terraspace_plugin_aws 0.5.0 → 0.6.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1b21cc6b247837fa9b7ea33ffdcc95026f3a5e79ced8193aaa1481f0c8ffa143
4
- data.tar.gz: b7bd06428a87d5920c36defa54b0266b0f6a84a31b5996d267ce941b6850e179
3
+ metadata.gz: 45855622a0c3a3a7b78580cc3a0962c468899487570f13c77ff31970eabd1c16
4
+ data.tar.gz: '09bcbeb865515ca488001b0834e899c3351e53ecdb20bec698e00afacaad3ab7'
5
5
  SHA512:
6
- metadata.gz: b576cf6058b7a7c2268542a9d1a3d1b4095716106555efce9bb878a8b6442ef1996e7f1c12dedac972e9db040ddef490cda36611c5b85e50480de0989baa11af
7
- data.tar.gz: 1747b119553d71b04756e8feee49cf5b0cc19d8b32848dd20d8a90dd38c3f7f799f9d35c8ffb954030a79485677ecce4a4586ac4b41644fb50df402cdde9e5e4
6
+ metadata.gz: 9e1248830acc18f5d68ad49aeade257c0ded0ddd294ed0c904a0bc3c89ed4f099aa50a5c100536f9dab3a133638e81f451ae7f21b02206593a5df4ed2e39cda8
7
+ data.tar.gz: 84f1717dd86aa3c22e5457b14161a9826b17e9b06040f7492b68e4e394441e29b324e3eb89fae66ccf5e3438a13e8904cd65f14473bcce31155bc08464f2533f
data/CHANGELOG.md CHANGED
@@ -3,6 +3,12 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  This project *loosely tries* to adhere to [Semantic Versioning](http://semver.org/).
5
5
 
6
+ ## [0.6.0] - 2023-06-07
7
+ - [#25](https://github.com/boltops-tools/terraspace_plugin_aws/pull/25) fix starter example, use tags as example instead
8
+
9
+ ## [0.5.1] - 2023-03-27
10
+ - [#24](https://github.com/boltops-tools/terraspace_plugin_aws/pull/24) Remove redundant backend `encrypt` configuration
11
+
6
12
  ## [0.5.0] - 2022-07-20
7
13
  - [#23](https://github.com/boltops-tools/terraspace_plugin_aws/pull/23) update backend key generated default
8
14
 
@@ -1,8 +1,4 @@
1
1
  resource "aws_s3_bucket" "this" {
2
2
  bucket = var.bucket # If omitted, Terraform will assign a random, unique name.
3
- }
4
-
5
- resource "aws_s3_bucket_acl" "this" {
6
- bucket = aws_s3_bucket.this.id
7
- acl = var.acl
3
+ tags = var.tags
8
4
  }
@@ -4,8 +4,8 @@ variable "bucket" {
4
4
  default = null
5
5
  }
6
6
 
7
- variable "acl" {
8
- description = "(Optional) The canned ACL to apply. Defaults to 'private'."
9
- type = string
10
- default = "private"
11
- }
7
+ variable "tags" {
8
+ description = "(Optional) A mapping of tags to assign to the bucket."
9
+ type = map(string)
10
+ default = {}
11
+ }
@@ -6,7 +6,6 @@ terraform {
6
6
  bucket = "<%%= expansion('terraform-state-:ACCOUNT-:REGION-:ENV') %>"
7
7
  key = "<%%= expansion(':PROJECT/:REGION/:APP/:ROLE/:ENV/:EXTRA/:BUILD_DIR/terraform.tfstate') %>"
8
8
  region = "<%%= expansion(':REGION') %>"
9
- encrypt = true
10
9
  dynamodb_table = "terraform_locks"
11
10
  }
12
11
  }
@@ -5,5 +5,5 @@ resource "random_pet" "this" {
5
5
  module "bucket" {
6
6
  source = "../../modules/example"
7
7
  bucket = "bucket-${random_pet.this.id}"
8
- acl = var.acl
8
+ tags = var.tags
9
9
  }
@@ -1,5 +1,5 @@
1
- variable "acl" {
2
- description = "The canned ACL to apply. Defaults to 'private'."
3
- type = string
4
- default = "private"
1
+ variable "tags" {
2
+ description = "(Optional) A mapping of tags to assign to the bucket."
3
+ type = map(string)
4
+ default = {}
5
5
  }
@@ -1,8 +1,4 @@
1
1
  resource("aws_s3_bucket", "this",
2
2
  bucket: var.bucket, # If omitted, Terraform will assign a random, unique name.
3
- )
4
-
5
- resource("aws_s3_bucket_acl", "this",
6
- bucket: "${aws_s3_bucket.this.id}",
7
- acl: var.acl,
3
+ tags: var.tags,
8
4
  )
@@ -3,7 +3,8 @@ variable("bucket",
3
3
  default: nil,
4
4
  )
5
5
 
6
- variable("acl",
7
- description: "(Optional) The canned ACL to apply. Defaults to 'private'.",
8
- default: "private",
6
+ variable("tags",
7
+ description: "(Optional) A mapping of tags to assign to the bucket.",
8
+ type: "map(string)",
9
+ default: {},
9
10
  )
@@ -5,5 +5,5 @@ resource("random_pet", "this",
5
5
  module!("bucket",
6
6
  source: "../../modules/example",
7
7
  bucket: "bucket-${random_pet.this.id}",
8
- acl: var.acl,
8
+ tags: var.tags,
9
9
  )
@@ -1,5 +1,5 @@
1
- variable("acl",
2
- description: "The canned ACL to apply. Defaults to 'private'.",
3
- type: "string",
4
- default: "private",
1
+ variable("tags",
2
+ description: "(Optional) A mapping of tags to assign to the bucket.",
3
+ type: "map(string)",
4
+ default: {},
5
5
  )
@@ -1,3 +1,3 @@
1
1
  module TerraspacePluginAws
2
- VERSION = "0.5.0"
2
+ VERSION = "0.6.0"
3
3
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: terraspace_plugin_aws
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.0
4
+ version: 0.6.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Tung Nguyen
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2022-07-20 00:00:00.000000000 Z
11
+ date: 2023-06-07 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-dynamodb
@@ -210,7 +210,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
210
210
  - !ruby/object:Gem::Version
211
211
  version: '0'
212
212
  requirements: []
213
- rubygems_version: 3.3.12
213
+ rubygems_version: 3.4.10
214
214
  signing_key:
215
215
  specification_version: 4
216
216
  summary: Terraspace AWS Plugin