You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
340
+
|[aws_iam_policy_document.access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
341
+
|[aws_iam_policy_document.access_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
334
342
|[aws_iam_policy_document.dms_assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
335
343
|[aws_iam_policy_document.dms_assume_role_redshift](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
336
344
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
345
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
337
346
338
347
## Inputs
339
348
340
349
| Name | Description | Type | Default | Required |
| <aname="input_access_iam_role_description"></a> [access\_iam\_role\_description](#input\_access\_iam\_role\_description)| Description of the role |`string`|`null`| no |
352
+
| <aname="input_access_iam_role_name"></a> [access\_iam\_role\_name](#input\_access\_iam\_role\_name)| Name to use on IAM role created |`string`|`null`| no |
353
+
| <aname="input_access_iam_role_path"></a> [access\_iam\_role\_path](#input\_access\_iam\_role\_path)| IAM role path |`string`|`null`| no |
354
+
| <aname="input_access_iam_role_permissions_boundary"></a> [access\_iam\_role\_permissions\_boundary](#input\_access\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
355
+
| <aname="input_access_iam_role_policies"></a> [access\_iam\_role\_policies](#input\_access\_iam\_role\_policies)| Map of IAM role policy ARNs to attach to the IAM role |`map(string)`|`{}`| no |
356
+
| <aname="input_access_iam_role_tags"></a> [access\_iam\_role\_tags](#input\_access\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
357
+
| <aname="input_access_iam_role_use_name_prefix"></a> [access\_iam\_role\_use\_name\_prefix](#input\_access\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`access_iam_role_name`) is used as a prefix |`bool`|`true`| no |
358
+
| <aname="input_access_iam_statements"></a> [access\_iam\_statements](#input\_access\_iam\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
359
+
| <aname="input_access_kms_key_arns"></a> [access\_kms\_key\_arns](#input\_access\_kms\_key\_arns)| A list of KMS key ARNs the access IAM role is permitted to decrypt |`list(string)`|`[]`| no |
360
+
| <aname="input_access_secret_arns"></a> [access\_secret\_arns](#input\_access\_secret\_arns)| A list of SecretManager secret ARNs the access IAM role is permitted to access |`list(string)`|`[]`| no |
361
+
| <aname="input_access_source_s3_bucket_arns"></a> [access\_source\_s3\_bucket\_arns](#input\_access\_source\_s3\_bucket\_arns)| A list of S3 bucket ARNs the access IAM role is permitted to access |`list(string)`|`[]`| no |
362
+
| <aname="input_access_target_dynamodb_table_arns"></a> [access\_target\_dynamodb\_table\_arns](#input\_access\_target\_dynamodb\_table\_arns)| A list of DynamoDB table ARNs the access IAM role is permitted to access |`list(string)`|`[]`| no |
363
+
| <aname="input_access_target_elasticsearch_arns"></a> [access\_target\_elasticsearch\_arns](#input\_access\_target\_elasticsearch\_arns)| A list of Elasticsearch ARNs the access IAM role is permitted to access |`list(string)`|`[]`| no |
364
+
| <aname="input_access_target_kinesis_arns"></a> [access\_target\_kinesis\_arns](#input\_access\_target\_kinesis\_arns)| A list of Kinesis ARNs the access IAM role is permitted to access |`list(string)`|`[]`| no |
365
+
| <aname="input_access_target_s3_bucket_arns"></a> [access\_target\_s3\_bucket\_arns](#input\_access\_target\_s3\_bucket\_arns)| A list of S3 bucket ARNs the access IAM role is permitted to access |`list(string)`|`[]`| no |
342
366
| <aname="input_certificates"></a> [certificates](#input\_certificates)| Map of objects that define the certificates to be created |`map(any)`|`{}`| no |
343
367
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created |`bool`|`true`| no |
368
+
| <aname="input_create_access_iam_role"></a> [create\_access\_iam\_role](#input\_create\_access\_iam\_role)| Determines whether the ECS task definition IAM role should be created |`bool`|`true`| no |
369
+
| <aname="input_create_access_policy"></a> [create\_access\_policy](#input\_create\_access\_policy)| Determines whether the IAM policy should be created |`bool`|`true`| no |
344
370
| <aname="input_create_iam_roles"></a> [create\_iam\_roles](#input\_create\_iam\_roles)| Determines whether the required [DMS IAM resources](https://docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#CHAP_Security.APIRole) will be created |`bool`|`true`| no |
345
371
| <aname="input_create_repl_subnet_group"></a> [create\_repl\_subnet\_group](#input\_create\_repl\_subnet\_group)| Determines whether the replication subnet group will be created |`bool`|`true`| no |
346
372
| <aname="input_enable_redshift_target_permissions"></a> [enable\_redshift\_target\_permissions](#input\_enable\_redshift\_target\_permissions)| Determines whether `redshift.amazonaws.com` is permitted access to assume the `dms-access-for-endpoint` role |`bool`|`false`| no |
@@ -350,9 +376,9 @@ No modules.
350
376
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the role |`string`|`null`| no |
351
377
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to apply to the DMS IAM roles |`map(string)`|`{}`| no |
352
378
| <aname="input_repl_instance_allocated_storage"></a> [repl\_instance\_allocated\_storage](#input\_repl\_instance\_allocated\_storage)| The amount of storage (in gigabytes) to be initially allocated for the replication instance. Min: 5, Max: 6144, Default: 50 |`number`|`null`| no |
353
-
| <aname="input_repl_instance_allow_major_version_upgrade"></a> [repl\_instance\_allow\_major\_version\_upgrade](#input\_repl\_instance\_allow\_major\_version\_upgrade)| Indicates that major version upgrades are allowed |`bool`|`null`| no |
379
+
| <aname="input_repl_instance_allow_major_version_upgrade"></a> [repl\_instance\_allow\_major\_version\_upgrade](#input\_repl\_instance\_allow\_major\_version\_upgrade)| Indicates that major version upgrades are allowed |`bool`|`true`| no |
354
380
| <aname="input_repl_instance_apply_immediately"></a> [repl\_instance\_apply\_immediately](#input\_repl\_instance\_apply\_immediately)| Indicates whether the changes should be applied immediately or during the next maintenance window |`bool`|`null`| no |
355
-
| <aname="input_repl_instance_auto_minor_version_upgrade"></a> [repl\_instance\_auto\_minor\_version\_upgrade](#input\_repl\_instance\_auto\_minor\_version\_upgrade)| Indicates that minor engine upgrades will be applied automatically to the replication instance during the maintenance window |`bool`|`null`| no |
381
+
| <aname="input_repl_instance_auto_minor_version_upgrade"></a> [repl\_instance\_auto\_minor\_version\_upgrade](#input\_repl\_instance\_auto\_minor\_version\_upgrade)| Indicates that minor engine upgrades will be applied automatically to the replication instance during the maintenance window |`bool`|`true`| no |
356
382
| <aname="input_repl_instance_availability_zone"></a> [repl\_instance\_availability\_zone](#input\_repl\_instance\_availability\_zone)| The EC2 Availability Zone that the replication instance will be created in |`string`|`null`| no |
357
383
| <aname="input_repl_instance_class"></a> [repl\_instance\_class](#input\_repl\_instance\_class)| The compute and memory capacity of the replication instance as specified by the replication instance class |`string`|`null`| no |
358
384
| <aname="input_repl_instance_engine_version"></a> [repl\_instance\_engine\_version](#input\_repl\_instance\_engine\_version)| The [engine version](https://docs.aws.amazon.com/dms/latest/userguide/CHAP_ReleaseNotes.html) number of the replication instance |`string`|`null`| no |
@@ -370,12 +396,16 @@ No modules.
370
396
| <aname="input_repl_subnet_group_subnet_ids"></a> [repl\_subnet\_group\_subnet\_ids](#input\_repl\_subnet\_group\_subnet\_ids)| A list of the EC2 subnet IDs for the subnet group |`list(string)`|`[]`| no |
371
397
| <aname="input_repl_subnet_group_tags"></a> [repl\_subnet\_group\_tags](#input\_repl\_subnet\_group\_tags)| A map of additional tags to apply to the replication subnet group |`map(string)`|`{}`| no |
372
398
| <aname="input_replication_tasks"></a> [replication\_tasks](#input\_replication\_tasks)| Map of objects that define the replication tasks to be created |`any`|`{}`| no |
399
+
| <aname="input_s3_endpoints"></a> [s3\_endpoints](#input\_s3\_endpoints)| Map of objects that define the S3 endpoints to be created |`any`|`{}`| no |
373
400
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to use on all resources |`map(string)`|`{}`| no |
374
401
375
402
## Outputs
376
403
377
404
| Name | Description |
378
405
|------|-------------|
406
+
| <aname="output_access_iam_role_arn"></a> [access\_iam\_role\_arn](#output\_access\_iam\_role\_arn)| Access IAM role ARN |
407
+
| <aname="output_access_iam_role_name"></a> [access\_iam\_role\_name](#output\_access\_iam\_role\_name)| Access IAM role name |
408
+
| <aname="output_access_iam_role_unique_id"></a> [access\_iam\_role\_unique\_id](#output\_access\_iam\_role\_unique\_id)| Stable and unique string identifying the access IAM role |
379
409
| <aname="output_certificates"></a> [certificates](#output\_certificates)| A map of maps containing the certificates created and their full output of attributes and values |
380
410
| <aname="output_dms_access_for_endpoint_iam_role_arn"></a> [dms\_access\_for\_endpoint\_iam\_role\_arn](#output\_dms\_access\_for\_endpoint\_iam\_role\_arn)| Amazon Resource Name (ARN) specifying the role |
381
411
| <aname="output_dms_access_for_endpoint_iam_role_id"></a> [dms\_access\_for\_endpoint\_iam\_role\_id](#output\_dms\_access\_for\_endpoint\_iam\_role\_id)| Name of the IAM role |
@@ -394,6 +424,7 @@ No modules.
394
424
| <aname="output_replication_instance_tags_all"></a> [replication\_instance\_tags\_all](#output\_replication\_instance\_tags\_all)| A map of tags assigned to the resource, including those inherited from the provider `default_tags` configuration block |
395
425
| <aname="output_replication_subnet_group_id"></a> [replication\_subnet\_group\_id](#output\_replication\_subnet\_group\_id)| The ID of the subnet group |
396
426
| <aname="output_replication_tasks"></a> [replication\_tasks](#output\_replication\_tasks)| A map of maps containing the replication tasks created and their full output of attributes and values |
427
+
| <aname="output_s3_endpoints"></a> [s3\_endpoints](#output\_s3\_endpoints)| A map of maps containing the S3 endpoints created and their full output of attributes and values |
0 commit comments