You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The module's built-in CloudWatch Logs and SNS publish permissions are attached as an inline role policy, leaving the role's managed-policy attachment quota available for the caller's `additional_managed_policy_arns`. AWS still enforces the aggregate inline policy size limit for `additional_inline_policies`.
57
+
25
58
## Inputs
26
59
27
60
-`lambda_image_uri` (string): URI of the Lambda container image.
@@ -34,11 +67,14 @@ module "scheduled_lambda" {
34
67
-`image_command` (list(string)): Optional override for the container CMD/handler.
35
68
-`tags` (map(string)): Tags to apply to created resources.
36
69
-`create_test_url` (bool): Create a public Lambda Function URL for temporary testing only (not for production). This URL has no auth and is publicly accessible, so it can be abused.
70
+
-`additional_managed_policy_arns` (map(string)): Additional IAM managed policy ARNs to attach to the Lambda execution role, keyed by stable labels. Supports up to 10 entries.
71
+
-`additional_inline_policies` (map(string)): Additional inline IAM policy JSON documents to attach to the Lambda execution role, keyed by stable labels. AWS enforces the aggregate inline-policy size limit.
37
72
38
73
## Outputs
39
74
40
75
-`lambda_arn`: ARN of the scheduled Lambda function.
41
76
-`execution_role_arn`: ARN of the Lambda execution role.
77
+
-`execution_role_name`: Name of the Lambda execution role.
42
78
-`log_group_name`: CloudWatch log group name for the Lambda.
43
79
-`schedule_rule_name`: Name of the EventBridge schedule rule.
44
80
-`test_function_url`: Function URL for temporary testing (null if disabled).
0 commit comments