File tree 16 files changed +22
-22
lines changed
16 files changed +22
-22
lines changed Original file line number Diff line number Diff line change 1
1
resource "google_monitoring_alert_policy" "generate-access-token" {
2
- count = len (var. notification_channels ) > 0 ? 1 : 0
2
+ count = length (var. notification_channels ) > 0 ? 1 : 0
3
3
4
4
# In the absence of data, incident will auto-close after an hour
5
5
alert_strategy {
Original file line number Diff line number Diff line change @@ -56,7 +56,7 @@ resource "google_service_account_iam_binding" "allow-pubsub-to-mint-tokens" {
56
56
}
57
57
58
58
module "audit-delivery-serviceaccount" {
59
- count = len (var. notification_channels ) > 0 ? 1 : 0
59
+ count = length (var. notification_channels ) > 0 ? 1 : 0
60
60
61
61
source = " ../audit-serviceaccount"
62
62
Original file line number Diff line number Diff line change @@ -75,7 +75,7 @@ resource "google_service_account_iam_binding" "provisioner-acts-as-import-identi
75
75
}
76
76
77
77
module "audit-import-serviceaccount" {
78
- count = len (var. notification_channels ) > 0 ? 1 : 0
78
+ count = length (var. notification_channels ) > 0 ? 1 : 0
79
79
80
80
source = " ../audit-serviceaccount"
81
81
Original file line number Diff line number Diff line change @@ -51,7 +51,7 @@ resource "google_storage_bucket" "recorder" {
51
51
data "google_client_openid_userinfo" "me" {}
52
52
53
53
resource "google_monitoring_alert_policy" "bucket-access" {
54
- count = len (var. notification_channels ) > 0 ? 1 : 0
54
+ count = length (var. notification_channels ) > 0 ? 1 : 0
55
55
56
56
# In the absence of data, incident will auto-close after an hour
57
57
alert_strategy {
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ resource "google_service_account_iam_binding" "allow-pubsub-to-mint-tokens" {
31
31
}
32
32
33
33
module "audit-trigger-serviceaccount" {
34
- count = len (var. notification_channels ) > 0 ? 1 : 0
34
+ count = length (var. notification_channels ) > 0 ? 1 : 0
35
35
36
36
source = " ../audit-serviceaccount"
37
37
Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ module "my-configmap" {
22
22
EOT
23
23
24
24
# Optionally: channels to notify if this configuration is manipulated.
25
- notification-channels = [ ... ]
25
+ notification_channels = [ ... ]
26
26
}
27
27
28
28
module "foo-service" {
@@ -90,7 +90,7 @@ No modules.
90
90
| ------| -------------| ------| ---------| :--------:|
91
91
| <a name =" input_data " ></a > [ data] ( #input\_ data ) | The data to place in the secret. | ` string ` | n/a | yes |
92
92
| <a name =" input_name " ></a > [ name] ( #input\_ name ) | The name to give the secret. | ` string ` | n/a | yes |
93
- | <a name =" input_notification-channels " ></a > [ notification-channels ] ( #input\_ notification-channels ) | The channels to notify if the configuration data is improperly accessed. | ` list(string) ` | n/a | yes |
93
+ | <a name =" input_notification_channels " ></a > [ notification\_ channels ] ( #input\_ notification\_ channels ) | The channels to notify if the configuration data is improperly accessed. | ` list(string) ` | n/a | yes |
94
94
| <a name =" input_project_id " ></a > [ project\_ id] ( #input\_ project\_ id ) | n/a | ` string ` | n/a | yes |
95
95
| <a name =" input_service-account " ></a > [ service-account] ( #input\_ service-account ) | The email of the service account that will access the secret. | ` string ` | n/a | yes |
96
96
Original file line number Diff line number Diff line change @@ -30,7 +30,7 @@ data "google_client_openid_userinfo" "me" {}
30
30
31
31
// Create an alert policy to notify if the secret is accessed by an unauthorized entity.
32
32
resource "google_monitoring_alert_policy" "anomalous-secret-access" {
33
- count = len (var. notification_channels ) > 0 ? 1 : 0
33
+ count = length (var. notification_channels ) > 0 ? 1 : 0
34
34
35
35
# In the absence of data, incident will auto-close after an hour
36
36
alert_strategy {
@@ -77,7 +77,7 @@ resource "google_monitoring_alert_policy" "anomalous-secret-access" {
77
77
}
78
78
}
79
79
80
- notification_channels = var. notification-channels
80
+ notification_channels = var. notification_channels
81
81
82
82
enabled = " true"
83
83
project = var. project_id
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ variable "service-account" {
17
17
type = string
18
18
}
19
19
20
- variable "notification-channels " {
20
+ variable "notification_channels " {
21
21
description = " The channels to notify if the configuration data is improperly accessed."
22
22
type = list (string )
23
23
}
Original file line number Diff line number Diff line change @@ -218,7 +218,7 @@ resource "google_service_account" "delivery" {
218
218
}
219
219
220
220
module "audit-delivery-serviceaccount" {
221
- count = len (var. notification_channels ) > 0 ? 1 : 0
221
+ count = length (var. notification_channels ) > 0 ? 1 : 0
222
222
223
223
source = " ../audit-serviceaccount"
224
224
@@ -284,7 +284,7 @@ data "google_client_openid_userinfo" "me" {}
284
284
285
285
// Create an alert policy to notify if the job is accessed by an unauthorized entity.
286
286
resource "google_monitoring_alert_policy" "anomalous-job-access" {
287
- count = len (var. notification_channels ) > 0 ? 1 : 0
287
+ count = length (var. notification_channels ) > 0 ? 1 : 0
288
288
289
289
# In the absence of data, incident will auto-close after an hour
290
290
alert_strategy {
Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ module "webhook-secret" {
21
21
service-account = google_service_account. service . email
22
22
authorized-adder = var. secret_version_adder
23
23
24
- notification-channels = var. notification_channels
24
+ notification_channels = var. notification_channels
25
25
}
26
26
27
27
module "this" {
Original file line number Diff line number Diff line change @@ -136,7 +136,7 @@ resource "google_service_account_iam_binding" "allow-impersonation" {
136
136
// Create an auditing policy to ensure that tokens are only issued for identities
137
137
// matching our expectations.
138
138
module "audit-usage" {
139
- count = len (var. notification_channels ) > 0 ? 1 : 0
139
+ count = length (var. notification_channels ) > 0 ? 1 : 0
140
140
141
141
source = " ../audit-serviceaccount"
142
142
Original file line number Diff line number Diff line change 1
1
module "audit-serviceaccount" {
2
- count = len (var. notification_channels ) > 0 ? 1 : 0
2
+ count = length (var. notification_channels ) > 0 ? 1 : 0
3
3
4
4
source = " ../audit-serviceaccount"
5
5
@@ -284,7 +284,7 @@ data "google_client_openid_userinfo" "me" {}
284
284
285
285
// Create an alert policy to notify if the service is accessed by an unauthorized entity.
286
286
resource "google_monitoring_alert_policy" "anomalous-service-access" {
287
- count = len (var. notification_channels ) > 0 ? 1 : 0
287
+ count = length (var. notification_channels ) > 0 ? 1 : 0
288
288
289
289
# In the absence of data, incident will auto-close after an hour
290
290
alert_strategy {
Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ module "my-secret" {
21
21
authorized-adder = "group:[email protected] "
22
22
23
23
# Optionally: channels to notify if this secret is manipulated.
24
- notification-channels = [ ... ]
24
+ notification_channels = [ ... ]
25
25
}
26
26
27
27
module "foo-service" {
@@ -90,7 +90,7 @@ No modules.
90
90
| <a name =" input_authorized-adder " ></a > [ authorized-adder] ( #input\_ authorized-adder ) | A member-style representation of the identity authorized to add new secret values (e.g. group: oncall @my-corp.dev). | ` string ` | n/a | yes |
91
91
| <a name =" input_create_placeholder_version " ></a > [ create\_ placeholder\_ version] ( #input\_ create\_ placeholder\_ version ) | Whether to create a placeholder secret version to avoid bad reference on first deploy. | ` bool ` | ` false ` | no |
92
92
| <a name =" input_name " ></a > [ name] ( #input\_ name ) | The name to give the secret. | ` string ` | n/a | yes |
93
- | <a name =" input_notification-channels " ></a > [ notification-channels ] ( #input\_ notification-channels ) | The channels to notify if the configuration data is improperly accessed. | ` list(string) ` | n/a | yes |
93
+ | <a name =" input_notification_channels " ></a > [ notification\_ channels ] ( #input\_ notification\_ channels ) | The channels to notify if the configuration data is improperly accessed. | ` list(string) ` | n/a | yes |
94
94
| <a name =" input_project_id " ></a > [ project\_ id] ( #input\_ project\_ id ) | n/a | ` string ` | n/a | yes |
95
95
| <a name =" input_service-account " ></a > [ service-account] ( #input\_ service-account ) | The email of the service account that will access the secret. | ` string ` | n/a | yes |
96
96
Original file line number Diff line number Diff line change @@ -41,7 +41,7 @@ data "google_project" "project" { project_id = var.project_id }
41
41
42
42
// Create an alert policy to notify if the secret is accessed by an unauthorized entity.
43
43
resource "google_monitoring_alert_policy" "anomalous-secret-access" {
44
- count = len (var. notification_channels ) > 0 ? 1 : 0
44
+ count = length (var. notification_channels ) > 0 ? 1 : 0
45
45
46
46
# In the absence of data, incident will auto-close after an hour
47
47
alert_strategy {
@@ -82,7 +82,7 @@ resource "google_monitoring_alert_policy" "anomalous-secret-access" {
82
82
}
83
83
}
84
84
85
- notification_channels = var. notification-channels
85
+ notification_channels = var. notification_channels
86
86
87
87
enabled = " true"
88
88
project = var. project_id
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ variable "service-account" {
17
17
type = string
18
18
}
19
19
20
- variable "notification-channels " {
20
+ variable "notification_channels " {
21
21
description = " The channels to notify if the configuration data is improperly accessed."
22
22
type = list (string )
23
23
}
Original file line number Diff line number Diff line change @@ -166,7 +166,7 @@ locals {
166
166
}
167
167
168
168
resource "google_monitoring_alert_policy" "abnormal-gclb-access" {
169
- count = len (var. notification_channels ) > 0 ? 1 : 0
169
+ count = length (var. notification_channels ) > 0 ? 1 : 0
170
170
171
171
# In the absence of data, incident will auto-close after an hour
172
172
alert_strategy {
You can’t perform that action at this time.
0 commit comments