terraspace_plugin_aws 0.5.0 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1b21cc6b247837fa9b7ea33ffdcc95026f3a5e79ced8193aaa1481f0c8ffa143
4
- data.tar.gz: b7bd06428a87d5920c36defa54b0266b0f6a84a31b5996d267ce941b6850e179
3
+ metadata.gz: 45855622a0c3a3a7b78580cc3a0962c468899487570f13c77ff31970eabd1c16
4
+ data.tar.gz: '09bcbeb865515ca488001b0834e899c3351e53ecdb20bec698e00afacaad3ab7'
5
5
  SHA512:
6
- metadata.gz: b576cf6058b7a7c2268542a9d1a3d1b4095716106555efce9bb878a8b6442ef1996e7f1c12dedac972e9db040ddef490cda36611c5b85e50480de0989baa11af
7
- data.tar.gz: 1747b119553d71b04756e8feee49cf5b0cc19d8b32848dd20d8a90dd38c3f7f799f9d35c8ffb954030a79485677ecce4a4586ac4b41644fb50df402cdde9e5e4
6
+ metadata.gz: 9e1248830acc18f5d68ad49aeade257c0ded0ddd294ed0c904a0bc3c89ed4f099aa50a5c100536f9dab3a133638e81f451ae7f21b02206593a5df4ed2e39cda8
7
+ data.tar.gz: 84f1717dd86aa3c22e5457b14161a9826b17e9b06040f7492b68e4e394441e29b324e3eb89fae66ccf5e3438a13e8904cd65f14473bcce31155bc08464f2533f
data/CHANGELOG.md CHANGED
@@ -3,6 +3,12 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  This project *loosely tries* to adhere to [Semantic Versioning](http://semver.org/).
5
5
 
6
+ ## [0.6.0] - 2023-06-07
7
+ - [#25](https://github.com/boltops-tools/terraspace_plugin_aws/pull/25) fix starter example, use tags as example instead
8
+
9
+ ## [0.5.1] - 2023-03-27
10
+ - [#24](https://github.com/boltops-tools/terraspace_plugin_aws/pull/24) Remove redundant backend `encrypt` configuration
11
+
6
12
  ## [0.5.0] - 2022-07-20
7
13
  - [#23](https://github.com/boltops-tools/terraspace_plugin_aws/pull/23) update backend key generated default
8
14
 
@@ -1,8 +1,4 @@
1
1
  resource "aws_s3_bucket" "this" {
2
2
  bucket = var.bucket # If omitted, Terraform will assign a random, unique name.
3
- }
4
-
5
- resource "aws_s3_bucket_acl" "this" {
6
- bucket = aws_s3_bucket.this.id
7
- acl = var.acl
3
+ tags = var.tags
8
4
  }
@@ -4,8 +4,8 @@ variable "bucket" {
4
4
  default = null
5
5
  }
6
6
 
7
- variable "acl" {
8
- description = "(Optional) The canned ACL to apply. Defaults to 'private'."
9
- type = string
10
- default = "private"
11
- }
7
+ variable "tags" {
8
+ description = "(Optional) A mapping of tags to assign to the bucket."
9
+ type = map(string)
10
+ default = {}
11
+ }
@@ -6,7 +6,6 @@ terraform {
6
6
  bucket = "<%%= expansion('terraform-state-:ACCOUNT-:REGION-:ENV') %>"
7
7
  key = "<%%= expansion(':PROJECT/:REGION/:APP/:ROLE/:ENV/:EXTRA/:BUILD_DIR/terraform.tfstate') %>"
8
8
  region = "<%%= expansion(':REGION') %>"
9
- encrypt = true
10
9
  dynamodb_table = "terraform_locks"
11
10
  }
12
11
  }
@@ -5,5 +5,5 @@ resource "random_pet" "this" {
5
5
  module "bucket" {
6
6
  source = "../../modules/example"
7
7
  bucket = "bucket-${random_pet.this.id}"
8
- acl = var.acl
8
+ tags = var.tags
9
9
  }
@@ -1,5 +1,5 @@
1
- variable "acl" {
2
- description = "The canned ACL to apply. Defaults to 'private'."
3
- type = string
4
- default = "private"
1
+ variable "tags" {
2
+ description = "(Optional) A mapping of tags to assign to the bucket."
3
+ type = map(string)
4
+ default = {}
5
5
  }
@@ -1,8 +1,4 @@
1
1
  resource("aws_s3_bucket", "this",
2
2
  bucket: var.bucket, # If omitted, Terraform will assign a random, unique name.
3
- )
4
-
5
- resource("aws_s3_bucket_acl", "this",
6
- bucket: "${aws_s3_bucket.this.id}",
7
- acl: var.acl,
3
+ tags: var.tags,
8
4
  )
@@ -3,7 +3,8 @@ variable("bucket",
3
3
  default: nil,
4
4
  )
5
5
 
6
- variable("acl",
7
- description: "(Optional) The canned ACL to apply. Defaults to 'private'.",
8
- default: "private",
6
+ variable("tags",
7
+ description: "(Optional) A mapping of tags to assign to the bucket.",
8
+ type: "map(string)",
9
+ default: {},
9
10
  )
@@ -5,5 +5,5 @@ resource("random_pet", "this",
5
5
  module!("bucket",
6
6
  source: "../../modules/example",
7
7
  bucket: "bucket-${random_pet.this.id}",
8
- acl: var.acl,
8
+ tags: var.tags,
9
9
  )
@@ -1,5 +1,5 @@
1
- variable("acl",
2
- description: "The canned ACL to apply. Defaults to 'private'.",
3
- type: "string",
4
- default: "private",
1
+ variable("tags",
2
+ description: "(Optional) A mapping of tags to assign to the bucket.",
3
+ type: "map(string)",
4
+ default: {},
5
5
  )
@@ -1,3 +1,3 @@
1
1
  module TerraspacePluginAws
2
- VERSION = "0.5.0"
2
+ VERSION = "0.6.0"
3
3
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: terraspace_plugin_aws
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.0
4
+ version: 0.6.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Tung Nguyen
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2022-07-20 00:00:00.000000000 Z
11
+ date: 2023-06-07 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-dynamodb
@@ -210,7 +210,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
210
210
  - !ruby/object:Gem::Version
211
211
  version: '0'
212
212
  requirements: []
213
- rubygems_version: 3.3.12
213
+ rubygems_version: 3.4.10
214
214
  signing_key:
215
215
  specification_version: 4
216
216
  summary: Terraspace AWS Plugin