No requirements.
Name | Version |
---|---|
aws | n/a |
Name | Source | Version |
---|---|---|
iam_eks_role | terraform-aws-modules/iam/aws//modules/iam-eks-role | n/a |
Name | Type |
---|---|
aws_iam_access_key.bucket_access_key | resource |
aws_iam_policy.bucket_rw | resource |
aws_iam_user.bucket_user | resource |
aws_iam_user_policy_attachment.bucket_user_policy | resource |
aws_s3_bucket.bucket | resource |
aws_s3_bucket_cors_configuration.bucket_cors | resource |
aws_s3_bucket_intelligent_tiering_configuration.bucket_tiering | resource |
aws_s3_bucket_lifecycle_configuration.bucket_lifecycle | resource |
aws_s3_bucket_policy.bucket_policy | resource |
aws_s3_bucket_public_access_block.bucket_restrict_access | resource |
aws_iam_policy_document.allow_public_access | data source |
aws_iam_policy_document.allow_read_write | data source |
Name | Description | Type | Default | Required |
---|---|---|---|---|
bucket_name | n/a | string |
n/a | yes |
bucket_type | n/a | string |
"private" |
no |
cors_rules | n/a | list(any) |
[ |
no |
create | n/a | bool |
true |
no |
create_iam_eks_role | n/a | map(any) |
{} |
no |
create_iam_user | n/a | bool |
false |
no |
expiration_objects_days | n/a | number |
90 |
no |
expiration_objects_enabled | n/a | bool |
false |
no |
glacier_days | n/a | number |
7 |
no |
glacier_enabled | n/a | bool |
false |
no |
infrequent_access_days | n/a | number |
30 |
no |
infrequent_access_enabled | n/a | bool |
false |
no |
tags | n/a | map(string) |
{} |
no |
tiering_archive_access | n/a | number |
90 |
no |
tiering_deep_archive_access | n/a | number |
180 |
no |
tiering_enabled | n/a | bool |
true |
no |
Name | Description |
---|---|
aws_access_key | IAM access key for S3 bucket |
aws_secret_key | IAM secret key for S3 bucket |
eks_role | IAM role ARN for EKS cluster |
No requirements.
Name | Version |
---|---|
aws | n/a |
Name | Source | Version |
---|---|---|
iam_eks_role | terraform-aws-modules/iam/aws//modules/iam-eks-role | n/a |
Name | Type |
---|---|
aws_iam_access_key.bucket_access_key | resource |
aws_iam_policy.bucket_rw | resource |
aws_iam_policy.extra_custom_policy | resource |
aws_iam_user.bucket_user | resource |
aws_iam_user_policy_attachment.bucket_user_policy | resource |
aws_iam_user_policy_attachment.extra_custom_policy | resource |
aws_s3_bucket.bucket | resource |
aws_s3_bucket_acl.grant_owner_to_iam | resource |
aws_s3_bucket_cors_configuration.bucket_cors | resource |
aws_s3_bucket_intelligent_tiering_configuration.bucket_tiering | resource |
aws_s3_bucket_lifecycle_configuration.bucket_lifecycle | resource |
aws_s3_bucket_ownership_controls.bucket_acl | resource |
aws_s3_bucket_policy.bucket_policy | resource |
aws_s3_bucket_public_access_block.bucket_restrict_access | resource |
aws_canonical_user_id.current | data source |
aws_iam_policy_document.allow_public_access | data source |
aws_iam_policy_document.allow_read_write | data source |
Name | Description | Type | Default | Required |
---|---|---|---|---|
bucket_name | n/a | string |
n/a | yes |
bucket_type | n/a | string |
"private" |
no |
cors_rules | n/a | list |
[ |
no |
create | n/a | bool |
true |
no |
create_iam_eks_role | n/a | any |
{} |
no |
create_iam_user | n/a | bool |
false |
no |
create_iam_user_write_acl | If iam user can use WRITE_ACP on bucket | bool |
false |
no |
expiration_objects_days | n/a | number |
90 |
no |
expiration_objects_enabled | n/a | bool |
false |
no |
extra_custom_policy | n/a | any |
{} |
no |
glacier_days | n/a | number |
30 |
no |
glacier_enabled | n/a | bool |
false |
no |
infrequent_access_days | n/a | number |
7 |
no |
infrequent_access_enabled | lifecycle | bool |
false |
no |
intelligent_tiering | n/a | list |
[] |
no |
intelligent_tiering_days | n/a | number |
7 |
no |
intelligent_tiering_enabled | n/a | bool |
false |
no |
tags | n/a | map(string) |
{} |
no |
Name | Description |
---|---|
aws_access_key | IAM access key for S3 bucket |
aws_secret_key | IAM secret key for S3 bucket |
eks_role | IAM role ARN for EKS cluster |