Skip to content

Commit c57ca48

Browse files
authored
Merge pull request #20 from creynolds15/ACLs
DSD-2975: remove legacy ACLs
2 parents 84b6832 + f5a3b7e commit c57ca48

File tree

8 files changed

+30
-10
lines changed

8 files changed

+30
-10
lines changed

CHANGELOG.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,8 @@
11
# Tamr S3 Module Repo
22

3+
## v1.3.3 - August 9th 2022
4+
* Fixes a bug with legacy ACLs for S3 buckets
5+
36
## v1.3.2 - August 9th 2022
47
* Fixes a bug where two resources were controlling server side encryption
58

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.3.2
1+
1.3.3
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
terraform {
2+
required_version = ">= 1.0.0"
3+
required_providers {
4+
aws = {
5+
source = "hashicorp/aws"
6+
version = ">= 3.36, !=4.0.0, !=4.1.0, !=4.2.0, !=4.3.0, !=4.4.0, !=4.5.0, !=4.6.0, !=4.7.0, !=4.8.0"
7+
}
8+
}
9+
}

examples/minimal/versions.tf

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
terraform {
2+
required_version = ">= 1.0.0"
3+
required_providers {
4+
aws = {
5+
source = "hashicorp/aws"
6+
version = ">= 3.36, !=4.0.0, !=4.1.0, !=4.2.0, !=4.3.0, !=4.4.0, !=4.5.0, !=4.6.0, !=4.7.0, !=4.8.0"
7+
}
8+
}
9+
}
Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,13 @@
11
terraform {
2-
required_version = ">= 0.13"
2+
required_version = ">= 1.0.0"
33
required_providers {
44
aws = {
55
source = "hashicorp/aws"
66
version = ">= 3.36, !=4.0.0, !=4.1.0, !=4.2.0, !=4.3.0, !=4.4.0, !=4.5.0, !=4.6.0, !=4.7.0, !=4.8.0"
77
}
8+
random = {
9+
source = "hashicorp/random"
10+
version = ">= 3.3.2"
11+
}
812
}
913
}

modules/encrypted-bucket/main.tf

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ resource "aws_s3_bucket" "new_bucket" {
1414
}
1515
}
1616

17+
#tfsec:ignore:aws-s3-encryption-customer-key
1718
resource "aws_s3_bucket_server_side_encryption_configuration" "encryption_for_new_bucket" {
1819
bucket = aws_s3_bucket.new_bucket.id
1920
rule {
@@ -35,12 +36,6 @@ resource "aws_s3_bucket_policy" "sse_bucket_policy" {
3536
)
3637
}
3738

38-
# Sets S3 bucket ACL
39-
resource "aws_s3_bucket_acl" "acl_for_new_bucket" {
40-
bucket = aws_s3_bucket.new_bucket.id
41-
acl = "private"
42-
}
43-
4439
# Enabling S3 bucket public access block
4540
resource "aws_s3_bucket_public_access_block" "for_new_bucket" {
4641
bucket = aws_s3_bucket.new_bucket.id

modules/encrypted-bucket/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
terraform {
2-
required_version = ">= 0.13"
2+
required_version = ">= 1.0.0"
33
required_providers {
44
aws = {
55
source = "hashicorp/aws"

versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
terraform {
2-
required_version = ">= 0.13"
2+
required_version = ">= 1.0.0"
33
required_providers {
44
aws = {
55
source = "hashicorp/aws"

0 commit comments

Comments
 (0)