Skip to content

Commit 1d52711

Browse files
authored
Feat: Add Output for Replication IAM Role ARN (#88)
1 parent ccb6e1d commit 1d52711

File tree

3 files changed

+8
-2
lines changed

3 files changed

+8
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,6 +262,7 @@ Available targets:
262262
| <a name="output_bucket_region"></a> [bucket\_region](#output\_bucket\_region) | Bucket region |
263263
| <a name="output_bucket_regional_domain_name"></a> [bucket\_regional\_domain\_name](#output\_bucket\_regional\_domain\_name) | The bucket region-specific domain name |
264264
| <a name="output_enabled"></a> [enabled](#output\_enabled) | Is module enabled |
265+
| <a name="output_replication_role_arn"></a> [replication\_role\_arn](#output\_replication\_role\_arn) | The ARN of the replication IAM Role |
265266
| <a name="output_secret_access_key"></a> [secret\_access\_key](#output\_secret\_access\_key) | The secret access key. This will be written to the state file in plain-text |
266267
| <a name="output_user_arn"></a> [user\_arn](#output\_user\_arn) | The ARN assigned by AWS for the user |
267268
| <a name="output_user_enabled"></a> [user\_enabled](#output\_user\_enabled) | Is user creation enabled |
@@ -278,6 +279,7 @@ Like this project? Please give it a ★ on [our GitHub](https://github.com/cloud
278279
Are you using this project or any of our other projects? Consider [leaving a testimonial][testimonial]. =)
279280

280281

282+
281283
## Related Projects
282284

283285
Check out these related projects.
@@ -289,8 +291,6 @@ Check out these related projects.
289291
- [terraform-aws-lb-s3-bucket](https://github.com/cloudposse/terraform-aws-lb-s3-bucket) - Terraform module to provision an S3 bucket with built in IAM policy to allow AWS Load Balancers to ship access logs
290292
- [terraform-aws-s3-log-storage](https://github.com/cloudposse/terraform-aws-s3-log-storage) - Terraform module creates an S3 bucket suitable for receiving logs from other AWS services such as S3, CloudFront, and CloudTrail
291293

292-
293-
294294
## Help
295295

296296
**Got a question?** We got answers.

docs/terraform.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,7 @@
9090
| <a name="output_bucket_region"></a> [bucket\_region](#output\_bucket\_region) | Bucket region |
9191
| <a name="output_bucket_regional_domain_name"></a> [bucket\_regional\_domain\_name](#output\_bucket\_regional\_domain\_name) | The bucket region-specific domain name |
9292
| <a name="output_enabled"></a> [enabled](#output\_enabled) | Is module enabled |
93+
| <a name="output_replication_role_arn"></a> [replication\_role\_arn](#output\_replication\_role\_arn) | The ARN of the replication IAM Role |
9394
| <a name="output_secret_access_key"></a> [secret\_access\_key](#output\_secret\_access\_key) | The secret access key. This will be written to the state file in plain-text |
9495
| <a name="output_user_arn"></a> [user\_arn](#output\_user\_arn) | The ARN assigned by AWS for the user |
9596
| <a name="output_user_enabled"></a> [user\_enabled](#output\_user\_enabled) | Is user creation enabled |

outputs.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,11 @@ output "user_unique_id" {
4848
description = "The user unique ID assigned by AWS"
4949
}
5050

51+
output "replication_role_arn" {
52+
value = module.this.enabled && var.s3_replication_enabled ? join("", aws_iam_role.replication.*.arn) : ""
53+
description = "The ARN of the replication IAM Role"
54+
}
55+
5156
output "access_key_id" {
5257
sensitive = true
5358
value = module.s3_user.access_key_id

0 commit comments

Comments
 (0)