You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -44,8 +39,12 @@ Terraform module for creating skeleton lambda and the github actions oidc AWS IA
44
39
| <aname="input_allowed_triggers"></a> [allowed\_triggers](#input\_allowed\_triggers)| Map of allowed triggers to create Lambda permissions |`map(any)`|`{}`| no |
45
40
| <aname="input_architectures"></a> [architectures](#input\_architectures)| Instruction set architecture for your Lambda function. Valid values are ["x86\_64"] and ["arm64"]. |`list(string)`|`null`| no |
46
41
| <aname="input_attach_network_policy"></a> [attach\_network\_policy](#input\_attach\_network\_policy)| Flag to attach network policy to use VPC subnet and security group |`bool`|`false`| no |
42
+
| <aname="input_attach_policies"></a> [attach\_policies](#input\_attach\_policies)| controls whether AWS managed policies should be added to IAM role for Lambda Function (e.g AWSLambdaBasicExecutionRole) |`bool`|`false`| no |
43
+
| <aname="input_attach_policy_json"></a> [attach\_policy\_json](#input\_attach\_policy\_json)| Controls whether policy\_json should be added to IAM role for Lambda Function |`bool`|`false`| no |
47
44
| <aname="input_attach_policy_jsons"></a> [attach\_policy\_jsons](#input\_attach\_policy\_jsons)| Controls whether policy\_jsons should be added to IAM role for Lambda Function |`bool`|`false`| no |
45
+
| <aname="input_attach_policy_statements"></a> [attach\_policy\_statements](#input\_attach\_policy\_statements)| Controls whether policy\_jsons should be added to IAM role for Lambda Function |`bool`|`false`| no |
48
46
| <aname="input_authorization_type"></a> [authorization\_type](#input\_authorization\_type)| The type of authentication that the Lambda Function URL uses. Set to 'AWS\_IAM' to restrict access to authenticated IAM users only. Set to 'NONE' to bypass IAM authentication and create a public endpoint. |`string`|`"NONE"`| no |
47
+
| <aname="input_cloudwatch_logs_retention_in_days"></a> [cloudwatch\_logs\_retention\_in\_days](#input\_cloudwatch\_logs\_retention\_in\_days)| Number of days the cloudwatch logs will be retained. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. |`number`|`7`| no |
49
48
| <aname="input_code_signing_config_arn"></a> [code\_signing\_config\_arn](#input\_code\_signing\_config\_arn)| Amazon Resource Name (ARN) for a Code Signing Configuration |`string`|`null`| no |
50
49
| <aname="input_cors"></a> [cors](#input\_cors)| CORS settings to be used by the Lambda Function URL |`any`|`{}`| no |
51
50
| <aname="input_create_current_version_allowed_triggers"></a> [create\_current\_version\_allowed\_triggers](#input\_create\_current\_version\_allowed\_triggers)| Whether to allow triggers on current version of Lambda Function (this will revoke permissions from previous version because Terraform manages only current resources) |`bool`|`true`| no |
@@ -60,7 +59,7 @@ Terraform module for creating skeleton lambda and the github actions oidc AWS IA
60
59
| <aname="input_ephemeral_storage_size"></a> [ephemeral\_storage\_size](#input\_ephemeral\_storage\_size)| Amount of ephemeral storage (/tmp) in MB your Lambda Function can use at runtime. Valid value between 512 MB to 10,240 MB (10 GB). |`number`|`512`| no |
61
60
| <aname="input_function_name"></a> [function\_name](#input\_function\_name)| Lambda Function Name |`string`| n/a | yes |
62
61
| <aname="input_function_prefix"></a> [function\_prefix](#input\_function\_prefix)| Prefix for the IAM role for lambda functions |`string`|`""`| no |
63
-
| <aname="input_github_repo"></a> [github\_repo](#input\_github\_repo)| GitHub repo to grant access to assume a role via OIDC. | <pre>object({<br> repo = string<br> branches = optional(list(string), [])<br> environments = optional(list(string), [])<br><br> # Custom Role name. It will autocreate based on repo if not provided<br> role_name = optional(string)<br> })</pre> | n/a | yes |
62
+
| <aname="input_github_repo"></a> [github\_repo](#input\_github\_repo)| GitHub repo to grant access to assume a role via OIDC. | <pre>object({<br> repo = string<br> branches = optional(list(string), [])<br> environments = optional(list(string), ["*"])<br><br> # Custom Role name. It will autocreate based on repo if not provided<br> role_name = optional(string)<br> })</pre> | n/a | yes |
64
63
| <aname="input_handler"></a> [handler](#input\_handler)| Lambda Function Index Handler |`string`|`"index.handler"`| no |
65
64
| <aname="input_image_config_command"></a> [image\_config\_command](#input\_image\_config\_command)| The CMD for the docker image |`list(string)`|`[]`| no |
66
65
| <aname="input_image_config_entry_point"></a> [image\_config\_entry\_point](#input\_image\_config\_entry\_point)| The ENTRYPOINT for the docker image |`list(string)`|`[]`| no |
@@ -70,8 +69,12 @@ Terraform module for creating skeleton lambda and the github actions oidc AWS IA
70
69
| <aname="input_lambda_at_edge"></a> [lambda\_at\_edge](#input\_lambda\_at\_edge)| Set this to true if using Lambda@Edge, to enable publishing, limit the timeout, and allow edgelambda.amazonaws.com to invoke the function |`bool`|`false`| no |
71
70
| <aname="input_lambda_role"></a> [lambda\_role](#input\_lambda\_role)| IAM role ARN attached to the Lambda Function. This governs both who / what can invoke your Lambda Function, as well as what resources our Lambda Function has access to. See Lambda Permission Model for more details. |`string`|`""`| no |
72
71
| <aname="input_layers"></a> [layers](#input\_layers)| List of Lambda Layer Version ARNs (maximum of 5) to attach to your Lambda Function. |`list(string)`|`null`| no |
72
+
| <aname="input_managed_policy_arns"></a> [managed\_policy\_arns](#input\_managed\_policy\_arns)| list of AWS managed policies to attach to IAM role for Lambda Function |`list(string)`|`null`| no |
73
73
| <aname="input_memory_size"></a> [memory\_size](#input\_memory\_size)| Amount of memory in MB your Lambda Function can use at runtime. Valid value between 128 MB to 10,240 MB (10 GB), in 64 MB increments. |`number`|`128`| no |
74
+
| <aname="input_number_of_managed_policies"></a> [number\_of\_managed\_policies](#input\_number\_of\_managed\_policies)| number of AWS managed policies to attach to IAM role for Lambda Function |`number`|`0`| no |
75
+
| <aname="input_number_of_policy_jsons"></a> [number\_of\_policy\_jsons](#input\_number\_of\_policy\_jsons)| Number of policies JSON to attach to IAM role for Lambda Function |`number`|`0`| no |
74
76
| <aname="input_package_type"></a> [package\_type](#input\_package\_type)| The Lambda deployment package type. Valid options: Zip or Image |`string`|`"Zip"`| no |
77
+
| <aname="input_policy_json"></a> [policy\_json](#input\_policy\_json)| An additional policy document as JSON to attach to the Lambda Function role |`string`|`null`| no |
75
78
| <aname="input_policy_jsons"></a> [policy\_jsons](#input\_policy\_jsons)| List of additional policies for the lambda execution |`list(string)`|`[]`| no |
| <aname="input_publish"></a> [publish](#input\_publish)| Whether to publish creation/change as new Lambda Function Version. |`bool`|`false`| no |
@@ -88,11 +91,16 @@ Terraform module for creating skeleton lambda and the github actions oidc AWS IA
88
91
89
92
| Name | Description |
90
93
|------|-------------|
94
+
| <aname="output_function_url"></a> [function\_url](#output\_function\_url)| The function url of lambda function to be able to be set as cloudfront origin |
95
+
| <aname="output_function_url_id"></a> [function\_url\_id](#output\_function\_url\_id)| The function url ID of lambda function to be able to be set as cloudfront origin |
96
+
| <aname="output_invoke_arn"></a> [invoke\_arn](#output\_invoke\_arn)| The invoke arn of lambda function for APIGW integration |
91
97
| <aname="output_lambda_cloudwatch_log_group_arn"></a> [lambda\_cloudwatch\_log\_group\_arn](#output\_lambda\_cloudwatch\_log\_group\_arn)| Lambda Cloudwatch Log group |
92
98
| <aname="output_lambda_cloudwatch_log_group_name"></a> [lambda\_cloudwatch\_log\_group\_name](#output\_lambda\_cloudwatch\_log\_group\_name)| Lambda Cloudwatch Log group |
93
99
| <aname="output_lambda_function_arn"></a> [lambda\_function\_arn](#output\_lambda\_function\_arn)| Lambda Function ARN |
94
100
| <aname="output_lambda_function_name"></a> [lambda\_function\_name](#output\_lambda\_function\_name)| Lambda Function Name |
101
+
| <aname="output_lambda_function_version"></a> [lambda\_function\_version](#output\_lambda\_function\_version)| Latest published version of Lambda Function |
95
102
| <aname="output_lambda_role_arn"></a> [lambda\_role\_arn](#output\_lambda\_role\_arn)| ARN of the IAM role created for the Lambda Function |
96
103
| <aname="output_lambda_role_name"></a> [lambda\_role\_name](#output\_lambda\_role\_name)| The name of the IAM role created for the Lambda Function |
97
104
| <aname="output_lambda_role_unique_id"></a> [lambda\_role\_unique\_id](#output\_lambda\_role\_unique\_id)| The unique id of the IAM role created for the Lambda Function |
98
-
<!-- END_TF_DOCS -->
105
+
| <aname="output_lamda_gha_role_name"></a> [lamda\_gha\_role\_name](#output\_lamda\_gha\_role\_name)| The crated role that can be assumed for the configured repository. |
106
+
| <aname="output_qualified_arn"></a> [qualified\_arn](#output\_qualified\_arn)| The qualified arn of the lambda function to be associated with Cloudfront as a Lambda@Edge function |
0 commit comments