You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the cryptographic keys that are used to protect your data.
Copy file name to clipboardExpand all lines: variables.tf
+59-7Lines changed: 59 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -67,6 +67,11 @@ variable "enabled" {
67
67
default=true
68
68
description="Specifies whether the kms is enabled or disabled."
69
69
}
70
+
variable"kms_key_enabled" {
71
+
type=bool
72
+
default=true
73
+
description="Specifies whether the kms is enabled or disabled."
74
+
}
70
75
71
76
72
77
variable"key_usage" {
@@ -82,13 +87,6 @@ variable "alias" {
82
87
description="The display name of the alias. The name must start with the word `alias` followed by a forward slash."
83
88
}
84
89
85
-
variable"policy" {
86
-
type=string
87
-
default=""
88
-
sensitive=true
89
-
description="A valid policy JSON document. For more information about building AWS IAM policy documents with Terraform."
90
-
}
91
-
92
90
variable"customer_master_key_spec" {
93
91
type=string
94
92
default="SYMMETRIC_DEFAULT"
@@ -107,3 +105,57 @@ variable "multi_region" {
107
105
default=true
108
106
description="Indicates whether the KMS key is a multi-Region (true) or regional (false) key."
109
107
}
108
+
109
+
variable"bypass_policy_lockout_safety_check" {
110
+
type=bool
111
+
default=null
112
+
description="A flag to indicate whether to bypass the key policy lockout safety check. Setting this value to true increases the risk that the KMS key becomes unmanageable"
113
+
}
114
+
115
+
variable"valid_to" {
116
+
type=string
117
+
default=""
118
+
description="Time at which the imported key material expires. When the key material expires, AWS KMS deletes the key material and the CMK becomes unusable. If not specified, key material does not expire"
119
+
}
120
+
121
+
variable"key_material_base64" {
122
+
type=string
123
+
default=null
124
+
description="Base64 encoded 256-bit symmetric encryption key material to import. The CMK is permanently associated with this key material. External key only"
125
+
}
126
+
127
+
variable"create_external_enabled" {
128
+
type=bool
129
+
default=false
130
+
description="Determines whether an external CMK (externally provided material) will be created or a standard CMK (AWS provided material)"
131
+
}
132
+
133
+
variable"primary_external_key_arn" {
134
+
type=string
135
+
default=null
136
+
description="The primary external key arn of a multi-region replica external key"
137
+
}
138
+
139
+
variable"primary_key_arn" {
140
+
type=string
141
+
default=""
142
+
description="The primary key arn of a multi-region replica key"
143
+
}
144
+
145
+
variable"policy" {
146
+
type=string
147
+
default=null
148
+
description="A valid policy JSON document. Although this is a key policy, not an IAM policy, an `aws_iam_policy_document`, in the form that designates a principal, can be used"
149
+
}
150
+
151
+
variable"computed_aliases" {
152
+
description="A map of aliases to create. Values provided via the `name` key of the map can be computed from upstream resources"
153
+
type=any
154
+
default={}
155
+
}
156
+
157
+
variable"aliases_use_name_prefix" {
158
+
description="Determines whether the alias name is used as a prefix"
0 commit comments