Skip to content

Commit 66a61f4

Browse files
committed
fix: updated S3 resource as per AWS 4.0 version
1 parent 63e0e27 commit 66a61f4

File tree

3 files changed

+39
-28
lines changed

3 files changed

+39
-28
lines changed

.github/workflows/terraform.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
steps:
5656
- uses: actions/checkout@v2
5757
- name: terraform init
58-
run: terraform init -get -backend=false -input=false
58+
run: terraform init -upgrade -get -backend=false -input=false
5959
- if: contains(matrix.terraform, '1.1.')
6060
name: check terraform formatting
6161
run: terraform fmt -recursive -check=true -write=false

modules/runner-binaries-syncer/main.tf

Lines changed: 37 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -4,44 +4,55 @@ locals {
44

55
resource "aws_s3_bucket" "action_dist" {
66
bucket = var.distribution_bucket_name
7-
acl = "private"
87
force_destroy = true
98
tags = var.tags
9+
}
1010

11-
# Max 1 block - server_side_encryption_configuration
12-
dynamic "server_side_encryption_configuration" {
13-
for_each = length(keys(var.server_side_encryption_configuration)) == 0 ? [] : [var.server_side_encryption_configuration]
14-
15-
content {
16-
17-
dynamic "rule" {
18-
for_each = length(keys(lookup(server_side_encryption_configuration.value, "rule", {}))) == 0 ? [] : [lookup(server_side_encryption_configuration.value, "rule", {})]
11+
resource "aws_s3_bucket_acl" "action_dist_acl" {
12+
bucket = aws_s3_bucket.action_dist.id
13+
acl = "private"
14+
}
1915

20-
content {
21-
bucket_key_enabled = lookup(rule.value, "bucket_key_enabled", null)
16+
resource "aws_s3_bucket_lifecycle_configuration" "bucket-config" {
17+
bucket = aws_s3_bucket.action_dist.id
2218

23-
dynamic "apply_server_side_encryption_by_default" {
24-
for_each = length(keys(lookup(rule.value, "apply_server_side_encryption_by_default", {}))) == 0 ? [] : [
25-
lookup(rule.value, "apply_server_side_encryption_by_default", {})]
19+
rule {
20+
id = "lifecycle_config"
21+
status = "Enabled"
2622

27-
content {
28-
sse_algorithm = apply_server_side_encryption_by_default.value.sse_algorithm
29-
kms_master_key_id = lookup(apply_server_side_encryption_by_default.value, "kms_master_key_id", null)
30-
}
31-
}
32-
}
33-
}
23+
abort_incomplete_multipart_upload {
24+
days_after_initiation = 7
3425
}
35-
}
36-
37-
lifecycle_rule {
38-
enabled = true
39-
abort_incomplete_multipart_upload_days = 7
4026

4127
transition {
4228
days = 35
4329
storage_class = "INTELLIGENT_TIERING"
4430
}
31+
32+
33+
}
34+
}
35+
36+
resource "aws_s3_bucket_server_side_encryption_configuration" "action_dist" {
37+
bucket = aws_s3_bucket.action_dist.id
38+
39+
40+
dynamic "rule" {
41+
for_each = length(keys(lookup(var.server_side_encryption_configuration, "rule", {}))) == 0 ? [] : [lookup(var.server_side_encryption_configuration, "rule", {})]
42+
43+
content {
44+
bucket_key_enabled = lookup(rule.value, "bucket_key_enabled", null)
45+
46+
dynamic "apply_server_side_encryption_by_default" {
47+
for_each = length(keys(lookup(rule.value, "apply_server_side_encryption_by_default", {}))) == 0 ? [] : [
48+
lookup(rule.value, "apply_server_side_encryption_by_default", {})]
49+
50+
content {
51+
sse_algorithm = apply_server_side_encryption_by_default.value.sse_algorithm
52+
kms_master_key_id = lookup(apply_server_side_encryption_by_default.value, "kms_master_key_id", null)
53+
}
54+
}
55+
}
4556
}
4657
}
4758

modules/runner-binaries-syncer/runner-binaries-syncer.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ resource "aws_lambda_permission" "syncer" {
118118
### Extra trigger to trigger from S3 to execute the lambda after first deployment
119119
###################################################################################
120120

121-
resource "aws_s3_bucket_object" "trigger" {
121+
resource "aws_s3_object" "trigger" {
122122
bucket = aws_s3_bucket.action_dist.id
123123
key = "triggers/${aws_lambda_function.syncer.id}-trigger.json"
124124
source = "${path.module}/trigger.json"

0 commit comments

Comments
 (0)