You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_app_name"></a> [app\_name](#input\_app\_name)| Name of the application (used in repository naming).|`string`| n/a |yes |
51
+
| <aname="input_current_account_id"></a> [current\_account\_id](#input\_current\_account\_id)|AWS account ID where the repository is created. |`string`| n/a |yes |
52
+
| <aname="input_environment"></a> [environment](#input\_environment)| Deployment environment tag used for naming and labeling (e.g., dev, prod). |`string`| n/a |yes |
53
+
| <aname="input_owner"></a> [owner](#input\_owner)| Identifies the team or person responsible for the resource (used for tagging). |`string`| n/a | yes |
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
67
65
|[aws_iam_policy_document.combined_policy_documents](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
68
-
|[aws_iam_policy_document.kms_key_base](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
69
-
|[aws_iam_policy_document.kms_key_generate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
70
-
66
+
|[aws_iam_policy_document.kms_key_base](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
67
+
|[aws_iam_policy_document.kms_key_generate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
71
68
## Inputs
72
69
73
-
| Name | Description | Type | Default | Required |
| <aname="input_allow_decrypt_for_arn"></a> [allow\_decrypt\_for\_arn](#input\_allow\_decrypt\_for\_arn)| Flag to allow generating a decrypt-only policy for specified ARNs. |`bool`|`false`| no |
73
+
| <aname="input_allowed_arn"></a> [allowed\_arn](#input\_allowed\_arn)| List of ARNs that are allowed full encrypt/decrypt access to the KMS key. |`list(string)`|`[]`| no |
74
+
| <aname="input_aws_identifiers"></a> [aws\_identifiers](#input\_aws\_identifiers)| List of ARNs that will be granted decrypt-only access. |`list(string)`|`[]`| no |
| <aname="input_owner"></a> [owner](#input\_owner)| Owner tag for identifying the resource owner. |`string`| n/a | yes |
80
+
| <aname="input_service_identifiers"></a> [service\_identifiers](#input\_service\_identifiers)| List of AWS service principal identifiers allowed to use the key (e.g., 's3.amazonaws.com'). |`list(string)`| n/a | yes |
0 commit comments