Skip to content

Latest commit

 

History

History
64 lines (56 loc) · 5.35 KB

interface.md

File metadata and controls

64 lines (56 loc) · 5.35 KB

Requirements

Name Version
terraform >= 0.12

Providers

Name Version
aws n/a
null n/a

Inputs

Name Description Type Default Required
acl ACL to use for the bucket; defaults to 'private' string "private" no
additional_tags A map of additional tags to merge with the module's standard tags and apply to the bucket. map(string) {} no
allow_administer_resource_arns The list of fully-qualified AWS IAM ARNs authorized to administer this bucket. Wildcards are supported. e.g. arn:aws:iam::12345678910:user/ci or arn:aws:iam::12345678910:role/app-backend-* list(string) [] no
allow_administer_resource_test The IAM test to use in the policy statement condition, should be one of 'ArnEquals' (default) or 'ArnLike' string "ArnEquals" no
allow_delete_data_arns The list of fully-qualified AWS IAM ARNs authorized to delete data in this bucket. Wildcards are supported. e.g. arn:aws:iam::12345678910:user/ci or arn:aws:iam::12345678910:role/app-backend-* list(string) [] no
allow_delete_data_test The IAM test to use in the policy statement condition, should be one of 'ArnEquals' (default) or 'ArnLike' string "ArnEquals" no
allow_read_config_arns The list of fully-qualified AWS IAM ARNs authorized to read configuration of this bucket. Wildcards are supported. e.g. arn:aws:iam::12345678910:user/ci or arn:aws:iam::12345678910:role/app-backend-* list(string) [] no
allow_read_config_test The IAM test to use in the policy statement condition, should be one of 'ArnEquals' (default) or 'ArnLike' string "ArnEquals" no
allow_read_data_arns The list of fully-qualified AWS IAM ARNs authorized to read data in this bucket. Wildcards are supported. e.g. arn:aws:iam::12345678910:user/ci or arn:aws:iam::12345678910:role/app-backend-* list(string) [] no
allow_read_data_test The IAM test to use in the policy statement condition, should be one of 'ArnEquals' (default) or 'ArnLike' string "ArnEquals" no
allow_write_data_arns The list of fully-qualified AWS IAM ARNs authorized to write data in this bucket. Wildcards are supported. e.g. arn:aws:iam::12345678910:user/ci or arn:aws:iam::12345678910:role/app-backend-* list(string) [] no
allow_write_data_test The IAM test to use in the policy statement condition, should be one of 'ArnEquals' (default) or 'ArnLike' string "ArnEquals" no
app Name of the application the bucket supports string n/a yes
availability Expected Availability level of data in the bucket, e.g. 0.999, 0.9999, 0.99999, 0.999999 string "" no
block_public_acls n/a string "true" no
block_public_policy n/a string "true" no
business_process The high-level business process the bucket supports string "" no
business_unit The top-level organizational division that owns the resource. e.g. Consumer Retail, Enterprise Solutions, Manufacturing string "" no
compliance_scheme The regulatory compliance scheme the resource’s configuration should conform to string "" no
confidentiality Expected Confidentiality level of data in the bucket, e.g. Public, Internal, Confidential, Restricted string "" no
cost_center The managerial accounting cost center for the bucket string "" no
env Name of the environment the bucket supports string n/a yes
force_destroy Force destruction of the bucket and all objects in it; defaults to 'false' string "false" no
ignore_public_acls n/a string "true" no
integrity Expected Integrity level of data in the bucket, e.g. 0.999, 0.9999, 0.99999, 0.999999 string "" no
kms_master_key_id (Optional) ARN of KMS key to encrypt objects with. Empty string means use the default master key. string "" no
logging_target_bucket Bucket to use for request access logging string n/a yes
logging_target_prefix (Optional) Override the default log prefix path of log/s3// string "" no
logical_name Specify the 'logical' name of the bucket appropriate for the bucket's primary use case, e.g. media or orders string n/a yes
org Short id of the organization that owns the bucket string n/a yes
owner Name of the team or department that responsible for the bucket string n/a yes
policy (optional) fully rendered policy; if unspecified, the policy will be generated from the allow_* variables string "" no
restrict_public_buckets n/a string "true" no
role The role or function of this resource within the Application's logical architecture, e.g. load balancer, app server, database string "" no
versioning_enabled Enable versioning on the bucket; defaults to 'true' string "true" no
versioning_mfa_delete Require confirmation of deletes via multi-factor auth; defaults to 'false' string "false" no

Outputs

Name Description
account_id n/a
bucket_arn n/a
bucket_domain_name n/a
bucket_id n/a
policy_json n/a