mirror of
https://github.com/GSA/notifications-api.git
synced 2025-12-20 15:31:15 -05:00
This changeset adjusts our Terraform for the production and demo environments so that the new delete_recursive_allowed with the Cloud Foundry Cloud Controller is set to false. It also updates the shared modules to all explicitly account for this property so that we can set the flag easily. Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
43 lines
1.0 KiB
HCL
43 lines
1.0 KiB
HCL
variable "cf_org_name" {
|
|
type = string
|
|
description = "cloud.gov organization name"
|
|
}
|
|
|
|
variable "cf_space_name" {
|
|
type = string
|
|
description = "cloud.gov space name (staging or prod)"
|
|
}
|
|
|
|
variable "name" {
|
|
type = string
|
|
description = "name of the service instance"
|
|
}
|
|
|
|
variable "aws_region" {
|
|
type = string
|
|
description = "AWS region the SES instance is in"
|
|
}
|
|
|
|
variable "email_domain" {
|
|
type = string
|
|
default = ""
|
|
description = "domain name that emails will be coming from"
|
|
}
|
|
|
|
variable "email_receipt_error" {
|
|
type = string
|
|
description = "email address to list in SPF records for errors to be sent to"
|
|
}
|
|
|
|
variable "mail_from_subdomain" {
|
|
type = string
|
|
description = "Subdomain of email_domain to set as the mail-from header"
|
|
default = ""
|
|
}
|
|
|
|
variable "delete_recursive_allowed" {
|
|
type = bool
|
|
default = true
|
|
description = "Flag for allowing resources to be recursively deleted - not recommended in production environments"
|
|
}
|