Skip to content

Commit

Permalink
fix: update s3 module version and change default attach deny insecure…
Browse files Browse the repository at this point in the history
… to `true`
  • Loading branch information
bryantbiggs committed Nov 3, 2021
1 parent eab8af4 commit 02265da
Show file tree
Hide file tree
Showing 6 changed files with 14 additions and 14 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
| <a name="input_api_vpce_security_group_ids"></a> [api\_vpce\_security\_group\_ids](#input\_api\_vpce\_security\_group\_ids) | IDs of security groups to attach to API endpoint | `list(string)` | `[]` | no |
| <a name="input_api_vpce_subnet_ids"></a> [api\_vpce\_subnet\_ids](#input\_api\_vpce\_subnet\_ids) | IDs of subnets to associate with API endpoint | `list(string)` | `[]` | no |
| <a name="input_api_vpce_tags"></a> [api\_vpce\_tags](#input\_api\_vpce\_tags) | A map of tags to apply to the API endpoint | `map(string)` | `{}` | no |
| <a name="input_bucket_attach_deny_insecure_transport_policy"></a> [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy) | Controls if S3 bucket should have deny non-SSL transport policy attacheds | `bool` | `false` | no |
| <a name="input_bucket_attach_deny_insecure_transport_policy"></a> [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy) | Controls if S3 bucket should have deny non-SSL transport policy attacheds | `bool` | `true` | no |
| <a name="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name) | Lambda artifact S3 bucket name | `string` | `""` | no |
| <a name="input_create_agent_vpce"></a> [create\_agent\_vpce](#input\_create\_agent\_vpce) | Controls whether an agent endpoint should be created | `bool` | `false` | no |
| <a name="input_create_api_vpce"></a> [create\_api\_vpce](#input\_create\_api\_vpce) | Controls whether a API endpoint should be created | `bool` | `false` | no |
Expand Down
10 changes: 5 additions & 5 deletions examples/complete/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,11 +38,11 @@ Note that this example may create resources which will incur monetary charges on
| Name | Source | Version |
|------|--------|---------|
| <a name="module_default"></a> [default](#module\_default) | ../../ | n/a |
| <a name="module_log_bucket_1"></a> [log\_bucket\_1](#module\_log\_bucket\_1) | terraform-aws-modules/s3-bucket/aws | ~> 2 |
| <a name="module_log_bucket_2"></a> [log\_bucket\_2](#module\_log\_bucket\_2) | terraform-aws-modules/s3-bucket/aws | ~> 2 |
| <a name="module_security_group"></a> [security\_group](#module\_security\_group) | terraform-aws-modules/security-group/aws | ~> 4 |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3 |
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.2 |
| <a name="module_log_bucket_1"></a> [log\_bucket\_1](#module\_log\_bucket\_1) | terraform-aws-modules/s3-bucket/aws | ~> 2.0 |
| <a name="module_log_bucket_2"></a> [log\_bucket\_2](#module\_log\_bucket\_2) | terraform-aws-modules/s3-bucket/aws | ~> 2.0 |
| <a name="module_security_group"></a> [security\_group](#module\_security\_group) | terraform-aws-modules/security-group/aws | ~> 4.0 |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.0 |

## Resources

Expand Down
10 changes: 5 additions & 5 deletions examples/complete/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ resource "aws_kms_alias" "datadog" {

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 3"
version = "~> 3.0"

name = local.name
cidr = "10.0.0.0/16"
Expand Down Expand Up @@ -98,7 +98,7 @@ module "vpc" {

module "vpc_endpoints" {
source = "terraform-aws-modules/vpc/aws//modules/vpc-endpoints"
version = "~> 3.2"
version = "~> 3.0"

vpc_id = module.vpc.vpc_id
security_group_ids = [module.security_group.security_group_id]
Expand All @@ -119,7 +119,7 @@ module "vpc_endpoints" {

module "security_group" {
source = "terraform-aws-modules/security-group/aws"
version = "~> 4"
version = "~> 4.0"

name = local.name
description = "Example security group"
Expand Down Expand Up @@ -150,7 +150,7 @@ module "security_group" {

module "log_bucket_1" {
source = "terraform-aws-modules/s3-bucket/aws"
version = "~> 2"
version = "~> 2.0"

bucket = "logs-1-${random_pet.this.id}"
force_destroy = true
Expand All @@ -177,7 +177,7 @@ module "log_bucket_1" {

module "log_bucket_2" {
source = "terraform-aws-modules/s3-bucket/aws"
version = "~> 2"
version = "~> 2.0"

bucket = "logs-2-${random_pet.this.id}"
force_destroy = true
Expand Down
2 changes: 1 addition & 1 deletion modules/log_forwarder/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ module "datadog_log_forwarder" {

| Name | Source | Version |
|------|--------|---------|
| <a name="module_this_s3_bucket"></a> [this\_s3\_bucket](#module\_this\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | v2.6.0 |
| <a name="module_this_s3_bucket"></a> [this\_s3\_bucket](#module\_this\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | v2.10.0 |

## Resources

Expand Down
2 changes: 1 addition & 1 deletion modules/log_forwarder/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ data "aws_region" "current" {}

module "this_s3_bucket" {
source = "terraform-aws-modules/s3-bucket/aws"
version = "v2.6.0"
version = "v2.10.0"

create_bucket = var.create && var.create_bucket
bucket = local.bucket_name
Expand Down
2 changes: 1 addition & 1 deletion variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ variable "bucket_name" {
variable "bucket_attach_deny_insecure_transport_policy" {
description = "Controls if S3 bucket should have deny non-SSL transport policy attacheds"
type = bool
default = false
default = true
}

# Log Forwarder S3 Objcet
Expand Down

0 comments on commit 02265da

Please sign in to comment.