google-nomulus/proxy/terraform/modules/variables.tf
Michael Muller 1b4b217588 Update terraform files and instructions (#1402)
* Update terraform files and instructions

Update proxy terraform files based on current best practices and allow
exclusion of forwarding rules for HTTP endpoints.  Specifically:
-   Add a "public_web_whois" input to allow disabling the public HTTP
    whois forwarding.
-   Add "description" fields to all variables.
-   Move outputs of the top-level module into "outputs.tf".
-   Auto-reformat using hclfmt.
2021-10-29 09:10:23 -04:00

67 lines
1.5 KiB
HCL

variable "proxy_project_name" {
description = "GCP project in which the proxy runs."
}
variable "gcr_project_name" {
description = "GCP project from which the proxy image is pulled."
}
variable "proxy_domain_name" {
description = <<EOF
The base domain name of the proxy, without the whois. or epp. part.
EOF
}
variable "proxy_certificate_bucket" {
description = <<EOF
The GCS bucket that stores the encrypted SSL certificate. The "gs://"
prefix should be omitted.
EOF
}
variable "proxy_key_ring" {
default = "proxy-key-ring"
description = "Cloud KMS keyring name"
}
variable "proxy_key" {
default = "proxy-key"
description = "Cloud KMS key name"
}
variable "proxy_ports" {
type = map
description = "Node ports exposed by the proxy."
default = {
health_check = 30000
whois = 30001
epp = 30002
http-whois = 30010
https-whois = 30011
}
}
variable "proxy_ports_canary" {
type = map
description = "Node ports exposed by the canary proxy."
default = {
health_check = 31000
whois = 31001
epp = 31002
http-whois = 31010
https-whois = 31011
}
}
variable "public_web_whois" {
type = number
default = 1
description = <<EOF
Set to 1 if the whois HTTP ports are external, 0 if not. This is necessary
because our test projects are configured with
constraints/compute.restrictLoadBalancerCreationForTypes, which prohibits
forwarding external HTTP(s) connections.
EOF
}