From 1d52711ca9418c3ffc41cc21588901e9c2c398cc Mon Sep 17 00:00:00 2001 From: Yonatan Koren Date: Mon, 24 May 2021 13:44:40 -0400 Subject: [PATCH] Feat: Add Output for Replication IAM Role ARN (#88) --- README.md | 4 ++-- docs/terraform.md | 1 + outputs.tf | 5 +++++ 3 files changed, 8 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 40641e8a..e5c4e2e4 100644 --- a/README.md +++ b/README.md @@ -262,6 +262,7 @@ Available targets: | [bucket\_region](#output\_bucket\_region) | Bucket region | | [bucket\_regional\_domain\_name](#output\_bucket\_regional\_domain\_name) | The bucket region-specific domain name | | [enabled](#output\_enabled) | Is module enabled | +| [replication\_role\_arn](#output\_replication\_role\_arn) | The ARN of the replication IAM Role | | [secret\_access\_key](#output\_secret\_access\_key) | The secret access key. This will be written to the state file in plain-text | | [user\_arn](#output\_user\_arn) | The ARN assigned by AWS for the user | | [user\_enabled](#output\_user\_enabled) | Is user creation enabled | @@ -278,6 +279,7 @@ Like this project? Please give it a ★ on [our GitHub](https://github.com/cloud Are you using this project or any of our other projects? Consider [leaving a testimonial][testimonial]. =) + ## Related Projects Check out these related projects. @@ -289,8 +291,6 @@ Check out these related projects. - [terraform-aws-lb-s3-bucket](https://github.com/cloudposse/terraform-aws-lb-s3-bucket) - Terraform module to provision an S3 bucket with built in IAM policy to allow AWS Load Balancers to ship access logs - [terraform-aws-s3-log-storage](https://github.com/cloudposse/terraform-aws-s3-log-storage) - Terraform module creates an S3 bucket suitable for receiving logs from other AWS services such as S3, CloudFront, and CloudTrail - - ## Help **Got a question?** We got answers. diff --git a/docs/terraform.md b/docs/terraform.md index 1d2274ea..f12ac41a 100644 --- a/docs/terraform.md +++ b/docs/terraform.md @@ -90,6 +90,7 @@ | [bucket\_region](#output\_bucket\_region) | Bucket region | | [bucket\_regional\_domain\_name](#output\_bucket\_regional\_domain\_name) | The bucket region-specific domain name | | [enabled](#output\_enabled) | Is module enabled | +| [replication\_role\_arn](#output\_replication\_role\_arn) | The ARN of the replication IAM Role | | [secret\_access\_key](#output\_secret\_access\_key) | The secret access key. This will be written to the state file in plain-text | | [user\_arn](#output\_user\_arn) | The ARN assigned by AWS for the user | | [user\_enabled](#output\_user\_enabled) | Is user creation enabled | diff --git a/outputs.tf b/outputs.tf index f02f4207..a657a4af 100644 --- a/outputs.tf +++ b/outputs.tf @@ -48,6 +48,11 @@ output "user_unique_id" { description = "The user unique ID assigned by AWS" } +output "replication_role_arn" { + value = module.this.enabled && var.s3_replication_enabled ? join("", aws_iam_role.replication.*.arn) : "" + description = "The ARN of the replication IAM Role" +} + output "access_key_id" { sensitive = true value = module.s3_user.access_key_id