|
| 1 | +module "wrapper" { |
| 2 | + source = "../" |
| 3 | + |
| 4 | + for_each = var.items |
| 5 | + |
| 6 | + aliases = try(each.value.aliases, var.defaults.aliases, []) |
| 7 | + aliases_use_name_prefix = try(each.value.aliases_use_name_prefix, var.defaults.aliases_use_name_prefix, false) |
| 8 | + bypass_policy_lockout_safety_check = try(each.value.bypass_policy_lockout_safety_check, var.defaults.bypass_policy_lockout_safety_check, null) |
| 9 | + computed_aliases = try(each.value.computed_aliases, var.defaults.computed_aliases, {}) |
| 10 | + create = try(each.value.create, var.defaults.create, true) |
| 11 | + create_external = try(each.value.create_external, var.defaults.create_external, false) |
| 12 | + create_replica = try(each.value.create_replica, var.defaults.create_replica, false) |
| 13 | + create_replica_external = try(each.value.create_replica_external, var.defaults.create_replica_external, false) |
| 14 | + custom_key_store_id = try(each.value.custom_key_store_id, var.defaults.custom_key_store_id, null) |
| 15 | + customer_master_key_spec = try(each.value.customer_master_key_spec, var.defaults.customer_master_key_spec, null) |
| 16 | + deletion_window_in_days = try(each.value.deletion_window_in_days, var.defaults.deletion_window_in_days, null) |
| 17 | + description = try(each.value.description, var.defaults.description, null) |
| 18 | + enable_default_policy = try(each.value.enable_default_policy, var.defaults.enable_default_policy, true) |
| 19 | + enable_key_rotation = try(each.value.enable_key_rotation, var.defaults.enable_key_rotation, true) |
| 20 | + enable_route53_dnssec = try(each.value.enable_route53_dnssec, var.defaults.enable_route53_dnssec, false) |
| 21 | + grants = try(each.value.grants, var.defaults.grants, {}) |
| 22 | + is_enabled = try(each.value.is_enabled, var.defaults.is_enabled, null) |
| 23 | + key_administrators = try(each.value.key_administrators, var.defaults.key_administrators, []) |
| 24 | + key_asymmetric_public_encryption_users = try(each.value.key_asymmetric_public_encryption_users, var.defaults.key_asymmetric_public_encryption_users, []) |
| 25 | + key_asymmetric_sign_verify_users = try(each.value.key_asymmetric_sign_verify_users, var.defaults.key_asymmetric_sign_verify_users, []) |
| 26 | + key_hmac_users = try(each.value.key_hmac_users, var.defaults.key_hmac_users, []) |
| 27 | + key_material_base64 = try(each.value.key_material_base64, var.defaults.key_material_base64, null) |
| 28 | + key_owners = try(each.value.key_owners, var.defaults.key_owners, []) |
| 29 | + key_service_roles_for_autoscaling = try(each.value.key_service_roles_for_autoscaling, var.defaults.key_service_roles_for_autoscaling, []) |
| 30 | + key_service_users = try(each.value.key_service_users, var.defaults.key_service_users, []) |
| 31 | + key_statements = try(each.value.key_statements, var.defaults.key_statements, {}) |
| 32 | + key_symmetric_encryption_users = try(each.value.key_symmetric_encryption_users, var.defaults.key_symmetric_encryption_users, []) |
| 33 | + key_usage = try(each.value.key_usage, var.defaults.key_usage, null) |
| 34 | + key_users = try(each.value.key_users, var.defaults.key_users, []) |
| 35 | + multi_region = try(each.value.multi_region, var.defaults.multi_region, false) |
| 36 | + override_policy_documents = try(each.value.override_policy_documents, var.defaults.override_policy_documents, []) |
| 37 | + policy = try(each.value.policy, var.defaults.policy, null) |
| 38 | + primary_external_key_arn = try(each.value.primary_external_key_arn, var.defaults.primary_external_key_arn, null) |
| 39 | + primary_key_arn = try(each.value.primary_key_arn, var.defaults.primary_key_arn, null) |
| 40 | + route53_dnssec_sources = try(each.value.route53_dnssec_sources, var.defaults.route53_dnssec_sources, []) |
| 41 | + source_policy_documents = try(each.value.source_policy_documents, var.defaults.source_policy_documents, []) |
| 42 | + tags = try(each.value.tags, var.defaults.tags, {}) |
| 43 | + valid_to = try(each.value.valid_to, var.defaults.valid_to, null) |
| 44 | +} |
0 commit comments