You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat!: Upgrade AWS provider and min required Terraform version to 6.0 and 1.5.7 respectively (#36)
* feat: addition of enhanced region support
* run of pre-commit hooks
* feat: addition of enhanced region support
* feat: Raise MSV of Terraform
* fix: Remove region examples
* fix: Re-align example
* feat: Add variable definitions to replace `any`
* chore: Updates from testing
---------
Co-authored-by: Bryant Biggs <bryantbiggs@gmail.com>
| <aname="input_aliases"></a> [aliases](#input\_aliases)| A list of aliases to create. Note - due to the use of `toset()`, values must be static strings and not computed values |`list(string)`|`[]`| no |
181
181
| <aname="input_aliases_use_name_prefix"></a> [aliases\_use\_name\_prefix](#input\_aliases\_use\_name\_prefix)| Determines whether the alias name is used as a prefix |`bool`|`false`| no |
182
182
| <aname="input_bypass_policy_lockout_safety_check"></a> [bypass\_policy\_lockout\_safety\_check](#input\_bypass\_policy\_lockout\_safety\_check)| A flag to indicate whether to bypass the key policy lockout safety check. Setting this value to true increases the risk that the KMS key becomes unmanageable |`bool`|`null`| no |
183
-
| <aname="input_computed_aliases"></a> [computed\_aliases](#input\_computed\_aliases)| A map of aliases to create. Values provided via the `name` key of the map can be computed from upstream resources |`any`|`{}`| no |
183
+
| <aname="input_computed_aliases"></a> [computed\_aliases](#input\_computed\_aliases)| A map of aliases to create. Values provided via the `name` key of the map can be computed from upstream resources |<pre>map(object({<br/> name = string<br/> }))</pre>|`{}`| no |
184
184
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
185
185
| <aname="input_create_external"></a> [create\_external](#input\_create\_external)| Determines whether an external CMK (externally provided material) will be created or a standard CMK (AWS provided material) |`bool`|`false`| no |
186
186
| <aname="input_create_replica"></a> [create\_replica](#input\_create\_replica)| Determines whether a replica standard CMK will be created (AWS provided material) |`bool`|`false`| no |
@@ -192,7 +192,7 @@ No modules.
192
192
| <aname="input_enable_default_policy"></a> [enable\_default\_policy](#input\_enable\_default\_policy)| Specifies whether to enable the default key policy. Defaults to `true`|`bool`|`true`| no |
193
193
| <aname="input_enable_key_rotation"></a> [enable\_key\_rotation](#input\_enable\_key\_rotation)| Specifies whether key rotation is enabled. Defaults to `true`|`bool`|`true`| no |
194
194
| <aname="input_enable_route53_dnssec"></a> [enable\_route53\_dnssec](#input\_enable\_route53\_dnssec)| Determines whether the KMS policy used for Route53 DNSSEC signing is enabled |`bool`|`false`| no |
195
-
| <aname="input_grants"></a> [grants](#input\_grants)| A map of grant definitions to create |`any`|`{}`| no |
195
+
| <aname="input_grants"></a> [grants](#input\_grants)| A map of grant definitions to create |<pre>map(object({<br/> constraints = optional(list(object({<br/> encryption_context_equals = optional(map(string))<br/> encryption_context_subset = optional(map(string))<br/> })))<br/> grant_creation_tokens = optional(list(string))<br/> grantee_principal = string<br/> name = optional(string) # Will fall back to use map key<br/> operations = list(string)<br/> retire_on_delete = optional(bool)<br/> retiring_principal = optional(string)<br/> }))</pre> |`null`| no |
196
196
| <aname="input_is_enabled"></a> [is\_enabled](#input\_is\_enabled)| Specifies whether the key is enabled. Defaults to `true`|`bool`|`null`| no |
197
197
| <aname="input_key_administrators"></a> [key\_administrators](#input\_key\_administrators)| A list of IAM ARNs for [key administrators](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-default-allow-administrators)|`list(string)`|`[]`| no |
198
198
| <aname="input_key_asymmetric_public_encryption_users"></a> [key\_asymmetric\_public\_encryption\_users](#input\_key\_asymmetric\_public\_encryption\_users)| A list of IAM ARNs for [key asymmetric public encryption users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-users-crypto)|`list(string)`|`[]`| no |
@@ -202,7 +202,7 @@ No modules.
202
202
| <aname="input_key_owners"></a> [key\_owners](#input\_key\_owners)| A list of IAM ARNs for those who will have full key permissions (`kms:*`) |`list(string)`|`[]`| no |
203
203
| <aname="input_key_service_roles_for_autoscaling"></a> [key\_service\_roles\_for\_autoscaling](#input\_key\_service\_roles\_for\_autoscaling)| A list of IAM ARNs for [AWSServiceRoleForAutoScaling roles](https://docs.aws.amazon.com/autoscaling/ec2/userguide/key-policy-requirements-EBS-encryption.html#policy-example-cmk-access)|`list(string)`|`[]`| no |
204
204
| <aname="input_key_service_users"></a> [key\_service\_users](#input\_key\_service\_users)| A list of IAM ARNs for [key service users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-service-integration)|`list(string)`|`[]`| no |
205
-
| <aname="input_key_statements"></a> [key\_statements](#input\_key\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
205
+
| <aname="input_key_statements"></a> [key\_statements](#input\_key\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |<pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> |`null`| no |
206
206
| <aname="input_key_symmetric_encryption_users"></a> [key\_symmetric\_encryption\_users](#input\_key\_symmetric\_encryption\_users)| A list of IAM ARNs for [key symmetric encryption users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-users-crypto)|`list(string)`|`[]`| no |
207
207
| <aname="input_key_usage"></a> [key\_usage](#input\_key\_usage)| Specifies the intended use of the key. Valid values: `ENCRYPT_DECRYPT` or `SIGN_VERIFY`. Defaults to `ENCRYPT_DECRYPT`|`string`|`null`| no |
208
208
| <aname="input_key_users"></a> [key\_users](#input\_key\_users)| A list of IAM ARNs for [key users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-default-allow-users)|`list(string)`|`[]`| no |
@@ -211,8 +211,9 @@ No modules.
211
211
| <aname="input_policy"></a> [policy](#input\_policy)| A valid policy JSON document. Although this is a key policy, not an IAM policy, an `aws_iam_policy_document`, in the form that designates a principal, can be used |`string`|`null`| no |
212
212
| <aname="input_primary_external_key_arn"></a> [primary\_external\_key\_arn](#input\_primary\_external\_key\_arn)| The primary external key arn of a multi-region replica external key |`string`|`null`| no |
213
213
| <aname="input_primary_key_arn"></a> [primary\_key\_arn](#input\_primary\_key\_arn)| The primary key arn of a multi-region replica key |`string`|`null`| no |
214
+
| <aname="input_region"></a> [region](#input\_region)| Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration |`string`|`null`| no |
214
215
| <aname="input_rotation_period_in_days"></a> [rotation\_period\_in\_days](#input\_rotation\_period\_in\_days)| Custom period of time between each rotation date. Must be a number between 90 and 2560 (inclusive) |`number`|`null`| no |
215
-
| <aname="input_route53_dnssec_sources"></a> [route53\_dnssec\_sources](#input\_route53\_dnssec\_sources)| A list of maps containing `account_ids` and Route53 `hosted_zone_arn` that will be allowed to sign DNSSEC records |`list(any)`|`[]`| no |
216
+
| <aname="input_route53_dnssec_sources"></a> [route53\_dnssec\_sources](#input\_route53\_dnssec\_sources)| A list of maps containing `account_ids` and Route53 `hosted_zone_arn` that will be allowed to sign DNSSEC records |<pre>list(object({<br/> account_ids = optional(list(string))<br/> hosted_zone_arn = optional(string)<br/> }))</pre> |`null`| no |
216
217
| <aname="input_source_policy_documents"></a> [source\_policy\_documents](#input\_source\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s |`list(string)`|`[]`| no |
217
218
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
218
219
| <aname="input_valid_to"></a> [valid\_to](#input\_valid\_to)| Time at which the imported key material expires. When the key material expires, AWS KMS deletes the key material and the CMK becomes unusable. If not specified, key material does not expire |`string`|`null`| no |
@@ -229,6 +230,7 @@ No modules.
229
230
| <aname="output_key_arn"></a> [key\_arn](#output\_key\_arn)| The Amazon Resource Name (ARN) of the key |
230
231
| <aname="output_key_id"></a> [key\_id](#output\_key\_id)| The globally unique identifier for the key |
231
232
| <aname="output_key_policy"></a> [key\_policy](#output\_key\_policy)| The IAM resource policy set on the key |
233
+
| <aname="output_key_region"></a> [key\_region](#output\_key\_region)| The region for the key |
0 commit comments