-
Notifications
You must be signed in to change notification settings - Fork 33
/
variables.tf
39 lines (31 loc) · 1.81 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
variable "backend_bucket" {
}
variable "dynamodb_lock_table_enabled" {
type = bool
default = true
description = "Affects terraform-aws-backend module behavior. Set to false or 0 to prevent this module from creating the DynamoDB table to use for terraform state locking and consistency. More info on locking for aws/s3 backends: https://www.terraform.io/docs/backends/types/s3.html. More information about how terraform handles booleans here: https://www.terraform.io/docs/configuration/variables.html"
}
variable "dynamodb_lock_table_stream_enabled" {
type = bool
default = false
description = "Affects terraform-aws-backend module behavior. Set to false or 0 to disable DynamoDB Streams for the table. More info on DynamoDB streams: https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Streams.html. More information about how terraform handles booleans here: https://www.terraform.io/docs/configuration/variables.html"
}
variable "dynamodb_lock_table_stream_view_type" {
default = "NEW_AND_OLD_IMAGES"
}
variable "dynamodb_lock_table_name" {
default = "terraform-lock"
}
variable "lock_table_read_capacity" {
type = number
default = 1
}
variable "lock_table_write_capacity" {
type = number
default = 1
}
variable "kms_key_id" {
# Default to absent/blank to use the default aws/s3 aws kms master key
default = ""
description = "The AWS KMS master key ID used for the SSE-KMS encryption on the tf state s3 bucket. If the kms_key_id is specified, the bucket default encryption key management method will be set to aws-kms. If the kms_key_id is not specified (the default), then the default encryption key management method will be set to aes-256 (also known as aws-s3 key management). The default aws/s3 AWS KMS master key is used if this element is absent (the default)."
}