You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,7 +189,7 @@ No resources.
189
189
| <aname="input_cluster_configuration"></a> [cluster\_configuration](#input\_cluster\_configuration)| The execute command configuration for the cluster |`any`|`{}`| no |
190
190
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the cluster (up to 255 letters, numbers, hyphens, and underscores) |`string`|`""`| no |
191
191
| <aname="input_cluster_service_connect_defaults"></a> [cluster\_service\_connect\_defaults](#input\_cluster\_service\_connect\_defaults)| Configures a default Service Connect namespace |`map(string)`|`{}`| no |
192
-
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br/> {<br/> "name": "containerInsights",<br/> "value": "enabled"<br/> }<br/>]</pre> | no |
192
+
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br> {<br> "name": "containerInsights",<br> "value": "enabled"<br> }<br>]</pre> | no |
193
193
| <aname="input_cluster_tags"></a> [cluster\_tags](#input\_cluster\_tags)| A map of additional tags to add to the cluster |`map(string)`|`{}`| no |
194
194
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
195
195
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
@@ -207,8 +207,8 @@ No resources.
207
207
| <aname="input_task_exec_iam_role_tags"></a> [task\_exec\_iam\_role\_tags](#input\_task\_exec\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
208
208
| <aname="input_task_exec_iam_role_use_name_prefix"></a> [task\_exec\_iam\_role\_use\_name\_prefix](#input\_task\_exec\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`task_exec_iam_role_name`) is used as a prefix |`bool`|`true`| no |
209
209
| <aname="input_task_exec_iam_statements"></a> [task\_exec\_iam\_statements](#input\_task\_exec\_iam\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
210
-
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
211
-
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
210
+
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:secretsmanager:*:*:secret:*"<br>]</pre> | no |
211
+
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:ssm:*:*:parameter/*"<br>]</pre> | no |
Copy file name to clipboardExpand all lines: modules/cluster/README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -174,7 +174,7 @@ No modules.
174
174
| <aname="input_cluster_configuration"></a> [cluster\_configuration](#input\_cluster\_configuration)| The execute command configuration for the cluster |`any`|`{}`| no |
175
175
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the cluster (up to 255 letters, numbers, hyphens, and underscores) |`string`|`""`| no |
176
176
| <aname="input_cluster_service_connect_defaults"></a> [cluster\_service\_connect\_defaults](#input\_cluster\_service\_connect\_defaults)| Configures a default Service Connect namespace |`map(string)`|`{}`| no |
177
-
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br/> {<br/> "name": "containerInsights",<br/> "value": "enabled"<br/> }<br/>]</pre> | no |
177
+
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br> {<br> "name": "containerInsights",<br> "value": "enabled"<br> }<br>]</pre> | no |
178
178
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
179
179
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
180
180
| <aname="input_create_task_exec_iam_role"></a> [create\_task\_exec\_iam\_role](#input\_create\_task\_exec\_iam\_role)| Determines whether the ECS task definition IAM role should be created |`bool`|`false`| no |
@@ -190,8 +190,8 @@ No modules.
190
190
| <aname="input_task_exec_iam_role_tags"></a> [task\_exec\_iam\_role\_tags](#input\_task\_exec\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
191
191
| <aname="input_task_exec_iam_role_use_name_prefix"></a> [task\_exec\_iam\_role\_use\_name\_prefix](#input\_task\_exec\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`task_exec_iam_role_name`) is used as a prefix |`bool`|`true`| no |
192
192
| <aname="input_task_exec_iam_statements"></a> [task\_exec\_iam\_statements](#input\_task\_exec\_iam\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
193
-
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
194
-
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
193
+
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:secretsmanager:*:*:secret:*"<br>]</pre> | no |
194
+
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:ssm:*:*:parameter/*"<br>]</pre> | no |
Copy file name to clipboardExpand all lines: modules/container-definition/README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,7 +146,7 @@ No modules.
146
146
| <aname="input_command"></a> [command](#input\_command)| The command that's passed to the container |`list(string)`|`[]`| no |
147
147
| <aname="input_cpu"></a> [cpu](#input\_cpu)| The number of cpu units to reserve for the container. This is optional for tasks using Fargate launch type and the total amount of `cpu` of all containers in a task will need to be lower than the task-level cpu value |`number`|`null`| no |
148
148
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
149
-
| <aname="input_dependencies"></a> [dependencies](#input\_dependencies)| The dependencies defined for container startup and shutdown. A container can contain multiple dependencies. When a dependency is defined for container startup, for container shutdown it is reversed. The condition can be one of START, COMPLETE, SUCCESS or HEALTHY | <pre>list(object({<br/> condition = string<br/> containerName = string<br/> }))</pre> |`[]`| no |
149
+
| <aname="input_dependencies"></a> [dependencies](#input\_dependencies)| The dependencies defined for container startup and shutdown. A container can contain multiple dependencies. When a dependency is defined for container startup, for container shutdown it is reversed. The condition can be one of START, COMPLETE, SUCCESS or HEALTHY | <pre>list(object({<br> condition = string<br> containerName = string<br> }))</pre> |`[]`| no |
150
150
| <aname="input_disable_networking"></a> [disable\_networking](#input\_disable\_networking)| When this parameter is true, networking is disabled within the container |`bool`|`null`| no |
151
151
| <aname="input_dns_search_domains"></a> [dns\_search\_domains](#input\_dns\_search\_domains)| Container DNS search domains. A list of DNS search domains that are presented to the container |`list(string)`|`[]`| no |
152
152
| <aname="input_dns_servers"></a> [dns\_servers](#input\_dns\_servers)| Container DNS servers. This is a list of strings specifying the IP addresses of the DNS servers |`list(string)`|`[]`| no |
@@ -155,10 +155,10 @@ No modules.
155
155
| <aname="input_enable_cloudwatch_logging"></a> [enable\_cloudwatch\_logging](#input\_enable\_cloudwatch\_logging)| Determines whether CloudWatch logging is configured for this container definition. Set to `false` to use other logging drivers |`bool`|`true`| no |
156
156
| <aname="input_enable_execute_command"></a> [enable\_execute\_command](#input\_enable\_execute\_command)| Specifies whether to enable Amazon ECS Exec for the tasks within the service |`bool`|`false`| no |
157
157
| <aname="input_entrypoint"></a> [entrypoint](#input\_entrypoint)| The entry point that is passed to the container |`list(string)`|`[]`| no |
158
-
| <aname="input_environment"></a> [environment](#input\_environment)| The environment variables to pass to the container | <pre>list(object({<br/> name = string<br/> value = string<br/> }))</pre> |`[]`| no |
159
-
| <aname="input_environment_files"></a> [environment\_files](#input\_environment\_files)| A list of files containing the environment variables to pass to a container | <pre>list(object({<br/> value = string<br/> type = string<br/> }))</pre> |`[]`| no |
158
+
| <aname="input_environment"></a> [environment](#input\_environment)| The environment variables to pass to the container | <pre>list(object({<br> name = string<br> value = string<br> }))</pre> |`[]`| no |
159
+
| <aname="input_environment_files"></a> [environment\_files](#input\_environment\_files)| A list of files containing the environment variables to pass to a container | <pre>list(object({<br> value = string<br> type = string<br> }))</pre> |`[]`| no |
160
160
| <aname="input_essential"></a> [essential](#input\_essential)| If the `essential` parameter of a container is marked as `true`, and that container fails or stops for any reason, all other containers that are part of the task are stopped |`bool`|`null`| no |
161
-
| <aname="input_extra_hosts"></a> [extra\_hosts](#input\_extra\_hosts)| A list of hostnames and IP address mappings to append to the `/etc/hosts` file on the container | <pre>list(object({<br/> hostname = string<br/> ipAddress = string<br/> }))</pre> |`[]`| no |
161
+
| <aname="input_extra_hosts"></a> [extra\_hosts](#input\_extra\_hosts)| A list of hostnames and IP address mappings to append to the `/etc/hosts` file on the container | <pre>list(object({<br> hostname = string<br> ipAddress = string<br> }))</pre> |`[]`| no |
162
162
| <aname="input_firelens_configuration"></a> [firelens\_configuration](#input\_firelens\_configuration)| The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see [Custom Log Routing](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/using_firelens.html) in the Amazon Elastic Container Service Developer Guide |`any`|`{}`| no |
163
163
| <aname="input_health_check"></a> [health\_check](#input\_health\_check)| The container health check command and associated configuration parameters for the container. See [HealthCheck](https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_HealthCheck.html)|`any`|`{}`| no |
164
164
| <aname="input_hostname"></a> [hostname](#input\_hostname)| The hostname to use for your container |`string`|`null`| no |
@@ -177,14 +177,14 @@ No modules.
177
177
| <aname="input_pseudo_terminal"></a> [pseudo\_terminal](#input\_pseudo\_terminal)| When this parameter is true, a `TTY` is allocated |`bool`|`false`| no |
178
178
| <aname="input_readonly_root_filesystem"></a> [readonly\_root\_filesystem](#input\_readonly\_root\_filesystem)| When this parameter is true, the container is given read-only access to its root file system |`bool`|`true`| no |
179
179
| <aname="input_repository_credentials"></a> [repository\_credentials](#input\_repository\_credentials)| Container repository credentials; required when using a private repo. This map currently supports a single key; "credentialsParameter", which should be the ARN of a Secrets Manager's secret holding the credentials |`map(string)`|`{}`| no |
180
-
| <aname="input_resource_requirements"></a> [resource\_requirements](#input\_resource\_requirements)| The type and amount of a resource to assign to a container. The only supported resource is a GPU | <pre>list(object({<br/> type = string<br/> value = string<br/> }))</pre> |`[]`| no |
181
-
| <aname="input_secrets"></a> [secrets](#input\_secrets)| The secrets to pass to the container. For more information, see [Specifying Sensitive Data](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/specifying-sensitive-data.html) in the Amazon Elastic Container Service Developer Guide | <pre>list(object({<br/> name = string<br/> valueFrom = string<br/> }))</pre> |`[]`| no |
180
+
| <aname="input_resource_requirements"></a> [resource\_requirements](#input\_resource\_requirements)| The type and amount of a resource to assign to a container. The only supported resource is a GPU | <pre>list(object({<br> type = string<br> value = string<br> }))</pre> |`[]`| no |
181
+
| <aname="input_secrets"></a> [secrets](#input\_secrets)| The secrets to pass to the container. For more information, see [Specifying Sensitive Data](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/specifying-sensitive-data.html) in the Amazon Elastic Container Service Developer Guide | <pre>list(object({<br> name = string<br> valueFrom = string<br> }))</pre> |`[]`| no |
182
182
| <aname="input_service"></a> [service](#input\_service)| The name of the service that the container definition is associated with |`string`|`""`| no |
183
183
| <aname="input_start_timeout"></a> [start\_timeout](#input\_start\_timeout)| Time duration (in seconds) to wait before giving up on resolving dependencies for a container |`number`|`30`| no |
184
184
| <aname="input_stop_timeout"></a> [stop\_timeout](#input\_stop\_timeout)| Time duration (in seconds) to wait before the container is forcefully killed if it doesn't exit normally on its own |`number`|`120`| no |
185
185
| <aname="input_system_controls"></a> [system\_controls](#input\_system\_controls)| A list of namespaced kernel parameters to set in the container |`list(map(string))`|`[]`| no |
186
186
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
187
-
| <aname="input_ulimits"></a> [ulimits](#input\_ulimits)| A list of ulimits to set in the container. If a ulimit value is specified in a task definition, it overrides the default values set by Docker | <pre>list(object({<br/> hardLimit = number<br/> name = string<br/> softLimit = number<br/> }))</pre> |`[]`| no |
187
+
| <aname="input_ulimits"></a> [ulimits](#input\_ulimits)| A list of ulimits to set in the container. If a ulimit value is specified in a task definition, it overrides the default values set by Docker | <pre>list(object({<br> hardLimit = number<br> name = string<br> softLimit = number<br> }))</pre> |`[]`| no |
188
188
| <aname="input_user"></a> [user](#input\_user)| The user to run as inside the container. Can be any of these formats: user, user:group, uid, uid:gid, user:gid, uid:group. The default (null) will use the container's configured `USER` directive or root if not set |`string`|`null`| no |
189
189
| <aname="input_volumes_from"></a> [volumes\_from](#input\_volumes\_from)| Data volumes to mount from another container |`list(any)`|`[]`| no |
190
190
| <aname="input_working_directory"></a> [working\_directory](#input\_working\_directory)| The working directory to run commands inside the container |`string`|`null`| no |
0 commit comments