Bucket is the Schema for the Buckets API. Provides a S3 bucket resource.
Type
CRD
Group
s3.aws.upbound.io
Version
v1beta1
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
BucketSpec defines the desired state of Bucket
No description provided.
ProviderConfigReference specifies how the provider that will be used to create, observe, update, and delete this managed resource should be configured.
Policies for referencing.
ProviderReference specifies the provider that will be used to create, observe, update, and delete this managed resource. Deprecated: Please use ProviderConfigReference, i.e. providerConfigRef
Policies for referencing.
PublishConnectionDetailsTo specifies the connection secret config which contains a name, metadata and a reference to secret store config to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource.
WriteConnectionSecretToReference specifies the namespace and name of a Secret to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource. This field is planned to be replaced in a future release in favor of PublishConnectionDetailsTo. Currently, both could be set independently and connection details would be published to both without affecting each other.
BucketStatus defines the observed state of Bucket.
No description provided.
A rule of Cross-Origin Resource Sharing. See CORS rule below for details. Use the resource aws_s3_bucket_cors_configuration instead.
List of headers allowed.
One or more HTTP methods that you allow the origin to execute. Can be GET, PUT, POST, DELETE or HEAD.
One or more origins you want customers to be able to access the bucket from.
One or more headers in the response that you want customers to be able to access from their applications (for example, from a JavaScript XMLHttpRequest object).
An ACL policy grant. See Grant below for details. Conflicts with acl. Use the resource aws_s3_bucket_acl instead.
List of permissions to apply for grantee. Valid values are READ, WRITE, READ_ACP, WRITE_ACP, FULL_CONTROL.
A configuration of object lifecycle management. See Lifecycle Rule below for details. Use the resource aws_s3_bucket_lifecycle_configuration instead.
Specifies a period in the object's expire. See Expiration below for details.
Specifies when noncurrent object versions expire. See Noncurrent Version Expiration below for details.
Specifies when noncurrent object versions transitions. See Noncurrent Version Transition below for details.
Specifies a period in the object's transitions. See Transition below for details.
A configuration of S3 bucket logging parameters. See Logging below for details. Use the resource aws_s3_bucket_logging instead.
A configuration of S3 object locking. See Object Lock Configuration below for details. Use the object_lock_enabled parameter and the resource aws_s3_bucket_object_lock_configuration instead.
The Object Lock rule in place for this bucket (documented below).
A configuration of replication configuration. See Replication Configuration below for details. Use the resource aws_s3_bucket_replication_configuration instead.
Specifies the rules managing the replication (documented below).
Specifies the destination for the rule (documented below).
Specifies the overrides to use for object owners on replication. Must be used in conjunction with account_id owner override configuration.
Specifies special object selection criteria (documented below).
Match SSE-KMS encrypted objects (documented below). If specified, replica_kms_key_id in destination must be specified as well.
A configuration of server-side encryption configuration. See Server Side Encryption Configuration below for details. Use the resource aws_s3_bucket_server_side_encryption_configuration instead.
A single object for server-side encryption by default configuration. (documented below)
A single object for setting server-side encryption by default. (documented below)
A configuration of the S3 bucket website. See Website below for details. Use the resource aws_s3_bucket_website_configuration instead.
Conditions of the resource.
example-destination
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: example-destination-rand123
meta.upbound.io/example-id: appflow/v1beta1/flow
labels:
testing.upbound.io/example-name: example_destination
name: example-destination
spec:
forProvider:
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
crossplane.io/external-name: ${Rand.RFC1123Subdomain}
testing.upbound.io/example-name: input_bucket_label
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
forceDestroy: true
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
testing.upbound.io/example-name: upbound-example
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
forceDestroy: true
region: us-west-1
example
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: example-rand12345
meta.upbound.io/example-id: fsx/v1beta1/datarepositoryassociation
labels:
testing.upbound.io/example-name: example
name: example
spec:
forProvider:
region: us-east-1
test-channel-bucket
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: test-channel-bucket
meta.upbound.io/example-id: configservice/v1beta1/awsconfigurationrecorderstatus
labels:
testing.upbound.io/example-name: b
name: test-channel-bucket
spec:
forProvider:
forceDestroy: true
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
crossplane.io/external-name: ${Rand.RFC1123Subdomain}
testing.upbound.io/example-name: thumb_bucket_label
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
forceDestroy: true
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
upjet.upbound.io/manual-intervention: For deletion of this resource, firstly needs to be cleaned up.
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
crossplane.io/external-name: ${Rand.RFC1123Subdomain}
testing.upbound.io/example-name: content_bucket_label
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
forceDestroy: true
region: us-west-1
example-source
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: example-source-rand123
meta.upbound.io/example-id: appflow/v1beta1/flow
labels:
testing.upbound.io/example-name: example_source
name: example-source
spec:
forProvider:
region: us-west-1
example
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: ${Rand.RFC1123Subdomain}
meta.upbound.io/example-id: s3control/v1beta1/accesspoint
labels:
testing.upbound.io/example-name: example
name: example
spec:
forProvider:
region: us-west-1
test-definition-bucket
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: test-definition-bucket-axbjhdwjdk
meta.upbound.io/example-id: cur/v1beta1/reportdefinition
labels:
testing.upbound.io/example-name: example
name: test-definition-bucket
spec:
forProvider:
forceDestroy: true
region: us-east-1
test-channel-bucket
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: test-channel-bucket
meta.upbound.io/example-id: configservice/v1beta1/deliverychannel
labels:
testing.upbound.io/example-name: b
name: test-channel-bucket
spec:
forProvider:
forceDestroy: true
region: us-west-1
foo
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: op-rgszzcuww
meta.upbound.io/example-id: cloudtrail/v1beta1/trail
labels:
testing.upbound.io/example-name: foo
name: foo
spec:
forProvider:
forceDestroy: true
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
testing.upbound.io/example-name: bucket
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
region: us-west-1
${Rand.RFC1123Subdomain}-2
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
testing.upbound.io/example-name: s3-2
name: ${Rand.RFC1123Subdomain}-2
spec:
forProvider:
region: us-west-1
tags:
Name: SampleBucket-2
codepipeline-bucket
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
annotations:
crossplane.io/external-name: ${Rand.RFC1123Subdomain}
meta.upbound.io/example-id: codepipeline/v1beta1/codepipeline
labels:
testing.upbound.io/example-name: codepipeline_bucket
name: codepipeline-bucket
spec:
forProvider:
region: us-west-1
${Rand.RFC1123Subdomain}
apiVersion: s3.aws.upbound.io/v1beta1
kind: Bucket
metadata:
labels:
testing.upbound.io/example-name: s3
name: ${Rand.RFC1123Subdomain}
spec:
forProvider:
objectLockEnabled: true
region: us-west-1
tags:
Name: SampleBucket
© 2022 Upbound, Inc.
Discover the building blocksfor your internal cloud platform.