You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/mpc-backup-key/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ No modules.
32
32
| <aname="input_mpc_party_cross_account_iam_role_arn"></a> [mpc\_party\_cross\_account\_iam\_role\_arn](#input\_mpc\_party\_cross\_account\_iam\_role\_arn)| ARN of cross-account IAM role allowed for usage of KMS key |`string`|`null`| no |
33
33
| <aname="input_mpc_party_kms_alias"></a> [mpc\_party\_kms\_alias](#input\_mpc\_party\_kms\_alias)| Alias for the KMS key |`string`|`null`| no |
34
34
| <aname="input_mpc_party_kms_backup_description"></a> [mpc\_party\_kms\_backup\_description](#input\_mpc\_party\_kms\_backup\_description)| Description of KMS Key |`string`|`"Asymmetric KMS key backup for MPC Party"`| no |
35
-
| <aname="input_mpc_party_kms_backup_vault_customer_master_key_spec"></a> [mpc\_party\_kms\_backup\_vault\_customer\_master\_key\_spec](#input\_mpc\_party\_kms\_backup\_vault\_customer\_master\_key\_spec)| Key spec for the backup vault |`string`|`"ASYMMETRIC_DEFAULT"`| no |
35
+
| <aname="input_mpc_party_kms_backup_vault_customer_master_key_spec"></a> [mpc\_party\_kms\_backup\_vault\_customer\_master\_key\_spec](#input\_mpc\_party\_kms\_backup\_vault\_customer\_master\_key\_spec)| Key spec for the backup vault |`string`|`"RSA_4096"`| no |
36
36
| <aname="input_mpc_party_kms_backup_vault_key_usage"></a> [mpc\_party\_kms\_backup\_vault\_key\_usage](#input\_mpc\_party\_kms\_backup\_vault\_key\_usage)| Key usage for the backup vault |`string`|`"ENCRYPT_DECRYPT"`| no |
37
37
| <aname="input_mpc_party_kms_deletion_window_in_days"></a> [mpc\_party\_kms\_deletion\_window\_in\_days](#input\_mpc\_party\_kms\_deletion\_window\_in\_days)| Deletion window in days for KMS key |`number`|`30`| no |
38
38
| <aname="input_mpc_party_kms_image_attestation_sha"></a> [mpc\_party\_kms\_image\_attestation\_sha](#input\_mpc\_party\_kms\_image\_attestation\_sha)| Attestation SHA for KMS image |`string`|`null`| no |
@@ -376,10 +374,7 @@ The module can optionally create:
376
374
| <aname="input_enable_rds"></a> [enable\_rds](#input\_enable\_rds)| Whether to create the RDS instance |`bool`|`true`| no |
377
375
| <aname="input_k8s_namespace"></a> [k8s\_namespace](#input\_k8s\_namespace)| The Kubernetes namespace for MPC party resources |`string`|`"kms-decentralized"`| no |
378
376
| <aname="input_k8s_service_account_name"></a> [k8s\_service\_account\_name](#input\_k8s\_service\_account\_name)| The name of the Kubernetes service account for MPC party |`string`| n/a | yes |
379
-
| <aname="input_kms_backup_external_role_arn"></a> [kms\_backup\_external\_role\_arn](#input\_kms\_backup\_external\_role\_arn)| ARN of the backup vault for the KMS key |`string`|`null`| no |
380
377
| <aname="input_kms_backup_vault_bucket_name"></a> [kms\_backup\_vault\_bucket\_name](#input\_kms\_backup\_vault\_bucket\_name)| Backup vault S3 bucket name |`string`|`null`| no |
381
-
| <aname="input_kms_backup_vault_customer_master_key_spec"></a> [kms\_backup\_vault\_customer\_master\_key\_spec](#input\_kms\_backup\_vault\_customer\_master\_key\_spec)| Key spec for the backup vault |`string`|`"ASYMMETRIC_DEFAULT"`| no |
382
-
| <aname="input_kms_backup_vault_key_usage"></a> [kms\_backup\_vault\_key\_usage](#input\_kms\_backup\_vault\_key\_usage)| Key usage for the backup vault |`string`|`"ENCRYPT_DECRYPT"`| no |
383
378
| <aname="input_kms_backup_vault_kms_key_arn"></a> [kms\_backup\_vault\_kms\_key\_arn](#input\_kms\_backup\_vault\_kms\_key\_arn)| KMS key ARN for the backup vault |`string`|`null`| no |
384
379
| <aname="input_kms_connector_enable_txsender_key"></a> [kms\_connector\_enable\_txsender\_key](#input\_kms\_connector\_enable\_txsender\_key)| Whether to enable the KMS key for the kms-connector txsender |`bool`|`false`| no |
385
380
| <aname="input_kms_connector_txsender_key_spec"></a> [kms\_connector\_txsender\_key\_spec](#input\_kms\_connector\_txsender\_key\_spec)| Specification for the KMS-Connector txsender (e.g., ECC\_SECG\_P256K1 for Ethereum key signing) |`string`|`"ECC_SECG_P256K1"`| no |
0 commit comments