You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
139
145
|[aws_iam_policy_document.streamnative_bootstrap_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -157,17 +163,17 @@ No modules.
157
163
| <aname="input_region"></a> [region](#input\_region)| The AWS region where your instance of StreamNative Cloud is deployed. Defaults to all regions "*" |`string`|`"*"`| no |
158
164
| <aname="input_s3_bucket_pattern"></a> [s3\_bucket\_pattern](#input\_s3\_bucket\_pattern)| Defines the bucket prefix for streamnative managed buckets (backup and offload). Typically defaults to "snc-*", but should match the bucket created using the tiered-storage-resources module |`string`|`"*snc*"`| no |
159
165
| <aname="input_s3_kms_key_arns"></a> [s3\_kms\_key\_arns](#input\_s3\_kms\_key\_arns)| List of KMS key ARNs to use for S3 buckets |`list(string)`|`[]`| no |
160
-
| <aname="input_sn_policy_version"></a> [sn\_policy\_version](#input\_sn\_policy\_version)| The value of SNVersion tag |`string`|`"3.14.1"`| no |
166
+
| <aname="input_sn_policy_version"></a> [sn\_policy\_version](#input\_sn\_policy\_version)| The value of SNVersion tag |`string`|`"3.16.1"`| no |
161
167
| <aname="input_source_identities"></a> [source\_identities](#input\_source\_identities)| Place an additional constraint on source identity, disabled by default and only to be used if specified by StreamNative |`list(any)`|`[]`| no |
162
168
| <aname="input_source_identity_test"></a> [source\_identity\_test](#input\_source\_identity\_test)| The test to use for source identity |`string`|`"ForAnyValue:StringLike"`| no |
163
169
| <aname="input_streamnative_google_account_id"></a> [streamnative\_google\_account\_id](#input\_streamnative\_google\_account\_id)| (Deprecated, use streamnative\_google\_account\_ids instead) The Google Cloud service account ID used by StreamNative for Control Plane operations |`string`|`"108050666045451143798"`| no |
164
-
| <aname="input_streamnative_google_account_ids"></a> [streamnative\_google\_account\_ids](#input\_streamnative\_google\_account\_ids)| The Google Cloud service account IDs used by StreamNative for Control Plane operations |`list(string)`| <pre>[<br> "108050666045451143798"<br>]</pre> | no |
170
+
| <aname="input_streamnative_google_account_ids"></a> [streamnative\_google\_account\_ids](#input\_streamnative\_google\_account\_ids)| The Google Cloud service account IDs used by StreamNative for Control Plane operations |`list(string)`| <pre>[<br/> "108050666045451143798"<br/>]</pre> | no |
165
171
| <aname="input_streamnative_principal_ids"></a> [streamnative\_principal\_ids](#input\_streamnative\_principal\_ids)| When set, this applies an additional check for certain StreamNative principals to futher restrict access to which services / users can access an account. |`list(string)`|`[]`| no |
166
-
| <aname="input_streamnative_support_access_role_arns"></a> [streamnative\_support\_access\_role\_arns](#input\_streamnative\_support\_access\_role\_arns)| A list ARNs provided by StreamNative that enable streamnative support engineers access the StreamNativeCloudBootstrapRole. This is used only in some initial provisioning and in case of on-call support. |`list(string)`| <pre>[<br> "arn:aws:iam::311022431024:role/cloud-support-general"<br>]</pre> | no |
167
-
| <aname="input_streamnative_vendor_access_role_arns"></a> [streamnative\_vendor\_access\_role\_arns](#input\_streamnative\_vendor\_access\_role\_arns)| A list ARNs provided by StreamNative that enable us to work with the Vendor Access Roles created by this module (StreamNativeCloudBootstrapRole, StreamNativeCloudManagementRole). This is how StreamNative is granted access into your AWS account, and should typically be the default value unless directed otherwise. This arns are used *only* for automations. |`list(string)`| <pre>[<br> "arn:aws:iam::311022431024:role/cloud-manager"<br>]</pre> | no |
172
+
| <aname="input_streamnative_support_access_role_arns"></a> [streamnative\_support\_access\_role\_arns](#input\_streamnative\_support\_access\_role\_arns)| A list ARNs provided by StreamNative that enable streamnative support engineers access the StreamNativeCloudBootstrapRole. This is used only in some initial provisioning and in case of on-call support. |`list(string)`| <pre>[<br/> "arn:aws:iam::311022431024:role/cloud-support-general"<br/>]</pre> | no |
173
+
| <aname="input_streamnative_vendor_access_role_arns"></a> [streamnative\_vendor\_access\_role\_arns](#input\_streamnative\_vendor\_access\_role\_arns)| A list ARNs provided by StreamNative that enable us to work with the Vendor Access Roles created by this module (StreamNativeCloudBootstrapRole, StreamNativeCloudManagementRole). This is how StreamNative is granted access into your AWS account, and should typically be the default value unless directed otherwise. This arns are used *only* for automations. |`list(string)`| <pre>[<br/> "arn:aws:iam::311022431024:role/cloud-manager"<br/>]</pre> | no |
168
174
| <aname="input_tags"></a> [tags](#input\_tags)| Extra tags to apply to the resources created by this module. |`map(string)`|`{}`| no |
169
175
| <aname="input_test_suffix"></a> [test\_suffix](#input\_test\_suffix)| Used in testing to apply us to apply multiple versions of the role |`string`|`""`| no |
170
-
| <aname="input_vpc_allowed_ids"></a> [vpc\_allowed\_ids](#input\_vpc\_allowed\_ids)| Allows for further scoping down policy for allowed VPC |`list(any)`| <pre>[<br> "*"<br>]</pre> | no |
176
+
| <aname="input_vpc_allowed_ids"></a> [vpc\_allowed\_ids](#input\_vpc\_allowed\_ids)| Allows for further scoping down policy for allowed VPC |`list(any)`| <pre>[<br/> "*"<br/>]</pre> | no |
171
177
| <aname="input_write_policy_files"></a> [write\_policy\_files](#input\_write\_policy\_files)| Write the policy files locally to disk for debugging and validation |`bool`|`false`| no |
0 commit comments