|
1 | 1 | variable "region" { |
2 | | - type = string |
3 | | -} |
4 | | - |
5 | | -variable "arn_format" { |
6 | | - type = string |
7 | | - default = "arn:aws" |
8 | | - description = "ARN format to be used. May be changed to support deployment in GovCloud/China regions." |
9 | | -} |
10 | | - |
11 | | -variable "acl" { |
12 | | - type = string |
13 | | - description = "The canned ACL to apply to the S3 bucket" |
14 | | - default = "private" |
15 | | -} |
16 | | - |
17 | | -variable "billing_mode" { |
18 | | - default = "PROVISIONED" |
19 | | - description = "DynamoDB billing mode" |
20 | | -} |
21 | | - |
22 | | -variable "read_capacity" { |
23 | | - default = 5 |
24 | | - description = "DynamoDB read capacity units" |
25 | | -} |
26 | | - |
27 | | -variable "write_capacity" { |
28 | | - default = 5 |
29 | | - description = "DynamoDB write capacity units" |
30 | | -} |
31 | | - |
32 | | -variable "force_destroy" { |
33 | | - type = bool |
34 | | - description = "A boolean that indicates the S3 bucket can be destroyed even if it contains objects. These objects are not recoverable" |
35 | | - default = false |
36 | | -} |
37 | | - |
38 | | -variable "mfa_delete" { |
39 | | - type = bool |
40 | | - description = "A boolean that indicates that versions of S3 objects can only be deleted with MFA. ( Terraform cannot apply changes of this value; https://github.com/terraform-providers/terraform-provider-aws/issues/629 )" |
41 | | - default = false |
42 | | -} |
43 | | - |
44 | | -variable "enable_point_in_time_recovery" { |
45 | | - type = bool |
46 | | - description = "Enable DynamoDB point-in-time recovery" |
47 | | - default = true |
48 | | -} |
49 | | - |
50 | | -variable "enable_server_side_encryption" { |
51 | | - type = bool |
52 | | - description = "Enable DynamoDB server-side encryption" |
53 | | - default = true |
54 | | -} |
55 | | - |
56 | | -variable "enable_public_access_block" { |
57 | | - type = bool |
58 | | - description = "Enable Bucket Public Access Block" |
59 | | - default = true |
60 | | -} |
61 | | - |
62 | | -variable "block_public_acls" { |
63 | | - type = bool |
64 | | - description = "Whether Amazon S3 should block public ACLs for this bucket" |
65 | | - default = true |
66 | | -} |
67 | | - |
68 | | -variable "ignore_public_acls" { |
69 | | - type = bool |
70 | | - description = "Whether Amazon S3 should ignore public ACLs for this bucket" |
71 | | - default = true |
72 | | -} |
73 | | - |
74 | | -variable "block_public_policy" { |
75 | | - description = "Whether Amazon S3 should block public bucket policies for this bucket" |
76 | | - default = true |
77 | | -} |
78 | | - |
79 | | -variable "restrict_public_buckets" { |
80 | | - type = bool |
81 | | - description = "Whether Amazon S3 should restrict public bucket policies for this bucket" |
82 | | - default = true |
83 | | -} |
84 | | - |
85 | | -variable "prevent_unencrypted_uploads" { |
86 | | - type = bool |
87 | | - default = true |
88 | | - description = "Prevent uploads of unencrypted objects to S3" |
89 | | -} |
90 | | - |
91 | | -variable "profile" { |
92 | | - type = string |
93 | | - default = "" |
94 | | - description = "AWS profile name as set in the shared credentials file" |
95 | | -} |
96 | | - |
97 | | -variable "role_arn" { |
98 | | - type = string |
99 | | - default = "" |
100 | | - description = "The role to be assumed" |
101 | | -} |
102 | | - |
103 | | -variable "terraform_backend_config_file_name" { |
104 | | - type = string |
105 | | - default = "terraform.tf" |
106 | | - description = "Name of terraform backend config file" |
107 | | -} |
108 | | - |
109 | | -variable "terraform_backend_config_file_path" { |
110 | 2 | type = string |
111 | | - default = "" |
112 | | - description = "Directory for the terraform backend config file, usually `.`. The default is to create no file." |
113 | | -} |
114 | | - |
115 | | -variable "terraform_backend_config_template_file" { |
116 | | - type = string |
117 | | - default = "" |
118 | | - description = "The path to the template used to generate the config file" |
119 | | -} |
120 | | - |
121 | | -variable "terraform_version" { |
122 | | - type = string |
123 | | - default = "0.12.2" |
124 | | - description = "The minimum required terraform version" |
125 | | -} |
126 | | - |
127 | | -variable "terraform_state_file" { |
128 | | - type = string |
129 | | - default = "terraform.tfstate" |
130 | | - description = "The path to the state file inside the bucket" |
131 | | -} |
132 | | - |
133 | | -variable "s3_bucket_name" { |
134 | | - type = string |
135 | | - default = "" |
136 | | - description = "S3 bucket name. If not provided, the name will be generated by the label module in the format namespace-stage-name" |
137 | | -} |
138 | | - |
139 | | -variable "s3_replication_enabled" { |
140 | | - type = bool |
141 | | - default = false |
142 | | - description = "Set this to true and specify `s3_replica_bucket_arn` to enable replication" |
143 | | -} |
144 | | - |
145 | | -variable "s3_replica_bucket_arn" { |
146 | | - type = string |
147 | | - default = "" |
148 | | - description = "The ARN of the S3 replica bucket (destination)" |
149 | | -} |
150 | | - |
151 | | -variable "logging" { |
152 | | - type = object({ |
153 | | - bucket_name = string |
154 | | - prefix = string |
155 | | - }) |
156 | | - default = null |
157 | | - description = "Bucket access logging configuration." |
| 3 | + description = "AWS region" |
158 | 4 | } |
159 | 5 |
|
160 | 6 | variable "bucket_enabled" { |
|
0 commit comments