You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This module creates an S3 bucket with support of versioning, encryption, ACL and bucket object policy.
@@ -47,16 +47,21 @@ We literally have [*hundreds of terraform modules*][terraform_modules] that are
47
47
48
48
## Usage
49
49
50
+
51
+
**IMPORTANT:** The `master` branch is used in `source` just as an example. In your code, do not pin to `master` because there may be breaking changes between releases.
52
+
Instead pin to the release tag (e.g. `?ref=tags/x.y.z`) of one of our [latest releases](https://github.com/cloudposse/terraform-aws-s3-bucket/releases).
| delimiter | Delimiter to be used between `namespace`, `stage`, `name` and `attributes`| string |`-`| no |
87
-
| enabled | Set to `false` to prevent the module from creating any resources |string|`true`| no |
88
-
| force_destroy | A boolean string that indicates all objects should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable.|string|`false`| no |
92
+
| enabled | Set to `false` to prevent the module from creating any resources |bool|`true`| no |
93
+
| force_destroy | A boolean string that indicates all objects should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable |bool|`false`| no |
89
94
| kms_master_key_id | The AWS KMS master key ID used for the `SSE-KMS` encryption. This can only be used when you set the value of `sse_algorithm` as `aws:kms`. The default aws/s3 AWS KMS master key is used if this element is absent while the `sse_algorithm` is `aws:kms`| string | `` | no |
90
-
| name | Name (e.g. `app` or `db`) | string | - | yes |
| policy | A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy.| string | `` | no |
93
-
| region | If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee.| string | `` | no |
95
+
| name | Name (e.g. `app` or `cluster`) | string | - | yes |
| policy | A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy | string | `` | no |
98
+
| region | If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee | string | `` | no |
94
99
| sse_algorithm | The server-side encryption algorithm to use. Valid values are `AES256` and `aws:kms`| string |`AES256`| no |
This module creates an S3 bucket with support of versioning, encryption, ACL and bucket object policy.
70
70
If `user_enabled` variable is set to `true`, the module will provision a basic IAM user with permissions to access the bucket.
71
-
71
+
72
72
This basic IAM system user is suitable for CI/CD systems (_e.g._ TravisCI, CircleCI) or systems which are *external* to AWS that cannot leverage [AWS IAM Instance Profiles](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html).
73
-
73
+
74
74
We do not recommend creating IAM users this way for any other purpose.
| delimiter | Delimiter to be used between `namespace`, `stage`, `name` and `attributes`| string |`-`| no |
10
-
| enabled | Set to `false` to prevent the module from creating any resources |string|`true`| no |
11
-
| force_destroy | A boolean string that indicates all objects should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable.|string|`false`| no |
10
+
| enabled | Set to `false` to prevent the module from creating any resources |bool|`true`| no |
11
+
| force_destroy | A boolean string that indicates all objects should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable |bool|`false`| no |
12
12
| kms_master_key_id | The AWS KMS master key ID used for the `SSE-KMS` encryption. This can only be used when you set the value of `sse_algorithm` as `aws:kms`. The default aws/s3 AWS KMS master key is used if this element is absent while the `sse_algorithm` is `aws:kms`| string | `` | no |
13
-
| name | Name (e.g. `app` or `db`) | string | - | yes |
| policy | A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy.| string | `` | no |
16
-
| region | If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee.| string | `` | no |
13
+
| name | Name (e.g. `app` or `cluster`) | string | - | yes |
| policy | A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy | string | `` | no |
16
+
| region | If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee | string | `` | no |
17
17
| sse_algorithm | The server-side encryption algorithm to use. Valid values are `AES256` and `aws:kms`| string |`AES256`| no |
0 commit comments