You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CODE_OF_CONDUCT.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ Additionally, community organizers are available to help community members engag
65
65
66
66
## 8. Addressing Grievances
67
67
68
-
If you feel you have been falsely or unfairly accused of violating this Code of Conduct, you should notify CN Services with a concise description of your grievance. Your grievance will be handled in accordance with our existing governing policies.
68
+
If you feel you have been falsely or unfairly accused of violating this Code of Conduct, you should notify CN Services with a concise description of your grievance. Your grievance will be handled in accordance with our existing governing policies.
The Citizen Code of Conduct is distributed by [Stumptown Syndicate](http://stumptownsyndicate.org) under a [Creative Commons Attribution-ShareAlike license](http://creativecommons.org/licenses/by-sa/3.0/).
84
+
The Citizen Code of Conduct is distributed by [Stumptown Syndicate](http://stumptownsyndicate.org) under a [Creative Commons Attribution-ShareAlike license](http://creativecommons.org/licenses/by-sa/3.0/).
85
85
86
86
Portions of text derived from the [Django Code of Conduct](https://www.djangoproject.com/conduct/) and the [Geek Feminism Anti-Harassment Policy](http://geekfeminism.wikia.com/wiki/Conference_anti-harassment/Policy).
@@ -83,6 +83,7 @@ In order to run all checks at any point run the following command:
83
83
| <aname="input_environment_files"></a> [environment\_files](#input\_environment\_files)| One or more files containing the environment variables to pass to the container. This maps to the --env-file option to docker run. The file must be hosted in Amazon S3. This option is only available to tasks using the EC2 launch type. This is a list of maps | <pre>list(object({<br> value = string<br> type = string<br> }))</pre> |`[]`| no |
84
84
| <aname="input_ephemeral_storage_size"></a> [ephemeral\_storage\_size](#input\_ephemeral\_storage\_size)| The number of GBs to provision for ephemeral storage on Fargate tasks. Must be greater than or equal to 21 and less than or equal to 200 |`number`|`0`| no |
85
85
| <aname="input_essential"></a> [essential](#input\_essential)| Determines whether all other containers in a task are stopped, if this container fails or stops for any reason. Due to how Terraform type casts booleans in json it is required to double quote this value |`bool`|`true`| no |
86
+
| <aname="input_execution_role_arn"></a> [execution\_role\_arn](#input\_execution\_role\_arn)| (Optional) The ARN of IAM role that grants permissions to start the containers defined in a task (e.g populate environment variables from AWS Secrets Manager). If not specified, `aws_iam_role.ecs_task_execution_role.arn` is used |`string`|`null`| no |
86
87
| <aname="input_extra_hosts"></a> [extra\_hosts](#input\_extra\_hosts)| A list of hostnames and IP address mappings to append to the /etc/hosts file on the container. This is a list of maps | <pre>list(object({<br> ipAddress = string<br> hostname = string<br> }))</pre> |`null`| no |
87
88
| <aname="input_firelens_configuration"></a> [firelens\_configuration](#input\_firelens\_configuration)| The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more details, see https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_FirelensConfiguration.html| <pre>object({<br> type = string<br> options = map(string)<br> })</pre> |`null`| no |
88
89
| <aname="input_healthcheck"></a> [healthcheck](#input\_healthcheck)| (Optional) A map containing command (string), timeout, interval (duration in seconds), retries (1-10, number of times to retry before marking container unhealthy), and startPeriod (0-300, optional grace period to wait, in seconds, before failed healthchecks count toward retries) | <pre>object({<br> command = list(string)<br> retries = number<br> timeout = number<br> interval = number<br> startPeriod = number<br> })</pre> |`null`| no |
@@ -115,7 +116,7 @@ In order to run all checks at any point run the following command:
115
116
| <aname="input_stop_timeout"></a> [stop\_timeout](#input\_stop\_timeout)| Time duration (in seconds) to wait before the container is forcefully killed if it doesn't exit normally on its own |`number`|`null`| no |
116
117
| <aname="input_system_controls"></a> [system\_controls](#input\_system\_controls)| A list of namespaced kernel parameters to set in the container, mapping to the --sysctl option to docker run. This is a list of maps: { namespace = "", value = ""} |`list(map(string))`|`[]`| no |
117
118
| <aname="input_tags"></a> [tags](#input\_tags)| Resource tags |`map(string)`|`{}`| no |
118
-
| <aname="input_task_role_arn"></a> [task\_role\_arn](#input\_task\_role\_arn)| (Optional) The ARN of IAM role that allows your Amazon ECS container task to make calls to other AWS services. If not specified, `aws_iam_role.ecs_task_execution_role.arn` is used |`string`|`null`| no |
119
+
| <aname="input_task_role_arn"></a> [task\_role\_arn](#input\_task\_role\_arn)| (Optional) The ARN of IAM role that grants permissions to the actual application once the container is started (e.g access an S3 bucket or DynamoDB database). If not specified, `aws_iam_role.ecs_task_execution_role.arn` is used |`string`|`null`| no |
119
120
| <aname="input_ulimits"></a> [ulimits](#input\_ulimits)| Container ulimit settings. This is a list of maps, where each map should contain "name", "hardLimit" and "softLimit" | <pre>list(object({<br> name = string<br> hardLimit = number<br> softLimit = number<br> }))</pre> |`null`| no |
120
121
| <aname="input_user"></a> [user](#input\_user)| The user to run as inside the container. Can be any of these formats: user, user:group, uid, uid:gid, user:gid, uid:group. The default (null) will use the container's configured `USER` directive or root if not set. |`string`|`null`| no |
121
122
| <aname="input_volumes"></a> [volumes](#input\_volumes)| (Optional) A set of volume blocks that containers in your task may use | <pre>list(object({<br> host_path = string<br> name = string<br> docker_volume_configuration = list(object({<br> autoprovision = bool<br> driver = string<br> driver_opts = map(string)<br> labels = map(string)<br> scope = string<br> }))<br> efs_volume_configuration = list(object({<br> file_system_id = string<br> root_directory = string<br> transit_encryption = string<br> transit_encryption_port = string<br> authorization_config = list(object({<br> access_point_id = string<br> iam = string<br> }))<br> }))<br> }))</pre> |`[]`| no |
Copy file name to clipboardExpand all lines: variables.tf
+7-1Lines changed: 7 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -433,7 +433,13 @@ variable "skip_destroy" {
433
433
}
434
434
435
435
variable"task_role_arn" {
436
-
description="(Optional) The ARN of IAM role that allows your Amazon ECS container task to make calls to other AWS services. If not specified, `aws_iam_role.ecs_task_execution_role.arn` is used"
436
+
description="(Optional) The ARN of IAM role that grants permissions to the actual application once the container is started (e.g access an S3 bucket or DynamoDB database). If not specified, `aws_iam_role.ecs_task_execution_role.arn` is used"
437
+
type=string
438
+
default=null
439
+
}
440
+
441
+
variable"execution_role_arn" {
442
+
description="(Optional) The ARN of IAM role that grants permissions to start the containers defined in a task (e.g populate environment variables from AWS Secrets Manager). If not specified, `aws_iam_role.ecs_task_execution_role.arn` is used"
0 commit comments