-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathvariables.tf
322 lines (273 loc) · 9.1 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
variable "name" {
type = string
description = "A name for the Terraform workspace"
}
variable "region" {
type = string
default = null
description = "The default region of the account"
}
variable "agent_pool_id" {
type = string
default = null
description = "Agent pool ID, requires \"execution_mode\" to be set to agent"
}
variable "agent_role_arns" {
type = list(string)
default = null
description = "IAM role ARNs used by Terraform Cloud Agent to assume role in the created account"
}
variable "allow_destroy_plan" {
type = bool
default = true
description = "Whether destroy plans can be queued on the workspace"
}
variable "assessments_enabled" {
type = bool
default = true
description = "Whether to regularly run health assessments such as drift detection on the workspace"
}
variable "auth_method" {
type = string
default = "iam_role_oidc"
description = "Configures how the workspace authenticates with the AWS account (can be iam_user, iam_role, or iam_role_oidc)"
validation {
condition = lower(var.auth_method) == "iam_user" || lower(var.auth_method) == "iam_role" || lower(var.auth_method) == "iam_role_oidc"
error_message = "The auth_method value must be either \"iam_user\", \"iam_role\", or \"iam_role_oidc\"."
}
}
variable "auto_apply" {
type = bool
default = false
description = "Whether to automatically apply changes when a Terraform plan is successful"
}
variable "auto_apply_run_trigger" {
type = bool
default = false
description = "Whether to automatically apply changes for runs that were created by run triggers from another workspace"
}
variable "branch" {
type = string
default = "main"
description = "The git branch to trigger the TFE workspace for"
}
variable "clear_text_env_variables" {
type = map(string)
default = {}
description = "An optional map with clear text environment variables"
}
variable "clear_text_hcl_variables" {
type = map(string)
default = {}
description = "An optional map with clear text HCL Terraform variables"
}
variable "clear_text_terraform_variables" {
type = map(string)
default = {}
description = "An optional map with clear text Terraform variables"
}
variable "description" {
type = string
default = null
description = "A description for the workspace"
}
variable "execution_mode" {
type = string
default = "remote"
description = "Which execution mode to use"
validation {
condition = var.execution_mode == "agent" || var.execution_mode == "local" || var.execution_mode == "remote"
error_message = "The execution_mode value must be either \"agent\", \"local\", or \"remote\"."
}
}
variable "file_triggers_enabled" {
type = bool
default = true
description = "Whether to filter runs based on the changed files in a VCS push"
}
variable "github_app_installation_id" {
type = string
default = null
description = "The GitHub App installation ID to use"
}
variable "global_remote_state" {
type = bool
default = null
description = "Allow all workspaces in the organization to read the state of this workspace"
}
variable "notification_configuration" {
type = map(object({
destination_type = string
enabled = optional(bool, true)
url = string
triggers = optional(list(string), [
"run:created",
"run:planning",
"run:needs_attention",
"run:applying",
"run:completed",
"run:errored",
])
}))
default = {}
description = "Notification configuration, using name as key and config as value"
nullable = false
validation {
condition = alltrue([for k, v in var.notification_configuration : contains(["email", "generic", "microsoft-teams", "slack"], v.destination_type)])
error_message = "Supported destination types are: \"email\", \"generic\", \"microsoft-teams\", or \"slack\""
}
}
variable "oauth_token_id" {
type = string
default = null
description = "The OAuth token ID of the VCS provider"
}
variable "oidc_settings" {
type = object({
audience = optional(string, "aws.workload.identity")
provider_arn = string
site_address = optional(string, "app.terraform.io")
})
default = null
description = "OIDC settings to use if \"auth_method\" is set to \"iam_role_oidc\""
}
variable "path" {
type = string
default = null
description = "Path in which to create the IAM role or user"
}
variable "permissions_boundary_arn" {
type = string
default = null
description = "ARN of the policy that is used to set the permissions boundary for the IAM role or IAM user"
}
variable "policy" {
type = string
default = null
description = "The policy to attach to the pipeline role or user"
}
variable "policy_arns" {
type = set(string)
default = []
description = "A set of policy ARNs to attach to the pipeline user"
}
variable "project_id" {
type = string
default = null
description = "ID of the project where the workspace should be created"
}
variable "queue_all_runs" {
type = bool
default = true
description = "When set to false no initial run is queued and all runs triggered by a webhook will not be queued, necessary if you need to set variable sets after creation."
}
variable "remote_state_consumer_ids" {
type = set(string)
default = null
description = "A set of workspace IDs set as explicit remote state consumers for this workspace"
}
variable "repository_identifier" {
type = string
default = null
description = "The repository identifier to connect the workspace to"
}
variable "role_name" {
type = string
default = null
description = "The IAM role name for a new pipeline role"
}
variable "sensitive_env_variables" {
type = map(string)
default = {}
description = "An optional map with sensitive environment variables"
}
variable "sensitive_hcl_variables" {
type = map(object({
sensitive = string
}))
default = {}
description = "An optional map with sensitive HCL Terraform variables"
}
variable "sensitive_terraform_variables" {
type = map(string)
default = {}
description = "An optional map with sensitive Terraform variables"
}
variable "speculative_enabled" {
type = bool
default = true
description = "Enables or disables speculative plans on PR/MR, enabled by default"
}
variable "ssh_key_id" {
type = string
default = null
description = "The SSH key ID to assign to the workspace"
}
variable "tags" {
type = map(string)
default = null
description = "A mapping of tags to assign to resource"
}
variable "team_access" {
type = map(object({
access = optional(string, null),
permissions = optional(object({
run_tasks = bool
runs = string
sentinel_mocks = string
state_versions = string
variables = string
workspace_locking = bool
}), null)
}))
default = {}
description = "Map of team names and either type of fixed access or custom permissions to assign"
nullable = false
validation {
condition = alltrue([for o in var.team_access : !(o.access != null && o.permissions != null)])
error_message = "Cannot use \"access\" and \"permissions\" keys together when specifying a team's access."
}
}
variable "terraform_organization" {
type = string
description = "The Terraform Enterprise organization to create the workspace in"
}
variable "terraform_version" {
type = string
default = "latest"
description = "The version of Terraform to use for this workspace"
}
variable "trigger_patterns" {
type = list(string)
default = null
description = "List of glob patterns that describe the files Terraform Cloud monitors for changes. Trigger patterns are always appended to the root directory of the repository. Mutually exclusive with trigger-prefixes"
}
variable "trigger_prefixes" {
type = list(string)
default = ["modules"]
description = "List of repository-root-relative paths which should be tracked for changes"
}
variable "username" {
type = string
default = null
description = "The username for a new pipeline user"
}
variable "variable_set_ids" {
type = map(string)
default = {}
description = "Map of variable set ids to attach to the workspace"
}
variable "workspace_tags" {
type = list(string)
default = null
description = "A list of tag names for this workspace. Note that tags must only contain lowercase letters, numbers, colons, or hyphens"
validation {
condition = alltrue([for workspace_tag in coalesce(var.workspace_tags, []) : can(regex("[-:a-z0-9]", workspace_tag))])
error_message = "One or more tags are not in the correct format (lowercase letters, numbers, colons, or hyphens)"
}
}
variable "working_directory" {
type = string
default = "terraform"
description = "A relative path that Terraform will execute within"
}