Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v3.3.0 release #322

Merged
merged 83 commits into from
May 15, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
83 commits
Select commit Hold shift + click to select a range
7dd2728
TD-239 Add dummy code scanning
tom-reinders Apr 17, 2023
37b46fd
Enabled injection of a custom backend policy to the API definition
pipalmic Apr 18, 2023
fd0039e
Feature/14689 update out scaling rules (#309)
ArtiomMatiom Apr 18, 2023
d0eb913
Feature/14684 storageaccount configure lifecyclemanagent rules (#310)
ArtiomMatiom Apr 18, 2023
4fdb769
fix direction (#312)
ArtiomMatiom Apr 19, 2023
a14019b
CM-27 - Add basic K8S-modules
Apr 19, 2023
123c7f3
CM-27 - Remove optional types
Apr 19, 2023
515c6a1
CM-27 - Change replica type specification and add Dependabot definition
Apr 19, 2023
4ec6663
CM-27 - Lint
Apr 19, 2023
90ffac9
CM-27 - Add host property
Apr 19, 2023
a27b26a
CM-27 - Add public Postgresql server
Apr 19, 2023
6da8891
CM-27 - Add PVC module
Apr 19, 2023
a7abb31
CM-27 - Do not specify zone
Apr 19, 2023
059451b
CM-27 - Revert change
Apr 19, 2023
0a453d0
CM-27 - Rename volume entity
Apr 19, 2023
ba80a56
CM-27 - Use v1
Apr 19, 2023
2bb12b2
CM-27 - Add config path option
Apr 19, 2023
34217e9
CM-27 - Ignore label changes
Apr 19, 2023
1313b8e
CM-27 - Add MySQL flexible public
Apr 19, 2023
bc3a0c0
CM-27 - Remove wrong references
Apr 20, 2023
f6e8f34
CM-27 - Increase default retention
Apr 20, 2023
8e98ae9
CM-27 - Add prevent destroy
Apr 20, 2023
f5e2dac
CM-27 - Update linting and add container port
Apr 20, 2023
0c456ab
CM-27 - Update firewall rule
Apr 20, 2023
9471ad7
CM-27 - Mark as sensitive
Apr 20, 2023
0c825c9
CM-27 - Add test for volume
Apr 20, 2023
213698f
CM-27 - Update replica checks
Apr 20, 2023
d244d98
CM-27 - Update probes
Apr 20, 2023
a3aa2fc
CM-27 - Update probes
Apr 20, 2023
4d2ff59
CM-27 - Add env references
Apr 20, 2023
4a0569b
CM-27 - Update label
Apr 20, 2023
d173d6e
CM-27 - Update output
Apr 20, 2023
de7a004
CM-27 - Update administrator login
Apr 20, 2023
71d5c5c
CM-27 - Update label
Apr 20, 2023
4b0694a
CM-27 - Add service port as output
Apr 20, 2023
b0c2d20
CM-27 - Add service port as output
Apr 20, 2023
d59c88e
CM-27 - Update paths
Apr 20, 2023
08225ab
CM-27 - Add scaler proxy
Apr 20, 2023
fbcc430
CM-27 - Add scaler proxy
Apr 20, 2023
b3ab518
CM-27 - Tweak
Apr 20, 2023
20c0c9a
CM-27 - Tweak
Apr 20, 2023
9bff980
CM-27 - Update value
Apr 20, 2023
8fd8e6e
CM-27 - Add resource scaler
Apr 21, 2023
771bc6a
CM-27 - Add probe properties
Apr 21, 2023
ec60a50
CM-27 - Add probe properties
Apr 21, 2023
a57be4b
CM-27 - Add probe properties
Apr 21, 2023
873e88a
CM-27 - Add probe properties
Apr 21, 2023
33c9dff
CM-27 - Support no scaler
Apr 21, 2023
c8556d0
CM-27 - Support no scaler
Apr 21, 2023
daf737a
CM-27 - Support no scaler
Apr 21, 2023
1b9ea2f
CM-27 - Support no scaler
Apr 21, 2023
9c59d52
CM-27 - Support no scaler
Apr 21, 2023
97bffae
CM-27 - Support no scaler
Apr 21, 2023
579cae1
CM-27 - Add env variable
Apr 21, 2023
746b6c0
CM-27 - Add env variable
Apr 21, 2023
8f31cb4
CM-27 - Allow conditional enabling of Ingress
Apr 21, 2023
f4e4f57
Merge pull request #311 from recognizegroup/feature/custom-backend-po…
pipalmic Apr 24, 2023
7cd42f6
Merge pull request #308 from recognizegroup/feature/TD-239_add_dummy_…
Apr 24, 2023
385a1af
Apply only one backend policy at a time as multiple backend policies …
pipalmic Apr 25, 2023
d6da208
Merge pull request #314 from recognizegroup/bug/multiple-backend-poli…
pipalmic Apr 25, 2023
57dfa21
Update modules/kubernetes/secret/main.tf
Apr 25, 2023
c57eeb3
Update modules/kubernetes/configmap/main.tf
Apr 25, 2023
4fac76e
Apply suggestions from code review
Apr 25, 2023
0687048
Merge pull request #313 from recognizegroup/feature/CM-27-basic-k8s-m…
tom-reinders Apr 25, 2023
345c126
fix logic app standard changes deployment
jezekt Apr 26, 2023
4919f2c
fix formatting in logic_app_standard main.tf
jezekt Apr 26, 2023
a014431
add PowerShell command for non-linux machines
jezekt Apr 26, 2023
eb91561
fix formatting in logic_app_standard main.tf
jezekt Apr 26, 2023
e56d2be
simplify zip command
tjezek Apr 26, 2023
cdae9fc
Merge pull request #316 from recognizegroup/bug/logic-app-standard-de…
tom-reinders Apr 26, 2023
ab4272a
update identity settings of logic app standard to support user identity
jezekt Apr 26, 2023
5efe522
TD-239 Update changelog
tom-reinders Apr 28, 2023
b6d06c8
split logic_app_standard identity object into use_managed_identity an…
jezekt May 2, 2023
3658760
Merge branch 'develop' into feature/logic-app-standard-identity
jezekt May 2, 2023
cd57126
Merge pull request #317 from recognizegroup/feature/logic-app-standar…
tom-reinders May 2, 2023
cd6ca71
TD-590 Add minimums for passwords
tom-reinders May 8, 2023
bd78f65
TD-590 PR fix
tom-reinders May 8, 2023
897f493
Merge pull request #320 from recognizegroup/TD-590_add_minimums_for_p…
tom-reinders May 8, 2023
383bdda
TD-590 Reverse order to try hotfix issue hashicorp/terraform-provider…
tom-reinders May 8, 2023
e422e04
Merge pull request #321 from recognizegroup/feature/TD-590_reverse_or…
tom-reinders May 9, 2023
e45be14
Merge branch 'develop' into feature/TD-239_update_changelog
tom-reinders May 15, 2023
10a03e7
TD-239 TD-590 - Update changelog
tom-reinders May 15, 2023
11e157c
Merge pull request #318 from recognizegroup/feature/TD-239_update_cha…
tom-reinders May 15, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
35 changes: 35 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -332,6 +332,11 @@ updates:
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/azure/mysql_flexible_server_public"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/azure/network_security_group"
schedule:
Expand All @@ -342,6 +347,11 @@ updates:
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/azure/postgresql_public"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/azure/private_dns_zone"
schedule:
Expand Down Expand Up @@ -501,3 +511,28 @@ updates:
directory: "/modules/other/password_generator"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/kubernetes/configmap"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/kubernetes/deployment_with_service"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/kubernetes/ingress"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/kubernetes/secret"
schedule:
interval: "daily"

- package-ecosystem: "terraform"
directory: "/modules/kubernetes/pvc"
schedule:
interval: "daily"
32 changes: 32 additions & 0 deletions .github/workflows/dummy-code-scanning.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
name: "Dummy Code Scanning"

on:
push:
branches: [ develop ]

jobs:
code-scanning-dummy:
name: Perform code scanning (Dummy) - Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write

steps:
- name: Checkout repository
uses: actions/checkout@v3

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: javascript
packs: codeql/javascript-queries

# Autobuild the language if possible
- name: Autobuild
uses: github/codeql-action/autobuild@v2

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
5 changes: 3 additions & 2 deletions .github/workflows/validate.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
name: Validate
on:
push:
pull_request:
branches:
- '**'
- main
- develop

jobs:
validate-terraform:
Expand Down
31 changes: 31 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,36 @@ All notable changes to this project will be documented in this file.
The format is based on [Common Changelog](https://common-changelog.org),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [3.3.0] - 2023-05-15

### Changed

- `azure/mysql_flexible_server`: Change default of variable `backup_retention_days` from `7` to `30` ([#313](https://github.com/recognizegroup/terraform/pull/313)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489))

### Added

- `azure/service_plan`: Add variable `scaling_rules` ([#309](https://github.com/recognizegroup/terraform/pull/309), [#312](https://github.com/recognizegroup/terraform/pull/312)) ([`fd0039e3`](https://github.com/recognizegroup/terraform/commit/fd0039e3), [`4fdb7698`](https://github.com/recognizegroup/terraform/commit/4fdb7698))
- `azure/storage_account_public`: Add variable `auto_delete_rules` ([#310](https://github.com/recognizegroup/terraform/pull/310)) ([`d0eb9139`](https://github.com/recognizegroup/terraform/commit/d0eb9139))
- `azure/api_management_api`: Add variable `custom_backend_policy` ([#311](https://github.com/recognizegroup/terraform/pull/311), [#314](https://github.com/recognizegroup/terraform/pull/314)) ([`37b46fd7`](https://github.com/recognizegroup/terraform/commit/37b46fd7), [`385a1af1`](https://github.com/recognizegroup/terraform/commit/385a1af1))
- Add module `azure/mysql_flexible_server_public` ([#313](https://github.com/recognizegroup/terraform/pull/313), [#320](https://github.com/recognizegroup/terraform/pull/320)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489), [`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))
- Add module `azure/postgresql_public` ([#313](https://github.com/recognizegroup/terraform/pull/313), [#320](https://github.com/recognizegroup/terraform/pull/320)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489), [`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))
- Add module `kubernetes/configmap` ([#313](https://github.com/recognizegroup/terraform/pull/313)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489))
- Add module `kubernetes/deployment_with_service` ([#313](https://github.com/recognizegroup/terraform/pull/313), [#321](https://github.com/recognizegroup/terraform/pull/321)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489), [`383bdda5`](https://github.com/recognizegroup/terraform/commit/383bdda5))
- Add module `kubernetes/ingress` ([#313](https://github.com/recognizegroup/terraform/pull/313)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489))
- Add module `kubernetes/pvc` ([#313](https://github.com/recognizegroup/terraform/pull/313)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489))
- Add module `kubernetes/secret` ([#313](https://github.com/recognizegroup/terraform/pull/313)) ([`06870489`](https://github.com/recognizegroup/terraform/commit/06870489))
- `azure/logic_app_standard`: Add variable `identity_ids` ([#317](https://github.com/recognizegroup/terraform/pull/317)) ([`ab4272ad`](https://github.com/recognizegroup/terraform/commit/ab4272ad), [`b6d06c84`](https://github.com/recognizegroup/terraform/commit/b6d06c84))
- `other/password_generator`: Add variables `min_lower`, `min_upper`, `min_numeric`, `min_special` ([#320](https://github.com/recognizegroup/terraform/pull/320)) ([`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d), [`bd78f656`](https://github.com/recognizegroup/terraform/commit/bd78f656))

### Fixed

- `azure/logic_app_standard`: Fix deployment bug caused by [hashicorp/terraform-provider-archive#40](https://github.com/hashicorp/terraform-provider-archive/issues/40) ([#316](https://github.com/recognizegroup/terraform/pull/316)) ([`cdae9fcb`](https://github.com/recognizegroup/terraform/commit/cdae9fcb))
- `azure/mssql`: Fix bug where random_password could generate a password with only one type of character be it lowercase, uppercase, numeric or special ([#320](https://github.com/recognizegroup/terraform/pull/320)) ([`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))
- `azure/mysql`: Fix bug where random_password could generate a password with only one type of character be it lowercase, uppercase, numeric or special ([#320](https://github.com/recognizegroup/terraform/pull/320)) ([`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))
- `azure/mysql_flexible_server`: Fix bug where random_password could generate a password with only one type of character be it lowercase, uppercase, numeric or special ([#320](https://github.com/recognizegroup/terraform/pull/320)) ([`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))
- `azure/postgresql`: Fix bug where random_password could generate a password with only one type of character be it lowercase, uppercase, numeric or special ([#320](https://github.com/recognizegroup/terraform/pull/320)) ([`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))
- `azure/synapse_workspace`: Fix bug where random_password could generate a password with only one type of character be it lowercase, uppercase, numeric or special ([#320](https://github.com/recognizegroup/terraform/pull/320)) ([`cd6ca71d`](https://github.com/recognizegroup/terraform/commit/cd6ca71d))

## [3.2.0] - 2023-04-11

### Changed
Expand Down Expand Up @@ -89,6 +119,7 @@ _If you are upgrading: please see [UPGRADE_3.0.md](UPGRADE_3.0.md)._
- **Breaking:** Remove module `azure/monitoring`, replace with `azure/azure/monitoring_action_group` and `azure/monitoring_log_analytics_alert` ([#268](https://github.com/recognizegroup/terraform/pull/268)) ([`5bd013c1`](https://github.com/recognizegroup/terraform/commit/5bd013c1))
- **Breaking:** Remove module `azure/api_connectors/storage_account`, replace with `azure/api_connectors/storage_blob` and `azure/api_connectors/storage_table` ([#276](https://github.com/recognizegroup/terraform/pull/276)) ([`7a483886`](https://github.com/recognizegroup/terraform/commit/7a483886))

[3.3.0]: https://github.com/recognizegroup/terraform/releases/tag/v3.3.0
[3.2.0]: https://github.com/recognizegroup/terraform/releases/tag/v3.2.0
[3.1.0]: https://github.com/recognizegroup/terraform/releases/tag/v3.1.0
[3.0.0]: https://github.com/recognizegroup/terraform/releases/tag/v3.0.0
14 changes: 11 additions & 3 deletions modules/azure/api_management_api/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -185,11 +185,19 @@ resource "azurerm_api_management_api_policy" "api_policy" {
%{endif}
</inbound>

<backend>
%{if var.custom_backend_policy != null}
${var.custom_backend_policy}
%{else}
<base />
%{endif}
</backend>

<outbound>
<base />
%{if var.custom_outbound_policy != null}
${var.custom_outbound_policy}
%{endif}
%{if var.custom_outbound_policy != null}
${var.custom_outbound_policy}
%{endif}
</outbound>
</policies>
XML
Expand Down
6 changes: 6 additions & 0 deletions modules/azure/api_management_api/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -210,3 +210,9 @@ variable "custom_outbound_policy" {
description = "Additional outbound xml policies"
default = null
}

variable "custom_backend_policy" {
type = string
description = "Additional backend xml policies"
default = null
}
44 changes: 34 additions & 10 deletions modules/azure/logic_app_standard/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,11 @@ provider "azurerm" {
provider "archive" {
}

locals {
identity_type = var.use_managed_identity && length(var.identity_ids) > 0 ? "SystemAssigned, UserAssigned" : var.use_managed_identity ? "SystemAssigned" : length(var.identity_ids) > 0 ? "UserAssigned" : null
is_linux = length(regexall("/home/", lower(abspath(path.root)))) > 0
}

resource "azurerm_logic_app_standard" "app" {
name = var.logic_app_name
location = var.location
Expand All @@ -31,9 +36,10 @@ resource "azurerm_logic_app_standard" "app" {
version = var.logic_app_version

dynamic "identity" {
for_each = var.use_managed_identity ? [1] : []
for_each = local.identity_type != null ? [1] : []
content {
type = "SystemAssigned"
type = local.identity_type
identity_ids = var.identity_ids
}
}

Expand All @@ -54,11 +60,26 @@ resource "azurerm_logic_app_standard" "app" {
virtual_network_subnet_id = var.integration_subnet_id
}

# First, create a zip file containing the workflow
data "archive_file" "workflow" {
# First, create a check.zip with archive_file to check diffs (this step is required)
# replacing this step by checking of deploy.zip created by local-exec doesn't work
# because local-exec is not executed during 'plan' so it would take old deploy.zip
data "archive_file" "check_zip" {
type = "zip"
source_dir = var.workflows_source_path
output_path = "${path.module}/files/deploy.zip"
output_path = "${path.module}/files/check.zip"
}

resource "null_resource" "zip_logic_app" {
depends_on = [data.archive_file.check_zip]

triggers = {
deploy = data.archive_file.check_zip.output_sha
}
# if check.zip file changes, create deploy.zip file
provisioner "local-exec" {
interpreter = local.is_linux ? ["bash", "-c"] : ["PowerShell", "-Command"]
command = local.is_linux ? "cd ${path.module} && mkdir -p files && cd ${var.workflows_source_path} && zip -rq $OLDPWD/files/deploy.zip ." : "New-Item -Path \"${path.module}\" -Name \"files\" -ItemType \"directory\" -Force; Compress-Archive -Path \"${var.workflows_source_path}\\*\" -DestinationPath \"${path.module}\\files\\deploy.zip\""
}
}

# After the logic app is created, start a deployment using the Azure CLI
Expand All @@ -70,11 +91,14 @@ data "archive_file" "workflow" {
# deployment to make sure the app settings are available before the deployment is started.

resource "time_sleep" "wait_for_app_settings" {
depends_on = [azurerm_logic_app_standard.app]
depends_on = [
azurerm_logic_app_standard.app,
null_resource.zip_logic_app
]
create_duration = "${var.deployment_wait_timeout}s"

triggers = {
time = timestamp()
deploy = data.archive_file.check_zip.output_sha
}
}

Expand All @@ -83,7 +107,7 @@ resource "null_resource" "install-extension" {
depends_on = [time_sleep.wait_for_app_settings]

triggers = {
deploy = data.archive_file.workflow.output_sha
deploy = data.archive_file.check_zip.output_sha
}

provisioner "local-exec" {
Expand All @@ -99,10 +123,10 @@ resource "null_resource" "deploy" {
depends_on = [null_resource.install-extension]

triggers = {
deploy = data.archive_file.workflow.output_sha
deploy = data.archive_file.check_zip.output_sha
}

provisioner "local-exec" {
command = "az logicapp deployment source config-zip --name ${var.logic_app_name} --resource-group ${var.resource_group_name} --subscription ${data.azurerm_subscription.current.display_name} --src ${data.archive_file.workflow.output_path}"
command = "az logicapp deployment source config-zip --name ${var.logic_app_name} --resource-group ${var.resource_group_name} --subscription ${data.azurerm_subscription.current.display_name} --src ${path.module}/files/deploy.zip"
}
}
2 changes: 1 addition & 1 deletion modules/azure/logic_app_standard/outputs.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
output "principal_id" {
value = var.use_managed_identity ? azurerm_logic_app_standard.app.identity[0].principal_id : null
value = length(azurerm_logic_app_standard.app.identity) > 0 ? azurerm_logic_app_standard.app.identity[0].principal_id : null
}

output "name" {
Expand Down
8 changes: 7 additions & 1 deletion modules/azure/logic_app_standard/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -36,10 +36,16 @@ variable "enabled" {

variable "use_managed_identity" {
type = bool
description = "Use Managed Identity for this logic app"
description = "Use System Assigned Managed Identity for this logic app"
default = false
}

variable "identity_ids" {
type = list(string)
description = "User Assigned Managed Identity ids for this logic app"
default = []
}

variable "app_settings" {
type = map(string)
description = "A map of key/value pairs to be used as application settings for the logic app."
Expand Down
4 changes: 4 additions & 0 deletions modules/azure/mssql/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@ resource "random_password" "mssql_admin_password" {
special = true
override_special = "_%@"
keepers = var.password_keeper
min_lower = 1
min_upper = 1
min_numeric = 1
min_special = 1
}

resource "azurerm_mssql_server" "mssql_server" {
Expand Down
4 changes: 4 additions & 0 deletions modules/azure/mysql/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,10 @@ resource "random_password" "mysql_admin_password" {
special = true
override_special = "_%@"
keepers = var.password_keeper
min_lower = 1
min_upper = 1
min_numeric = 1
min_special = 1
}

resource "azurerm_mysql_server" "mysql_server" {
Expand Down
4 changes: 4 additions & 0 deletions modules/azure/mysql_flexible_server/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,10 @@ resource "random_password" "mysql_admin_password" {
special = true
override_special = "_%@"
keepers = var.password_keeper
min_lower = 1
min_upper = 1
min_numeric = 1
min_special = 1
}

resource "azurerm_mysql_flexible_server" "mysql_flexible_server" {
Expand Down
4 changes: 2 additions & 2 deletions modules/azure/mysql_flexible_server/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ variable "storage_auto_grow_enabled" {
variable "backup_retention_days" {
type = number
description = "Backup retention days for the mysql server."
default = 7
default = 30
}

variable "geo_redundant_backup_enabled" {
Expand Down Expand Up @@ -101,4 +101,4 @@ variable "slow_query_log" {
variable "private_dns_zone_id" {
type = string
description = "ID of the private dns zone"
}
}
Loading