https://github.com/boltops-tools/terraspace_plugin_aws
Terraspace AWS Provider
https://github.com/boltops-tools/terraspace_plugin_aws
boltops terraform terraspace
Last synced: about 2 months ago
JSON representation
Terraspace AWS Provider
- Host: GitHub
- URL: https://github.com/boltops-tools/terraspace_plugin_aws
- Owner: boltops-tools
- License: apache-2.0
- Created: 2020-05-28T16:22:30.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2023-07-13T05:45:32.000Z (almost 2 years ago)
- Last Synced: 2024-05-01T11:29:05.283Z (about 1 year ago)
- Topics: boltops, terraform, terraspace
- Language: Ruby
- Homepage:
- Size: 107 KB
- Stars: 1
- Watchers: 4
- Forks: 4
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE.txt
Awesome Lists containing this project
README
# Terraspace AWS Plugin
[](https://www.boltops.com)
AWS Cloud support for terraspace.
## Installation
Add this line to your application's Gemfile:
```ruby
gem 'terraspace_plugin_aws'
```## Configure
Terraspace Docs: [AWS Terraspace Plugin](https://terraspace.cloud/docs/plugins/aws/)
Optionally configure the plugin. Here's an example `aws.rb` for your terraspace project.
config/plugins/aws.rb
```ruby
TerraspacePluginAws.configure do |config|
config.auto_create = true # set to false to completely disable auto creationconfig.s3.encryption = true
config.s3.enforce_ssl = true
config.s3.versioning = true
config.s3.lifecycle = true
config.s3.access_logging = false # false by default
config.s3.secure_existing = false # run the security controls on existing buckets. by default, only run on newly created bucket the first timeconfig.dynamodb.encryption = true
config.dynamodb.kms_master_key_id = nil
config.dynamodb.sse_type = "KMS"
end
```By default:
* S3 Buckets are secured with [encryption](https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html), have an [enforce ssl bucket policy](https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-policy-for-config-rule/), have [versioning enabled](https://docs.aws.amazon.com/AmazonS3/latest/dev/Versioning.html), has a [lifecycle policy](https://docs.aws.amazon.com/AmazonS3/latest/user-guide/create-lifecycle.html), and have [bucket server access logging enabled](https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html).
* DynamoDB tables have [encryption enabled](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/EncryptionAtRest.html) using the AWS Managed KMS Key for DynamoDB.The settings generally only apply if the s3 bucket or dynamodb table do not yet exist yet and is created for the first time.
If using `kms_master_key_id` it must already exist.
## Contributing
Bug reports and pull requests are welcome on GitHub at https://github.com/boltops-tools/terraspace_plugin_aws.