You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/iam-role-for-service-accounts-eks/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -225,7 +225,7 @@ No modules.
225
225
| <aname="input_external_dns_hosted_zone_arns"></a> [external\_dns\_hosted\_zone\_arns](#input\_external\_dns\_hosted\_zone\_arns)| Route53 hosted zone ARNs to allow External DNS to manage records |`list(string)`| <pre>[<br/> "arn:aws:route53:::hostedzone/*"<br/>]</pre> | no |
226
226
| <aname="input_external_secrets_kms_key_arns"></a> [external\_secrets\_kms\_key\_arns](#input\_external\_secrets\_kms\_key\_arns)| List of KMS Key ARNs that are used by Secrets Manager that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br/> "arn:aws:kms:*:*:key/*"<br/>]</pre> | no |
227
227
| <aname="input_external_secrets_secrets_manager_arns"></a> [external\_secrets\_secrets\_manager\_arns](#input\_external\_secrets\_secrets\_manager\_arns)| List of Secrets Manager ARNs that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
228
-
| <aname="input_external_secrets_secrets_manager_create_permission"></a> [external\_secrets\_secrets\_manager\_create\_permission](#input\_external\_secrets\_secrets\_manager\_create\_permission)|Determins whether External Secrets may use secretsmanager:CreateSecret|`bool`|`false`| no |
228
+
| <aname="input_external_secrets_secrets_manager_create_permission"></a> [external\_secrets\_secrets\_manager\_create\_permission](#input\_external\_secrets\_secrets\_manager\_create\_permission)|Determines whether External Secrets may use secretsmanager:CreateSecret|`bool`|`false`| no |
229
229
| <aname="input_external_secrets_ssm_parameter_arns"></a> [external\_secrets\_ssm\_parameter\_arns](#input\_external\_secrets\_ssm\_parameter\_arns)| List of Systems Manager Parameter ARNs that contain secrets to mount using External Secrets |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
230
230
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`true`| no |
231
231
| <aname="input_fsx_lustre_csi_service_role_arns"></a> [fsx\_lustre\_csi\_service\_role\_arns](#input\_fsx\_lustre\_csi\_service\_role\_arns)| Service role ARNs to allow FSx for Lustre CSI create and manage FSX for Lustre service linked roles |`list(string)`| <pre>[<br/> "arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*"<br/>]</pre> | no |
Copy file name to clipboardExpand all lines: modules/iam-user/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ Creates IAM user, IAM login profile, IAM access key and uploads IAM SSH user pub
6
6
7
7
**If possible, always use PGP encryption to prevent Terraform from keeping unencrypted password and access secret key in state file.**
8
8
9
-
### Keybase pre-requisits
9
+
### Keybase pre-requisites
10
10
11
11
When `pgp_key` is specified as `keybase:username`, make sure that that user has already uploaded public key to keybase.io. For example, user with username `test` has done it properly and you can [verify it here](https://keybase.io/test/pgp_keys.asc).
0 commit comments