Skip to content

Commit b1d97f2

Browse files
author
vijay-stephen
committed
Merge pull request #40 from sourcefuse/fix/inspector-member-acct-association
Fix/inspector member acct association
1 parent 48bf8bf commit b1d97f2

File tree

1 file changed

+3
-2
lines changed
  • docs/arc-iac-docs/modules/terraform-aws-arc-security

1 file changed

+3
-2
lines changed

docs/arc-iac-docs/modules/terraform-aws-arc-security/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,14 @@ module "cloud_security" {
5353

5454
| Name | Version |
5555
|------|---------|
56-
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3, < 2.0.0 |
56+
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.0 |
5757
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0, < 6.0 |
5858

5959
## Providers
6060

6161
| Name | Version |
6262
|------|---------|
63-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 5.62.0 |
63+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 5.99.1 |
6464

6565
## Modules
6666

@@ -98,6 +98,7 @@ module "cloud_security" {
9898

9999
| Name | Description | Type | Default | Required |
100100
|------|-------------|------|---------|:--------:|
101+
| <a name="input_add_inspector_member_accounts"></a> [add\_inspector\_member\_accounts](#input\_add\_inspector\_member\_accounts) | Whether to associate as a member account with your Amazon Inspector delegated administrator account. | `bool` | `false` | no |
101102
| <a name="input_aws_config_managed_rules"></a> [aws\_config\_managed\_rules](#input\_aws\_config\_managed\_rules) | A list of AWS Managed Rules that should be enabled on the account.<br><br>See the following for a list of possible rules to enable:<br>https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html | <pre>map(object({<br> description = string<br> identifier = string<br> input_parameters = any<br> tags = map(string)<br> enabled = bool<br> }))</pre> | `{}` | no |
102103
| <a name="input_aws_config_sns_subscribers"></a> [aws\_config\_sns\_subscribers](#input\_aws\_config\_sns\_subscribers) | A map of subscription configurations for SNS topics<br><br>For more information, see:<br>https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription#argument-reference<br><br>protocol:<br> The protocol to use. The possible values for this are: sqs, sms, lambda, application. (http or https are partially<br> supported, see link) (email is an option but is unsupported in terraform, see link).<br>endpoint:<br> The endpoint to send data to, the contents will vary with the protocol. (see link for more information)<br>endpoint\_auto\_confirms:<br> Boolean indicating whether the end point is capable of auto confirming subscription e.g., PagerDuty. Default is<br> false<br>raw\_message\_delivery:<br> Boolean indicating whether or not to enable raw message delivery (the original message is directly passed, not wrapped in JSON with the original message in the message property).<br> Default is false | <pre>map(object({<br> protocol = string<br> endpoint = string<br> endpoint_auto_confirms = bool<br> raw_message_delivery = bool<br> }))</pre> | n/a | yes |
103104
| <a name="input_create_config_iam_role"></a> [create\_config\_iam\_role](#input\_create\_config\_iam\_role) | Flag to indicate whether an iam role should be created for aws config. | `bool` | `false` | no |

0 commit comments

Comments
 (0)