@@ -45,15 +45,18 @@ for dxw's Dalmatian hosting platform.
45
45
| [ aws_glue_catalog_table.cloudtrail] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/glue_catalog_table ) | resource |
46
46
| [ aws_iam_policy.cloudtrail_cloudwatch_logs] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
47
47
| [ aws_iam_policy.cloudwatch_slack_alerts_logs_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
48
+ | [ aws_iam_policy.custom] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
48
49
| [ aws_iam_policy.delete_default_resources_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
49
50
| [ aws_iam_policy.delete_default_resources_vpc_delete_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
50
51
| [ aws_iam_policy.ssm_dhmc] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
51
52
| [ aws_iam_role.cloudtrail_cloudwatch_logs] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
52
53
| [ aws_iam_role.cloudwatch_slack_alerts_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
54
+ | [ aws_iam_role.custom] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
53
55
| [ aws_iam_role.delete_default_resources_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
54
56
| [ aws_iam_role.ssm_dhmc] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
55
57
| [ aws_iam_role_policy_attachment.cloudtrail_cloudwatch_logs] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
56
58
| [ aws_iam_role_policy_attachment.cloudwatch_slack_alerts_logs_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
59
+ | [ aws_iam_role_policy_attachment.custom] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
57
60
| [ aws_iam_role_policy_attachment.delete_default_resources_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
58
61
| [ aws_iam_role_policy_attachment.delete_default_resources_vpc_delete_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
59
62
| [ aws_iam_role_policy_attachment.ssm_dhmc] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
@@ -126,6 +129,7 @@ for dxw's Dalmatian hosting platform.
126
129
| <a name =" input_cloudwatch_slack_alerts_kms_encryption " ></a > [ cloudwatch\_ slack\_ alerts\_ kms\_ encryption] ( #input\_ cloudwatch\_ slack\_ alerts\_ kms\_ encryption ) | Use KMS encryption with the Slack Alerts SNS topic and logs | ` bool ` | n/a | yes |
127
130
| <a name =" input_cloudwatch_slack_alerts_log_retention " ></a > [ cloudwatch\_ slack\_ alerts\_ log\_ retention] ( #input\_ cloudwatch\_ slack\_ alerts\_ log\_ retention ) | Cloudwatch Slack Alerts log retention. Set to 0 to keep all logs | ` number ` | n/a | yes |
128
131
| <a name =" input_codestar_connections " ></a > [ codestar\_ connections] ( #input\_ codestar\_ connections ) | CodeStar connections to create | <pre >map(<br /> object({<br /> provider_type = string,<br /> })<br /> )</pre > | n/a | yes |
132
+ | <a name =" input_custom_iam_roles " ></a > [ custom\_ iam\_ roles] ( #input\_ custom\_ iam\_ roles ) | Configure custom IAM roles/policies | <pre >map(object({<br /> description = string<br /> policies = map(object({<br /> description = string<br /> Version = string<br /> Statement = list(object({<br /> Action = list(string)<br /> Effect = string<br /> Resource = string<br /> }))<br /> }))<br /> assume_role_policy = object({<br /> Version = string<br /> Statement = list(object({<br /> Action = list(string)<br /> Effect = string<br /> Principal = map(string)<br /> }))<br /> })<br /> }))</pre > | n/a | yes |
129
133
| <a name =" input_delete_default_resources_lambda_kms_encryption " ></a > [ delete\_ default\_ resources\_ lambda\_ kms\_ encryption] ( #input\_ delete\_ default\_ resources\_ lambda\_ kms\_ encryption ) | Conditionally encrypt the Delete Default Resources Lambda logs with KMS | ` bool ` | n/a | yes |
130
134
| <a name =" input_delete_default_resources_log_retention " ></a > [ delete\_ default\_ resources\_ log\_ retention] ( #input\_ delete\_ default\_ resources\_ log\_ retention ) | Log retention for the Delete Default Resources Lambda | ` number ` | n/a | yes |
131
135
| <a name =" input_enable_cloudtrail " ></a > [ enable\_ cloudtrail] ( #input\_ enable\_ cloudtrail ) | Enable Cloudtrail | ` bool ` | n/a | yes |
0 commit comments