Skip to content

Commit 279b7cd

Browse files
authored
Merge pull request #9 from geekcell/rewrite-module-parts
feat: version 2 release
2 parents 2c2ea79 + dbb6b95 commit 279b7cd

19 files changed

+746
-221
lines changed

.editorconfig

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ end_of_line = lf
88
indent_size = 2
99
indent_style = space
1010
insert_final_newline = true
11-
max_line_length = 80
11+
max_line_length = 120
1212
trim_trailing_whitespace = true
1313

1414
[*.md]

.github/workflows/test.yaml

+57
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
###############
3+
## Run tests ##
4+
###############
5+
6+
#
7+
# Documentation:
8+
# https://help.github.com/en/articles/workflow-syntax-for-github-actions
9+
#
10+
11+
name: Test
12+
on:
13+
pull_request:
14+
push:
15+
branches: [ main ]
16+
17+
##########################
18+
# Prevent duplicate jobs #
19+
##########################
20+
concurrency:
21+
group: ${{ github.repository }}
22+
cancel-in-progress: false
23+
24+
permissions:
25+
id-token: write
26+
contents: read
27+
28+
###############
29+
# Run the job #
30+
###############
31+
jobs:
32+
terraform-test:
33+
name: Terraform Test
34+
runs-on: ubuntu-latest
35+
steps:
36+
############################
37+
# Checkout the source code #
38+
############################
39+
- name: Checkout
40+
uses: actions/checkout@v3
41+
42+
#############################
43+
# Configure AWS credentials #
44+
#############################
45+
- name: Configure AWS credentials
46+
uses: aws-actions/configure-aws-credentials@v2
47+
with:
48+
role-to-assume: arn:aws:iam::${{ vars.AWS_TESTING_ACCOUNT_ID }}:role/${{ vars.AWS_TESTING_ROLE }}
49+
aws-region: ${{ vars.AWS_TESTING_REGION }}
50+
mask-aws-account-id: false
51+
52+
#############
53+
# Run tests #
54+
#############
55+
- name: Run Tests
56+
timeout-minutes: 30
57+
run: terraform init && terraform test

.pre-commit-config.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ repos:
44
hooks:
55
- id: terraform_docs
66
- id: terraform_fmt
7+
args:
8+
- --args=-recursive
79
- id: terraform_validate
810
args:
911
- --hook-config=--retry-once-with-cleanup=true

.terraform-docs.yml

+7-2
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,19 @@ content: |-
2626
# Examples
2727
### Basic Example
2828
```hcl
29-
{{ include "examples/basic-example/main.tf" }}
29+
{{ include "examples/minimal/main.tf" }}
3030
```
3131
3232
### With Rules
3333
```hcl
34-
{{ include "examples/with-rules/main.tf" }}
34+
{{ include "examples/with-predefined-rules/main.tf" }}
3535
```
3636
37+
# Predefined Rules
38+
```hcl
39+
{{ include "rules.tf" }}
40+
```
41+
3742
output:
3843
file: "README.md"
3944
mode: inject

README.md

+144-27
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
[![Release](https://github.com/geekcell/terraform-aws-backup/actions/workflows/release.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/release.yaml)
88
[![Validate](https://github.com/geekcell/terraform-aws-backup/actions/workflows/validate.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/validate.yaml)
99
[![Lint](https://github.com/geekcell/terraform-aws-backup/actions/workflows/linter.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/linter.yaml)
10+
[![Test](https://github.com/geekcell/terraform-aws-backup/actions/workflows/test.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/test.yaml)
1011

1112
### Security
1213
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-backup/general)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-backup&benchmark=INFRASTRUCTURE+SECURITY)
@@ -37,7 +38,7 @@
3738

3839
This Terraform module provides a preconfigured solution for setting up
3940
AWS Backup in your AWS account. With this module, you can easily and
40-
efficiently create and manage backup policies for your AWS resources. Our
41+
efficiently create and manage backups for your AWS resources. Our
4142
team has extensive experience working with AWS Backup and has optimized
4243
this module to provide the best possible experience for users.
4344

@@ -53,19 +54,30 @@ great choice.
5354

5455
| Name | Description | Type | Default | Required |
5556
|------|-------------|------|---------|:--------:|
56-
| <a name="input_backup_name"></a> [backup\_name](#input\_backup\_name) | The display name of a backup plan. | `string` | n/a | yes |
57-
| <a name="input_changeable_for_days"></a> [changeable\_for\_days](#input\_changeable\_for\_days) | The number of days before the lock date. If omitted creates a vault lock in governance mode, otherwise it will create a vault lock in compliance mode. | `number` | `null` | no |
57+
| <a name="input_changeable_for_days"></a> [changeable\_for\_days](#input\_changeable\_for\_days) | The number of days before the lock date. If omitted creates a vault lock in governance mode, otherwise it will create<br> a vault lock in compliance mode. When you apply this setting:<br><br> The vault will become immutable in 3 days after applying. You have 3 days of grace time to manage or delete the vault<br> lock before it becomes immutable. During this time, only those users with specific IAM permissions can make changes.<br><br> Once the vault is locked in compliance mode, it cannot be managed or deleted by anyone, even the root user or AWS.<br> The only way to deactivate the lock is to terminate the account, which will delete all the backups.<br><br> Since you cannot delete the Vault, it will be charged for backups until that date. Be careful! | `number` | `null` | no |
58+
| <a name="input_custom_rules"></a> [custom\_rules](#input\_custom\_rules) | Backup rules to add to the AWS Backup Vault. See examples for usage. | <pre>list(object({<br> name = string<br> schedule = optional(string)<br><br> start_window = optional(number)<br> completion_window = optional(number)<br><br> enable_continuous_backup = optional(bool)<br> recovery_point_tags = optional(map(string), {})<br><br> lifecycle = optional(object({<br> cold_storage_after = optional(number)<br> delete_after = optional(number)<br> }))<br><br> copy_action = optional(object({<br> destination_vault_arn = optional(string)<br> lifecycle = optional(object({<br> cold_storage_after = optional(number)<br> delete_after = optional(number)<br> }))<br> }))<br> }))</pre> | `[]` | no |
59+
| <a name="input_enable_customer_managed_kms"></a> [enable\_customer\_managed\_kms](#input\_enable\_customer\_managed\_kms) | Whether to enable customer managed KMS encryption for the backup vault. | `bool` | `false` | no |
60+
| <a name="input_enable_vault_lock"></a> [enable\_vault\_lock](#input\_enable\_vault\_lock) | Whether to enable Vault Lock for the backup vault. | `bool` | `false` | no |
61+
| <a name="input_enable_windows_vss_backup"></a> [enable\_windows\_vss\_backup](#input\_enable\_windows\_vss\_backup) | Whether to enable Windows VSS backup for the backup plan. | `bool` | `false` | no |
62+
| <a name="input_kms_key_id"></a> [kms\_key\_id](#input\_kms\_key\_id) | The ARN of the KMS Key to use to encrypt your backups. If left empty, the default AWS KMS will be used. | `string` | `null` | no |
5863
| <a name="input_max_retention_days"></a> [max\_retention\_days](#input\_max\_retention\_days) | The maximum retention period that the vault retains its recovery points. | `number` | `365` | no |
5964
| <a name="input_min_retention_days"></a> [min\_retention\_days](#input\_min\_retention\_days) | The minimum retention period that the vault retains its recovery points. | `number` | `7` | no |
60-
| <a name="input_resources"></a> [resources](#input\_resources) | An array of strings that either contain Amazon Resource Names (ARNs) or match patterns of resources to assign to a backup plan. | `list(string)` | n/a | yes |
61-
| <a name="input_rules"></a> [rules](#input\_rules) | Backup rules to add to the AWS Backup Vault. See examples for usage. | <pre>list(object({<br> name = string<br> schedule = string<br> start_window = number<br> completion_window = number<br> enable_continuous_backup = bool<br> lifecycle = map(string)<br> }))</pre> | <pre>[<br> {<br> "completion_window": 240,<br> "enable_continuous_backup": false,<br> "lifecycle": {<br> "cold_storage_after": 1,<br> "delete_after": 365<br> },<br> "name": "weekly-snapshot",<br> "schedule": "cron(0 3 ? * 2,3,4,5,6,7,1 *)",<br> "start_window": 60<br> },<br> {<br> "completion_window": 240,<br> "enable_continuous_backup": false,<br> "lifecycle": {<br> "cold_storage_after": 1,<br> "delete_after": 365<br> },<br> "name": "monthly-snapshot",<br> "schedule": "cron(0 3 1 * ? *)",<br> "start_window": 60<br> },<br> {<br> "completion_window": 240,<br> "enable_continuous_backup": false,<br> "lifecycle": {<br> "cold_storage_after": 1,<br> "delete_after": 730<br> },<br> "name": "quarterly-snapshot",<br> "schedule": "cron(0 3 1 1,4,7,10 ? *)",<br> "start_window": 60<br> },<br> {<br> "completion_window": 240,<br> "enable_continuous_backup": false,<br> "lifecycle": {<br> "cold_storage_after": 1,<br> "delete_after": 3650<br> },<br> "name": "yearly-snapshot",<br> "schedule": "cron(0 3 1 1 ? *)",<br> "start_window": 60<br> },<br> {<br> "completion_window": 240,<br> "enable_continuous_backup": true,<br> "lifecycle": {<br> "cold_storage_after": null,<br> "delete_after": 35<br> },<br> "name": "daily-snapshot",<br> "schedule": "cron(0 3 ? * * *)",<br> "start_window": 60<br> }<br>]</pre> | no |
62-
| <a name="input_service"></a> [service](#input\_service) | The service that the resource belongs to. | `string` | n/a | yes |
65+
| <a name="input_plan_name"></a> [plan\_name](#input\_plan\_name) | The display name of the backup plan. | `string` | n/a | yes |
66+
| <a name="input_predefined_rules"></a> [predefined\_rules](#input\_predefined\_rules) | A list of predefined backup rules to add to the AWS Backup Plan. See examples for usage. | `list(string)` | `[]` | no |
67+
| <a name="input_role_arn"></a> [role\_arn](#input\_role\_arn) | The ARN of the IAM role that AWS Backup uses to authenticate when restoring or backing up the target resources. If left empty, a default role will be created. | `string` | `null` | no |
68+
| <a name="input_selections"></a> [selections](#input\_selections) | An array of strings that either contain Amazon Resource Names (ARNs) or match patterns of resources to assign to a backup plan. | <pre>list(object({<br> name = string<br> role_arn = optional(string)<br><br> arns = optional(list(string))<br> tag = optional(object({<br> type = string<br> key = string<br> value = string<br> }))<br> }))</pre> | `[]` | no |
6369
| <a name="input_tags"></a> [tags](#input\_tags) | Tags to add to the AWS Backup. | `map(any)` | `{}` | no |
70+
| <a name="input_vault_force_destroy"></a> [vault\_force\_destroy](#input\_vault\_force\_destroy) | Whether to allow the backup vault to be destroyed even if it contains recovery points. | `string` | `false` | no |
6471
| <a name="input_vault_name"></a> [vault\_name](#input\_vault\_name) | Name of the backup vault to create. | `string` | n/a | yes |
6572

6673
## Outputs
6774

68-
No outputs.
75+
| Name | Description |
76+
|------|-------------|
77+
| <a name="output_backup_plan_arn"></a> [backup\_plan\_arn](#output\_backup\_plan\_arn) | The ARN of the backup plan. |
78+
| <a name="output_backup_plan_id"></a> [backup\_plan\_id](#output\_backup\_plan\_id) | The ID of the backup plan. |
79+
| <a name="output_backup_vault_arn"></a> [backup\_vault\_arn](#output\_backup\_vault\_arn) | The ARN of the backup vault. |
80+
| <a name="output_backup_vault_id"></a> [backup\_vault\_id](#output\_backup\_vault\_id) | The ID of the backup vault. |
6981

7082
## Providers
7183

@@ -75,27 +87,30 @@ No outputs.
7587

7688
## Resources
7789

78-
- resource.aws_backup_plan.main (main.tf#55)
79-
- resource.aws_backup_selection.main (main.tf#48)
80-
- resource.aws_backup_vault.main (main.tf#18)
81-
- resource.aws_backup_vault_lock_configuration.main (main.tf#25)
82-
- resource.aws_iam_role.main (main.tf#96)
83-
- resource.aws_iam_role_policy_attachment.main_backup (main.tf#103)
84-
- resource.aws_iam_role_policy_attachment.main_restore (main.tf#108)
85-
- resource.aws_iam_role_policy_attachment.s3_backup (main.tf#113)
86-
- resource.aws_iam_role_policy_attachment.s3_restore (main.tf#118)
87-
- data source.aws_iam_policy_document.main (data.tf#1)
90+
- resource.aws_backup_plan.main (main.tf#45)
91+
- resource.aws_backup_selection.main (main.tf#103)
92+
- resource.aws_backup_vault.main (main.tf#27)
93+
- resource.aws_backup_vault_lock_configuration.main (main.tf#35)
8894

8995
# Examples
9096
### Basic Example
9197
```hcl
9298
module "basic-example" {
9399
source = "../../"
94100
95-
vault_name = "main"
96-
backup_name = "rds"
97-
service = "s3"
98-
resources = ["arn:aws:s3:::my-bucket"]
101+
vault_name = "my-project"
102+
plan_name = "customer-data"
103+
104+
selections = [
105+
{
106+
name = "s3-buckets"
107+
arns = ["arn:aws:s3:::my-bucket", "arn:aws:s3:::my-other-bucket"]
108+
},
109+
{
110+
name = "db-snaps"
111+
arns = ["arn:aws:rds:us-east-2:123456789012:db:my-mysql-instance"]
112+
}
113+
]
99114
}
100115
```
101116

@@ -104,14 +119,13 @@ module "basic-example" {
104119
module "with-rules" {
105120
source = "../../"
106121
107-
vault_name = "main"
108-
backup_name = "rds"
109-
service = "s3"
110-
resources = ["arn:aws:s3:::my-bucket"]
122+
vault_name = "my-project"
123+
plan_name = "customer-data"
111124
112-
rules = [
125+
predefined_rules = ["daily-snapshot", "monthly-snapshot"]
126+
custom_rules = [
113127
{
114-
name = "weekly-snapshot"
128+
name = "my-custom-rule"
115129
schedule = "cron(0 3 ? * 2,3,4,5,6,7,1 *)"
116130
start_window = 60
117131
completion_window = 240
@@ -123,6 +137,109 @@ module "with-rules" {
123137
}
124138
}
125139
]
140+
141+
selections = [
142+
{
143+
name = "s3-buckets"
144+
arns = ["arn:aws:s3:::my-bucket", "arn:aws:s3:::my-other-bucket"]
145+
},
146+
{
147+
name = "db-snaps"
148+
arns = ["arn:aws:rds:us-east-2:123456789012:db:my-mysql-instance"]
149+
}
150+
]
151+
}
152+
```
153+
154+
# Predefined Rules
155+
```hcl
156+
locals {
157+
predefined_rules = [
158+
# At 03:00 AM UTC, daily
159+
{
160+
name = "daily-snapshot"
161+
schedule = "cron(0 3 ? * * *)"
162+
start_window = 60
163+
completion_window = 240
164+
enable_continuous_backup = true
165+
recovery_point_tags = {}
166+
167+
lifecycle = {
168+
cold_storage_after = null
169+
delete_after = 35 # 5 weeks
170+
}
171+
172+
copy_action = null
173+
},
174+
175+
# At 03:00 AM UTC, every Sunday
176+
{
177+
name = "weekly-snapshot"
178+
schedule = "cron(0 3 ? * SUN *)"
179+
start_window = 60
180+
completion_window = 240
181+
enable_continuous_backup = true
182+
recovery_point_tags = {}
183+
184+
lifecycle = {
185+
cold_storage_after = null
186+
delete_after = 183 # 6 months
187+
}
188+
189+
copy_action = null
190+
},
191+
192+
# At 03:00 AM UTC, on day 1 of the month
193+
{
194+
name = "monthly-snapshot"
195+
schedule = "cron(0 3 1 * ? *)"
196+
start_window = 60
197+
completion_window = 240
198+
enable_continuous_backup = false
199+
recovery_point_tags = {}
200+
201+
lifecycle = {
202+
cold_storage_after = 1 # day
203+
delete_after = 365 # 1 year
204+
}
205+
206+
copy_action = null
207+
},
208+
209+
# At 03:00 AM UTC, on day 1 of the month, only in January, April, July, and October
210+
{
211+
name = "quarterly-snapshot"
212+
schedule = "cron(0 3 1 1,4,7,10 ? *)"
213+
start_window = 60
214+
completion_window = 240
215+
enable_continuous_backup = false
216+
recovery_point_tags = {}
217+
218+
lifecycle = {
219+
cold_storage_after = 1 # day
220+
delete_after = 730 # 2 years
221+
}
222+
223+
copy_action = null
224+
},
225+
226+
# At 03:00 AM UTC, on day 1 of the month, only in January
227+
{
228+
name = "yearly-snapshot"
229+
schedule = "cron(0 3 1 1 ? *)"
230+
start_window = 60
231+
completion_window = 240
232+
enable_continuous_backup = false
233+
recovery_point_tags = {}
234+
235+
lifecycle = {
236+
cold_storage_after = 1 # day
237+
delete_after = 3650 # 10 years
238+
}
239+
240+
copy_action = null
241+
}
242+
]
126243
}
127244
```
128245
<!-- END_TF_DOCS -->

data.tf

-11
This file was deleted.

docs/20-badges.md

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
[![Release](https://github.com/geekcell/terraform-aws-backup/actions/workflows/release.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/release.yaml)
55
[![Validate](https://github.com/geekcell/terraform-aws-backup/actions/workflows/validate.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/validate.yaml)
66
[![Lint](https://github.com/geekcell/terraform-aws-backup/actions/workflows/linter.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/linter.yaml)
7+
[![Test](https://github.com/geekcell/terraform-aws-backup/actions/workflows/test.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-backup/actions/workflows/test.yaml)
78

89
### Security
910
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-backup/general)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-backup&benchmark=INFRASTRUCTURE+SECURITY)

examples/basic-example/main.tf

-8
This file was deleted.

examples/minimal/main.tf

+17
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
module "basic-example" {
2+
source = "../../"
3+
4+
vault_name = "my-project"
5+
plan_name = "customer-data"
6+
7+
selections = [
8+
{
9+
name = "s3-buckets"
10+
arns = ["arn:aws:s3:::my-bucket", "arn:aws:s3:::my-other-bucket"]
11+
},
12+
{
13+
name = "db-snaps"
14+
arns = ["arn:aws:rds:us-east-2:123456789012:db:my-mysql-instance"]
15+
}
16+
]
17+
}

0 commit comments

Comments
 (0)