You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* feat: Adding support for EBS volumes
* feat: Adding support for EBS volumes
* feat: Add support for EBS volumes
* feat: Add support for EBS volumes
* chore: Update min required AWS provider version
---------
Co-authored-by: Bryant Biggs <[email protected]>
| <aname="output_service_iam_role_name"></a> [service\_iam\_role\_name](#output\_service\_iam\_role\_name)| Service IAM role name |
74
74
| <aname="output_service_iam_role_unique_id"></a> [service\_iam\_role\_unique\_id](#output\_service\_iam\_role\_unique\_id)| Stable and unique string identifying the service IAM role |
75
75
| <aname="output_service_id"></a> [service\_id](#output\_service\_id)| ARN that identifies the service |
76
+
| <aname="output_service_infrastructure_iam_role_arn"></a> [service\_infrastructure\_iam\_role\_arn](#output\_service\_infrastructure\_iam\_role\_arn)| Infrastructure IAM role ARN |
77
+
| <aname="output_service_infrastructure_iam_role_name"></a> [service\_infrastructure\_iam\_role\_name](#output\_service\_infrastructure\_iam\_role\_name)| Infrastructure IAM role name |
76
78
| <aname="output_service_name"></a> [service\_name](#output\_service\_name)| Name of the service |
77
79
| <aname="output_service_task_definition_arn"></a> [service\_task\_definition\_arn](#output\_service\_task\_definition\_arn)| Full ARN of the Task Definition (including both `family` and `revision`) |
78
80
| <aname="output_service_task_definition_revision"></a> [service\_task\_definition\_revision](#output\_service\_task\_definition\_revision)| Revision of the task in a particular family |
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
209
211
|[aws_ecs_task_definition.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ecs_task_definition)| data source |
212
+
|[aws_iam_policy_document.infrastructure_iam_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
210
213
|[aws_iam_policy_document.service](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
211
214
|[aws_iam_policy_document.service_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
212
215
|[aws_iam_policy_document.task_exec](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -234,6 +237,7 @@ module "ecs_service" {
234
237
| <aname="input_cpu"></a> [cpu](#input\_cpu)| Number of cpu units used by the task. If the `requires_compatibilities` is `FARGATE` this field is required |`number`|`1024`| no |
235
238
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
236
239
| <aname="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role)| Determines whether the ECS service IAM role should be created |`bool`|`true`| no |
240
+
| <aname="input_create_infrastructure_iam_role"></a> [create\_infrastructure\_iam\_role](#input\_create\_infrastructure\_iam\_role)| Determines whether the ECS infrastructure IAM role should be created |`bool`|`false`| no |
237
241
| <aname="input_create_security_group"></a> [create\_security\_group](#input\_create\_security\_group)| Determines if a security group is created |`bool`|`true`| no |
238
242
| <aname="input_create_service"></a> [create\_service](#input\_create\_service)| Determines whether service resource will be created (set to `false` in case you want to create task definition only) |`bool`|`true`| no |
239
243
| <aname="input_create_task_definition"></a> [create\_task\_definition](#input\_create\_task\_definition)| Determines whether to create a task definition or use existing/provided |`bool`|`true`| no |
@@ -264,6 +268,13 @@ module "ecs_service" {
264
268
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
265
269
| <aname="input_ignore_task_definition_changes"></a> [ignore\_task\_definition\_changes](#input\_ignore\_task\_definition\_changes)| Whether changes to service `task_definition` changes should be ignored |`bool`|`false`| no |
266
270
| <aname="input_inference_accelerator"></a> [inference\_accelerator](#input\_inference\_accelerator)| Configuration block(s) with Inference Accelerators settings |`any`|`{}`| no |
271
+
| <aname="input_infrastructure_iam_role_arn"></a> [infrastructure\_iam\_role\_arn](#input\_infrastructure\_iam\_role\_arn)| Existing IAM role ARN |`string`|`null`| no |
272
+
| <aname="input_infrastructure_iam_role_description"></a> [infrastructure\_iam\_role\_description](#input\_infrastructure\_iam\_role\_description)| Description of the role |`string`|`null`| no |
273
+
| <aname="input_infrastructure_iam_role_name"></a> [infrastructure\_iam\_role\_name](#input\_infrastructure\_iam\_role\_name)| Name to use on IAM role created |`string`|`null`| no |
274
+
| <aname="input_infrastructure_iam_role_path"></a> [infrastructure\_iam\_role\_path](#input\_infrastructure\_iam\_role\_path)| IAM role path |`string`|`null`| no |
275
+
| <aname="input_infrastructure_iam_role_permissions_boundary"></a> [infrastructure\_iam\_role\_permissions\_boundary](#input\_infrastructure\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
276
+
| <aname="input_infrastructure_iam_role_tags"></a> [infrastructure\_iam\_role\_tags](#input\_infrastructure\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
277
+
| <aname="input_infrastructure_iam_role_use_name_prefix"></a> [infrastructure\_iam\_role\_use\_name\_prefix](#input\_infrastructure\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
267
278
| <aname="input_ipc_mode"></a> [ipc\_mode](#input\_ipc\_mode)| IPC resource namespace to be used for the containers in the task The valid values are `host`, `task`, and `none`|`string`|`null`| no |
268
279
| <aname="input_launch_type"></a> [launch\_type](#input\_launch\_type)| Launch type on which to run your service. The valid values are `EC2`, `FARGATE`, and `EXTERNAL`. Defaults to `FARGATE`|`string`|`"FARGATE"`| no |
269
280
| <aname="input_load_balancer"></a> [load\_balancer](#input\_load\_balancer)| Configuration block for load balancers |`any`|`{}`| no |
@@ -319,6 +330,7 @@ module "ecs_service" {
319
330
| <aname="input_timeouts"></a> [timeouts](#input\_timeouts)| Create, update, and delete timeout configurations for the service |`map(string)`|`{}`| no |
320
331
| <aname="input_triggers"></a> [triggers](#input\_triggers)| Map of arbitrary keys and values that, when changed, will trigger an in-place update (redeployment). Useful with `timestamp()`|`any`|`{}`| no |
321
332
| <aname="input_volume"></a> [volume](#input\_volume)| Configuration block for volumes that containers in your task may use |`any`|`{}`| no |
333
+
| <aname="input_volume_configuration"></a> [volume\_configuration](#input\_volume\_configuration)| Configuration for a volume specified in the task definition as a volume that is configured at launch time. Currently, the only supported volume type is an Amazon EBS volume |`any`|`{}`| no |
322
334
| <aname="input_wait_for_steady_state"></a> [wait\_for\_steady\_state](#input\_wait\_for\_steady\_state)| If true, Terraform will wait for the service to reach a steady state before continuing. Default is `false`|`bool`|`null`| no |
323
335
| <aname="input_wait_until_stable"></a> [wait\_until\_stable](#input\_wait\_until\_stable)| Whether terraform should wait until the task set has reached `STEADY_STATE`|`bool`|`null`| no |
324
336
| <aname="input_wait_until_stable_timeout"></a> [wait\_until\_stable\_timeout](#input\_wait\_until\_stable\_timeout)| Wait timeout for task set to reach `STEADY_STATE`. Valid time units include `ns`, `us` (or µs), `ms`, `s`, `m`, and `h`. Default `10m`|`string`|`null`| no |
@@ -334,6 +346,8 @@ module "ecs_service" {
334
346
| <aname="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name)| Service IAM role name |
335
347
| <aname="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id)| Stable and unique string identifying the service IAM role |
336
348
| <aname="output_id"></a> [id](#output\_id)| ARN that identifies the service |
349
+
| <aname="output_infrastructure_iam_role_arn"></a> [infrastructure\_iam\_role\_arn](#output\_infrastructure\_iam\_role\_arn)| Infrastructure IAM role ARN |
350
+
| <aname="output_infrastructure_iam_role_name"></a> [infrastructure\_iam\_role\_name](#output\_infrastructure\_iam\_role\_name)| Infrastructure IAM role name |
337
351
| <aname="output_name"></a> [name](#output\_name)| Name of the service |
338
352
| <aname="output_security_group_arn"></a> [security\_group\_arn](#output\_security\_group\_arn)| Amazon Resource Name (ARN) of the security group |
339
353
| <aname="output_security_group_id"></a> [security\_group\_id](#output\_security\_group\_id)| ID of the security group |
0 commit comments