|
| 1 | +module "wrapper" { |
| 2 | + source = "../" |
| 3 | + |
| 4 | + for_each = var.items |
| 5 | + |
| 6 | + access_points = try(each.value.access_points, var.defaults.access_points, {}) |
| 7 | + attach_policy = try(each.value.attach_policy, var.defaults.attach_policy, true) |
| 8 | + availability_zone_name = try(each.value.availability_zone_name, var.defaults.availability_zone_name, null) |
| 9 | + bypass_policy_lockout_safety_check = try(each.value.bypass_policy_lockout_safety_check, var.defaults.bypass_policy_lockout_safety_check, null) |
| 10 | + create = try(each.value.create, var.defaults.create, true) |
| 11 | + create_backup_policy = try(each.value.create_backup_policy, var.defaults.create_backup_policy, true) |
| 12 | + create_replication_configuration = try(each.value.create_replication_configuration, var.defaults.create_replication_configuration, false) |
| 13 | + create_security_group = try(each.value.create_security_group, var.defaults.create_security_group, true) |
| 14 | + creation_token = try(each.value.creation_token, var.defaults.creation_token, null) |
| 15 | + deny_nonsecure_transport = try(each.value.deny_nonsecure_transport, var.defaults.deny_nonsecure_transport, true) |
| 16 | + enable_backup_policy = try(each.value.enable_backup_policy, var.defaults.enable_backup_policy, true) |
| 17 | + encrypted = try(each.value.encrypted, var.defaults.encrypted, true) |
| 18 | + kms_key_arn = try(each.value.kms_key_arn, var.defaults.kms_key_arn, null) |
| 19 | + lifecycle_policy = try(each.value.lifecycle_policy, var.defaults.lifecycle_policy, {}) |
| 20 | + mount_targets = try(each.value.mount_targets, var.defaults.mount_targets, {}) |
| 21 | + name = try(each.value.name, var.defaults.name, "") |
| 22 | + override_policy_documents = try(each.value.override_policy_documents, var.defaults.override_policy_documents, []) |
| 23 | + performance_mode = try(each.value.performance_mode, var.defaults.performance_mode, null) |
| 24 | + policy_statements = try(each.value.policy_statements, var.defaults.policy_statements, []) |
| 25 | + provisioned_throughput_in_mibps = try(each.value.provisioned_throughput_in_mibps, var.defaults.provisioned_throughput_in_mibps, null) |
| 26 | + replication_configuration_destination = try(each.value.replication_configuration_destination, var.defaults.replication_configuration_destination, {}) |
| 27 | + security_group_description = try(each.value.security_group_description, var.defaults.security_group_description, null) |
| 28 | + security_group_name = try(each.value.security_group_name, var.defaults.security_group_name, null) |
| 29 | + security_group_rules = try(each.value.security_group_rules, var.defaults.security_group_rules, {}) |
| 30 | + security_group_use_name_prefix = try(each.value.security_group_use_name_prefix, var.defaults.security_group_use_name_prefix, false) |
| 31 | + security_group_vpc_id = try(each.value.security_group_vpc_id, var.defaults.security_group_vpc_id, null) |
| 32 | + source_policy_documents = try(each.value.source_policy_documents, var.defaults.source_policy_documents, []) |
| 33 | + tags = try(each.value.tags, var.defaults.tags, {}) |
| 34 | + throughput_mode = try(each.value.throughput_mode, var.defaults.throughput_mode, null) |
| 35 | +} |
0 commit comments