|
| 1 | +## Inputs |
| 2 | + |
| 3 | +| Name | Description | Type | Default | Required | |
| 4 | +|------|-------------|:----:|:-----:|:-----:| |
| 5 | +| acl | The canned ACL to apply. We recommend `private` to avoid exposing sensitive information | string | `private` | no | |
| 6 | +| allow_encrypted_uploads_only | Set to `true` to prevent uploads of unencrypted objects to S3 bucket | bool | `false` | no | |
| 7 | +| allowed_bucket_actions | List of actions the user is permitted to perform on the S3 bucket | list(string) | `<list>` | no | |
| 8 | +| attributes | Additional attributes (e.g. `1`) | list(string) | `<list>` | no | |
| 9 | +| delimiter | Delimiter to be used between `namespace`, `stage`, `name` and `attributes` | string | `-` | no | |
| 10 | +| enabled | Set to `false` to prevent the module from creating any resources | bool | `true` | no | |
| 11 | +| force_destroy | A boolean string that indicates all objects should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable | bool | `false` | no | |
| 12 | +| kms_master_key_arn | The AWS KMS master key ARN used for the `SSE-KMS` encryption. This can only be used when you set the value of `sse_algorithm` as `aws:kms`. The default aws/s3 AWS KMS master key is used if this element is absent while the `sse_algorithm` is `aws:kms` | string | `` | no | |
| 13 | +| lifecycle_rule_enabled | Enable or disable lifecycle rule | bool | `false` | no | |
| 14 | +| name | Name (e.g. `app` or `cluster`) | string | - | yes | |
| 15 | +| namespace | Namespace (e.g. `eg` or `cp`) | string | `` | no | |
| 16 | +| noncurrent_version_expiration_days | Specifies when noncurrent object versions expire | number | `90` | no | |
| 17 | +| noncurrent_version_transition_days | Number of days to persist in the standard storage tier before moving to the glacier tier infrequent access tier | number | `30` | no | |
| 18 | +| policy | A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy | string | `` | no | |
| 19 | +| prefix | Prefix identifying one or more objects to which the rule applies | string | `` | no | |
| 20 | +| region | If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee | string | `` | no | |
| 21 | +| sse_algorithm | The server-side encryption algorithm to use. Valid values are `AES256` and `aws:kms` | string | `AES256` | no | |
| 22 | +| stage | Stage (e.g. `prod`, `dev`, `staging`) | string | `` | no | |
| 23 | +| tags | Additional tags (e.g. `{ BusinessUnit = "XYZ" }` | map(string) | `<map>` | no | |
| 24 | +| user_enabled | Set to `true` to create an IAM user with permission to access the bucket | bool | `false` | no | |
| 25 | +| versioning_enabled | A state of versioning. Versioning is a means of keeping multiple variants of an object in the same bucket | bool | `false` | no | |
| 26 | + |
| 27 | +## Outputs |
| 28 | + |
| 29 | +| Name | Description | |
| 30 | +|------|-------------| |
| 31 | +| access_key_id | The access key ID | |
| 32 | +| bucket_arn | Bucket ARN | |
| 33 | +| bucket_domain_name | FQDN of bucket | |
| 34 | +| bucket_id | Bucket Name (aka ID) | |
| 35 | +| enabled | Is module enabled | |
| 36 | +| secret_access_key | The secret access key. This will be written to the state file in plain-text | |
| 37 | +| user_arn | The ARN assigned by AWS for the user | |
| 38 | +| user_enabled | Is user creation enabled | |
| 39 | +| user_name | Normalized IAM user name | |
| 40 | +| user_unique_id | The user unique ID assigned by AWS | |
| 41 | + |
0 commit comments