init S3 backend

This commit is contained in:
matthieu42morin 2024-03-02 14:39:26 +01:00
parent 949356cf4c
commit 1915f7cfb5
5 changed files with 34 additions and 10 deletions

3
.gitignore vendored
View File

@ -6,6 +6,9 @@
*.tfstate
*.tfstate.*
# Backend config public ignore
backend.hcl
# Crash log files
crash.log
crash.*.log

25
.terraform.lock.hcl Normal file
View File

@ -0,0 +1,25 @@
# This file is maintained automatically by "terraform init".
# Manual edits may be lost in future updates.
provider "registry.terraform.io/hashicorp/aws" {
version = "5.39.0"
constraints = ">= 4.0.0"
hashes = [
"h1:isoOv/JipnnPD3j8Df6XwGU1i4egjlygrgBv0RfsZ7g=",
"zh:01e405306470ed784bc9d38dbaeff394bd2c0f7d58e5592c5d0165c87d84e4b0",
"zh:0328fbd42a91e50601318d2c364a80ebd3b4e5755c85df6fafd2fed80bc54598",
"zh:042420e08d1ef1e2ed51c394539a6db27e031bedb9eaa19db9ccaf9fa93b9b36",
"zh:47dee460b2c06676e16f5070fff71e5e9eb24b74bcd7b4f7b53eea8ebd3c972f",
"zh:49c34f21a05bf5150e3a0a87c997fcd831ae81e3f2df86191e2fdd231525b585",
"zh:4d5a98726216e260296bdc13e562179a743ef4738b65154da697c2d9e9eb5c9b",
"zh:7fb08af13c868d8d20519b373eeb6707a0cea078495123e28e71727993474f53",
"zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425",
"zh:a57e7e44f79991e55be02f2b147a433b5a2690188be0510409b79e9b00e37009",
"zh:aeeb120cd6245f67ae3e52e13005c2dc1f091787564dd6b39ee6c05b2c239c53",
"zh:b5d39c6e55d0355f9fd93a802355166bd27edaf9acb753b190562474447674b2",
"zh:cfcc1922b380db5f90fd5ffc1e49fb9f316e6c41de4603f65b05d20ace72e15e",
"zh:d221d8cea09229743d2647944c0420a8e9e5d7e3ff088b30cbce85a8b051dcab",
"zh:dccca0239df6d39686b0f0947040b3c0e1270a4bab268c402b742cf5a7759296",
"zh:ef0564fb70e8210db9bf472f662e093a1a1f204a1c1cb46467231be1a78882f3",
]
}

View File

@ -1,2 +1,5 @@
# terraform-s3-remote-state
A gruntwork.io implementation of a Terraform remote state backend using S3 for state file storage and DynamoDB for locking.
See more [here](https://blog.gruntwork.io/how-to-manage-terraform-state-28f5697e68fa)

View File

@ -1,10 +1,8 @@
terraform {
backend "s3" {
bucket = "omnicognate-terraform-state"
# PROVIDE THIS KEY ... FILE ISOLATION
key = "global/s3/terraform.tfstate"
region = "eu-north-1"
dynamodb_table = "omnicognate-terraform-locks"
encrypt = true
# PROVIDE THIS KEY ... FILE ISOLATION
}
required_version = ">= 1.0.0"
required_providers {

View File

@ -1,5 +0,0 @@
# === user vars ===
role_arn = ""
# === required core vars ===
aws_region = "eu-north-1"