Skip to content

Commit

Permalink
[pre-commit.ci] auto fixes from pre-commit.com hooks
Browse files Browse the repository at this point in the history
for more information, see https://pre-commit.ci
  • Loading branch information
pre-commit-ci[bot] committed Oct 7, 2024
1 parent e5536b0 commit 8c29000
Show file tree
Hide file tree
Showing 25 changed files with 82 additions and 83 deletions.
2 changes: 1 addition & 1 deletion .deepsource.toml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
version = 1

[[analyzers]]
name = "terraform"
name = "terraform"
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -136,4 +136,4 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
[0.15.1]: https://github.com/clouddrove/terraform-aws-s3/compare/0.15.1...master
[0.15.2]: https://github.com/clouddrove/terraform-aws-s3/compare/0.15.2...master
[1.3.0]: https://github.com/clouddrove/terraform-aws-s3/compare/1.3.0...master
[2.0.0]: https://github.com/clouddrove/terraform-aws-s3/compare/1.3.0...2.0.0
[2.0.0]: https://github.com/clouddrove/terraform-aws-s3/compare/1.3.0...2.0.0
2 changes: 1 addition & 1 deletion LICENSE
Original file line number Diff line number Diff line change
Expand Up @@ -198,4 +198,4 @@
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
limitations under the License.
12 changes: 6 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@
<hr>


We are a group of DevOps engineers & architects, joining hands in this ever evolving digital landscape. With our strong belief in Automation; just like microservices, always on the lookout to split the the infrastructure into smaller connected resources (database, cluster and more) which could be standardized, are manageable, scalable, secure & follow industry best practices.
We are a group of DevOps engineers & architects, joining hands in this ever evolving digital landscape. With our strong belief in Automation; just like microservices, always on the lookout to split the the infrastructure into smaller connected resources (database, cluster and more) which could be standardized, are manageable, scalable, secure & follow industry best practices.


This module includes Terraform open source, examples, and automation tests (for better understanding), which would help you create and improve your infrastructure with minimalistic coding.
Expand Down Expand Up @@ -79,7 +79,7 @@ This table contains both Prerequisites and Providers:
Refer to complete documentation: [here](docs/io.md)


<!--
<!--
## Module Dependencies
This module has dependencies on:
Expand Down Expand Up @@ -107,7 +107,7 @@ Refer [here](CHANGELOG.md).

## ✨ Contributors

Big thanks to our contributors for elevating our project with their dedication and expertise! But, we do not wish to stop there, would like to invite contributions from the community in improving these projects and making them more versatile for better reach. Remember, every bit of contribution is immensely valuable, as, together, we are moving in only 1 direction, i.e. forward.
Big thanks to our contributors for elevating our project with their dedication and expertise! But, we do not wish to stop there, would like to invite contributions from the community in improving these projects and making them more versatile for better reach. Remember, every bit of contribution is immensely valuable, as, together, we are moving in only 1 direction, i.e. forward.

<a href="https://github.com/clouddrove/terraform-aws-s3/graphs/contributors">
<img src="https://contrib.rocks/image?repo=clouddrove/terraform-aws-s3&max" />
Expand Down Expand Up @@ -135,7 +135,7 @@ Big thanks to our contributors for elevating our project with their dedication a



## Feedback
## Feedback
Spot a bug or have thoughts to share with us? Let's squash it together! Log it in our [issue tracker](https://github.com/clouddrove/terraform-aws-s3/issues), feel free to drop us an email at [[email protected]](mailto:[email protected]).

Show some love with a ★ on [our GitHub](https://github.com/clouddrove/terraform-aws-s3)! if our work has brightened your day! – your feedback fuels our journey!
Expand All @@ -147,7 +147,7 @@ We have [*100+ Terraform modules*][terraform_modules] 🙌. You could consider t

- [Terraform Module Registry:](https://registry.terraform.io/namespaces/clouddrove) Discover our Terraform modules here.

- [Terraform Modules for AWS/Azure Modules:](https://github.com/clouddrove/toc) Explore our comprehensive Table of Contents for easy navigation through our documentation for modules pertaining to AWS, Azure & GCP.
- [Terraform Modules for AWS/Azure Modules:](https://github.com/clouddrove/toc) Explore our comprehensive Table of Contents for easy navigation through our documentation for modules pertaining to AWS, Azure & GCP.

- [Terraform Modules for Digital Ocean:](https://github.com/terraform-do-modules/toc) Check out our specialized Terraform modules for Digital Ocean.

Expand All @@ -173,7 +173,7 @@ Join our tech elites [Join Now][slack] 🚀
Click [here][blog] :books: :star2:

## Tap into our capabilities
We provide a platform for organizations to engage with experienced top-tier DevOps & Cloud services. Tap into our pool of certified engineers and architects to elevate your DevOps and Cloud Solutions.
We provide a platform for organizations to engage with experienced top-tier DevOps & Cloud services. Tap into our pool of certified engineers and architects to elevate your DevOps and Cloud Solutions.

At [CloudDrove][website], has extensive experience in designing, building & migrating environments, securing, consulting, monitoring, optimizing, automating, and maintaining complex and large modern systems. With remarkable client footprints in American & European corridors, our certified architects & engineers are ready to serve you as per your requirements & schedule. Write to us at [[email protected]](mailto:[email protected]).

Expand Down
94 changes: 47 additions & 47 deletions README.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -54,44 +54,44 @@ usage: |-
module "s3_bucket" {
source = "clouddrove/s3/aws"
version = "2.0.0"
name = "bucket-new-version"
environment = "test"
label_order = ["name", "environment"]
#acceleration and request payer enable or disable.
#acceleration and request payer enable or disable.
acceleration_status = true
request_payer = "BucketOwner"
object_lock_enabled = "Enabled"
# logging of s3 bucket to destination bucket.
# logging of s3 bucket to destination bucket.
logging = true
target_bucket = module.logging_bucket.id
target_prefix = "logs"
#encrption on s3 with default encryption and kms encryption .
#encrption on s3 with default encryption and kms encryption .
enable_server_side_encryption = true
enable_kms = true
kms_master_key_id = module.kms_key.key_arn
#object locking of s3.
#object locking of s3.
object_lock_configuration = {
mode = "GOVERNANCE"
days = 366
years = null
}
versioning = true
#cross replicaton of s3
#cross replicaton of s3
cors_rule = [{
allowed_headers = ["*"],
allowed_methods = ["PUT", "POST"],
allowed_origins = ["https://s3-website-test.hashicorp.com"],
expose_headers = ["ETag"],
max_age_seconds = 3000
}]
#acl grant permission
#acl grant permission
grants = [
{
id = null
Expand All @@ -101,8 +101,8 @@ usage: |-
},
]
owner_id = data.aws_canonical_user_id.current.id
#lifecycle rule for s3
#lifecycle rule for s3
enable_lifecycle_configuration_rules = true
lifecycle_configuration_rules = [
{
Expand Down Expand Up @@ -146,7 +146,7 @@ usage: |-
expiration_days = 365
}
]
#static website on s3
website = {
index_document = "index.html"
Expand All @@ -171,24 +171,24 @@ usage: |-
}
}]
}
}
data "aws_canonical_user_id" "current" {}
```
### cors_s3 Bucket
```hcl
module "s3_bucket" {
source = "clouddrove/s3/aws"
version = "2.0.0"
name = "clouddrove-secure-bucket"
environment = "test"
label_order = ["name", "environment"]
versioning = true
acl = "private"
cors_rule = [{
allowed_headers = ["*"],
allowed_methods = ["PUT", "POST"],
Expand All @@ -198,31 +198,31 @@ usage: |-
}]
}
```
### default-s3 Bucket
```hcl
module "s3_bucket" {
source = "clouddrove/s3/aws"
version = "2.0.0"
name = "clouddrove-secure-bucket"
environment = "test"
label_order = ["name", "environment"]
versioning = true
acl = "private"
}
```
### encryption Bucket
```hcl
module "s3_bucket" {
source = "clouddrove/s3/aws"
version = "2.0.0"
name = "clouddrove-encryption-bucket"
environment = "test"
label_order = ["name", "environment"]
versioning = true
acl = "private"
enable_server_side_encryption = true
Expand All @@ -235,11 +235,11 @@ usage: |-
module "s3_bucket" {
source = "clouddrove/s3/aws"
version = "2.0.0"
name = "clouddrove-logging-encryption-bucket"
environment = "test"
label_order = ["name", "environment"]
versioning = true
acl = "private"
enable_server_side_encryption = true
Expand All @@ -251,7 +251,7 @@ usage: |-
depends_on = [module.logging_bucket]
}
```
### logging Bucket
```hcl
module "s3_bucket" {
Expand All @@ -261,7 +261,7 @@ usage: |-
name = "clouddrove-logging-bucket"
environment = "test"
label_order = ["name", "environment"]
versioning = true
acl = "private"
logging = true
Expand All @@ -270,7 +270,7 @@ usage: |-
depends_on = [module.logging_bucket]
}
```
### s3 replication Bucket
```hcl
module "s3_bucket" {
Expand All @@ -280,7 +280,7 @@ usage: |-
name = "clouddrov-s3-replication"
environment = "test"
label_order = ["name", "environment"]
acl = "private"
replication_configuration = {
role = aws_iam_role.replication.arn
Expand Down Expand Up @@ -363,10 +363,10 @@ usage: |-
]
}
}
resource "aws_iam_role" "replication" {
name = "s3-bucket-replication-${module.replica_bucket.id}"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
Expand All @@ -383,10 +383,10 @@ usage: |-
}
POLICY
}
resource "aws_iam_policy" "replication" {
name = "s3-bucket-replication-${module.replica_bucket.id}"
policy = <<POLICY
{
"Version": "2012-10-17",
Expand Down Expand Up @@ -423,14 +423,14 @@ usage: |-
}
POLICY
}
resource "aws_iam_policy_attachment" "replication" {
name = "s3-bucket-replication-${module.replica_bucket.id}"
roles = [aws_iam_role.replication.name]
policy_arn = aws_iam_policy.replication.arn
}
```
```
### s3 website Bucket
```hcl
module "s3_bucket" {
Expand All @@ -440,9 +440,9 @@ usage: |-
name = "clouddrove-website-bucket"
environment = "test"
label_order = ["name", "environment"]
website = {
website = {
index_document = "index.html"
error_document = "error.html"
routing_rules = [{
Expand All @@ -465,7 +465,7 @@ usage: |-
}
}]
}
versioning = true
acl = "private"
enable_lifecycle_configuration_rules = true
Expand Down Expand Up @@ -509,12 +509,12 @@ usage: |-
expiration_days = 365
}
]
attach_public_policy = true
bucket_policy = true ##first time apply it while be false.
aws_iam_policy_document = data.aws_iam_policy_document.default.json
}
data "aws_iam_policy_document" "default" {
version = "2012-10-17"
statement {
Expand All @@ -527,6 +527,6 @@ usage: |-
actions = ["s3:GetObject"]
resources = ["${module.s3_bucket.arn}/*"]
}
}
```
```
1 change: 0 additions & 1 deletion docs/io.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,4 +70,3 @@
| s3\_bucket\_website\_domain | The domain of the website endpoint, if the bucket is configured with a website. If not, this will be an empty string. This is used to create Route 53 alias records. |
| s3\_bucket\_website\_endpoint | The website endpoint, if the bucket is configured with a website. If not, this will be an empty string. |
| tags | A mapping of tags to assign to the resource. |

Loading

0 comments on commit 8c29000

Please sign in to comment.