You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_access_list_cidr_blocks"></a> [access\_list\_cidr\_blocks](#input\_access\_list\_cidr\_blocks)| List of CIDRs we want to grant access to our Metaflow Metadata Service. Usually this is our VPN's CIDR blocks. |`list(string)`|`[]`| no |
98
-
| <aname="input_api_basic_auth"></a> [api\_basic\_auth](#input\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
99
98
| <aname="input_batch_type"></a> [batch\_type](#input\_batch\_type)| AWS Batch Compute Type ('ec2', 'fargate') |`string`|`"ec2"`| no |
100
99
| <aname="input_compute_environment_desired_vcpus"></a> [compute\_environment\_desired\_vcpus](#input\_compute\_environment\_desired\_vcpus)| Desired Starting VCPUs for Batch Compute Environment [0-16] for EC2 Batch Compute Environment (ignored for Fargate) |`number`|`8`| no |
101
100
| <aname="input_compute_environment_egress_cidr_blocks"></a> [compute\_environment\_egress\_cidr\_blocks](#input\_compute\_environment\_egress\_cidr\_blocks)| CIDR blocks to which egress is allowed from the Batch Compute environment's security group |`list(string)`| <pre>[<br> "0.0.0.0/0"<br>]</pre> | no |
@@ -108,6 +107,8 @@ You can find a more complete example that uses this module but also includes set
108
107
| <aname="input_extra_ui_static_env_vars"></a> [extra\_ui\_static\_env\_vars](#input\_extra\_ui\_static\_env\_vars)| Additional environment variables for UI static app |`map(string)`|`{}`| no |
109
108
| <aname="input_iam_partition"></a> [iam\_partition](#input\_iam\_partition)| IAM Partition (Select aws-us-gov for AWS GovCloud, otherwise leave as is) |`string`|`"aws"`| no |
110
109
| <aname="input_metadata_service_container_image"></a> [metadata\_service\_container\_image](#input\_metadata\_service\_container\_image)| Container image for metadata service |`string`|`""`| no |
110
+
| <aname="input_metadata_service_enable_api_basic_auth"></a> [metadata\_service\_enable\_api\_basic\_auth](#input\_metadata\_service\_enable\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
111
+
| <aname="input_metadata_service_enable_api_gateway"></a> [metadata\_service\_enable\_api\_gateway](#input\_metadata\_service\_enable\_api\_gateway)| Enable API Gateway for public metadata service endpoint |`bool`|`true`| no |
111
112
| <aname="input_resource_prefix"></a> [resource\_prefix](#input\_resource\_prefix)| string prefix for all resources |`string`|`"metaflow"`| no |
112
113
| <aname="input_resource_suffix"></a> [resource\_suffix](#input\_resource\_suffix)| string suffix for all resources |`string`|`""`| no |
113
114
| <aname="input_subnet1_id"></a> [subnet1\_id](#input\_subnet1\_id)| First subnet used for availability zone redundancy |`string`| n/a | yes |
| <aname="input_access_list_cidr_blocks"></a> [access\_list\_cidr\_blocks](#input\_access\_list\_cidr\_blocks)| List of CIDRs we want to grant access to our Metaflow Metadata Service. Usually this is our VPN's CIDR blocks. |`list(string)`| n/a | yes |
19
-
| <aname="input_api_basic_auth"></a> [api\_basic\_auth](#input\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
20
19
| <aname="input_database_name"></a> [database\_name](#input\_database\_name)| The database name |`string`|`"metaflow"`| no |
| <aname="input_datastore_s3_bucket_kms_key_arn"></a> [datastore\_s3\_bucket\_kms\_key\_arn](#input\_datastore\_s3\_bucket\_kms\_key\_arn)| The ARN of the KMS key used to encrypt the Metaflow datastore S3 bucket |`string`| n/a | yes |
23
+
| <aname="input_enable_api_basic_auth"></a> [enable\_api\_basic\_auth](#input\_enable\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
24
+
| <aname="input_enable_api_gateway"></a> [enable\_api\_gateway](#input\_enable\_api\_gateway)| Enable API Gateway for public metadata service endpoint |`bool`|`true`| no |
24
25
| <aname="input_fargate_execution_role_arn"></a> [fargate\_execution\_role\_arn](#input\_fargate\_execution\_role\_arn)| The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution\_role for our Fargate instance |`string`| n/a | yes |
25
26
| <aname="input_iam_partition"></a> [iam\_partition](#input\_iam\_partition)| IAM Partition (Select aws-us-gov for AWS GovCloud, otherwise leave as is) |`string`|`"aws"`| no |
26
27
| <aname="input_is_gov"></a> [is\_gov](#input\_is\_gov)| Set to true if IAM partition is 'aws-us-gov' |`bool`|`false`| no |
description="The ARN of the KMS key used to encrypt the Metaflow datastore S3 bucket"
31
26
}
32
27
28
+
variable"enable_api_basic_auth" {
29
+
type=bool
30
+
default=true
31
+
description="Enable basic auth for API Gateway? (requires key export)"
32
+
}
33
+
34
+
variable"enable_api_gateway" {
35
+
type=bool
36
+
default=true
37
+
description="Enable API Gateway for public metadata service endpoint"
38
+
}
39
+
33
40
variable"fargate_execution_role_arn" {
34
41
type=string
35
42
description="The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution_role for our Fargate instance"
@@ -104,7 +111,6 @@ variable "subnet2_id" {
104
111
type=string
105
112
description="Second private subnet used for availability zone redundancy"
106
113
}
107
-
108
114
variable"vpc_cidr_blocks" {
109
115
type=list(string)
110
116
description="The VPC CIDR blocks that we'll access list on our Metadata Service API to allow all internal communications"
0 commit comments