You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
122
126
|[aws_cloudfront_cache_policy.managed_caching_disabled](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/cloudfront_cache_policy)| data source |
123
127
|[aws_cloudfront_origin_request_policy.managed_all_viewer_and_cloudfront_headers](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/cloudfront_origin_request_policy)| data source |
128
+
|[aws_iam_openid_connect_provider.gitlab](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_openid_connect_provider)| data source |
129
+
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
124
130
|[aws_iam_policy_document.deploy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
125
131
|[aws_iam_policy_document.kms_key_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
126
132
|[aws_iam_policy_document.s3_bucket_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
127
133
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
134
+
|[gitlab_project.this](https://registry.terraform.io/providers/gitlabhq/gitlab/latest/docs/data-sources/project)| data source |
128
135
129
136
## Inputs
130
137
131
138
| Name | Description | Type | Default | Required |
| <aname="input_aws_env_vars_suffix"></a> [aws\_env\_vars\_suffix](#input\_aws\_env\_vars\_suffix)| Append suffix for Gitlab CI/CD environment variables if needed |`string`|`""`| no |
134
141
| <aname="input_cloudfront_price_class"></a> [cloudfront\_price\_class](#input\_cloudfront\_price\_class)| CloudFront price class |`string`|`"PriceClass_100"`| no |
| <aname="input_default_ttl"></a> [default\_ttl](#input\_default\_ttl)| Default amount of time that you want objects to stay in a CloudFront cache |`number`|`3600`| no |
136
144
| <aname="input_domain_zone_id"></a> [domain\_zone\_id](#input\_domain\_zone\_id)| The ID of the hosted zone for domain |`string`| n/a | yes |
137
145
| <aname="input_domains"></a> [domains](#input\_domains)| List of domain aliases. You can also specify wildcard eg.: `*.example.com`|`list(string)`| n/a | yes |
146
+
| <aname="input_enable_deploy_role"></a> [enable\_deploy\_role](#input\_enable\_deploy\_role)| Toggle IAM role creation for S3 deploy & CloudFront invalidation; This requires existing aws\_iam\_openid\_connect\_provider matching domain of your gitlab provider |`bool`|`false`| no |
138
147
| <aname="input_enable_deploy_user"></a> [enable\_deploy\_user](#input\_enable\_deploy\_user)| Toggle s3 deploy user creation |`bool`|`true`| no |
139
148
| <aname="input_encrypt_with_kms"></a> [encrypt\_with\_kms](#input\_encrypt\_with\_kms)| Enable server side s3 bucket encryption with KMS key |`bool`|`false`| no |
140
149
| <aname="input_extra_domains"></a> [extra\_domains](#input\_extra\_domains)| Map of extra\_domains with domain name and zone\_id |`map(string)`|`{}`| no |
| <aname="input_response_header_access_control_allow_credentials"></a> [response\_header\_access\_control\_allow\_credentials](#input\_response\_header\_access\_control\_allow\_credentials)| n/a |`bool`|`false`| no |
156
165
| <aname="input_response_header_origin_override"></a> [response\_header\_origin\_override](#input\_response\_header\_origin\_override)| n/a |`bool`|`false`| no |
166
+
| <aname="input_restriction_type"></a> [restriction\_type](#input\_restriction\_type)| Apply for geo restrictions, values: none, whitelist, blacklist |`string`|`"none"`| no |
167
+
| <aname="input_restrictions_locations"></a> [restrictions\_locations](#input\_restrictions\_locations)| List of country codes |`list(string)`|`null`| no |
Copy file name to clipboardExpand all lines: variables.tf
+6Lines changed: 6 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -108,6 +108,12 @@ variable "functions" {
108
108
default={}
109
109
}
110
110
111
+
variable"enable_deploy_role" {
112
+
type=bool
113
+
default=false
114
+
description="Toggle IAM role creation for S3 deploy & CloudFront invalidation; This requires existing aws_iam_openid_connect_provider matching domain of your gitlab provider"
0 commit comments