s3-buckets
appzen-oss/s3-buckets/aws
Terraform module to manage AWS S3 buckets
AWS S3 Buckets Terraform module   Terraform module which creates multiple AWS S3 buckets Terraform Registry Usage ``hcl module "s3-buckets" { source = "devops-workflow/s3-buckets/aws" names = ["bucket1", "bucket2", "bucket3"] environment = "dev" organization = "corp" } ` This would create/manage 3 S3 buckets: corp-dev-bucket1, corp-dev-bucket2, and corp-dev-bucket3 If a S3 bucket already exists, you will need to import it. Like this: `Shell terraform import module.s3-buckets.aws_s3_bucket.this[0] corp-dev-bucket1 ` Inputs | Name | Description | Type | Default | Required | |------|-------------|:----:|:-----:|:-----:| | allow_encrypted_upl
| Name | Type | Description | Default |
|---|---|---|---|
| names | list | List of S3 bucket names | required |
| environment | string | Environment (ex: `dev`, `qa`, `stage`, `prod`). (Second or top level namespace. | required |
| tags | map | A map of additional tags | {} |
| kms_master_key_arn | string | The AWS KMS master key ARN used for the SSE-KMS encryption. This can only be use | "" |
| principal | string | principal | "*" |
| versioned | bool | Version the bucket | false |
| block_public_acls | bool | Whether Amazon S3 should block public ACLs for this bucket | true |
| component | string | TAG: Underlying, dedicated piece of service (Cache, DB, ...) | "UNDEF-S3-Buckets" |
| owner | string | TAG: Owner of the service | "UNDEF-S3-Buckets" |
| service | string | TAG: Application (microservice) name | "UNDEF-S3-Buckets" |
| block_public_policy | bool | Whether Amazon S3 should block public bucket policies for this bucket | true |
| namespace-org | bool | Prefix name with the organization. If true, format is: <org>-<env namespaced nam | true |
| team | string | TAG: Department/team of people responsible for service | "UNDEF-S3-Buckets" |
| force_destroy | bool | Delete all objects in bucket on destroy | false |
| allow_encrypted_uploads_only | string | Set to `true` to prevent uploads of unencrypted objects to S3 bucket | "false" |
| restrict_public_buckets | bool | Whether Amazon S3 should restrict public bucket policies for this bucket | true |
| monitor | string | TAG: Should resource be monitored | "UNDEF-S3-Buckets" |
| namespace-env | bool | Prefix name with the environment. If true, format is: <env>-<name> | true |
| encryption | string | If encryption is true, create an S3 bucket with default encryption i.e. `AES256` | "true" |
| public | bool | Allow public read access to bucket | false |
| organization | string | Organization name (Top level namespace) | "" |
| enabled | bool | Set to false to prevent the module from creating anything | true |
ids — List of AWS S3 Bucket IDsname_bases — List of base names used to generate S3 bucket namesnames — List of AWS S3 Bucket Namesregions — List of AWS S3 Bucket Regionsarns — List of AWS S3 Bucket ARNsdomain_names — List of AWS S3 Bucket Domain Nameshosted_zone_ids — List of AWS S3 Bucket Hosted Zone IDsAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,