SourceFuse AWS Reference Architecture (ARC) Terraform module for managing the s3 module.
-
Manages S3 Buckets: Handles the creation, deletion, and maintenance of Amazon S3 (Simple Storage Service) buckets, which are containers for storing data in the cloud.
-
Supports Lifecycle Rules: Enables the setup and management of lifecycle rules that automate the transition of data between different storage classes and the deletion of objects after a specified period.
-
Configurable Bucket Policies and Access Controls: Allows for the configuration of bucket policies and access control lists (ACLs) to define permissions and manage access to the data stored in S3 buckets, ensuring data security and compliance.
-
Supports CORS and Website Configurations: Provides support for Cross-Origin Resource Sharing (CORS) configurations to manage cross-origin requests to the bucket's resources, and allows for configuring the bucket to host static websites, including setting index and error documents.
-
Cross-Region Replication: Facilitates the automatic, asynchronous copying of objects across different AWS regions to enhance data availability, disaster recovery, and data compliance requirements.
SourceFuse's AWS Reference Architecture (ARC) Terraform module for managing Amazon S3 buckets using Terraform. It simplifies the creation, configuration, and management of S3 buckets by providing a set of predefined settings and options. The module supports advanced features such as bucket policies, access control lists (ACLs), lifecycle rules, and versioning. It also includes support for configuring Cross-Origin Resource Sharing (CORS) and cross-region replication for enhanced data availability and resilience. By leveraging this module, users can ensure consistent, secure, and efficient management of their S3 resources within an infrastructure-as-code (IaC) framework.
To see a full example, check out the main.tf file in the example folder.
module "s3" {
source = "sourcefuse/arc-s3/aws"
version = "0.0.1"
name = var.name
acl = var.acl
lifecycle_config = local.lifecycle_config
tags = module.tags.tags
}
Name | Version |
---|---|
terraform | ~> 1.3, < 2.0.0 |
aws | ~> 5.0 |
random | ~> 3.0 |
No providers.
Name | Source | Version |
---|---|---|
bucket | ./modules/bucket | n/a |
replication | ./modules/replication | n/a |
No resources.
Name | Description | Type | Default | Required |
---|---|---|---|---|
acl | Please node ACL is deprecated by AWS in favor of bucket policies. Defaults to "private" for backwards compatibility,recommended to set s3_object_ownership to "BucketOwnerEnforced" instead. |
string |
"private" |
no |
availability_zone_id | The ID of the availability zone. | string |
"" |
no |
bucket_logging_data | (optional) Bucket logging data | object({ |
{ |
no |
bucket_policy_doc | (optional) S3 bucket Policy doc | string |
null |
no |
cors_configuration | List of S3 bucket CORS configurations | list(object({ |
[] |
no |
create_bucket | (optional) Whether to create bucket | bool |
true |
no |
create_s3_directory_bucket | Control the creation of the S3 directory bucket. Set to true to create the bucket, false to skip. | bool |
false |
no |
enable_versioning | Whether to enable versioning for the bucket | bool |
true |
no |
event_notification_details | (optional) S3 event notification details | object({ |
{ |
no |
force_destroy | (Optional, Default:false) Boolean that indicates all objects (including any locked objects) should be deleted from the bucket when the bucket is destroyed so that the bucket can be destroyed without error. These objects are not recoverable. This only deletes objects when the bucket is destroyed, not when setting this parameter to true. Once this parameter is set to true, there must be a successful terraform apply run before a destroy is required to update this value in the resource state. Without a successful terraform apply after this parameter is set, this flag will have no effect. If setting this field in the same operation that would require replacing the bucket or destroying the bucket, this flag will not work. Additionally when importing a bucket, a successful terraform apply is required to set this value in state before it will take effect on a destroy operation. | bool |
false |
no |
lifecycle_config | (optional) S3 Lifecycle configuration | object({ |
{ |
no |
name | Bucket name. If provided, the bucket will be created with this name instead of generating the name from the context | string |
n/a | yes |
object_lock_config | (optional) Object Lock configuration | object({ |
{ |
no |
object_lock_enabled | (Optional, Forces new resource) Indicates whether this bucket has an Object Lock configuration enabled. Valid values are true or false. This argument is not supported in all regions or partitions. | string |
false |
no |
object_ownership | (Optional) Object ownership. Valid values: BucketOwnerPreferred, ObjectWriter or BucketOwnerEnforced BucketOwnerPreferred - Objects uploaded to the bucket change ownership to the bucket owner if the objects are uploaded with the bucket-owner-full-control canned ACL. ObjectWriter - Uploading account will own the object if the object is uploaded with the bucket-owner-full-control canned ACL. BucketOwnerEnforced - Bucket owner automatically owns and has full control over every object in the bucket. ACLs no longer affect permissions to data in the S3 bucket. |
string |
"BucketOwnerPreferred" |
no |
public_access_config | (Optional) block_public_acls - Whether Amazon S3 should block public ACLs for this bucket. Defaults to false. Enabling this setting does not affect existing policies or ACLs. When set to true causes the following behavior: PUT Bucket acl and PUT Object acl calls will fail if the specified ACL allows public access. PUT Object calls will fail if the request includes an object ACL. block_public_policy - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy. When set to true causes Amazon S3 to: Reject calls to PUT Bucket policy if the specified bucket policy allows public access. ignore_public_acls - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy. When set to true causes Amazon S3 to: Reject calls to PUT Bucket policy if the specified bucket policy allows public access. restrict_public_buckets - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy. When set to true causes Amazon S3 to: Reject calls to PUT Bucket policy if the specified bucket policy allows public access. |
object({ |
{ |
no |
replication_config | Replication configuration for S3 bucket | object({ |
{ |
no |
server_side_encryption_config_data | (optional) S3 encryption details | object({ |
{ |
no |
tags | Tags to assign the resources. | map(string) |
{} |
no |
transfer_acceleration_enabled | (optional) Whether to enable Trasfer accelaration | bool |
false |
no |
Name | Description |
---|---|
bucket_arn | Bucket ARN |
bucket_id | Bucket ID or Name |
destination_buckets | n/a |
role_arn | Role used to S3 replication |
- Configure pre-commit hooks
pre-commit install
while Contributing or doing git commit please specify the breaking change in your commit message whether its major,minor or patch
For Example
git commit -m "your commit message #major"
By specifying this , it will bump the version and if you don't specify this in your commit message then by default it will consider patch and will bump that accordingly
- Tests are available in
test
directory - Configure the dependencies
cd test/ go mod init github.com/sourcefuse/terraform-aws-refarch-<module_name> go get github.com/gruntwork-io/terratest/modules/terraform
- Now execute the test
go test -timeout 30m
This project is authored by:
- SourceFuse ARC Team