|
1 | 1 | terraform { |
2 | | - required_version = ">= 1.0" |
3 | | - |
| 2 | + required_version = "1.14.0" |
4 | 3 | required_providers { |
5 | 4 | aws = { |
6 | 5 | source = "hashicorp/aws" |
7 | | - version = "~> 6.0" |
8 | | - } |
9 | | - random = { |
10 | | - source = "hashicorp/random" |
11 | | - version = "~> 3.0" |
| 6 | + version = "6.22.0" |
12 | 7 | } |
13 | 8 | } |
14 | 9 | } |
15 | 10 |
|
16 | | -data "aws_iam_policy_document" "zappa" { |
| 11 | +data "aws_iam_policy_document" "fixtures_read_only" { |
17 | 12 | statement { |
18 | | - actions = ["s3:*"] |
19 | | - condition { |
20 | | - test = "Bool" |
21 | | - variable = "aws:SecureTransport" |
22 | | - values = ["false"] |
23 | | - } |
24 | | - effect = "Deny" |
25 | | - principals { |
26 | | - type = "*" |
27 | | - identifiers = ["*"] |
28 | | - } |
| 13 | + actions = [ |
| 14 | + "s3:GetObject" |
| 15 | + ] |
| 16 | + effect = "Allow" |
29 | 17 | resources = [ |
30 | | - aws_s3_bucket.zappa.arn, |
31 | | - "${aws_s3_bucket.zappa.arn}/*", |
| 18 | + "arn:aws:s3:::${var.fixtures_s3_bucket}/*" |
32 | 19 | ] |
33 | | - sid = "EnforceTls" |
34 | 20 | } |
35 | 21 | } |
36 | 22 |
|
37 | | -resource "aws_iam_policy" "fixtures_read_only" { |
38 | | - name = "${var.project_name}-${var.environment}-fixtures-read-only" |
39 | | - description = "Allows read-only access to the fixtures S3 bucket" |
| 23 | +module "fixtures_bucket" { |
| 24 | + source = "./modules/s3-bucket" |
40 | 25 |
|
41 | | - policy = jsonencode({ |
42 | | - Version = "2012-10-17" |
43 | | - Statement = [ |
44 | | - { |
45 | | - Action = [ |
46 | | - "s3:GetObject" |
47 | | - ] |
48 | | - Effect = "Allow" |
49 | | - Resource = "arn:aws:s3:::${var.fixtures_s3_bucket}/*" |
50 | | - } |
51 | | - ] |
| 26 | + bucket_name = var.fixtures_s3_bucket |
| 27 | + force_destroy = var.force_destroy_bucket |
| 28 | + tags = merge(var.common_tags, { |
| 29 | + Name = "${var.project_name}-${var.environment}-fixtures" |
52 | 30 | }) |
53 | 31 | } |
54 | 32 |
|
55 | | -resource "aws_s3_bucket" "fixtures" { # NOSONAR |
56 | | - bucket = var.fixtures_s3_bucket |
57 | | - tags = var.common_tags |
58 | | -} |
59 | | - |
60 | | -resource "aws_s3_bucket_lifecycle_configuration" "zappa" { |
61 | | - bucket = aws_s3_bucket.zappa.id |
| 33 | +module "zappa_bucket" { |
| 34 | + source = "./modules/s3-bucket" |
62 | 35 |
|
63 | | - rule { |
64 | | - abort_incomplete_multipart_upload { |
65 | | - days_after_initiation = var.abort_incomplete_multipart_upload_days |
66 | | - } |
67 | | - id = "delete-old-versions" |
68 | | - noncurrent_version_expiration { |
69 | | - noncurrent_days = var.noncurrent_version_expiration_days |
70 | | - } |
71 | | - status = "Enabled" |
72 | | - } |
73 | | -} |
74 | | - |
75 | | -resource "aws_s3_bucket" "zappa" { # NOSONAR |
76 | | - bucket = var.zappa_s3_bucket |
| 36 | + bucket_name = var.zappa_s3_bucket |
77 | 37 | force_destroy = var.force_destroy_bucket |
78 | 38 | tags = merge(var.common_tags, { |
79 | 39 | Name = "${var.project_name}-${var.environment}-zappa-deployments" |
80 | 40 | }) |
81 | 41 | } |
82 | 42 |
|
83 | | -resource "aws_s3_bucket_policy" "zappa" { |
84 | | - bucket = aws_s3_bucket.zappa.id |
85 | | - policy = data.aws_iam_policy_document.zappa.json |
86 | | -} |
87 | | - |
88 | | -resource "aws_s3_bucket_public_access_block" "fixtures" { |
89 | | - block_public_acls = true |
90 | | - block_public_policy = true |
91 | | - bucket = aws_s3_bucket.fixtures.id |
92 | | - ignore_public_acls = true |
93 | | - restrict_public_buckets = true |
94 | | -} |
95 | | - |
96 | | -resource "aws_s3_bucket_public_access_block" "zappa" { |
97 | | - block_public_acls = true |
98 | | - block_public_policy = true |
99 | | - bucket = aws_s3_bucket.zappa.id |
100 | | - ignore_public_acls = true |
101 | | - restrict_public_buckets = true |
102 | | -} |
103 | | - |
104 | | -resource "aws_s3_bucket_server_side_encryption_configuration" "fixtures" { |
105 | | - bucket = aws_s3_bucket.fixtures.id |
106 | | - |
107 | | - rule { |
108 | | - apply_server_side_encryption_by_default { |
109 | | - sse_algorithm = "AES256" |
110 | | - } |
111 | | - } |
112 | | -} |
113 | | - |
114 | | -resource "aws_s3_bucket_server_side_encryption_configuration" "zappa" { |
115 | | - bucket = aws_s3_bucket.zappa.id |
116 | | - |
117 | | - rule { |
118 | | - apply_server_side_encryption_by_default { |
119 | | - sse_algorithm = "AES256" |
120 | | - } |
121 | | - } |
122 | | -} |
123 | | - |
124 | | -resource "aws_s3_bucket_versioning" "fixtures" { |
125 | | - bucket = aws_s3_bucket.fixtures.id |
126 | | - |
127 | | - versioning_configuration { |
128 | | - status = "Enabled" |
129 | | - } |
130 | | -} |
131 | | - |
132 | | -resource "aws_s3_bucket_versioning" "zappa" { |
133 | | - bucket = aws_s3_bucket.zappa.id |
134 | | - |
135 | | - versioning_configuration { |
136 | | - status = "Enabled" |
137 | | - } |
| 43 | +resource "aws_iam_policy" "fixtures_read_only" { |
| 44 | + name = "${var.project_name}-${var.environment}-fixtures-read-only" |
| 45 | + description = "Allows read-only access to the fixtures S3 bucket" |
| 46 | + policy = data.aws_iam_policy_document.fixtures_read_only.json |
138 | 47 | } |
0 commit comments