s3-buckets

appzen-oss/s3-buckets/aws

Terraform Module HCL AWS

Terraform module to manage AWS S3 buckets

Install
module "s3-buckets" {
source = "appzen-oss/s3-buckets/aws"
version = "0.3.5"
}
plain text: /constructs/tfmod-appzen-oss-s3-buckets-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

AWS S3 Buckets Terraform module ![CircleCI](https://circleci.com/gh/appzen-oss/terraform-aws-s3-buckets) ![Github release](https://github.com/appzen-oss/terraform-aws-s3-buckets/releases) Terraform module which creates multiple AWS S3 buckets Terraform Registry Usage ``hcl module "s3-buckets" { source = "devops-workflow/s3-buckets/aws" names = ["bucket1", "bucket2", "bucket3"] environment = "dev" organization = "corp" } ` This would create/manage 3 S3 buckets: corp-dev-bucket1, corp-dev-bucket2, and corp-dev-bucket3 If a S3 bucket already exists, you will need to import it. Like this: `Shell terraform import module.s3-buckets.aws_s3_bucket.this[0] corp-dev-bucket1 ` Inputs | Name | Description | Type | Default | Required | |------|-------------|:----:|:-----:|:-----:| | allow_encrypted_upl

Inputs (26)
NameTypeDescriptionDefault
nameslistList of S3 bucket names required
environmentstringEnvironment (ex: `dev`, `qa`, `stage`, `prod`). (Second or top level namespace. required
tagsmapA map of additional tags{}
kms_master_key_arnstringThe AWS KMS master key ARN used for the SSE-KMS encryption. This can only be use""
principalstringprincipal"*"
versionedboolVersion the bucketfalse
block_public_aclsboolWhether Amazon S3 should block public ACLs for this buckettrue
componentstringTAG: Underlying, dedicated piece of service (Cache, DB, ...)"UNDEF-S3-Buckets"
ownerstringTAG: Owner of the service"UNDEF-S3-Buckets"
servicestringTAG: Application (microservice) name"UNDEF-S3-Buckets"
block_public_policyboolWhether Amazon S3 should block public bucket policies for this buckettrue
namespace-orgboolPrefix name with the organization. If true, format is: <org>-<env namespaced namtrue
teamstringTAG: Department/team of people responsible for service"UNDEF-S3-Buckets"
force_destroyboolDelete all objects in bucket on destroyfalse
allow_encrypted_uploads_onlystringSet to `true` to prevent uploads of unencrypted objects to S3 bucket"false"
restrict_public_bucketsboolWhether Amazon S3 should restrict public bucket policies for this buckettrue
monitorstringTAG: Should resource be monitored"UNDEF-S3-Buckets"
namespace-envboolPrefix name with the environment. If true, format is: <env>-<name>true
encryptionstringIf encryption is true, create an S3 bucket with default encryption i.e. `AES256`"true"
publicboolAllow public read access to bucketfalse
organizationstringOrganization name (Top level namespace)""
enabledboolSet to false to prevent the module from creating anythingtrue
Outputs (7)
ids — List of AWS S3 Bucket IDs
name_bases — List of base names used to generate S3 bucket names
names — List of AWS S3 Bucket Names
regions — List of AWS S3 Bucket Regions
arns — List of AWS S3 Bucket ARNs
domain_names — List of AWS S3 Bucket Domain Names
hosted_zone_ids — List of AWS S3 Bucket Hosted Zone IDs
Resources (3)
aws_s3_bucketaws_s3_bucket_policyaws_s3_bucket_public_access_block
Details
FrameworkTerraform Module
LanguageHCL
Version0.3.5
Cloud AWS
★ Stars0
Forks3
Total downloads8.5k
Inputs26
Outputs7
Resources3
Examples6
Namespaceappzen-oss
Updated