Skip to content

Commit

Permalink
Push pre-commit changes
Browse files Browse the repository at this point in the history
  • Loading branch information
vijay-stephen authored and github-actions[bot] committed Jul 30, 2024
1 parent d617003 commit 9c39a89
Show file tree
Hide file tree
Showing 18 changed files with 20 additions and 13 deletions.
2 changes: 2 additions & 0 deletions .terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ No resources.
| <a name="input_object_lock_config"></a> [object\_lock\_config](#input\_object\_lock\_config) | (optional) Object Lock configuration | <pre>object({<br> mode = optional(string, "COMPLIANCE")<br> days = optional(number, 30)<br> })</pre> | <pre>{<br> "days": 30,<br> "mode": "COMPLIANCE"<br>}</pre> | no |
| <a name="input_object_lock_enabled"></a> [object\_lock\_enabled](#input\_object\_lock\_enabled) | (Optional, Forces new resource) Indicates whether this bucket has an Object Lock configuration enabled. Valid values are true or false. This argument is not supported in all regions or partitions. | `string` | `false` | no |
| <a name="input_object_ownership"></a> [object\_ownership](#input\_object\_ownership) | (Optional) Object ownership. Valid values: BucketOwnerPreferred, ObjectWriter or BucketOwnerEnforced<br> BucketOwnerPreferred - Objects uploaded to the bucket change ownership to the bucket owner if the objects are uploaded with the bucket-owner-full-control canned ACL.<br> ObjectWriter - Uploading account will own the object if the object is uploaded with the bucket-owner-full-control canned ACL.<br> BucketOwnerEnforced - Bucket owner automatically owns and has full control over every object in the bucket. ACLs no longer affect permissions to data in the S3 bucket. | `string` | `"BucketOwnerPreferred"` | no |
| <a name="input_public_access_config"></a> [public\_access\_config](#input\_public\_access\_config) | (Optional) <br>block\_public\_acls - Whether Amazon S3 should block public ACLs for this bucket. Defaults to false. Enabling this setting does not affect existing policies or ACLs. When set to true causes the following behavior:<br> PUT Bucket acl and PUT Object acl calls will fail if the specified ACL allows public access.<br> PUT Object calls will fail if the request includes an object ACL.<br>block\_public\_policy - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy.<br> When set to true causes Amazon S3 to:<br> Reject calls to PUT Bucket policy if the specified bucket policy allows public access.<br>ignore\_public\_acls - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy.<br> When set to true causes Amazon S3 to:<br> Reject calls to PUT Bucket policy if the specified bucket policy allows public access.<br>restrict\_public\_buckets - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy.<br> When set to true causes Amazon S3 to:<br> Reject calls to PUT Bucket policy if the specified bucket policy allows public access. | <pre>object({<br> block_public_acls = optional(bool, true)<br> block_public_policy = optional(bool, true)<br> ignore_public_acls = optional(bool, true)<br> restrict_public_buckets = optional(bool, true)<br> })</pre> | <pre>{<br> "block_public_acls": true,<br> "block_public_policy": true,<br> "ignore_public_acls": true,<br> "restrict_public_buckets": true<br>}</pre> | no |
| <a name="input_public_access_config"></a> [public\_access\_config](#input\_public\_access\_config) | (Optional)<br>block\_public\_acls - Whether Amazon S3 should block public ACLs for this bucket. Defaults to false. Enabling this setting does not affect existing policies or ACLs. When set to true causes the following behavior:<br> PUT Bucket acl and PUT Object acl calls will fail if the specified ACL allows public access.<br> PUT Object calls will fail if the request includes an object ACL.<br>block\_public\_policy - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy.<br> When set to true causes Amazon S3 to:<br> Reject calls to PUT Bucket policy if the specified bucket policy allows public access.<br>ignore\_public\_acls - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy.<br> When set to true causes Amazon S3 to:<br> Reject calls to PUT Bucket policy if the specified bucket policy allows public access.<br>restrict\_public\_buckets - Whether Amazon S3 should block public bucket policies for this bucket. Defaults to false. Enabling this setting does not affect the existing bucket policy.<br> When set to true causes Amazon S3 to:<br> Reject calls to PUT Bucket policy if the specified bucket policy allows public access. | <pre>object({<br> block_public_acls = optional(bool, true)<br> block_public_policy = optional(bool, true)<br> ignore_public_acls = optional(bool, true)<br> restrict_public_buckets = optional(bool, true)<br> })</pre> | <pre>{<br> "block_public_acls": true,<br> "block_public_policy": true,<br> "ignore_public_acls": true,<br> "restrict_public_buckets": true<br>}</pre> | no |
| <a name="input_replication_config"></a> [replication\_config](#input\_replication\_config) | Replication configuration for S3 bucket | <pre>object({<br> enable = bool<br> role_name = optional(string, null) // if null , it will create new role<br><br> rules = list(object({<br> id = optional(string, null) // if null "${var.source_bucket_name}-rule-index"<br> filter = optional(list(object({<br> prefix = optional(string, null)<br> tags = optional(map(string), {})<br> })), [])<br><br> delete_marker_replication = optional(string, "Enabled")<br><br> source_selection_criteria = optional(object({<br> replica_modifications = optional(object({<br> status = optional(string, "Enabled")<br> }))<br> kms_key_id = optional(string, null)<br> sse_kms_encrypted_objects = optional(object({<br> status = optional(string, "Enabled")<br> }))<br> }))<br><br><br> destinations = list(object({<br> bucket = string<br> storage_class = optional(string, "STANDARD")<br> encryption_configuration = optional(object({<br> replica_kms_key_id = optional(string, null)<br> }))<br> }))<br> }))<br><br> })</pre> | <pre>{<br> "enable": false,<br> "role_name": null,<br> "rules": []<br>}</pre> | no |
| <a name="input_server_side_encryption_config_data"></a> [server\_side\_encryption\_config\_data](#input\_server\_side\_encryption\_config\_data) | (optional) S3 encryption details | <pre>object({<br> bucket_key_enabled = optional(bool, true)<br> sse_algorithm = optional(string, "AES256")<br> kms_master_key_id = optional(string, null)<br> })</pre> | <pre>{<br> "bucket_key_enabled": true,<br> "kms_master_key_id": null,<br> "sse_algorithm": "AES256"<br>}</pre> | no |
| <a name="input_tags"></a> [tags](#input\_tags) | Tags to assign the resources. | `map(string)` | `{}` | no |
Expand Down
2 changes: 2 additions & 0 deletions examples/replication/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 0 additions & 1 deletion examples/replication/dev.tfvars
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@
src_bucket_name = "poc-arc-src-43699"
dest_bucket_name = "poc-arc-dest-43699"
acl = "private"

2 changes: 1 addition & 1 deletion examples/replication/locals.tf
Original file line number Diff line number Diff line change
Expand Up @@ -29,4 +29,4 @@ locals {
}
]
}
}
}
2 changes: 1 addition & 1 deletion examples/replication/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,4 +20,4 @@ variable "dest_bucket_name" {
variable "acl" {
type = string
description = "ACL value"
}
}
2 changes: 2 additions & 0 deletions examples/simple/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion examples/simple/dev.tfvars
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
name = "poc-arc-test-32324"
acl = "private"
acl = "private"
2 changes: 1 addition & 1 deletion examples/simple/locals.tf
Original file line number Diff line number Diff line change
Expand Up @@ -34,4 +34,4 @@ locals {
}
]
}
}
}
2 changes: 1 addition & 1 deletion examples/simple/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,4 @@ variable "name" {
variable "acl" {
type = string
description = "ACL value"
}
}
1 change: 1 addition & 0 deletions modules/bucket/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 0 additions & 1 deletion modules/bucket/outputs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,3 @@ output "arn" {
value = aws_s3_bucket.this.arn
description = "Bucket ARN"
}

2 changes: 2 additions & 0 deletions modules/replication/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion modules/replication/data.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ data "aws_iam_role" "this" {
data "aws_kms_key" "this" {
for_each = local.kms_key_ids
key_id = each.value
}
}
2 changes: 1 addition & 1 deletion modules/replication/locals.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,4 +20,4 @@ locals {


kms_key_ids = toset(concat(local.dest_replica_kms_key_id_list, local.src_kms_key_ids))
}
}
2 changes: 1 addition & 1 deletion modules/replication/outputs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ output "role_arn" {

output "destination_buckets" {
value = local.destination_buckets
}
}
2 changes: 1 addition & 1 deletion outputs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,4 @@ output "destination_buckets" {
output "role_arn" {
value = var.replication_config.enable ? module.replication[0].role_arn : null
description = "Role used to S3 replication"
}
}
2 changes: 1 addition & 1 deletion variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ variable "public_access_config" {
restrict_public_buckets = true
}
description = <<-EOT
(Optional)
(Optional)
block_public_acls - Whether Amazon S3 should block public ACLs for this bucket. Defaults to false. Enabling this setting does not affect existing policies or ACLs. When set to true causes the following behavior:
PUT Bucket acl and PUT Object acl calls will fail if the specified ACL allows public access.
PUT Object calls will fail if the request includes an object ACL.
Expand Down

0 comments on commit 9c39a89

Please sign in to comment.