You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,7 +180,7 @@ No modules.
180
180
| <aname="input_aliases"></a> [aliases](#input\_aliases)| A list of aliases to create. Note - due to the use of `toset()`, values must be static strings and not computed values |`list(string)`|`[]`| no |
181
181
| <aname="input_aliases_use_name_prefix"></a> [aliases\_use\_name\_prefix](#input\_aliases\_use\_name\_prefix)| Determines whether the alias name is used as a prefix |`bool`|`false`| no |
182
182
| <aname="input_bypass_policy_lockout_safety_check"></a> [bypass\_policy\_lockout\_safety\_check](#input\_bypass\_policy\_lockout\_safety\_check)| A flag to indicate whether to bypass the key policy lockout safety check. Setting this value to true increases the risk that the KMS key becomes unmanageable |`bool`|`null`| no |
183
-
| <aname="input_computed_aliases"></a> [computed\_aliases](#input\_computed\_aliases)| A map of aliases to create. Values provided via the `name` key of the map can be computed from upstream resources |`any`|`{}`| no |
183
+
| <aname="input_computed_aliases"></a> [computed\_aliases](#input\_computed\_aliases)| A map of aliases to create. Values provided via the `name` key of the map can be computed from upstream resources |<pre>map(object({<br/> name = string<br/> }))</pre>|`{}`| no |
184
184
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
185
185
| <aname="input_create_external"></a> [create\_external](#input\_create\_external)| Determines whether an external CMK (externally provided material) will be created or a standard CMK (AWS provided material) |`bool`|`false`| no |
186
186
| <aname="input_create_replica"></a> [create\_replica](#input\_create\_replica)| Determines whether a replica standard CMK will be created (AWS provided material) |`bool`|`false`| no |
@@ -192,7 +192,7 @@ No modules.
192
192
| <aname="input_enable_default_policy"></a> [enable\_default\_policy](#input\_enable\_default\_policy)| Specifies whether to enable the default key policy. Defaults to `true`|`bool`|`true`| no |
193
193
| <aname="input_enable_key_rotation"></a> [enable\_key\_rotation](#input\_enable\_key\_rotation)| Specifies whether key rotation is enabled. Defaults to `true`|`bool`|`true`| no |
194
194
| <aname="input_enable_route53_dnssec"></a> [enable\_route53\_dnssec](#input\_enable\_route53\_dnssec)| Determines whether the KMS policy used for Route53 DNSSEC signing is enabled |`bool`|`false`| no |
195
-
| <aname="input_grants"></a> [grants](#input\_grants)| A map of grant definitions to create |`any`|`{}`| no |
195
+
| <aname="input_grants"></a> [grants](#input\_grants)| A map of grant definitions to create |<pre>map(object({<br/> constraints = optional(object({<br/> encryption_context_equals = optional(map(string))<br/> encryption_context_subset = optional(map(string))<br/> }))<br/> grant_creation_tokens = optional(string)<br/> grantee_principal = string<br/> name = optional(string) # Will fall back to use map key<br/> operations = list(string)<br/> retire_on_delete = optional(bool)<br/> retiring_principal = optional(string)<br/> }))</pre> |`null`| no |
196
196
| <aname="input_is_enabled"></a> [is\_enabled](#input\_is\_enabled)| Specifies whether the key is enabled. Defaults to `true`|`bool`|`null`| no |
197
197
| <aname="input_key_administrators"></a> [key\_administrators](#input\_key\_administrators)| A list of IAM ARNs for [key administrators](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-default-allow-administrators)|`list(string)`|`[]`| no |
198
198
| <aname="input_key_asymmetric_public_encryption_users"></a> [key\_asymmetric\_public\_encryption\_users](#input\_key\_asymmetric\_public\_encryption\_users)| A list of IAM ARNs for [key asymmetric public encryption users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-users-crypto)|`list(string)`|`[]`| no |
@@ -202,7 +202,7 @@ No modules.
202
202
| <aname="input_key_owners"></a> [key\_owners](#input\_key\_owners)| A list of IAM ARNs for those who will have full key permissions (`kms:*`) |`list(string)`|`[]`| no |
203
203
| <aname="input_key_service_roles_for_autoscaling"></a> [key\_service\_roles\_for\_autoscaling](#input\_key\_service\_roles\_for\_autoscaling)| A list of IAM ARNs for [AWSServiceRoleForAutoScaling roles](https://docs.aws.amazon.com/autoscaling/ec2/userguide/key-policy-requirements-EBS-encryption.html#policy-example-cmk-access)|`list(string)`|`[]`| no |
204
204
| <aname="input_key_service_users"></a> [key\_service\_users](#input\_key\_service\_users)| A list of IAM ARNs for [key service users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-service-integration)|`list(string)`|`[]`| no |
205
-
| <aname="input_key_statements"></a> [key\_statements](#input\_key\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
205
+
| <aname="input_key_statements"></a> [key\_statements](#input\_key\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |<pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> |`null`| no |
206
206
| <aname="input_key_symmetric_encryption_users"></a> [key\_symmetric\_encryption\_users](#input\_key\_symmetric\_encryption\_users)| A list of IAM ARNs for [key symmetric encryption users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-users-crypto)|`list(string)`|`[]`| no |
207
207
| <aname="input_key_usage"></a> [key\_usage](#input\_key\_usage)| Specifies the intended use of the key. Valid values: `ENCRYPT_DECRYPT` or `SIGN_VERIFY`. Defaults to `ENCRYPT_DECRYPT`|`string`|`null`| no |
208
208
| <aname="input_key_users"></a> [key\_users](#input\_key\_users)| A list of IAM ARNs for [key users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-default-allow-users)|`list(string)`|`[]`| no |
@@ -211,9 +211,9 @@ No modules.
211
211
| <aname="input_policy"></a> [policy](#input\_policy)| A valid policy JSON document. Although this is a key policy, not an IAM policy, an `aws_iam_policy_document`, in the form that designates a principal, can be used |`string`|`null`| no |
212
212
| <aname="input_primary_external_key_arn"></a> [primary\_external\_key\_arn](#input\_primary\_external\_key\_arn)| The primary external key arn of a multi-region replica external key |`string`|`null`| no |
213
213
| <aname="input_primary_key_arn"></a> [primary\_key\_arn](#input\_primary\_key\_arn)| The primary key arn of a multi-region replica key |`string`|`null`| no |
214
-
| <aname="input_region"></a> [region](#input\_region)|(Optional) The Region where the resources will be managed. Defaults to the region set in the provider configuration.|`string`|`null`| no |
214
+
| <aname="input_region"></a> [region](#input\_region)| Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration |`string`|`null`| no |
215
215
| <aname="input_rotation_period_in_days"></a> [rotation\_period\_in\_days](#input\_rotation\_period\_in\_days)| Custom period of time between each rotation date. Must be a number between 90 and 2560 (inclusive) |`number`|`null`| no |
216
-
| <aname="input_route53_dnssec_sources"></a> [route53\_dnssec\_sources](#input\_route53\_dnssec\_sources)| A list of maps containing `account_ids` and Route53 `hosted_zone_arn` that will be allowed to sign DNSSEC records |`list(any)`|`[]`| no |
216
+
| <aname="input_route53_dnssec_sources"></a> [route53\_dnssec\_sources](#input\_route53\_dnssec\_sources)| A list of maps containing `account_ids` and Route53 `hosted_zone_arn` that will be allowed to sign DNSSEC records |<pre>list(object({<br/> account_ids = optional(list(string))<br/> hosted_zone_arn = optional(string)<br/> }))</pre> |`null`| no |
217
217
| <aname="input_source_policy_documents"></a> [source\_policy\_documents](#input\_source\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s |`list(string)`|`[]`| no |
218
218
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
219
219
| <aname="input_valid_to"></a> [valid\_to](#input\_valid\_to)| Time at which the imported key material expires. When the key material expires, AWS KMS deletes the key material and the CMK becomes unusable. If not specified, key material does not expire |`string`|`null`| no |
description="A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage"
0 commit comments