You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Make api gateway optional and adjust api_base_auth var naming (#40)
* Make api gateway optional and adjust api_base_auth var naming
Co-authored-by: Hugues Alary <[email protected]>
* Format api-gateway.tf file
* Use metadata_service_enable_api_basic_auth var name from root of module
---------
Co-authored-by: Hugues Alary <[email protected]>
| <aname="input_access_list_cidr_blocks"></a> [access\_list\_cidr\_blocks](#input\_access\_list\_cidr\_blocks)| List of CIDRs we want to grant access to our Metaflow Metadata Service. Usually this is our VPN's CIDR blocks. |`list(string)`|`[]`| no |
99
-
| <aname="input_api_basic_auth"></a> [api\_basic\_auth](#input\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
100
99
| <aname="input_batch_type"></a> [batch\_type](#input\_batch\_type)| AWS Batch Compute Type ('ec2', 'fargate') |`string`|`"ec2"`| no |
101
100
| <aname="input_compute_environment_desired_vcpus"></a> [compute\_environment\_desired\_vcpus](#input\_compute\_environment\_desired\_vcpus)| Desired Starting VCPUs for Batch Compute Environment [0-16] for EC2 Batch Compute Environment (ignored for Fargate) |`number`|`8`| no |
102
101
| <aname="input_compute_environment_egress_cidr_blocks"></a> [compute\_environment\_egress\_cidr\_blocks](#input\_compute\_environment\_egress\_cidr\_blocks)| CIDR blocks to which egress is allowed from the Batch Compute environment's security group |`list(string)`| <pre>[<br> "0.0.0.0/0"<br>]</pre> | no |
@@ -112,6 +111,8 @@ You can find a more complete example that uses this module but also includes set
112
111
| <aname="input_launch_template_http_put_response_hop_limit"></a> [launch\_template\_http\_put\_response\_hop\_limit](#input\_launch\_template\_http\_put\_response\_hop\_limit)| The desired HTTP PUT response hop limit for instance metadata requests. Can be an integer from 1 to 64 |`number`|`2`| no |
113
112
| <aname="input_launch_template_http_tokens"></a> [launch\_template\_http\_tokens](#input\_launch\_template\_http\_tokens)| Whether or not the metadata service requires session tokens, also referred to as Instance Metadata Service Version 2 (IMDSv2). Can be 'optional' or 'required' |`string`|`"optional"`| no |
114
113
| <aname="input_metadata_service_container_image"></a> [metadata\_service\_container\_image](#input\_metadata\_service\_container\_image)| Container image for metadata service |`string`|`""`| no |
114
+
| <aname="input_metadata_service_enable_api_basic_auth"></a> [metadata\_service\_enable\_api\_basic\_auth](#input\_metadata\_service\_enable\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
115
+
| <aname="input_metadata_service_enable_api_gateway"></a> [metadata\_service\_enable\_api\_gateway](#input\_metadata\_service\_enable\_api\_gateway)| Enable API Gateway for public metadata service endpoint |`bool`|`true`| no |
115
116
| <aname="input_resource_prefix"></a> [resource\_prefix](#input\_resource\_prefix)| string prefix for all resources |`string`|`"metaflow"`| no |
116
117
| <aname="input_resource_suffix"></a> [resource\_suffix](#input\_resource\_suffix)| string suffix for all resources |`string`|`""`| no |
117
118
| <aname="input_subnet1_id"></a> [subnet1\_id](#input\_subnet1\_id)| First subnet used for availability zone redundancy |`string`| n/a | yes |
| <aname="input_access_list_cidr_blocks"></a> [access\_list\_cidr\_blocks](#input\_access\_list\_cidr\_blocks)| List of CIDRs we want to grant access to our Metaflow Metadata Service. Usually this is our VPN's CIDR blocks. |`list(string)`| n/a | yes |
19
-
| <aname="input_api_basic_auth"></a> [api\_basic\_auth](#input\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
20
19
| <aname="input_database_name"></a> [database\_name](#input\_database\_name)| The database name |`string`|`"metaflow"`| no |
| <aname="input_datastore_s3_bucket_kms_key_arn"></a> [datastore\_s3\_bucket\_kms\_key\_arn](#input\_datastore\_s3\_bucket\_kms\_key\_arn)| The ARN of the KMS key used to encrypt the Metaflow datastore S3 bucket |`string`| n/a | yes |
23
+
| <aname="input_enable_api_basic_auth"></a> [enable\_api\_basic\_auth](#input\_enable\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
24
+
| <aname="input_enable_api_gateway"></a> [enable\_api\_gateway](#input\_enable\_api\_gateway)| Enable API Gateway for public metadata service endpoint |`bool`|`true`| no |
24
25
| <aname="input_fargate_execution_role_arn"></a> [fargate\_execution\_role\_arn](#input\_fargate\_execution\_role\_arn)| The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution\_role for our Fargate instance |`string`| n/a | yes |
25
26
| <aname="input_iam_partition"></a> [iam\_partition](#input\_iam\_partition)| IAM Partition (Select aws-us-gov for AWS GovCloud, otherwise leave as is) |`string`|`"aws"`| no |
26
27
| <aname="input_is_gov"></a> [is\_gov](#input\_is\_gov)| Set to true if IAM partition is 'aws-us-gov' |`bool`|`false`| no |
description="The ARN of the KMS key used to encrypt the Metaflow datastore S3 bucket"
31
26
}
32
27
28
+
variable"enable_api_basic_auth" {
29
+
type=bool
30
+
default=true
31
+
description="Enable basic auth for API Gateway? (requires key export)"
32
+
}
33
+
34
+
variable"enable_api_gateway" {
35
+
type=bool
36
+
default=true
37
+
description="Enable API Gateway for public metadata service endpoint"
38
+
}
39
+
33
40
variable"fargate_execution_role_arn" {
34
41
type=string
35
42
description="The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution_role for our Fargate instance"
@@ -104,7 +111,6 @@ variable "subnet2_id" {
104
111
type=string
105
112
description="Second private subnet used for availability zone redundancy"
106
113
}
107
-
108
114
variable"vpc_cidr_blocks" {
109
115
type=list(string)
110
116
description="The VPC CIDR blocks that we'll access list on our Metadata Service API to allow all internal communications"
0 commit comments