Skip to content

Commit ae366ed

Browse files
fix: Correct S3 bucket access permission to try user provided S3 bucket ARNs first before falling back to default (#8)
Co-authored-by: Bryant Biggs <[email protected]>
1 parent d987b8d commit ae366ed

File tree

12 files changed

+39
-43
lines changed

12 files changed

+39
-43
lines changed

.pre-commit-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/antonbabenko/pre-commit-terraform
3-
rev: v1.79.1
3+
rev: v1.80.0
44
hooks:
55
- id: terraform_fmt
66
- id: terraform_validate

examples/private-cluster/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,10 @@ Note that this example may create resources which will incur monetary charges on
4343
| <a name="module_emr_disabled"></a> [emr\_disabled](#module\_emr\_disabled) | ../.. | n/a |
4444
| <a name="module_emr_instance_fleet"></a> [emr\_instance\_fleet](#module\_emr\_instance\_fleet) | ../.. | n/a |
4545
| <a name="module_emr_instance_group"></a> [emr\_instance\_group](#module\_emr\_instance\_group) | ../.. | n/a |
46-
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> v3.0 |
47-
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
48-
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.0 |
49-
| <a name="module_vpc_endpoints_sg"></a> [vpc\_endpoints\_sg](#module\_vpc\_endpoints\_sg) | terraform-aws-modules/security-group/aws | ~> 4.0 |
46+
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
47+
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
48+
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 5.0 |
49+
| <a name="module_vpc_endpoints_sg"></a> [vpc\_endpoints\_sg](#module\_vpc\_endpoints\_sg) | terraform-aws-modules/security-group/aws | ~> 5.0 |
5050

5151
## Resources
5252

examples/private-cluster/main.tf

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,7 @@ module "emr_disabled" {
249249

250250
module "vpc" {
251251
source = "terraform-aws-modules/vpc/aws"
252-
version = "~> 3.0"
252+
version = "~> 5.0"
253253

254254
name = local.name
255255
cidr = local.vpc_cidr
@@ -258,9 +258,8 @@ module "vpc" {
258258
public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)]
259259
private_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 10)]
260260

261-
enable_nat_gateway = true
262-
single_nat_gateway = true
263-
enable_dns_hostnames = true
261+
enable_nat_gateway = true
262+
single_nat_gateway = true
264263

265264
# https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html#manually-tagged-resources
266265
# Tag if you want EMR to create the security groups for you
@@ -274,7 +273,7 @@ module "vpc" {
274273

275274
module "vpc_endpoints" {
276275
source = "terraform-aws-modules/vpc/aws//modules/vpc-endpoints"
277-
version = "~> 3.0"
276+
version = "~> 5.0"
278277

279278
vpc_id = module.vpc.vpc_id
280279
security_group_ids = [module.vpc_endpoints_sg.security_group_id]
@@ -304,7 +303,7 @@ module "vpc_endpoints" {
304303

305304
module "vpc_endpoints_sg" {
306305
source = "terraform-aws-modules/security-group/aws"
307-
version = "~> 4.0"
306+
version = "~> 5.0"
308307

309308
name = "${local.name}-vpc-endpoints"
310309
description = "Security group for VPC endpoint access"
@@ -323,7 +322,7 @@ module "vpc_endpoints_sg" {
323322

324323
module "s3_bucket" {
325324
source = "terraform-aws-modules/s3-bucket/aws"
326-
version = "~> v3.0"
325+
version = "~> 3.0"
327326

328327
bucket_prefix = "${local.name}-"
329328

examples/public-cluster/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ Note that this example may create resources which will incur monetary charges on
4040
|------|--------|---------|
4141
| <a name="module_emr_instance_fleet"></a> [emr\_instance\_fleet](#module\_emr\_instance\_fleet) | ../.. | n/a |
4242
| <a name="module_emr_instance_group"></a> [emr\_instance\_group](#module\_emr\_instance\_group) | ../.. | n/a |
43-
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> v3.0 |
44-
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
43+
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
44+
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
4545

4646
## Resources
4747

examples/public-cluster/main.tf

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -247,16 +247,15 @@ module "emr_instance_group" {
247247

248248
module "vpc" {
249249
source = "terraform-aws-modules/vpc/aws"
250-
version = "~> 3.0"
250+
version = "~> 5.0"
251251

252252
name = local.name
253253
cidr = local.vpc_cidr
254254

255255
azs = local.azs
256256
public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)]
257257

258-
enable_nat_gateway = false
259-
enable_dns_hostnames = true
258+
enable_nat_gateway = false
260259

261260
# https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html#manually-tagged-resources
262261
# Tag if you want EMR to create the security groups for you
@@ -271,7 +270,7 @@ module "vpc" {
271270

272271
module "s3_bucket" {
273272
source = "terraform-aws-modules/s3-bucket/aws"
274-
version = "~> v3.0"
273+
version = "~> 3.0"
275274

276275
bucket_prefix = "${local.name}-"
277276

examples/serverless-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Note that this example may create resources which will incur monetary charges on
4444
| <a name="module_emr_serverless_disabled"></a> [emr\_serverless\_disabled](#module\_emr\_serverless\_disabled) | ../../modules/serverless | n/a |
4545
| <a name="module_emr_serverless_hive"></a> [emr\_serverless\_hive](#module\_emr\_serverless\_hive) | ../../modules/serverless | n/a |
4646
| <a name="module_emr_serverless_spark"></a> [emr\_serverless\_spark](#module\_emr\_serverless\_spark) | ../../modules/serverless | n/a |
47-
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
47+
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
4848

4949
## Resources
5050

examples/serverless-cluster/main.tf

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ module "emr_serverless_disabled" {
132132

133133
module "vpc" {
134134
source = "terraform-aws-modules/vpc/aws"
135-
version = "~> 3.0"
135+
version = "~> 5.0"
136136

137137
name = local.name
138138
cidr = local.vpc_cidr
@@ -141,9 +141,8 @@ module "vpc" {
141141
public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)]
142142
private_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 10)]
143143

144-
enable_nat_gateway = true
145-
single_nat_gateway = true
146-
enable_dns_hostnames = true
144+
enable_nat_gateway = true
145+
single_nat_gateway = true
147146

148147
tags = local.tags
149148
}

examples/studio/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@ $ terraform apply
3838
| <a name="module_emr_studio_disabled"></a> [emr\_studio\_disabled](#module\_emr\_studio\_disabled) | ../../modules/studio | n/a |
3939
| <a name="module_emr_studio_iam"></a> [emr\_studio\_iam](#module\_emr\_studio\_iam) | ../../modules/studio | n/a |
4040
| <a name="module_emr_studio_sso"></a> [emr\_studio\_sso](#module\_emr\_studio\_sso) | ../../modules/studio | n/a |
41-
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> v3.0 |
42-
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
41+
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
42+
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
4343

4444
## Resources
4545

examples/studio/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ module "emr_studio_disabled" {
154154

155155
module "vpc" {
156156
source = "terraform-aws-modules/vpc/aws"
157-
version = "~> 3.0"
157+
version = "~> 5.0"
158158

159159
name = local.name
160160
cidr = local.vpc_cidr
@@ -172,7 +172,7 @@ module "vpc" {
172172

173173
module "s3_bucket" {
174174
source = "terraform-aws-modules/s3-bucket/aws"
175-
version = "~> v3.0"
175+
version = "~> 3.0"
176176

177177
bucket_prefix = "${local.name}-"
178178

examples/virtual-cluster/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -65,11 +65,11 @@ aws emr-containers list-virtual-clusters --region us-west-2 --states ARRESTED \
6565
| <a name="module_complete"></a> [complete](#module\_complete) | ../../modules/virtual-cluster | n/a |
6666
| <a name="module_default"></a> [default](#module\_default) | ../../modules/virtual-cluster | n/a |
6767
| <a name="module_disabled"></a> [disabled](#module\_disabled) | ../../modules/virtual-cluster | n/a |
68-
| <a name="module_eks"></a> [eks](#module\_eks) | terraform-aws-modules/eks/aws | ~> 19.10 |
69-
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> v3.0 |
70-
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
71-
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.0 |
72-
| <a name="module_vpc_endpoints_sg"></a> [vpc\_endpoints\_sg](#module\_vpc\_endpoints\_sg) | terraform-aws-modules/security-group/aws | ~> 4.0 |
68+
| <a name="module_eks"></a> [eks](#module\_eks) | terraform-aws-modules/eks/aws | ~> 19.13 |
69+
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
70+
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
71+
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 5.0 |
72+
| <a name="module_vpc_endpoints_sg"></a> [vpc\_endpoints\_sg](#module\_vpc\_endpoints\_sg) | terraform-aws-modules/security-group/aws | ~> 5.0 |
7373

7474
## Resources
7575

0 commit comments

Comments
 (0)