s3.tf 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. # # TO BE IMPLEMENTED AT A LATER DATE!
  2. # resource "aws_s3_bucket" "bucket" {
  3. # bucket = "xdr-portal-lambda-${var.environment}"
  4. # force_destroy = true
  5. # acl = "private"
  6. # server_side_encryption_configuration {
  7. # rule {
  8. # apply_server_side_encryption_by_default {
  9. # kms_master_key_id = aws_kms_key.key.arn
  10. # sse_algorithm = "aws:kms"
  11. # }
  12. # }
  13. # }
  14. # }
  15. # resource "aws_s3_bucket_public_access_block" "public_access_block" {
  16. # bucket = aws_s3_bucket.bucket.id
  17. # block_public_acls = true
  18. # block_public_policy = true
  19. # ignore_public_acls = true
  20. # restrict_public_buckets = true
  21. # # Not technically dependent, but prevents a "Conflicting conditional operation" conflict.
  22. # # See https://github.com/hashicorp/terraform-provider-aws/issues/7628
  23. # depends_on = [aws_s3_bucket_policy.policy]
  24. # }
  25. # resource "aws_s3_bucket_policy" "policy" {
  26. # bucket = aws_s3_bucket.bucket.id
  27. # policy = data.aws_iam_policy_document.policy_document.json
  28. # }
  29. # data "aws_iam_policy_document" "policy_document" {
  30. # statement {
  31. # sid = "AllowS3Access"
  32. # actions = [ "s3:GetObject", "s3:GetObjectVersion" ]
  33. # effect = "Allow"
  34. # resources = [
  35. # "${aws_s3_bucket.bucket.arn}",
  36. # "${aws_s3_bucket.bucket.arn}/*"
  37. # ]
  38. # principals {
  39. # type = "AWS"
  40. # identifiers = [ "arn:${var.aws_partition}:iam::${var.aws_account_id}:root" ]
  41. # }
  42. # }
  43. # }
  44. # resource "aws_kms_key" "key" {
  45. # description = "Encryption of S3 code for portal-scheduler"
  46. # policy = data.aws_iam_policy_document.kms_policy_document.json
  47. # enable_key_rotation = true
  48. # tags = merge(var.standard_tags, var.tags)
  49. # }
  50. # data "aws_iam_policy_document" "kms_policy_document" {
  51. # statement {
  52. # sid = "AllowServices"
  53. # effect = "Allow"
  54. # principals {
  55. # type = "AWS"
  56. # identifiers = [
  57. # "arn:${var.aws_partition}:iam::${var.aws_account_id}:role/user/mdr_terraformer",
  58. # "arn:${var.aws_partition}:iam::${var.aws_account_id}:user/MDRAdmin"
  59. # ]
  60. # }
  61. # actions = [ "kms:*" ]
  62. # resources = [ "*" ]
  63. # }
  64. # # allow account to modify/manage key
  65. # statement {
  66. # sid = "AllowThisAccount"
  67. # effect = "Allow"
  68. # principals {
  69. # identifiers = ["arn:${var.aws_partition}:iam::${var.aws_account_id}:root"]
  70. # type = "AWS"
  71. # }
  72. # actions = [
  73. # "kms:*"
  74. # ]
  75. # resources = ["*"]
  76. # }
  77. # }
  78. # resource "aws_kms_alias" "key_alias" {
  79. # name = "alias/portal-s3-key"
  80. # target_key_id = aws_kms_key.key.key_id
  81. # }