forked from joshuamkite/terraform-aws-ssh-bastion-service
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathoutputs.tf
47 lines (38 loc) · 1.43 KB
/
outputs.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
output "service_dns_entry" {
description = "dns-registered url for service and host"
value = join("", aws_route53_record.bastion_service.*.name)
}
output "policy_example_for_parent_account_empty_if_not_used" {
description = "You must apply an IAM policy with trust relationship identical or compatible with this in your other AWS account for IAM lookups to function there with STS:AssumeRole and allow users to login"
value = join(
"",
data.template_file.sample_policies_for_parent_account.*.rendered,
)
}
output "bastion_sg_id" {
description = "Security Group id of the bastion host"
value = aws_security_group.bastion_service.id
}
output "lb_dns_name" {
description = "aws load balancer dns"
value = aws_lb.bastion-service.dns_name
}
output "lb_zone_id" {
value = aws_lb.bastion-service.zone_id
}
output "bastion_service_assume_role_name" {
description = "role created for service host asg - if created with assume role"
value = aws_iam_role.bastion_service_assume_role.*.name
}
output "bastion_service_role_name" {
description = "role created for service host asg - if created without assume role"
value = aws_iam_role.bastion_service_role.*.name
}
output "lb_arn" {
description = "aws load balancer arn"
value = aws_lb.bastion-service.arn
}
output "target_group_arn" {
description = "aws load balancer target group arn"
value = aws_lb_target_group.bastion-service.arn
}