end of the test, run `terraform destroy` to clean up any resources that were created
+ defer terraform.Destroy(t, terraformOptions)
+
+ // This will run `terraform init` and `terraform apply` and fail the test if there are any errors
+ terraform.InitAndApply(t, terraformOptions)
+
+ // Run `terraform output` to get the value of an output variable
+ today := time.Now().UTC().Truncate(24 * time.Hour).String()
+ created_date, _ := time.Parse(time.RFC3339, terraform.Output(t, terraformOptions, "created_date"))
+ created_date = created_date.Truncate(24 * time.Hour)
+
+ assert.Equal(t, today, created_date.String())
+
+ // Run `terraform output` to get the value of an output variable
+ gatewayURL := terraform.Output(t, terraformOptions, "invoke_url")
+ checkURL := fmt.Sprintf("%s/%s", gatewayURL, "path1")
+
+ // Make a GET request to the URL and inspect the response
+ tlsConfig := tls.Config{}
+ maxRetries := 5
+ timeBetweenRetries := 5 * time.Second
+
+ // Verify that we get back a 200 OK
+ http_helper.HttpGetWithRetryWithCustomValidation(t, checkURL, &tlsConfig, maxRetries, timeBetweenRetries, func(statusCode int, body string) bool {
+ return statusCode == 200
+ })
+}
+
+// Test the Terraform module in examples/complete doesn't attempt to create resources with enabled=false.
+func TestExamplesPrivateLinkDisabled(t *testing.T) {
+ testNoChanges(t, "../../examples/private-link")
+}
diff --git a/test/src/go.mod b/test/src/go.mod
index 7d05ab1..6babe21 100644
--- a/test/src/go.mod
+++ b/test/src/go.mod
@@ -1,8 +1,8 @@
-module github.com/cloudposse/terraform-example-module
+module github.com/cloudposse/terraform-aws-api-gateway
-go 1.13
+go 1.15
require (
- github.com/gruntwork-io/terratest v0.38.6
+ github.com/gruntwork-io/terratest v0.39.0
github.com/stretchr/testify v1.7.0
)
diff --git a/test/src/go.sum b/test/src/go.sum
index 49c41c7..0b7c352 100644
--- a/test/src/go.sum
+++ b/test/src/go.sum
@@ -143,6 +143,7 @@ github.com/cilium/ebpf v0.0.0-20200702112145-1c8d4c9ef775/go.mod h1:7cR51M8ViRLI
github.com/cilium/ebpf v0.2.0/go.mod h1:To2CFviqOWL/M0gIMsvSMlqe7em/l1ALkX1PyjrX2Qs=
github.com/cilium/ebpf v0.4.0/go.mod h1:4tRaxcgiL706VnOzHOdBlY8IEAIdxINsQBcU4xJJXRs=
github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/cloudposse/terraform-example-module v0.0.0-20211222003637-83874fa77e2a h1:RgCdQtX7ROgaR/ymQoeZUhMGKQC/CQvjyJP2G4KtlxU=
github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
@@ -439,6 +440,8 @@ github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFb
github.com/gruntwork-io/go-commons v0.8.0/go.mod h1:gtp0yTtIBExIZp7vyIV9I0XQkVwiQZze678hvDXof78=
github.com/gruntwork-io/terratest v0.38.6 h1:0CPrdcSBEXKk/FGFL0XoQ/0/8490Nd0GE5HkvXaPcYc=
github.com/gruntwork-io/terratest v0.38.6/go.mod h1:qWMjUaGFzoEKjtvgJF1H0igyMLke67Dq0akc9w4PRH8=
+github.com/gruntwork-io/terratest v0.39.0 h1:Lq7aNCoFxhhmdQIyuBFBf8N87aCnypmNBFYgvsdIfCQ=
+github.com/gruntwork-io/terratest v0.39.0/go.mod h1:CjHsEgP1Pe987X5N8K5qEqCuLtu1bqERGIAF8bTj1s0=
github.com/hashicorp/consul/api v1.1.0/go.mod h1:VmuI/Lkw1nC05EYQWNKwWGbkg+FbDBtguAZLlVdkD9Q=
github.com/hashicorp/consul/sdk v0.1.1/go.mod h1:VKf9jXwCTEY1QZP2MOLRhb5i/I/ssyNV1vwHyQBF0x8=
github.com/hashicorp/errwrap v0.0.0-20141028054710-7554cd9344ce/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
@@ -478,6 +481,8 @@ github.com/hashicorp/memberlist v0.1.3/go.mod h1:ajVTdAv/9Im8oMAAj5G31PhhMCZJV2p
github.com/hashicorp/serf v0.8.2/go.mod h1:6hOLApaqBFA1NXqRQAsxw9QxuDEvNxSQRwA/JwenrHc=
github.com/hashicorp/terraform-json v0.12.0 h1:8czPgEEWWPROStjkWPUnTQDXmpmZPlkQAwYYLETaTvw=
github.com/hashicorp/terraform-json v0.12.0/go.mod h1:pmbq9o4EuL43db5+0ogX10Yofv1nozM+wskr/bGFJpI=
+github.com/hashicorp/terraform-json v0.13.0 h1:Li9L+lKD1FO5RVFRM1mMMIBDoUHslOniyEi5CM+FWGY=
+github.com/hashicorp/terraform-json v0.13.0/go.mod h1:y5OdLBCT+rxbwnpxZs9kGL7R9ExU76+cpdY8zHwoazk=
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
@@ -778,6 +783,8 @@ github.com/zclconf/go-cty v1.2.1/go.mod h1:hOPWgoHbaTUnI5k4D2ld+GRpFJSCe6bCM7m1q
github.com/zclconf/go-cty v1.8.0/go.mod h1:vVKLxnk3puL4qRAv72AO+W99LUD4da90g3uUAzyuvAk=
github.com/zclconf/go-cty v1.8.1 h1:SI0LqNeNxAgv2WWqWJMlG2/Ad/6aYJ7IVYYMigmfkuI=
github.com/zclconf/go-cty v1.8.1/go.mod h1:vVKLxnk3puL4qRAv72AO+W99LUD4da90g3uUAzyuvAk=
+github.com/zclconf/go-cty v1.9.1 h1:viqrgQwFl5UpSxc046qblj78wZXVDFnSOufaOTER+cc=
+github.com/zclconf/go-cty v1.9.1/go.mod h1:vVKLxnk3puL4qRAv72AO+W99LUD4da90g3uUAzyuvAk=
github.com/zclconf/go-cty-debug v0.0.0-20191215020915-b22d67c1ba0b/go.mod h1:ZRKQfBXbGkpdV6QMzT3rU1kSTAnfu1dO8dPKjYprgj8=
go.etcd.io/bbolt v1.3.2/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU=
go.etcd.io/bbolt v1.3.3/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU=
diff --git a/variables.tf b/variables.tf
index 562985b..75f95c5 100644
--- a/variables.tf
+++ b/variables.tf
@@ -103,3 +103,9 @@ variable "rest_api_policy" {
type = string
default = null
}
+
+variable "private_link_target_arns" {
+ type = list(string)
+ description = "A list of target ARNs for VPC Private Link"
+ default = []
+}