{"treedata":{"name":"root","toggled":true,"children":[{"name":".circleci","children":[{"name":"config.yml","path":".circleci/config.yml","sha":"e07c294cc9bb14d05acdf936c500e394a6879133"}]},{"name":".gitignore","path":".gitignore","sha":"be548d345e99887d4ccc3163bf552ee9c337b48d"},{"name":"CODEOWNERS","path":"CODEOWNERS","sha":"8c24c86ef8447a19436b38826f458c71b4da4f45"},{"name":"LICENSE.txt","path":"LICENSE.txt","sha":"154ea4429924fda533b20544c7a19d8949fc82cf"},{"name":"README.md","path":"README.md","sha":"d303d744fb8e575927809921c309611c798d3852"},{"name":"_docs","children":[{"name":"migration_guides","children":[{"name":"nlb_to_0.15.0","children":[{"name":"README.md","path":"_docs/migration_guides/nlb_to_0.15.0/README.md","sha":"2a86c02a985b27782134cc30539455ecbd81046d"},{"name":"after_migration","children":[{"name":"main.tf","path":"_docs/migration_guides/nlb_to_0.15.0/after_migration/main.tf","sha":"9afc43a772b630798ab7d0b7a58fdbff9b0379b8"},{"name":"outputs.tf","path":"_docs/migration_guides/nlb_to_0.15.0/after_migration/outputs.tf","sha":"d967d0daa27477b626b7b28911d10b2f18fe6f76"},{"name":"vars.tf","path":"_docs/migration_guides/nlb_to_0.15.0/after_migration/vars.tf","sha":"b8c8af94a7ed9e5db9bd522bf69e0fe304efddee"}]},{"name":"before_migration","children":[{"name":"main.tf","path":"_docs/migration_guides/nlb_to_0.15.0/before_migration/main.tf","sha":"69345f63220752b9d3c83418ea9e31b1c91530a4"},{"name":"outputs.tf","path":"_docs/migration_guides/nlb_to_0.15.0/before_migration/outputs.tf","sha":"dc162b85fc673c12a9d166a1f58021eb142ac447"},{"name":"vars.tf","path":"_docs/migration_guides/nlb_to_0.15.0/before_migration/vars.tf","sha":"b8c8af94a7ed9e5db9bd522bf69e0fe304efddee"}]}]}]}]},{"name":"examples","children":[{"name":"acm-tls-certificate","children":[{"name":"README.md","path":"examples/acm-tls-certificate/README.md","sha":"0a7892a8b5d327254c91a96276273fcc975821ca"},{"name":"dependencies.tf","path":"examples/acm-tls-certificate/dependencies.tf","sha":"237767e8323ffdf0d76a976946fa24c4f12708ce"},{"name":"main.tf","path":"examples/acm-tls-certificate/main.tf","sha":"d349ec37274ee2e9ec78e0ea35a20f08492664b2"},{"name":"outputs.tf","path":"examples/acm-tls-certificate/outputs.tf","sha":"083ef125b3be1f465c66f8b1e8b0ede0c782f10e"},{"name":"vars.tf","path":"examples/acm-tls-certificate/vars.tf","sha":"3b96d4f8aa3d1620494d05538069dbc5d9d4de14"}]},{"name":"alb-with-logs","children":[{"name":"README.md","path":"examples/alb-with-logs/README.md","sha":"b46a1aef114340b80c6742b9344c52f1a952a7a4"},{"name":"main.tf","path":"examples/alb-with-logs/main.tf","sha":"690a7aff11110eab33b17ce18358b945c6c48f51"},{"name":"outputs.tf","path":"examples/alb-with-logs/outputs.tf","sha":"518914d6b608ea2d2996cbaa9361c370bd9c9fa1"},{"name":"vars.tf","path":"examples/alb-with-logs/vars.tf","sha":"029a4cf53d07f1e6e5c04c6173df8a29b0bed98f"}]},{"name":"alb","children":[{"name":"README.md","path":"examples/alb/README.md","sha":"202d51dd9238a27061a6277a4632dce37706a3f9"},{"name":"main.tf","path":"examples/alb/main.tf","sha":"c075a2d24a3e0554f43ac60f96942bda3e6cbb9b"},{"name":"outputs.tf","path":"examples/alb/outputs.tf","sha":"3ab937d31bc4423aa1e17150a40e966fc6cd81da"},{"name":"vars.tf","path":"examples/alb/vars.tf","sha":"3306c4227949373dc9fed5a83dc19f7d6904e007"}]},{"name":"multiple-acm-tls-certificates","children":[{"name":"main.tf","path":"examples/multiple-acm-tls-certificates/main.tf","sha":"4a55d2e698aa814bb75b5d6ebf3a6890d5bad99c"},{"name":"outputs.tf","path":"examples/multiple-acm-tls-certificates/outputs.tf","sha":"20ec52f607e69887ce2a0b54e68415cf36f034e6"},{"name":"vars.tf","path":"examples/multiple-acm-tls-certificates/vars.tf","sha":"55bb61a54afca24f007dfdf2aed50fb86355d56a"}]}]},{"name":"modules","children":[{"name":"acm-tls-certificate","children":[{"name":"README.md","path":"modules/acm-tls-certificate/README.md","sha":"783321db908f41eb3a1ac97fe84c6203065615e9"},{"name":"main.tf","path":"modules/acm-tls-certificate/main.tf","sha":"9ee9cf149dd5b5386a18f1ebf59607ecdd20d9a3"},{"name":"outputs.tf","path":"modules/acm-tls-certificate/outputs.tf","sha":"f075daac320e191ca2849aebab95403a0c5b0776"},{"name":"vars.tf","path":"modules/acm-tls-certificate/vars.tf","sha":"ca6385fbb1865ee150851f3ee165021a6712b45d","toggled":true},{"name":"wait-until-tls-cert-not-in-use.sh","path":"modules/acm-tls-certificate/wait-until-tls-cert-not-in-use.sh","sha":"68296e34cc4e86fbefcae3820e6de88f2aa6f911"}],"toggled":true},{"name":"alb","children":[{"name":"README.md","path":"modules/alb/README.md","sha":"e9d7404946cb0381f7fb4c860b98949def49d07e"},{"name":"main.tf","path":"modules/alb/main.tf","sha":"a43476486f08a3c1d4e2165d37fb0d99ed446572"},{"name":"outputs.tf","path":"modules/alb/outputs.tf","sha":"ad6ead5bfc79865a89228ac92dda76869c8dff48"},{"name":"vars.tf","path":"modules/alb/vars.tf","sha":"891a546aaea776ae9191e2396576572696ffa780"}]},{"name":"nlb","children":[{"name":"README.md","path":"modules/nlb/README.md","sha":"20dd5397807d3a10acd5a61d077baeb8cbac81d9"}]}],"toggled":true},{"name":"test","children":[{"name":"README.md","path":"test/README.md","sha":"ded6aae1d95e6fca858a0ef196d3ecf30d4bf5f2"},{"name":"acm_tls_certificate_test.go","path":"test/acm_tls_certificate_test.go","sha":"5f91328bd014ce3b7261fa4ac030497d9542fafd"},{"name":"go.mod","path":"test/go.mod","sha":"ecf9ffde697ff3a0fd2e2d62eba9ce0cf9ed421a"},{"name":"go.sum","path":"test/go.sum","sha":"a21625cae29a42bd8e1738788cda1753994ab4cb"},{"name":"lb_test.go","path":"test/lb_test.go","sha":"c3cf5e8b9334458a32e02f9ab320a75c4007337d"}]}]},"detailsContent":"<div class=\"preview__body--content\"><div><ul class=\"code__list\"><li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># ---------------------------------------------------------------------------------------------------------------------</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># REQUIRED MODULE PARAMETERS</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># These variables must be passed in by the operator.</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># ---------------------------------------------------------------------------------------------------------------------</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># AWS Terminology Explained:</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># - Amazon Certificate Manager (ACM): A fully managed certificate authority that allows you to easily </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># provision, manage and deploy public and private SSL/TLS certificates</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"><span class=\"hljs-comment\"># </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"></span></li>\n<li class=\"code__item\"><span class=\"code__text\">variable <span class=\"hljs-string\">\"acm_tls_certificates\"</span> {</span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># Ideally, we would use a more strict type here but since we want to support required and optional values, and since</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># Terraform's type system only supports maps that have the same type for all values, we have to use the less useful</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># `any` type.</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-built_in\">type</span> = any</span></li>\n<li class=\"code__item\"><span class=\"code__text\"></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># Each key for each entry in the map is the fully qualified domain name (FQDN) of the certificate you want to issue</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># e.g: example.com </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># Each entry in the map supports the following attributes: </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\">#</span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># OPTIONAL (defaults to value of corresponding module input): </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># - subject_alternative_names [list(string)] : A list of subject alternative names to include </span></span></li>\n<li class=\"code__item\"><span class=\"code__text\"> <span class=\"hljs-comment\"># in the certificate, e.g: [\"mail.example.com\", \"smtp.example.com\"]</span></span></li></ul></div></div>","repoName":"module-load-balancer","repoRef":"v0.20.1","serviceDescriptor":{"serviceName":"Elastic Load Balancer (ELB)","serviceRepoName":"module-load-balancer","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy the Application Load Balancer (ALB) for load balancing HTTP and HTTPS, with support for routing rules and WebSockets.","imageUrl":"elastic.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},"serviceCategoryName":"Networking","fileName":"vars.tf","filePath":"/modules/acm-tls-certificate/vars.tf","title":"Repo Browser: Elastic Load Balancer (ELB)","description":"Browse the repos in the Gruntwork Infrastructure as Code Library."}