-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathvariables.tf
More file actions
73 lines (63 loc) · 2.6 KB
/
variables.tf
File metadata and controls
73 lines (63 loc) · 2.6 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
variable "source_account_name" {
# This is used as a prefix for the vault name, and referenced by the policy and the lock.
# It doesn't have to match anything in the source AWS account.
description = "The name of the account that backups will come from"
type = string
}
variable "source_account_id" {
# The source account ID is used in the policy to allow permit root in the source account
# to copy backups into the vault.
description = "The id of the account that backups will come from"
type = string
}
variable "account_id" {
# This is used to deny root from being able to copy backups from the vault
# to anywhere other than the source account. The constraint will need to
# be removed if the original source account is lost.
description = "The id of the account that the vault will be in"
type = string
}
variable "region" {
description = "The region we should be operating in"
type = string
default = "eu-west-2"
}
variable "kms_key" {
description = "The KMS key used to secure the vault"
type = string
}
variable "enable_vault_protection" {
# With this set to true, privileges are locked down so that the vault can't be deleted or
# have its policy changed. The minimum and maximum retention periods are also set only if this is true.
description = "Flag which controls if the vault lock is enabled"
type = bool
default = false
}
variable "vault_lock_type" {
description = "The type of lock that the vault should be, will default to governance"
type = string
# See toplevel README.md:
# DO NOT SET THIS TO compliance UNTIL YOU ARE SURE THAT YOU WANT TO LOCK THE VAULT PERMANENTLY
# When you do, you will also need to set "enable_vault_protection" to true for it to take effect.
default = "governance"
}
variable "vault_lock_min_retention_days" {
description = "The minimum retention period that the vault retains its recovery points"
type = number
default = 365
}
variable "vault_lock_max_retention_days" {
description = "The maximum retention period that the vault retains its recovery points"
type = number
default = 365
}
variable "changeable_for_days" {
description = "How long you want the vault lock to be changeable for, only applies to compliance mode. This value is expressed in days no less than 3 and no greater than 36,500; otherwise, an error will return."
type = number
default = 14
}
variable "copy_target_arn_list" {
description = "A list of target ARNs to which restore points are allowed to be copied"
type = list(string)
default = null
}