backend
DNXLabs/backend/aws
This terraform module implements what is described in the Terraform S3 Backend.
terraform-aws-backend   This terraform module implements what is described in the Terraform S3 Backend documentation. S3 Encryption is enabled and Public Access policies used to ensure security. This module is expected to be deployed to a 'master' AWS account so that you can start using remote state as soon as possible. As this module creates the remote state backend, its statefile needs to be commited to git as it cannot be stored remotely. No sensetive information should be present in this file. It is also expected that you check the statefile for this module into git to avoid the chicken and egg problem. The following resources will be c
| Name | Type | Description | Default |
|---|---|---|---|
| bucket_prefix | string | A prefix applied to the S3 bucket created to ensure a unique name. | required |
| workspaces | list(string) | A list of terraform workspaces that IAM Roles/Policy will be created for | required |
| bucket_sse_algorithm | string | Encryption algorithm to use on the S3 bucket. Currently only AES256 is supported | "AES256" |
| kms_master_key_alias | string | The alias of the KMS key to use for S3 server-side encryption. If not provided, | "alias/aws/s3" |
| assume_policy | map(string) | A map that allows you to specify additional AWS principles that will be added to | {} |
state_bucket_arndynamo_lock_tableiam_rolesA batteries included cloud-init config to quickly and easily deploy a single Doc
Terraform module to create VPC resource on AWS.
Terraform module to create default S3 bucket with logging and encryption type sp
This terraform module is used to create ECR on AWS.