@@ -4,44 +4,55 @@ locals {
4
4
5
5
resource "aws_s3_bucket" "action_dist" {
6
6
bucket = var. distribution_bucket_name
7
- acl = " private"
8
7
force_destroy = true
9
8
tags = var. tags
9
+ }
10
10
11
- # Max 1 block - server_side_encryption_configuration
12
- dynamic "server_side_encryption_configuration" {
13
- for_each = length (keys (var. server_side_encryption_configuration )) == 0 ? [] : [var . server_side_encryption_configuration ]
14
-
15
- content {
16
-
17
- dynamic "rule" {
18
- for_each = length (keys (lookup (server_side_encryption_configuration. value , " rule" , {}))) == 0 ? [] : [lookup (server_side_encryption_configuration. value , " rule" , {})]
11
+ resource "aws_s3_bucket_acl" "action_dist_acl" {
12
+ bucket = aws_s3_bucket. action_dist . id
13
+ acl = " private"
14
+ }
19
15
20
- content {
21
- bucket_key_enabled = lookup (rule . value , " bucket_key_enabled " , null )
16
+ resource "aws_s3_bucket_lifecycle_configuration" "bucket-config" {
17
+ bucket = aws_s3_bucket . action_dist . id
22
18
23
- dynamic "apply_server_side_encryption_by_default" {
24
- for_each = length ( keys ( lookup (rule . value , " apply_server_side_encryption_by_default " , {}))) == 0 ? [] : [
25
- lookup (rule . value , " apply_server_side_encryption_by_default " , {})]
19
+ rule {
20
+ id = " lifecycle_config "
21
+ status = " Enabled "
26
22
27
- content {
28
- sse_algorithm = apply_server_side_encryption_by_default. value . sse_algorithm
29
- kms_master_key_id = lookup (apply_server_side_encryption_by_default. value , " kms_master_key_id" , null )
30
- }
31
- }
32
- }
33
- }
23
+ abort_incomplete_multipart_upload {
24
+ days_after_initiation = 7
34
25
}
35
- }
36
-
37
- lifecycle_rule {
38
- enabled = true
39
- abort_incomplete_multipart_upload_days = 7
40
26
41
27
transition {
42
28
days = 35
43
29
storage_class = " INTELLIGENT_TIERING"
44
30
}
31
+
32
+
33
+ }
34
+ }
35
+
36
+ resource "aws_s3_bucket_server_side_encryption_configuration" "action_dist" {
37
+ bucket = aws_s3_bucket. action_dist . id
38
+
39
+
40
+ dynamic "rule" {
41
+ for_each = length (keys (lookup (var. server_side_encryption_configuration , " rule" , {}))) == 0 ? [] : [lookup (var. server_side_encryption_configuration , " rule" , {})]
42
+
43
+ content {
44
+ bucket_key_enabled = lookup (rule. value , " bucket_key_enabled" , null )
45
+
46
+ dynamic "apply_server_side_encryption_by_default" {
47
+ for_each = length (keys (lookup (rule. value , " apply_server_side_encryption_by_default" , {}))) == 0 ? [] : [
48
+ lookup (rule. value , " apply_server_side_encryption_by_default" , {})]
49
+
50
+ content {
51
+ sse_algorithm = apply_server_side_encryption_by_default. value . sse_algorithm
52
+ kms_master_key_id = lookup (apply_server_side_encryption_by_default. value , " kms_master_key_id" , null )
53
+ }
54
+ }
55
+ }
45
56
}
46
57
}
47
58
0 commit comments