From 0a1b2f26125cd820afb16c5f316bf0854a9209ff Mon Sep 17 00:00:00 2001 From: Anton Babenko Date: Thu, 10 Aug 2023 14:46:48 +0200 Subject: [PATCH] fix: Updated variable types from any to map(any) --- README.md | 6 +++--- examples/complete/README.md | 2 +- examples/complete/main.tf | 2 +- variables.tf | 6 +++--- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index c434448..6851f76 100644 --- a/README.md +++ b/README.md @@ -166,13 +166,13 @@ No modules. | [name](#input\_name) | Friendly name of the new secret. The secret name can consist of uppercase letters, lowercase letters, digits, and any of the following characters: `/_+=.@-` | `string` | `null` | no | | [name\_prefix](#input\_name\_prefix) | Creates a unique name beginning with the specified prefix | `string` | `null` | no | | [override\_policy\_documents](#input\_override\_policy\_documents) | List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid` | `list(string)` | `[]` | no | -| [policy\_statements](#input\_policy\_statements) | A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | `any` | `{}` | no | +| [policy\_statements](#input\_policy\_statements) | A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | `map(any)` | `{}` | no | | [random\_password\_length](#input\_random\_password\_length) | The length of the generated random password | `number` | `32` | no | | [random\_password\_override\_special](#input\_random\_password\_override\_special) | Supply your own list of special characters to use for string generation. This overrides the default character list in the special argument | `string` | `"!@#$%&*()-_=+[]{}<>:?"` | no | | [recovery\_window\_in\_days](#input\_recovery\_window\_in\_days) | Number of days that AWS Secrets Manager waits before it can delete the secret. This value can be `0` to force deletion without recovery or range from `7` to `30` days. The default value is `30` | `number` | `null` | no | -| [replica](#input\_replica) | Configuration block to support secret replication | `any` | `{}` | no | +| [replica](#input\_replica) | Configuration block to support secret replication | `map(any)` | `{}` | no | | [rotation\_lambda\_arn](#input\_rotation\_lambda\_arn) | Specifies the ARN of the Lambda function that can rotate the secret | `string` | `""` | no | -| [rotation\_rules](#input\_rotation\_rules) | A structure that defines the rotation configuration for this secret | `any` | `{}` | no | +| [rotation\_rules](#input\_rotation\_rules) | A structure that defines the rotation configuration for this secret | `map(any)` | `{}` | no | | [secret\_binary](#input\_secret\_binary) | Specifies binary data that you want to encrypt and store in this version of the secret. This is required if `secret_string` is not set. Needs to be encoded to base64 | `string` | `null` | no | | [secret\_string](#input\_secret\_string) | Specifies text data that you want to encrypt and store in this version of the secret. This is required if `secret_binary` is not set | `string` | `null` | no | | [source\_policy\_documents](#input\_source\_policy\_documents) | List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s | `list(string)` | `[]` | no | diff --git a/examples/complete/README.md b/examples/complete/README.md index fef48e4..5e15845 100644 --- a/examples/complete/README.md +++ b/examples/complete/README.md @@ -41,7 +41,7 @@ Note that this example may create resources which will incur monetary charges on | Name | Source | Version | |------|--------|---------| -| [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | ~> 5.0 | +| [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | ~> 6.0 | | [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a | | [secrets\_manager\_disabled](#module\_secrets\_manager\_disabled) | ../.. | n/a | | [secrets\_manager\_rotate](#module\_secrets\_manager\_rotate) | ../.. | n/a | diff --git a/examples/complete/main.tf b/examples/complete/main.tf index ad23794..4c2be4e 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -152,7 +152,7 @@ data "aws_iam_policy_document" "this" { module "lambda" { source = "terraform-aws-modules/lambda/aws" - version = "~> 5.0" + version = "~> 6.0" function_name = local.name description = "Example Secrets Manager secret rotation lambda function" diff --git a/variables.tf b/variables.tf index 1f8c1b0..b4b915a 100644 --- a/variables.tf +++ b/variables.tf @@ -52,7 +52,7 @@ variable "recovery_window_in_days" { variable "replica" { description = "Configuration block to support secret replication" - type = any + type = map(any) default = {} } @@ -80,7 +80,7 @@ variable "override_policy_documents" { variable "policy_statements" { description = "A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage" - type = any + type = map(any) default = {} } @@ -154,6 +154,6 @@ variable "rotation_lambda_arn" { variable "rotation_rules" { description = "A structure that defines the rotation configuration for this secret" - type = any + type = map(any) default = {} }