All Projects → mineiros-io → terraform-aws-s3-bucket

mineiros-io / terraform-aws-s3-bucket

Licence: Apache-2.0 License
A Terraform module to create a Simple Storage Service (S3) Bucket on Amazon Web Services (AWS). https://aws.amazon.com/s3/

Programming Languages

HCL
1544 projects
Makefile
30231 projects
go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to terraform-aws-s3-bucket

terraform-aws-route53
A Terraform module to create a Route53 Domain Name System (DNS) on Amazon Web Services (AWS). https://aws.amazon.com/route53/
Stars: ✭ 39 (-17.02%)
Mutual labels:  iac, amazon-web-services, terraform-modules, terraform-aws, mineiros
terraform-aws-lambda-function
A Terraform module for deploying and managing Lambda functions on Amazon Web Services (AWS). https://aws.amazon.com/lambda/
Stars: ✭ 37 (-21.28%)
Mutual labels:  iac, amazon-web-services, terraform-modules, terraform-aws, mineiros
terraform-aws-cognito-user-pool
A Terraform module to create and manage Cognito User Pools (Simple and Secure User Sign-Up, Sign-In, and Access Control) on Amazon Web Services (AWS). https://aws.amazon.com/cognito
Stars: ✭ 46 (-2.13%)
Mutual labels:  iac, amazon-web-services, terraform-modules, terraform-aws, mineiros
terraform-aws-iam-user
A Terraform module to create and manage Identity and Access Management (IAM) Users on Amazon Web Services (AWS). https://aws.amazon.com/iam
Stars: ✭ 17 (-63.83%)
Mutual labels:  iac, amazon-web-services, terraform-modules, terraform-aws, mineiros
terraform-github-organization
A Terraform module to manage GitHub Organizations. https://github.com/
Stars: ✭ 53 (+12.77%)
Mutual labels:  iac, terraform-modules, mineiros
terraform-modules
Terraform Modules by Peak
Stars: ✭ 16 (-65.96%)
Mutual labels:  s3, iac, terraform-modules
terraform-aws-account
🌳 A sustainable Terraform Package which creates Account & IAM resources on AWS
Stars: ✭ 18 (-61.7%)
Mutual labels:  iac, terraform-modules, terraform-aws
gatsby-source-s3
A Gatsby source plugin to query against an S3 bucket (including images!)
Stars: ✭ 19 (-59.57%)
Mutual labels:  s3, s3-bucket
terraform-aws-efs-backup
Terraform module designed to easily backup EFS filesystems to S3 using DataPipeline
Stars: ✭ 40 (-14.89%)
Mutual labels:  s3, terraform-modules
terraform-oci-vcn
A reusable and extensible Terraform module that provisions a VCN on Oracle Cloud Infrastructure
Stars: ✭ 22 (-53.19%)
Mutual labels:  iac, terraform-modules
s3-proxy
S3 Reverse Proxy with GET, PUT and DELETE methods and authentication (OpenID Connect and Basic Auth)
Stars: ✭ 106 (+125.53%)
Mutual labels:  s3, s3-bucket
terraform-aws-redis-elasticache
A Terraform module to create an Amazon Web Services (AWS) Redis ElastiCache cluster.
Stars: ✭ 33 (-29.79%)
Mutual labels:  amazon-web-services, terraform-modules
terraform-aws-vpc
A Terraform module to create an Amazon Web Services (AWS) Virtual Private Cloud (VPC).
Stars: ✭ 24 (-48.94%)
Mutual labels:  amazon-web-services, terraform-modules
flask-drive
A simple Flask app to upload and download files off Amazon's S3
Stars: ✭ 23 (-51.06%)
Mutual labels:  s3, s3-bucket
BlobHelper
BlobHelper is a common, consistent storage interface for Microsoft Azure, Amazon S3, Komodo, Kvpbase, and local filesystem written in C#.
Stars: ✭ 23 (-51.06%)
Mutual labels:  s3, s3-bucket
Bucket-Flaws
Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Stars: ✭ 43 (-8.51%)
Mutual labels:  s3, s3-bucket
aws-tutorial-code
AWS tutorial code.
Stars: ✭ 114 (+142.55%)
Mutual labels:  s3-bucket, amazon-web-services
terraform-aws-cloudtrail
Terraform module to provision an AWS CloudTrail and an encrypted S3 bucket with versioning to store CloudTrail logs
Stars: ✭ 78 (+65.96%)
Mutual labels:  s3, terraform-modules
ionic-image-upload
Ionic Plugin for Uploading Images to Amazon S3
Stars: ✭ 26 (-44.68%)
Mutual labels:  s3, s3-bucket
terraform-aws-acm-certificate
A Terraform module to create an Amazon Certificate Manager (ACM) certificate with Route 53 DNS validation.
Stars: ✭ 43 (-8.51%)
Mutual labels:  amazon-web-services, terraform-modules

Build Status GitHub tag (latest SemVer) Terraform Version AWS Provider Version Join Slack

terraform-aws-s3-bucket

A Terraform base module for creating a secure AWS S3-Bucket.

This module supports Terraform v1.x, v0.15, v0.14, v0.13 as well as v0.12.20 and above and is compatible with the terraform AWS provider v3 as well as v2.0 and above.

Module Features

In contrast to the plain aws_s3_bucket resource this module creates secure buckets by default. While all security features can be disabled as needed, best practices are pre-configured.

In addition to security, easy cross-account access can be granted to the objects of the bucket enforcing bucket-owner-full-control ACL for objects created by other accounts.

  • Default Security Settings: Bucket public access blocking all set to true by default, Server-Side-Encryption (SSE) at rest enabled by default (AES256), Bucket ACL defaults to canned private ACL

  • Standard S3 Features: Server-Side-Encryption (SSE) enabled by default, Versioning, Bucket Logging, Lifecycle Rules, Request Payer, Cross-Origin Resource Sharing (CORS), Acceleration Status, Bucket Policy, Tags

  • Extended S3 Features: Bucket Public Access Blocking, S3 Access Points

  • Additional Features: Cross-Account access policy with forced bucket-owner-full-control ACL for direct access, Create Cloudfront Origin Access Identity (OAI) and grant read-only access, Grant read-only access to existing Cloudfront Origin Access Identity (OAI), Allow ELB log delivery

  • Features not yet implemented: Enforce Encryption via a policy that blocks unencrypted uploads, ACL policy grants (aws-provider >= 2.52.0), Amazon S3 Analytics (aws-provider >= 2.49.0), Replication Configuration, Website Configuration, S3 Object Locking, Bucket Notifications, Bucket Metrics, Bucket Inventory, Generate Cross-Account role for OAI enabled buckets if desired, Generate KMS key to encrypt objects at rest if desired

Getting Started

Most basic usage creating a random named secure AWS bucket.

module "bucket" {
  source  = "mineiros-io/s3-bucket/aws"
  version = "~> 0.6.0"
}

Advanced usage as found in examples/secure-s3-bucket/main.tf setting all required and optional arguments to their default values.

Module Argument Reference

See variables.tf and examples/ for details and use-cases.

Bucket Configuration

  • bucket: (Optional string)

    The name of the bucket. If omitted, Terraform will assign a random, unique name. Forces new resource.

  • bucket_prefix: (Optional string)

    Creates a unique bucket name beginning with the specified prefix. Conflicts with bucket. Forces new resource.

  • acl: (Optional string)

    The canned ACL to apply.

    Default is "private".

  • policy: (Optional string)

    A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. For more information about building AWS IAM policy documents with Terraform, see the AWS IAM Policy Document Guide.

    Default is null.

  • tags: (Optional map(string))

    A mapping of tags to assign to the bucket.

    Default is {}.

  • force_destroy: (Optional bool)

    A boolean that indicates all objects (including any locked objects) should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable.

    Default is false.

  • acceleration_status: (Optional string)

    Sets the accelerate configuration of an existing bucket. Can be Enabled or Suspended.

  • request_payer: (Optional string)

    Specifies who should bear the cost of Amazon S3 data transfer. Can be either BucketOwner or Requester. By default, the owner of the S3 bucket would incur the costs of any data transfer. See Requester Pays Buckets developer guide for more information.

    Default is "BucketOwner".

  • cors_rule: (Optional object(cors))

    Specifying settings for Cross-Origin Resource Sharing (CORS) (documented below).

    Default is {}.

    The cors object accepts the following attributes:

    • allowed_headers: (Optional list(string))

      Specifies which headers are allowed.

      Default is [].

    • allowed_methods: (Required list(string))

      Specifies which methods are allowed. Can be GET, PUT, POST, DELETE or HEAD.

    • allowed_origins: (Required list(string))

      Specifies which origins are allowed.

    • expose_headers: (Optional list(string))

      Specifies expose header in the response.

      Default is [].

    • max_age_seconds: (Optional number)

      Specifies time in seconds that browser can cache the response for a preflight request.

  • versioning: (Optional bool)

    Can also be of type object. When set to true versioning will be enabled. Specifies Versioning Configuration when passed as an object (documented below).

    Default is false.

    The object accepts the following attributes:

    • enabled: (Optional bool)

      Once you version-enable a bucket, it can never return to an unversioned state. You can, however, suspend versioning on that bucket.

    • mfa_delete: (Optional bool)

      Enable MFA delete for either change: the versioning state of your bucket or permanently delete an object version.

      Default is false.

  • logging: (Optional map(string))

    Specifying a configuration for logging access logs (documented below).

    Default is {}.

    Each `` object in the map accepts the following attributes:

    • target_bucket: (Required string)

      The name of the bucket that will receive the log objects.

    • target_prefix: (Optional string)

      To specify a key prefix for log objects.

  • apply_server_side_encryption_by_default: (Optional map(string))

    Specifying the server side encryption to apply to objects at rest (documented below). Default is to use AES256 encryption.

    Each `` object in the map accepts the following attributes:

    • sse_algorithm: (Optional string)

      The server-side encryption algorithm to use. Valid values are AES256 and aws:kms. Default applies when kms_master_key_id is specified, else AES256

      Default is "aws:kms".

    • kms_master_key_id: (Optional string)

      The AWS KMS master key ID used for the SSE-KMS encryption. The default aws/s3 AWS KMS master key is used if this element is absent while the sse_algorithm is aws:kms.

      Default is "null".

  • lifecycle_rules: (Optional list(lifecycle_rule))

    Specifying various rules specifying object lifecycle management (documented below).

    Default is [].

    Each lifecycle_rule object in the list accepts the following attributes:

    • id: (Optional string)

      Unique identifier for the rule.

    • prefix: (Optional string)

      Object key prefix identifying one or more objects to which the rule applies.

    • tags: (Optional map(string))

      Specifies object tags key and value.

    • enabled: (Required bool)

      Specifies lifecycle rule status.

    • abort_incomplete_multipart_upload_days: (Optional number)

      Specifies the number of days after initiating a multipart upload when the multipart upload must be completed.

    • expiration: (Optional object(expiration))

      Specifies a period in the object's expire (documented below).

      The expiration object accepts the following attributes:

      • date: (Optional string)

        Specifies the date after which you want the corresponding action to take effect.

      • days: (Optional string)

        Specifies the number of days after object creation when the specific rule action takes effect.

      • expired_object_delete_marker: (Optional bool)

        On a versioned bucket (versioning-enabled or versioning-suspended bucket), you can add this element in the lifecycle configuration to direct Amazon S3 to delete expired object delete markers.

    • transition: (Optional object(transition))

      Specifies a period in the object's transitions (documented below).

      The transition object accepts the following attributes:

      • date: (Optional string)

        Specifies the date after which you want the corresponding action to take effect.

      • days: (Optional number)

        Specifies the number of days after object creation when the specific rule action takes effect.

      • storage_class: (Required string)

        Specifies the Amazon S3 storage class to which you want the object to transition. Can be ONEZONE_IA, STANDARD_IA, INTELLIGENT_TIERING, GLACIER, or DEEP_ARCHIVE.

    • noncurrent_version_expiration: (Optional object(noncurrent_version_expiration))

      Specifies when noncurrent object versions expire (documented below).

      The noncurrent_version_expiration object accepts the following attributes:

      • days: (Required number)

        Specifies the number of days an object's noncurrent object versions expire.

    • noncurrent_version_transition: (Optional object(noncurrent_version_transition))

      Specifies when noncurrent object versions transitions (documented below). At least one of expiration, transition, noncurrent_version_expiration, noncurrent_version_transition must be specified.

      The noncurrent_version_transition object accepts the following attributes:

      • days: (Required number)

        Specifies the number of days an object's noncurrent object versions expire.

      • storage_class: (Required string)

        Specifies the Amazon S3 storage class to which you want the noncurrent versions object to transition. Can be ONEZONE_IA, STANDARD_IA, INTELLIGENT_TIERING, GLACIER, or DEEP_ARCHIVE.

Extended Resource Configuration

S3 Access Points

  • access_points: (Optional list(access_point))

    Amazon S3 Access Points simplify managing data access at scale for shared datasets in S3. Access points are named network endpoints that are attached to buckets that you can use to perform S3 object operations, such as GetObject and PutObject. Each access point has distinct permissions and network controls that S3 applies for any request that is made through that access point. Each access point enforces a customized access point policy that works in conjunction with the bucket policy that is attached to the underlying bucket. You can configure any access point to accept requests only from a virtual private cloud (VPC) to restrict Amazon S3 data access to a private network. You can also configure custom block public access settings for each access point.

    Default is [].

    Each access_point object in the list accepts the following attributes:

    • name: (Required string)

      The name you want to assign to this access point.

    • account_id: (Optional string)

      The AWS account ID for the owner of the bucket for which you want to create an access point. Defaults to automatically determined account ID of the Terraform AWS provider.

    • policy: (Optional string)

      A valid JSON document that specifies the policy that you want to apply to this access point.

    • vpc_id: (Optional string)

      If set, this access point will only allow connections from the specified VPC ID.

    • block_public_acls: (Optional bool)

      Whether Amazon S3 should block public ACLs for this bucket. Enabling this setting does not affect existing policies or ACLs.

      Default is true.

    • block_public_policy: (Optional bool)

      Whether Amazon S3 should block public bucket policies for this bucket. Enabling this setting does not affect the existing bucket policy. If true:

      • Reject calls to PUT Bucket policy if the specified bucket policy allows public access.

      Default is true.

    • ignore_public_acls: (Optional bool)

      Whether Amazon S3 should ignore public ACLs for this bucket. Enabling this setting does not affect the persistence of any existing ACLs and doesn't prevent new public ACLs from being set. If true:

      • Ignore public ACLs on this bucket and any objects that it contains.

      Default is true.

    • restrict_public_buckets: (Optional bool)

      Whether Amazon S3 should restrict public bucket policies for this bucket. Enabling this setting does not affect the previously stored bucket policy, except that public and cross-account access within the public bucket policy, including non-public delegation to specific accounts, is blocked. If true:

      • Only the bucket owner and AWS Services can access this buckets if it has a public policy.

      Default is true.

S3 bucket-level Public Access Block Configuration

  • block_public_acls: (Optional bool)

    Whether Amazon S3 should block public ACLs for this bucket. Enabling this setting does not affect existing policies or ACLs. If true:

    • PUT Bucket acl and PUT Object acl calls will fail if the specified ACL allows public access.
    • PUT Object calls will fail if the request includes an object ACL.

    Default is true.

  • block_public_policy: (Optional bool)

    Whether Amazon S3 should block public bucket policies for this bucket. Enabling this setting does not affect the existing bucket policy. If true:

    • Reject calls to PUT Bucket policy if the specified bucket policy allows public access.

    Default is true.

  • ignore_public_acls: (Optional bool)

    Whether Amazon S3 should ignore public ACLs for this bucket. Enabling this setting does not affect the persistence of any existing ACLs and doesn't prevent new public ACLs from being set. If true:

    • Ignore public ACLs on this bucket and any objects that it contains.

    Default is true.

  • restrict_public_buckets: (Optional bool)

    Whether Amazon S3 should restrict public bucket policies for this bucket. Enabling this setting does not affect the previously stored bucket policy, except that public and cross-account access within the public bucket policy, including non-public delegation to specific accounts, is blocked. If true:

    • Only the bucket owner and AWS Services can access this buckets if it has a public policy.

    Default is true.

Cross Account Access Configuration

  • cross_account_identifiers: (Optional list(string))

    Specifies identifiers that should be granted cross account access to. If this list is empty Cross Account Access is not configured and all other options in this category are ignored.

    Default is [].

  • cross_account_bucket_actions: (Optional list(string))

    Specifies actions on the bucket to grant from cross account.

    Default is ["s3:ListBucket"].

  • cross_account_object_actions: (Optional list(string))

    Specifies actions on bucket objects to grant from cross account.

    Default is ["s3:GetObject"].

  • cross_account_object_actions_with_forced_acl: (Optional list(string))

    Specifies actions on bucket objects to grant only with foreced ACL from cross account.

    Default is ["s3:PutObject","s3:PutObjectAcl"].

  • cross_account_forced_acls: (Optional list(string))

    Specifies ACLs to force on new objects for cross account access.

    Default is ["bucket-owner-full-control"].

Cloudfront Origin Access Identity Access

  • create_origin_access_identity: (Optional bool)

    Specifies whether to create and origin access identity and grant it access to read from the bucket. This can be used to grant a Cloudfront Distribution access to bucket objects when specifying this bucket as an origin. The Cloudfront Distribution must be in the same account. For cross account access create the OAI in the account of the cloudfront distribution and use origin_acesss_identities attribute to enable access. Attention: Objects shared that way need to be owned by the account the bucket belongs to and can not be owned by other accounts (e.g. when uploaded through cross-account-access).

    Default is false.

  • origin_acesss_identities: (Optional list(string))

    Specify a list of Cloudfront OAIs to grant read-only access to. If in addition a new origin access identity is created via the create_origin_access_identity attribute, all identities will be granted access. Attention: Objects shared that way need to be owned by the account the bucket belongs to and can not be owned by other accounts (e.g. when uploaded through cross-account-access).

    Default is [].

ELB Log Delivery

  • elb_log_delivery: (Optional bool)

    Allow delivery of logs from Elastic Loadbalancers (ELB).

  • elb_regions: (Optional list(string))

    The names of the region whose AWS ELB account IDs are desired. Default is the region from the AWS provider configuration.

    Default is [].

Module Configuration

  • module_enabled: (Optional bool)

    Specifies whether resources in the module will be created.

    Default is true.

  • module_tags: (Optional map(string))

    A map of tags that will be applied to all created resources that accept tags. Tags defined with 'module_tags' can be overwritten by resource-specific tags.

    Default is {}.

  • module_depends_on: (Optional list(any))

    A list of dependencies. Any object can be assigned to this list to define a hidden external dependency.

Module Outputs

The following attributes are exported by the module:

  • module_enabled: (bool)

    Whether this module is enabled.

  • bucket: (object(bucket))

    All bucket attributes as returned by the aws_s3_bucket resource containing all arguments as specified above and the other attributes as specified below.

  • id: (string)

    The name of the bucket.

  • arn: (string)

    The ARN of the bucket. Will be of format arn:aws:s3:::bucketname.

  • bucket_domain_name: (string)

    The bucket domain name. Will be of format bucketname.s3.amazonaws.com.

  • bucket_regional_domain_name: (string)

    The bucket region-specific domain name. The bucket domain name including the region name, please refer here for format. Note: The AWS CloudFront allows specifying S3 region-specific endpoint when creating S3 origin, it will prevent redirect issues from CloudFront to S3 Origin URL.

  • hosted_zone_id: (string)

    The Route 53 Hosted Zone ID for this bucket's region.

  • region: (string)

    The AWS region this bucket resides in.

  • bucket_policy: (object(bucket_policy))

    All bucket policy object attributes as returned by the s3_bucket_policy resource.

  • origin_access_identity: (object(origin_access_identity))

    All cloudfront origin access identity object attributes as returned by the aws_cloudfront_origin_access_identity resource.

  • access_point: (list(access_point))

    A list of aws_s3_access_point objects keyed by the name attribute.

External Documentation

AWS Documentation S3

Terraform AWS Provider Documentation

Module Versioning

This Module follows the principles of Semantic Versioning (SemVer).

Given a version number MAJOR.MINOR.PATCH, we increment the:

  1. MAJOR version when we make incompatible changes,
  2. MINOR version when we add functionality in a backwards compatible manner, and
  3. PATCH version when we make backwards compatible bug fixes.

Backwards compatibility in 0.0.z and 0.y.z version

  • Backwards compatibility in versions 0.0.z is not guaranteed when z is increased. (Initial development)
  • Backwards compatibility in versions 0.y.z is not guaranteed when y is increased. (Pre-release)

About Mineiros

Mineiros is a remote-first company headquartered in Berlin, Germany that solves development, automation and security challenges in cloud infrastructure.

Our vision is to massively reduce time and overhead for teams to manage and deploy production-grade and secure cloud infrastructure.

We offer commercial support for all of our modules and encourage you to reach out if you have any questions or need help. Feel free to email us at [email protected] or join our Community Slack channel.

Reporting Issues

We use GitHub Issues to track community reported issues and missing features.

Contributing

Contributions are always encouraged and welcome! For the process of accepting changes, we use Pull Requests. If you'd like more information, please see our Contribution Guidelines.

Makefile Targets

This repository comes with a handy Makefile. Run make help to see details on each available target.

License

license

This module is licensed under the Apache License Version 2.0, January 2004. Please see LICENSE for full details.

Copyright © 2020-2022 Mineiros GmbH

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].