Bucket is the Schema for the Buckets API. Provides a S3 bucket resource.
Type
CRD
Group
s3.aws.upbound.io
Version
v1beta1
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
BucketSpec defines the desired state of Bucket
No description provided.
THIS IS A BETA FIELD. It will be honored unless the Management Policies feature flag is disabled. InitProvider holds the same fields as ForProvider, with the exception of Identifier and other resource reference fields. The fields that are in InitProvider are merged into ForProvider when the resource is created. The same fields are also added to the terraform ignore_changes hook, to avoid updating them after creation. This is useful for fields that are required on creation, but we do not desire to update them after creation, for example because of an external controller is managing them, like an autoscaler.
THIS IS A BETA FIELD. It is on by default but can be opted out through a Crossplane feature flag. ManagementPolicies specify the array of actions Crossplane is allowed to take on the managed and external resources. This field is planned to replace the DeletionPolicy field in a future release. Currently, both could be set independently and non-default values would be honored if the feature flag is enabled. If both are custom, the DeletionPolicy field will be ignored. See the design doc for more information: https://github.com/crossplane/crossplane/blob/499895a25d1a1a0ba1604944ef98ac7a1a71f197/design/design-doc-observe-only-resources.md?plain=1#L223 and this one: https://github.com/crossplane/crossplane/blob/444267e84783136daa93568b364a5f01228cacbe/design/one-pager-ignore-changes.md
ProviderConfigReference specifies how the provider that will be used to create, observe, update, and delete this managed resource should be configured.
Policies for referencing.
PublishConnectionDetailsTo specifies the connection secret config which contains a name, metadata and a reference to secret store config to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource.
WriteConnectionSecretToReference specifies the namespace and name of a Secret to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource. This field is planned to be replaced in a future release in favor of PublishConnectionDetailsTo. Currently, both could be set independently and connection details would be published to both without affecting each other.
BucketStatus defines the observed state of Bucket.
No description provided.
Rule of Cross-Origin Resource Sharing. See CORS rule below for details. Use the resource aws_s3_bucket_cors_configuration instead.
List of headers allowed.
One or more HTTP methods that you allow the origin to execute. Can be GET, PUT, POST, DELETE or HEAD.
One or more origins you want customers to be able to access the bucket from.
One or more headers in the response that you want customers to be able to access from their applications (for example, from a JavaScript XMLHttpRequest object).
An ACL policy grant. See Grant below for details. Conflicts with acl. Use the resource aws_s3_bucket_acl instead.
List of permissions to apply for grantee. Valid values are READ, WRITE, READ_ACP, WRITE_ACP, FULL_CONTROL.
Configuration of object lifecycle management. See Lifecycle Rule below for details. Use the resource aws_s3_bucket_lifecycle_configuration instead.
Specifies a period in the object's expire. See Expiration below for details.
Specifies when noncurrent object versions expire. See Noncurrent Version Expiration below for details.
Specifies when noncurrent object versions transitions. See Noncurrent Version Transition below for details.
Specifies a period in the object's transitions. See Transition below for details.
Configuration of S3 bucket logging parameters. See Logging below for details. Use the resource aws_s3_bucket_logging instead.
Configuration of S3 object locking. See Object Lock Configuration below for details. Use the object_lock_enabled parameter and the resource aws_s3_bucket_object_lock_configuration instead.
Object Lock rule in place for this bucket (documented below).
Configuration of replication configuration. See Replication Configuration below for details. Use the resource aws_s3_bucket_replication_configuration instead.
Specifies the rules managing the replication (documented below).
Specifies the destination for the rule (documented below).
Specifies the overrides to use for object owners on replication. Must be used in conjunction with account_id owner override configuration.
Specifies special object selection criteria (documented below).
Match SSE-KMS encrypted objects (documented below). If specified, replica_kms_key_id in destination must be specified as well.
Configuration of server-side encryption configuration. See Server Side Encryption Configuration below for details. Use the resource aws_s3_bucket_server_side_encryption_configuration instead.
Single object for server-side encryption by default configuration. (documented below)
Single object for setting server-side encryption by default. (documented below)
Configuration of the S3 bucket website. See Website below for details. Use the resource aws_s3_bucket_website_configuration instead.
Conditions of the resource.
example-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketlifecycleconfiguration
labels:
testing.upbound.io/example-name: s3
name: example-${Rand.RFC1123Subdomain}
spec:
forProvider:
objectLockEnabled: true
region: us-west-1
tags:
Name: SampleBucket
bucket-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketaccelerateconfiguration
labels:
testing.upbound.io/example-name: example
name: bucket-${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
log-bucket-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketlogging
labels:
testing.upbound.io/example-name: log_bucket
name: log-bucket-${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
${Rand.RFC1123Subdomain}-canned
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketacl-canned
labels:
testing.upbound.io/example-name: s3-canned
name: ${Rand.RFC1123Subdomain}-canned
spec:
forProvider:
region: us-west-1
tags:
Name: SampleBucketCannedAcl
example-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketversioning
labels:
testing.upbound.io/example-name: example
name: example-${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
mybucket-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketserversideencryptionconfiguration
labels:
testing.upbound.io/example-name: mybucket
name: mybucket-${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
example-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/object
labels:
testing.upbound.io/example-name: s3
name: example-${Rand.RFC1123Subdomain}
spec:
forProvider:
objectLockEnabled: true
region: us-west-1
tags:
Name: SampleBucket
example-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketpublicaccessblock
labels:
testing.upbound.io/example-name: example
name: example-${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
example-${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketlogging
labels:
testing.upbound.io/example-name: example
name: example-${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
${Rand.RFC1123Subdomain}-2
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
testing.upbound.io/example-name: s3-2
name: ${Rand.RFC1123Subdomain}-2
spec:
forProvider:
region: us-west-1
tags:
Name: SampleBucket-2
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
testing.upbound.io/example-name: s3
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
objectLockEnabled: true
region: us-west-1
tags:
Name: SampleBucket
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
meta.upbound.io/example-id: s3/v1beta1/bucketpolicy
upjet.upbound.io/manual-intervention: This resource is dependency of
BucketPolicy. This resource is skipping because parent resource was
skipped.
labels:
testing.upbound.io/example-name: s3
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
objectLockEnabled: true
region: us-west-1
tags:
Name: SampleBucket
© 2024 Upbound, Inc.
Discover the building blocksfor your internal cloud platform.