You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_aliases"></a> [aliases](#input\_aliases)| Fully qualified domain name for site being hosted |`list(string)`| n/a | yes |
227
227
| <a name="input_cache_behaviors"></a> [cache\_behaviors](#input\_cache\_behaviors) | Set the cache behaviors for the distribution , Note:- You cannot use an origin request policy in a cache behavior without a cache policy. | <pre>list(object({<br/> origin_id = string // should be same as what is given in origins<br/> path_pattern = string<br/> allowed_methods = list(string)<br/> cached_methods = list(string)<br/> response_headers_policy_name = optional(string, null)<br/> use_aws_managed_response_headers_policy = optional(bool, false)<br/> function_association = optional(list(object({ // Specific event to trigger this function. Valid values: viewer-request or viewer-response.<br/> event_type = string,<br/> function_arn = string<br/> })))<br/> lambda_function_association = optional(list(object({ // A config block that triggers a lambda function with specific actions (maximum 4).<br/> event_type = string,<br/> lambda_arn = string,<br/> include_body = bool // When set to true it exposes the request body to the lambda function.<br/> })))<br/> use_aws_managed_cache_policy = bool,<br/> cache_policy_name = string, // It can be custom or aws managed policy name , if custom cache_policies variable key should match<br/> use_aws_managed_origin_request_policy = optional(bool),<br/> origin_request_policy_name = optional(string), // It can be custom or aws managed policy name , if custom origin_request_policies variable key should match<br/> compress = bool,<br/> viewer_protocol_policy = string<br/> }))</pre> | `[]` | no |
| <aname="input_retain_on_delete"></a> [retain\_on\_delete](#input\_retain\_on\_delete)| Disables the distribution instead of deleting it when destroying the resource through Terraform. If this is set, the distribution needs to be deleted manually afterwards. |`bool`|`false`| no |
244
244
| <aname="input_route53_record_ttl"></a> [route53\_record\_ttl](#input\_route53\_record\_ttl)| TTL for Route53 record |`string`|`60`| no |
245
-
| <aname="input_route53_root_domain"></a> [route53\_root\_domain](#input\_route53\_root\_domain)| Domain to add to route 53 as alias to distribution |`string`|n/a|yes|
245
+
| <aname="input_route53_root_domain"></a> [route53\_root\_domain](#input\_route53\_root\_domain)| Domain to add to route 53 as alias to distribution |`string`|`null`|no|
246
246
| <aname="input_s3_kms_details"></a> [s3\_kms\_details](#input\_s3\_kms\_details)| KMS details for S3 encryption | <pre>object({<br/> s3_bucket_encryption_type = string, //Encryption for S3 bucket , options : SSE-S3 - AES256 , SSE-KMS - aws:kms<br/> kms_key_administrators = optional(list(string)), // "Environment where deploying,List of AWS arns that will have permissions to use kms key"<br/> kms_key_users = optional(list(string)), // "Environment where deploying,List of AWS arns that will have permissions to use kms key"<br/> kms_key_arn = optional(string) // In case if we need to use CMK created else where, set as null if not used<br/> })</pre> | <pre>{<br/> "kms_key_administrators": [],<br/> "kms_key_arn": null,<br/> "kms_key_users": [],<br/> "s3_bucket_encryption_type": "SSE-S3"<br/>}</pre> | no |
247
247
| <aname="input_tags"></a> [tags](#input\_tags)| Tags for AWS resources |`map(string)`|`{}`| no |
248
248
| <aname="input_viewer_certificate"></a> [viewer\_certificate](#input\_viewer\_certificate)| The SSL configuration for this distribution | <pre>object({<br/> cloudfront_default_certificate = bool,<br/> minimum_protocol_version = string,<br/> ssl_support_method = string<br/> })</pre> | <pre>{<br/> "cloudfront_default_certificate": false,<br/> "minimum_protocol_version": "TLSv1.2_2018",<br/> "ssl_support_method": "sni-only"<br/>}</pre> | no |
0 commit comments