From fd93e04a8d4977a8f51f45b81a92f2897ccfbda6 Mon Sep 17 00:00:00 2001 From: Zachary Hill Date: Mon, 10 Apr 2023 10:59:14 -0400 Subject: [PATCH] removed legacy s3 modules which have been replaced by better s3/bucket code --- modules/aws/s3/s3_legacy/README.md | 88 -------------- modules/aws/s3/s3_legacy/main.tf | 40 ------ modules/aws/s3/s3_legacy/outputs.tf | 27 ----- modules/aws/s3/s3_legacy/variables.tf | 57 --------- modules/aws/s3/s3_with_transition/README.md | 96 --------------- modules/aws/s3/s3_with_transition/main.tf | 70 ----------- modules/aws/s3/s3_with_transition/outputs.tf | 27 ----- .../aws/s3/s3_with_transition/variables.tf | 114 ------------------ 8 files changed, 519 deletions(-) delete mode 100644 modules/aws/s3/s3_legacy/README.md delete mode 100644 modules/aws/s3/s3_legacy/main.tf delete mode 100644 modules/aws/s3/s3_legacy/outputs.tf delete mode 100644 modules/aws/s3/s3_legacy/variables.tf delete mode 100644 modules/aws/s3/s3_with_transition/README.md delete mode 100644 modules/aws/s3/s3_with_transition/main.tf delete mode 100644 modules/aws/s3/s3_with_transition/outputs.tf delete mode 100644 modules/aws/s3/s3_with_transition/variables.tf diff --git a/modules/aws/s3/s3_legacy/README.md b/modules/aws/s3/s3_legacy/README.md deleted file mode 100644 index 79d68f37..00000000 --- a/modules/aws/s3/s3_legacy/README.md +++ /dev/null @@ -1,88 +0,0 @@ -## Requirements - -| Name | Version | -|------|---------| -| terraform | >= 0.12.0 | - -## Providers - -| Name | Version | -|------|---------| -| aws | n/a | - -## Inputs - -| Name | Description | Type | Default | Required | -|------|-------------|------|---------|:--------:| -| acl | (Optional) The canned ACL to apply. Defaults to private. | `string` | `"private"` | no | -| bucket | (Required) The ARN of the S3 bucket where you want Amazon S3 to store replicas of the object identified by the rule. | `any` | n/a | yes | -| kms\_master\_key\_id | (optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. | `string` | `""` | no | -| mfa\_delete | (Optional) Enable MFA delete for either Change the versioning state of your bucket or Permanently delete an object version. Default is false. | `bool` | `false` | no | -| policy | (Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. | `string` | `""` | no | -| region | (Optional) If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee. | `any` | n/a | yes | -| sse\_algorithm | (required) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms | `string` | `"aws:kms"` | no | -| tags | (Optional) A mapping of tags to assign to the bucket. | `map` |
{
"created_by": "Zachary Hill",
"environment": "prod",
"terraform": "true"
}
| no | -| target\_bucket | (Required) The name of the bucket that will receive the log objects. | `string` | `""` | no | -| target\_prefix | (Optional) To specify a key prefix for log objects. | `string` | `"log/"` | no | -| versioning | (Optional) A state of versioning (documented below) | `bool` | `true` | no | - -## Outputs - -| Name | Description | -|------|-------------| -| s3\_bucket\_arn | n/a | -| s3\_bucket\_domain\_name | n/a | -| s3\_bucket\_id | n/a | -| s3\_bucket\_region | n/a | -| s3\_hosted\_zone\_id | n/a | - -## Requirements - -| Name | Version | -|------|---------| -| [terraform](#requirement\_terraform) | >= 1.0.0 | -| [aws](#requirement\_aws) | >= 4.0.0 | - -## Providers - -| Name | Version | -|------|---------| -| [aws](#provider\_aws) | >= 4.0.0 | - -## Modules - -No modules. - -## Resources - -| Name | Type | -|------|------| -| [aws_s3_bucket.s3_bucket](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket) | resource | - -## Inputs - -| Name | Description | Type | Default | Required | -|------|-------------|------|---------|:--------:| -| [acl](#input\_acl) | (Optional) The canned ACL to apply. Defaults to private. | `string` | `"private"` | no | -| [bucket](#input\_bucket) | (Required) The ARN of the S3 bucket where you want Amazon S3 to store replicas of the object identified by the rule. | `any` | n/a | yes | -| [kms\_master\_key\_id](#input\_kms\_master\_key\_id) | (optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. | `string` | `""` | no | -| [mfa\_delete](#input\_mfa\_delete) | (Optional) Enable MFA delete for either Change the versioning state of your bucket or Permanently delete an object version. Default is false. | `bool` | `false` | no | -| [policy](#input\_policy) | (Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. | `string` | `""` | no | -| [sse\_algorithm](#input\_sse\_algorithm) | (required) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms | `string` | `"aws:kms"` | no | -| [tags](#input\_tags) | (Optional) A mapping of tags to assign to the bucket. | `map(any)` |
{
"created_by": "Zachary Hill",
"environment": "prod",
"terraform": "true"
}
| no | -| [target\_bucket](#input\_target\_bucket) | (Required) The name of the bucket that will receive the log objects. | `string` | `""` | no | -| [target\_prefix](#input\_target\_prefix) | (Optional) To specify a key prefix for log objects. | `string` | `"log/"` | no | -| [versioning](#input\_versioning) | (Optional) A state of versioning (documented below) | `bool` | `true` | no | - -## Outputs - -| Name | Description | -|------|-------------| -| [s3\_bucket\_arn](#output\_s3\_bucket\_arn) | n/a | -| [s3\_bucket\_domain\_name](#output\_s3\_bucket\_domain\_name) | n/a | -| [s3\_bucket\_id](#output\_s3\_bucket\_id) | n/a | -| [s3\_bucket\_region](#output\_s3\_bucket\_region) | n/a | -| [s3\_hosted\_zone\_id](#output\_s3\_hosted\_zone\_id) | n/a | -| [website\_domain](#output\_website\_domain) | n/a | -| [website\_endpoint](#output\_website\_endpoint) | n/a | - \ No newline at end of file diff --git a/modules/aws/s3/s3_legacy/main.tf b/modules/aws/s3/s3_legacy/main.tf deleted file mode 100644 index 2739cbf4..00000000 --- a/modules/aws/s3/s3_legacy/main.tf +++ /dev/null @@ -1,40 +0,0 @@ -terraform { - required_version = ">= 1.0.0" - required_providers { - aws = { - source = "hashicorp/aws" - version = ">= 4.0.0" - } - } -} - -resource "aws_s3_bucket" "s3_bucket" { - acl = var.acl - bucket = var.bucket - policy = var.policy - - /*logging { - target_bucket = var.target_bucket - target_prefix = var.target_prefix - }*/ - - versioning { - enabled = var.versioning - mfa_delete = var.mfa_delete - } - - lifecycle { - prevent_destroy = true - } - - server_side_encryption_configuration { - rule { - apply_server_side_encryption_by_default { - kms_master_key_id = var.kms_master_key_id - sse_algorithm = var.sse_algorithm - } - } - } - - tags = var.tags -} diff --git a/modules/aws/s3/s3_legacy/outputs.tf b/modules/aws/s3/s3_legacy/outputs.tf deleted file mode 100644 index 115d4166..00000000 --- a/modules/aws/s3/s3_legacy/outputs.tf +++ /dev/null @@ -1,27 +0,0 @@ -output "s3_bucket_id" { - value = aws_s3_bucket.this.id -} - -output "s3_bucket_arn" { - value = aws_s3_bucket.this.arn -} - -output "s3_bucket_domain_name" { - value = aws_s3_bucket.this.bucket_domain_name -} - -output "s3_hosted_zone_id" { - value = aws_s3_bucket.this.hosted_zone_id -} - -output "s3_bucket_region" { - value = aws_s3_bucket.this.region -} - -output "website_endpoint" { - value = aws_s3_bucket_website_configuration.this.website_endpoint -} - -output "website_domain" { - value = aws_s3_bucket_website_configuration.this.website_domain -} diff --git a/modules/aws/s3/s3_legacy/variables.tf b/modules/aws/s3/s3_legacy/variables.tf deleted file mode 100644 index c91201e8..00000000 --- a/modules/aws/s3/s3_legacy/variables.tf +++ /dev/null @@ -1,57 +0,0 @@ -variable "acl" { - description = "(Optional) The canned ACL to apply. Defaults to private." - default = "private" -} - -variable "bucket" { - description = "(Required) The ARN of the S3 bucket where you want Amazon S3 to store replicas of the object identified by the rule." -} - -variable "kms_master_key_id" { - type = string - description = "(optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse_algorithm is aws:kms." - default = "" -} - -variable "policy" { - description = "(Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy." - default = "" -} - -variable "sse_algorithm" { - type = string - description = "(required) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms" - default = "aws:kms" -} - -variable "tags" { - type = map(any) - description = "(Optional) A mapping of tags to assign to the bucket." - default = { - created_by = "Zachary Hill" - environment = "prod" - terraform = "true" - } -} - -variable "target_bucket" { - type = string - description = "(Required) The name of the bucket that will receive the log objects." - default = "" -} - -variable "target_prefix" { - type = string - description = "(Optional) To specify a key prefix for log objects." - default = "log/" -} - -variable "versioning" { - description = "(Optional) A state of versioning (documented below)" - default = true -} - -variable "mfa_delete" { - description = "(Optional) Enable MFA delete for either Change the versioning state of your bucket or Permanently delete an object version. Default is false." - default = false -} diff --git a/modules/aws/s3/s3_with_transition/README.md b/modules/aws/s3/s3_with_transition/README.md deleted file mode 100644 index 69314181..00000000 --- a/modules/aws/s3/s3_with_transition/README.md +++ /dev/null @@ -1,96 +0,0 @@ -## Requirements - -| Name | Version | -|------|---------| -| terraform | >= 0.12.0 | - -## Providers - -| Name | Version | -|------|---------| -| aws | n/a | - -## Inputs - -| Name | Description | Type | Default | Required | -|------|-------------|------|---------|:--------:| -| acl | (Optional) The canned ACL to apply. Defaults to private. | `string` | `"private"` | no | -| bucket\_prefix | (Optional, Forces new resource) Creates a unique bucket name beginning with the specified prefix. Conflicts with bucket. | `any` | n/a | yes | -| kms\_master\_key\_id | (optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. | `string` | `""` | no | -| mfa\_delete | (Optional) Enable MFA delete for either Change the versioning state of your bucket or Permanently delete an object version. Default is false. | `bool` | `false` | no | -| policy | (Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. | `string` | `""` | no | -| region | (Optional) If specified, the AWS region this bucket should reside in. Otherwise, the region used by the callee. | `any` | n/a | yes | -| sse\_algorithm | (required) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms | `string` | `"aws:kms"` | no | -| tags | (Optional) A mapping of tags to assign to the bucket. | `map` |
{
"created_by": "Zachary Hill",
"environment": "prod",
"terraform": "true"
}
| no | -| target\_bucket | (Required) The name of the bucket that will receive the log objects. | `string` | `""` | no | -| target\_prefix | (Optional) To specify a key prefix for log objects. | `string` | `"log/"` | no | -| versioning | (Optional) A state of versioning (documented below) | `bool` | `true` | no | -| days | (required) Specifies the number of days after object creation when it will be moved to another storage class. Each class is defined independently in variables.tf | `number` | `defined in vars` | yes | -| enabled | (required) Specifies the number of days after object creation when it will be moved to another storage class. Each class is defined independently in variables.tf | `bool` | `true` | yes | -## Outputs - -| Name | Description | -|------|-------------| -| s3\_bucket\_arn | n/a | -| s3\_bucket\_domain\_name | n/a | -| s3\_bucket\_id | n/a | -| s3\_bucket\_region | n/a | -| s3\_hosted\_zone\_id | n/a | - -## Requirements - -| Name | Version | -|------|---------| -| [terraform](#requirement\_terraform) | >= 1.0.0 | -| [aws](#requirement\_aws) | >= 4.0.0 | - -## Providers - -| Name | Version | -|------|---------| -| [aws](#provider\_aws) | >= 4.0.0 | - -## Modules - -No modules. - -## Resources - -| Name | Type | -|------|------| -| [aws_s3_bucket.s3_bucket](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket) | resource | - -## Inputs - -| Name | Description | Type | Default | Required | -|------|-------------|------|---------|:--------:| -| [acl](#input\_acl) | (Optional) The canned ACL to apply. Defaults to private. | `string` | `"private"` | no | -| [bucket\_prefix](#input\_bucket\_prefix) | (Optional, Forces new resource) Creates a unique bucket name beginning with the specified prefix. Conflicts with bucket. | `any` | n/a | yes | -| [kms\_master\_key\_id](#input\_kms\_master\_key\_id) | (optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. | `string` | `""` | no | -| [lifecycle\_days\_to\_deep\_archive\_transition](#input\_lifecycle\_days\_to\_deep\_archive\_transition) | Specifies the number of days after object creation when it will be moved to Glacier storage. | `number` | `120` | no | -| [lifecycle\_days\_to\_glacier\_transition](#input\_lifecycle\_days\_to\_glacier\_transition) | Specifies the number of days after object creation when it will be moved to Glacier storage. | `number` | `90` | no | -| [lifecycle\_days\_to\_infrequent\_storage\_transition](#input\_lifecycle\_days\_to\_infrequent\_storage\_transition) | Specifies the number of days after object creation when it will be moved to standard infrequent access storage. | `number` | `30` | no | -| [lifecycle\_deep\_archive\_object\_prefix](#input\_lifecycle\_deep\_archive\_object\_prefix) | Object key prefix identifying one or more objects to which the lifecycle rule applies. | `string` | `""` | no | -| [lifecycle\_deep\_archive\_transition\_enabled](#input\_lifecycle\_deep\_archive\_transition\_enabled) | Specifies Deep Archive transition lifecycle rule status. | `bool` | `true` | no | -| [lifecycle\_glacier\_object\_prefix](#input\_lifecycle\_glacier\_object\_prefix) | Object key prefix identifying one or more objects to which the lifecycle rule applies. | `string` | `""` | no | -| [lifecycle\_glacier\_transition\_enabled](#input\_lifecycle\_glacier\_transition\_enabled) | Specifies Glacier transition lifecycle rule status. | `bool` | `true` | no | -| [lifecycle\_infrequent\_storage\_object\_prefix](#input\_lifecycle\_infrequent\_storage\_object\_prefix) | Object key prefix identifying one or more objects to which the lifecycle rule applies. | `string` | `""` | no | -| [lifecycle\_infrequent\_storage\_transition\_enabled](#input\_lifecycle\_infrequent\_storage\_transition\_enabled) | Specifies infrequent storage transition lifecycle rule status. | `bool` | `true` | no | -| [mfa\_delete](#input\_mfa\_delete) | (Optional) Enable MFA delete for either Change the versioning state of your bucket or Permanently delete an object version. Default is false. | `bool` | `false` | no | -| [policy](#input\_policy) | (Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. | `string` | `""` | no | -| [sse\_algorithm](#input\_sse\_algorithm) | (required) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms | `string` | `"aws:kms"` | no | -| [tags](#input\_tags) | (Optional) A mapping of tags to assign to the bucket. | `map(any)` |
{
"created_by": "Zachary Hill",
"environment": "prod",
"terraform": "true"
}
| no | -| [target\_bucket](#input\_target\_bucket) | (Required) The name of the bucket that will receive the log objects. | `string` | `""` | no | -| [target\_prefix](#input\_target\_prefix) | (Optional) To specify a key prefix for log objects. | `string` | `"log/"` | no | -| [versioning](#input\_versioning) | (Optional) A state of versioning (documented below) | `bool` | `true` | no | - -## Outputs - -| Name | Description | -|------|-------------| -| [s3\_bucket\_arn](#output\_s3\_bucket\_arn) | n/a | -| [s3\_bucket\_domain\_name](#output\_s3\_bucket\_domain\_name) | n/a | -| [s3\_bucket\_id](#output\_s3\_bucket\_id) | n/a | -| [s3\_bucket\_region](#output\_s3\_bucket\_region) | n/a | -| [s3\_hosted\_zone\_id](#output\_s3\_hosted\_zone\_id) | n/a | - \ No newline at end of file diff --git a/modules/aws/s3/s3_with_transition/main.tf b/modules/aws/s3/s3_with_transition/main.tf deleted file mode 100644 index ebd5cac0..00000000 --- a/modules/aws/s3/s3_with_transition/main.tf +++ /dev/null @@ -1,70 +0,0 @@ -terraform { - required_version = ">= 1.0.0" - required_providers { - aws = { - source = "hashicorp/aws" - version = ">= 4.0.0" - } - } -} - -resource "aws_s3_bucket" "s3_bucket" { - acl = var.acl - bucket_prefix = var.bucket_prefix - policy = var.policy - - /*logging { - target_bucket = var.target_bucket - target_prefix = var.target_prefix - }*/ - - versioning { - enabled = var.versioning - mfa_delete = var.mfa_delete - } - - lifecycle { - prevent_destroy = true - } - - lifecycle_rule { - id = "transition-to-infrequent-access-storage" - enabled = var.lifecycle_infrequent_storage_transition_enabled - prefix = var.lifecycle_infrequent_storage_object_prefix - transition { - days = var.lifecycle_days_to_infrequent_storage_transition - storage_class = "STANDARD_IA" - } - } - - lifecycle_rule { - id = "transition-to-glacier" - enabled = var.lifecycle_glacier_transition_enabled - prefix = var.lifecycle_glacier_object_prefix - transition { - days = var.lifecycle_days_to_glacier_transition - storage_class = "GLACIER" - } - } - - lifecycle_rule { - id = "transition-to-deep-archive" - enabled = var.lifecycle_deep_archive_transition_enabled - prefix = var.lifecycle_deep_archive_object_prefix - transition { - days = var.lifecycle_days_to_deep_archive_transition - storage_class = "DEEP_ARCHIVE" - } - } - - server_side_encryption_configuration { - rule { - apply_server_side_encryption_by_default { - kms_master_key_id = var.kms_master_key_id - sse_algorithm = var.sse_algorithm - } - } - } - - tags = var.tags -} diff --git a/modules/aws/s3/s3_with_transition/outputs.tf b/modules/aws/s3/s3_with_transition/outputs.tf deleted file mode 100644 index df66d1e1..00000000 --- a/modules/aws/s3/s3_with_transition/outputs.tf +++ /dev/null @@ -1,27 +0,0 @@ -output "s3_bucket_id" { - value = aws_s3_bucket.s3_bucket.id -} - -output "s3_bucket_arn" { - value = aws_s3_bucket.s3_bucket.arn -} - -output "s3_bucket_domain_name" { - value = aws_s3_bucket.s3_bucket.bucket_domain_name -} - -output "s3_hosted_zone_id" { - value = aws_s3_bucket.s3_bucket.hosted_zone_id -} - -output "s3_bucket_region" { - value = aws_s3_bucket.s3_bucket.region -} - -/*output "s3_bucket_website_endpoint" { - value = aws_s3_bucket.s3_bucket.website_endpoint -} - -output "s3_bucket_website_domain" { - value = aws_s3_bucket.s3_bucket.website_domain -}*/ diff --git a/modules/aws/s3/s3_with_transition/variables.tf b/modules/aws/s3/s3_with_transition/variables.tf deleted file mode 100644 index a8650f24..00000000 --- a/modules/aws/s3/s3_with_transition/variables.tf +++ /dev/null @@ -1,114 +0,0 @@ -variable "acl" { - description = "(Optional) The canned ACL to apply. Defaults to private." - default = "private" -} - -variable "bucket_prefix" { - description = "(Optional, Forces new resource) Creates a unique bucket name beginning with the specified prefix. Conflicts with bucket." -} - -variable "kms_master_key_id" { - type = string - description = "(optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse_algorithm is aws:kms." - default = "" -} - -variable "policy" { - description = "(Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy." - default = "" -} - -variable "sse_algorithm" { - type = string - description = "(required) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms" - default = "aws:kms" -} - -variable "tags" { - type = map(any) - description = "(Optional) A mapping of tags to assign to the bucket." - default = { - created_by = "Zachary Hill" - environment = "prod" - terraform = "true" - } -} - -variable "target_bucket" { - type = string - description = "(Required) The name of the bucket that will receive the log objects." - default = "" -} - -variable "target_prefix" { - type = string - description = "(Optional) To specify a key prefix for log objects." - default = "log/" -} - -variable "versioning" { - description = "(Optional) A state of versioning (documented below)" - default = true -} - -variable "mfa_delete" { - description = "(Optional) Enable MFA delete for either Change the versioning state of your bucket or Permanently delete an object version. Default is false." - default = false -} - -variable "lifecycle_infrequent_storage_transition_enabled" { - type = bool - default = true - description = "Specifies infrequent storage transition lifecycle rule status." -} - -variable "lifecycle_infrequent_storage_object_prefix" { - type = string - default = "" - description = "Object key prefix identifying one or more objects to which the lifecycle rule applies." - #sensitive = true -} - -variable "lifecycle_days_to_infrequent_storage_transition" { - type = number - default = 30 - description = "Specifies the number of days after object creation when it will be moved to standard infrequent access storage." -} - -variable "lifecycle_glacier_transition_enabled" { - type = bool - default = true - description = "Specifies Glacier transition lifecycle rule status." -} - -variable "lifecycle_glacier_object_prefix" { - type = string - default = "" - description = "Object key prefix identifying one or more objects to which the lifecycle rule applies." - #sensitive = true -} - -variable "lifecycle_days_to_glacier_transition" { - type = number - default = 90 - description = "Specifies the number of days after object creation when it will be moved to Glacier storage." -} - -variable "lifecycle_deep_archive_transition_enabled" { - type = bool - default = true - description = "Specifies Deep Archive transition lifecycle rule status." -} - -variable "lifecycle_deep_archive_object_prefix" { - type = string - default = "" - description = "Object key prefix identifying one or more objects to which the lifecycle rule applies." - #sensitive = true -} - -variable "lifecycle_days_to_deep_archive_transition" { - type = number - default = 120 - description = "Specifies the number of days after object creation when it will be moved to Glacier storage." -} \ No newline at end of file