You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description="The path to the function's deployment package within the local filesystem. If defined, The s3_-prefixed options cannot be used."
134
134
}
135
135
136
136
variable"s3_buckets" {
137
-
type=list
137
+
type=list(any)
138
138
default=[]
139
139
description="The S3 bucket location containing the function's deployment package. Conflicts with filename. This bucket must reside in the same AWS region where you are creating the Lambda function."
140
140
}
141
141
142
142
variable"s3_keies" {
143
-
type=list
143
+
type=list(any)
144
144
default=[]
145
145
description="The S3 key of an object containing the function's deployment package. Conflicts with filename."
146
146
}
147
147
148
148
variable"s3_object_versions" {
149
-
type=list
149
+
type=list(any)
150
150
default=[]
151
151
description="The object version containing the function's deployment package. Conflicts with filename."
152
152
}
153
153
154
154
variable"names" {
155
-
type=list
155
+
type=list(any)
156
156
default=[]
157
157
description="A unique name for your Lambda Layer."
158
158
}
159
159
160
160
variable"compatible_runtimes" {
161
-
type=list
161
+
type=list(any)
162
162
default=[]
163
163
description="A list of Runtimes this layer is compatible with. Up to 5 runtimes can be specified."
164
164
}
165
165
166
166
variable"descriptions" {
167
-
type=list
167
+
type=list(any)
168
168
default=[]
169
169
description="Description of what your Lambda Layer does."
170
170
}
171
171
172
172
variable"license_infos" {
173
-
type=list
173
+
type=list(any)
174
174
default=[]
175
175
description="License info for your Lambda Layer. See License Info."
176
176
}
177
177
178
178
variable"statement_ids" {
179
-
type=list
179
+
type=list(any)
180
180
default=[]
181
181
description="A unique statement identifier. By default generated by Terraform. "
182
182
}
183
183
184
184
variable"event_source_tokens" {
185
-
type=list
185
+
type=list(any)
186
186
default=[]
187
187
description="The Event Source Token to validate. Used with Alexa Skills."
description="The AWS Lambda action you want to allow in this statement. (e.g. lambda:InvokeFunction)."
200
200
}
201
201
202
202
variable"principals" {
203
-
type=list
203
+
type=list(any)
204
204
default=[]
205
205
description="The principal who is getting this permission. e.g. s3.amazonaws.com, an AWS account ID, or any valid AWS service principal such as events.amazonaws.com or sns.amazonaws.com."
206
206
}
207
207
208
208
variable"source_arns" {
209
-
type=list
209
+
type=list(any)
210
210
default=[]
211
211
description="When granting Amazon S3 or CloudWatch Events permission to invoke your function, you should specify this field with the Amazon Resource Name (ARN) for the S3 Bucket or CloudWatch Events Rule as its value. This ensures that only events generated from the specified bucket or rule can invoke the function."
212
212
}
213
213
214
214
variable"qualifiers" {
215
-
type=list
215
+
type=list(any)
216
216
default=[]
217
217
description="Query parameter to specify function version or alias name. The permission will then apply to the specific qualified ARN. e.g. arn:aws:lambda:aws-region:acct-id:function:function-name:2"
218
218
}
219
219
220
220
variable"source_accounts" {
221
-
type=list
221
+
type=list(any)
222
222
default=[]
223
223
description="This parameter is used for S3 and SES. The AWS account ID (without a hyphen) of the source owner."
224
224
}
225
225
226
226
variable"subnet_ids" {
227
-
type=list
227
+
type=list(any)
228
228
default=[]
229
229
description="Subnet ids for vpc config."
230
230
}
231
231
232
232
variable"security_group_ids" {
233
-
type=list
233
+
type=list(any)
234
234
default=[]
235
235
description="Security group ids for vpc config."
236
236
}
237
237
238
238
variable"variables" {
239
-
type=map
239
+
type=map(any)
240
240
default={}
241
241
description="A map that defines environment variables for the Lambda function."
242
+
}
243
+
244
+
variable"tracing_mode" {
245
+
type=string
246
+
default=null
247
+
description="Whether to to sample and trace a subset of incoming requests with AWS X-Ray. Valid values are PassThrough and Active."
248
+
}
249
+
250
+
variable"attach_tracing_policy" {
251
+
type=bool
252
+
default=false
253
+
description="Controls whether X-Ray tracing policy should be added to IAM role for Lambda Function"
0 commit comments