You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_addition_lambda_policy"></a> [addition\_lambda\_policy](#input\_addition\_lambda\_policy)| List of additional policies for the lambda execution |`list(string)`|`[]`| no |
44
45
| <aname="input_additional_deployer_role"></a> [additional\_deployer\_role](#input\_additional\_deployer\_role)| (Optional) Additional Deployer Policy Role |`list(any)`|`[]`| no |
| <aname="input_allowed_triggers"></a> [allowed\_triggers](#input\_allowed\_triggers)| Map of allowed triggers to create Lambda permissions |`map(any)`|`{}`| no |
46
48
| <aname="input_app_metadata"></a> [app\_metadata](#input\_app\_metadata)| Application component prefix, name used to generate resource names | <pre>object({<br> prefix = string<br> name = string<br> env = string<br> })</pre> | n/a | yes |
49
+
| <aname="input_attach_network_policy"></a> [attach\_network\_policy](#input\_attach\_network\_policy)| Flag to attach network policy to use VPC subnet and security group |`bool`|`true`| no |
47
50
| <aname="input_authorization_type"></a> [authorization\_type](#input\_authorization\_type)| The type of authentication that the Lambda Function URL uses. Set to 'AWS\_IAM' to restrict access to authenticated IAM users only. Set to 'NONE' to bypass IAM authentication and create a public endpoint. |`string`|`"AWS_IAM"`| no |
48
51
| <aname="input_cors"></a> [cors](#input\_cors)| CORS settings to be used by the Lambda Function URL |`any`|`{}`| no |
49
52
| <aname="input_create_gha_deployer"></a> [create\_gha\_deployer](#input\_create\_gha\_deployer)| Flag for creating Github Actions Deployer deployer |`bool`|`true`| no |
50
53
| <aname="input_function_description"></a> [function\_description](#input\_function\_description)| Lambda Function Description |`string`|`""`| no |
51
54
| <aname="input_function_index_handler"></a> [function\_index\_handler](#input\_function\_index\_handler)| Lambda Function Index Handler |`string`|`"index.handler"`| no |
52
-
| <aname="input_function_name"></a> [function\_name](#input\_function\_name)| Lambda Function Name |`string`|`""`|no|
55
+
| <aname="input_function_name"></a> [function\_name](#input\_function\_name)| Lambda Function Name |`string`|n/a|yes|
53
56
| <aname="input_function_prefix"></a> [function\_prefix](#input\_function\_prefix)| Prefix for the IAM role for lambda functions |`string`|`""`| no |
54
57
| <aname="input_github_branches"></a> [github\_branches](#input\_github\_branches)| List of github branches allowed for oidc subject claims. |`list(string)`|`[]`| no |
55
58
| <aname="input_github_environments"></a> [github\_environments](#input\_github\_environments)| (Optional) Allow GitHub action to deploy to all (default) or to one of the environments in the list. |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
56
59
| <aname="input_github_repo"></a> [github\_repo](#input\_github\_repo)| GitHub repository to grant access to assume a role via OIDC. |`string`| n/a | yes |
57
60
| <aname="input_lambda_environment_variables"></a> [lambda\_environment\_variables](#input\_lambda\_environment\_variables)| A map that defines environment variables for the Lambda Function. |`map(string)`|`{}`| no |
58
61
| <aname="input_lambda_runtime"></a> [lambda\_runtime](#input\_lambda\_runtime)| Lambda Function runtime |`string`|`"nodejs18.x"`| no |
59
62
| <aname="input_role_name"></a> [role\_name](#input\_role\_name)| (Optional) role name of the created role, if not provided the github\_repo will be used to generate. |`string`|`null`| no |
| <aname="input_vpc_subnet_ids"></a> [vpc\_subnet\_ids](#input\_vpc\_subnet\_ids)| List of Subnet Ids |`list(string)`| n/a | yes |
60
65
61
66
## Outputs
62
67
63
-
No outputs.
68
+
| Name | Description |
69
+
|------|-------------|
70
+
| <aname="output_lambda_cloudwatch_log_group_arn"></a> [lambda\_cloudwatch\_log\_group\_arn](#output\_lambda\_cloudwatch\_log\_group\_arn)| Lambda Cloudwatch Log group |
71
+
| <aname="output_lambda_cloudwatch_log_group_name"></a> [lambda\_cloudwatch\_log\_group\_name](#output\_lambda\_cloudwatch\_log\_group\_name)| Lambda Cloudwatch Log group |
72
+
| <aname="output_lambda_function_arn"></a> [lambda\_function\_arn](#output\_lambda\_function\_arn)| Lambda Function ARN |
73
+
| <aname="output_lambda_function_name"></a> [lambda\_function\_name](#output\_lambda\_function\_name)| Lambda Function Name |
74
+
| <aname="output_lambda_role_arn"></a> [lambda\_role\_arn](#output\_lambda\_role\_arn)| ARN of the IAM role created for the Lambda Function |
75
+
| <aname="output_lambda_role_name"></a> [lambda\_role\_name](#output\_lambda\_role\_name)| The name of the IAM role created for the Lambda Function |
76
+
| <aname="output_lambda_role_unique_id"></a> [lambda\_role\_unique\_id](#output\_lambda\_role\_unique\_id)| The unique id of the IAM role created for the Lambda Function |
0 commit comments