Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature: Route53 resolver module #1

Open
wants to merge 5 commits into
base: main
Choose a base branch
from
Open

feature: Route53 resolver module #1

wants to merge 5 commits into from

Conversation

angautam
Copy link
Collaborator

No description provided.

Copy link

github-actions bot commented Mar 10, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️``

Terraform Lint 📖success

Terraform Validation 🤖success

Validation Output

Success! The configuration is valid.


@angautam angautam changed the title Route53 resolver module feature: Route53 resolver module Mar 10, 2025
@github-actions github-actions bot added the feature New feature or request label Mar 10, 2025
Comment on lines +3 to +5
Terraform module to create Route53 resolver. This will be useful when creating the Route53 Resolver either inbound or outbound.

Please note that this module does not cover the Resolver query logging.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This Terraform module provisions an AWS Route 53 Resolver Endpoint for inbound or outbound DNS resolution.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Query logging is not a core functionality so no need to mention that it's not there imo


IMPORTANT: We do not pin modules to versions in our examples. We highly recommend that in your code you pin the version to the exact version you are using so that your infrastructure remains stable.

## Terraform AWS Route53 Resolver Module

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
## Terraform AWS Route53 Resolver Module


## Licensing

100% Open Source and licensed under the Apache License Version 2.0. See [LICENSE](https://github.com/schubergphilis/terraform-aws-mcaf-user/blob/master/LICENSE) for full details.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
100% Open Source and licensed under the Apache License Version 2.0. See [LICENSE](https://github.com/schubergphilis/terraform-aws-mcaf-user/blob/master/LICENSE) for full details.
100% Open Source and licensed under the Apache License Version 2.0. See [LICENSE](https://github.com/schubergphilis/terraform-aws-mcaf-route53-resolver/blob/master/LICENSE) for full details.

name = var.security_group_name
name_prefix = var.security_group_name_prefix
tags = var.tags
vpc_id = var.vpc_id

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

https://github.com/schubergphilis/terraform-aws-mcaf-lambda/blob/master/main.tf#L58

if you add a data source for this then you don't need the vpc_id variable anymore

count = var.create_security_group ? 1 : 0

source = "schubergphilis/mcaf-security-group/aws"
version = "0.1.0"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
version = "0.1.0"
version = "~> 0.1.0"


variable "protocols" {
type = list(string)
default = []

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it make sense to default to ["Do53", "DoH"] ?

variable "security_group_description" {
type = string
default = null
description = "This security group is created to allow port 53 for DNS resolver"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
description = "This security group is created to allow port 53 for DNS resolver"
description = "Route53 Resolver Endpoint Security Group, allows port 53 for DNS resolving"

variable "security_group_egress_cidr_blocks" {
type = string
default = "0.0.0.0/0"
description = "A list of CIDR blocks to allow on security group egress rules"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not a list but a string

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discussion point: take security group module out.. if not then we need to support multiple cidr_blocks and add looping

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants