-
Notifications
You must be signed in to change notification settings - Fork 1
/
variables.tf
173 lines (136 loc) · 3.89 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
variable "trusted_role_arns" {
description = "ARNs of AWS entities who can assume these roles"
default = []
}
variable "mfa_age" {
description = "Max age of valid MFA (in seconds) for roles which require MFA"
default = 86400
}
# Admin
variable "create_admin_role" {
description = "Whether to create admin role"
default = false
}
variable "admin_role_name" {
description = "IAM role with admin access"
default = "admin"
}
variable "admin_role_path" {
description = "Path of admin IAM role"
default = "/"
}
variable "admin_role_requires_mfa" {
description = "Whether admin role requires MFA"
default = true
}
variable "admin_role_policy_arn" {
description = "Policy ARN to use for admin role"
default = "arn:aws:iam::aws:policy/AdministratorAccess"
}
# Poweruser
variable "create_poweruser_role" {
description = "Whether to create poweruser role"
default = false
}
variable "poweruser_role_name" {
description = "IAM role with poweruser access"
default = "poweruser"
}
variable "poweruser_role_path" {
description = "Path of poweruser IAM role"
default = "/"
}
variable "poweruser_role_requires_mfa" {
description = "Whether poweruser role requires MFA"
default = true
}
variable "poweruser_role_policy_arn" {
description = "Policy ARN to use for admin role"
default = "arn:aws:iam::aws:policy/PowerUserAccess"
}
# Readonly
variable "create_readonly_role" {
description = "Whether to create readonly role"
default = false
}
variable "readonly_role_name" {
description = "IAM role with readonly access"
default = "readonly"
}
variable "readonly_role_path" {
description = "Path of readonly IAM role"
default = "/"
}
variable "readonly_role_requires_mfa" {
description = "Whether readonly role requires MFA"
default = true
}
variable "readonly_role_policy_arn" {
description = "Policy ARN to use for readonly role"
default = "arn:aws:iam::aws:policy/ReadOnlyAccess"
}
variable "max_session_duration" {
description = "Maximum CLI/API session duration in seconds between 3600 and 43200"
default = 3600
}
# Instance Scheduler
variable "instance_scheduler_trusted_account_id" {
description = "AWS account id where the master instance scheduler is running"
default = ""
}
variable "create_instance_scheduler_role" {
description = "Whether instance scheduler role has to be created"
default = false
}
# Cloudwatch Dashboard Sharing
variable "monitor_account_id" {
description = "Monitor AWS account id where the master Cloudwatch Dashboard is configured"
default = ""
}
variable "create_cloudwatch_share_role" {
description = "Whether cloudwatch share role has to be created"
default = false
}
# Nagios
variable "nagios_role_arn" {
description = "arn of principal which assumes nagios role"
default = []
}
variable "create_nagios_role" {
description = "Whether nagios role has to be created"
default = false
}
variable "create_nagios_budget_role" {
description = "Whether nagios budget role has to be created"
default = false
}
# Datadog
variable "create_datadog_role" {
description = "Whether datadog role has to be created"
default = false
}
# SLA Report
variable "create_sla_reporter_role" {
description = "Create role used by SLA report generator"
default = false
}
# CI_CD
variable "create_ci_cd_role" {
description = "Wheter ci_cd_role has to be created"
default = false
type = bool
}
variable "trusted_roles_ci_cd" {
description = "ARNs of AWS entities who can assume these roles for CI/CD"
default = []
}
variable "ci_cd_role_inline_policies" {
default = {}
description = "Inline policies map with policy name as key and json as value."
type = map(string)
}
variable "ci_cd_role_managed_policies" {
default = []
description = "Managed policies list."
type = list(string)
}