You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
147
152
148
153
## Inputs
@@ -152,6 +157,7 @@ No modules.
152
157
| <aname="input_block_public_policy"></a> [block\_public\_policy](#input\_block\_public\_policy)| Makes an optional API call to Zelkova to validate the Resource Policy to prevent broad access to your secret |`bool`|`null`| no |
153
158
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
154
159
| <aname="input_create_policy"></a> [create\_policy](#input\_create\_policy)| Determines whether a policy will be created |`bool`|`false`| no |
160
+
| <aname="input_create_random_password"></a> [create\_random\_password](#input\_create\_random\_password)| Determines whether a random password will be generated |`bool`|`false`| no |
155
161
| <aname="input_description"></a> [description](#input\_description)| A description of the secret |`string`|`null`| no |
156
162
| <aname="input_enable_rotation"></a> [enable\_rotation](#input\_enable\_rotation)| Determines whether secret rotation is enabled |`bool`|`false`| no |
157
163
| <aname="input_force_overwrite_replica_secret"></a> [force\_overwrite\_replica\_secret](#input\_force\_overwrite\_replica\_secret)| Accepts boolean value to specify whether to overwrite a secret with the same name in the destination Region |`bool`|`null`| no |
@@ -161,6 +167,8 @@ No modules.
161
167
| <aname="input_name_prefix"></a> [name\_prefix](#input\_name\_prefix)| Creates a unique name beginning with the specified prefix |`string`|`null`| no |
162
168
| <aname="input_override_policy_documents"></a> [override\_policy\_documents](#input\_override\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid`|`list(string)`|`[]`| no |
163
169
| <aname="input_policy_statements"></a> [policy\_statements](#input\_policy\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
170
+
| <aname="input_random_password_length"></a> [random\_password\_length](#input\_random\_password\_length)| The length of the generated random password |`number`|`32`| no |
171
+
| <aname="input_random_password_override_special"></a> [random\_password\_override\_special](#input\_random\_password\_override\_special)| Supply your own list of special characters to use for string generation. This overrides the default character list in the special argument |`string`|`"!@#$%&*()-_=+[]{}<>:?"`| no |
164
172
| <aname="input_recovery_window_in_days"></a> [recovery\_window\_in\_days](#input\_recovery\_window\_in\_days)| Number of days that AWS Secrets Manager waits before it can delete the secret. This value can be `0` to force deletion without recovery or range from `7` to `30` days. The default value is `30`|`number`|`null`| no |
165
173
| <aname="input_replica"></a> [replica](#input\_replica)| Configuration block to support secret replication |`any`|`{}`| no |
166
174
| <aname="input_rotation_lambda_arn"></a> [rotation\_lambda\_arn](#input\_rotation\_lambda\_arn)| Specifies the ARN of the Lambda function that can rotate the secret |`string`|`""`| no |
Copy file name to clipboardExpand all lines: variables.tf
+18Lines changed: 18 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,24 @@ variable "version_stages" {
118
118
default=null
119
119
}
120
120
121
+
variable"create_random_password" {
122
+
description="Determines whether a random password will be generated"
123
+
type=bool
124
+
default=false
125
+
}
126
+
127
+
variable"random_password_length" {
128
+
description="The length of the generated random password"
129
+
type=number
130
+
default=32
131
+
}
132
+
133
+
variable"random_password_override_special" {
134
+
description="Supply your own list of special characters to use for string generation. This overrides the default character list in the special argument"
The configuration in this directory contains an implementation of a single module wrapper pattern, which allows managing several copies of a module in places where using the native Terraform 0.13+ `for_each` feature is not feasible (e.g., with Terragrunt).
4
+
5
+
You may want to use a single Terragrunt configuration file to manage multiple resources without duplicating `terragrunt.hcl` files for each copy of the same module.
6
+
7
+
This wrapper does not implement any extra functionality.
0 commit comments