Skip to content

Commit 38084c3

Browse files
authored
mfa_delete removed (#159)
1 parent 3a37969 commit 38084c3

File tree

5 files changed

+2
-12
lines changed

5 files changed

+2
-12
lines changed

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,6 @@ Available targets:
277277
| root\_volume\_type | The type of the EBS root volume | `string` | `"gp2"` | no |
278278
| s3\_bucket\_access\_log\_bucket\_name | Name of the S3 bucket where s3 access log will be sent to | `string` | `""` | no |
279279
| s3\_bucket\_encryption\_enabled | When set to 'true' the resource will have aes256 encryption enabled by default | `bool` | `true` | no |
280-
| s3\_bucket\_mfa\_delete | A boolean that indicates that versions of S3 objects can only be deleted with MFA. ( Terraform cannot apply changes of this value; https://github.com/terraform-providers/terraform-provider-aws/issues/629 ) | `bool` | `true` | no |
281280
| s3\_bucket\_versioning\_enabled | When set to 'true' the s3 origin bucket will have versioning enabled | `bool` | `true` | no |
282281
| solution\_stack\_name | Elastic Beanstalk stack, e.g. Docker, Go, Node, Java, IIS. For more info, see https://docs.aws.amazon.com/elasticbeanstalk/latest/platforms/platforms-supported.html | `string` | n/a | yes |
283282
| spot\_fleet\_on\_demand\_above\_base\_percentage | The percentage of On-Demand Instances as part of additional capacity that your Auto Scaling group provisions beyond the SpotOnDemandBase instances. This option is relevant only when enable\_spot\_instances is true. | `number` | `-1` | no |

docs/terraform.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,6 @@
8989
| root\_volume\_type | The type of the EBS root volume | `string` | `"gp2"` | no |
9090
| s3\_bucket\_access\_log\_bucket\_name | Name of the S3 bucket where s3 access log will be sent to | `string` | `""` | no |
9191
| s3\_bucket\_encryption\_enabled | When set to 'true' the resource will have aes256 encryption enabled by default | `bool` | `true` | no |
92-
| s3\_bucket\_mfa\_delete | A boolean that indicates that versions of S3 objects can only be deleted with MFA. ( Terraform cannot apply changes of this value; https://github.com/terraform-providers/terraform-provider-aws/issues/629 ) | `bool` | `true` | no |
9392
| s3\_bucket\_versioning\_enabled | When set to 'true' the s3 origin bucket will have versioning enabled | `bool` | `true` | no |
9493
| solution\_stack\_name | Elastic Beanstalk stack, e.g. Docker, Go, Node, Java, IIS. For more info, see https://docs.aws.amazon.com/elasticbeanstalk/latest/platforms/platforms-supported.html | `string` | n/a | yes |
9594
| spot\_fleet\_on\_demand\_above\_base\_percentage | The percentage of On-Demand Instances as part of additional capacity that your Auto Scaling group provisions beyond the SpotOnDemandBase instances. This option is relevant only when enable\_spot\_instances is true. | `number` | `-1` | no |

examples/complete/main.tf

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,8 +84,6 @@ module "elastic_beanstalk_environment" {
8484
extended_ec2_policy_document = data.aws_iam_policy_document.minimal_s3_permissions.json
8585
prefer_legacy_ssm_policy = false
8686

87-
s3_bucket_mfa_delete = false
88-
8987
context = module.this.context
9088
}
9189

main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -927,6 +927,7 @@ data "aws_iam_policy_document" "elb_logs" {
927927
resource "aws_s3_bucket" "elb_logs" {
928928
#bridgecrew:skip=BC_AWS_S3_13:Skipping `Enable S3 Bucket Logging` check until bridgecrew will support dynamic blocks (https://github.com/bridgecrewio/checkov/issues/776).
929929
#bridgecrew:skip=BC_AWS_S3_14:Skipping `Ensure all data stored in the S3 bucket is securely encrypted at rest` check until bridgecrew will support dynamic blocks (https://github.com/bridgecrewio/checkov/issues/776).
930+
#bridgecrew:skip=CKV_AWS_52:Skipping `Ensure S3 bucket has MFA delete enabled` due to issue in terraform (https://github.com/hashicorp/terraform-provider-aws/issues/629).
930931
count = var.tier == "WebServer" && var.environment_type == "LoadBalanced" ? 1 : 0
931932
bucket = "${module.this.id}-eb-loadbalancer-logs"
932933
acl = "private"
@@ -947,8 +948,7 @@ resource "aws_s3_bucket" "elb_logs" {
947948
}
948949

949950
versioning {
950-
enabled = var.s3_bucket_versioning_enabled
951-
mfa_delete = var.s3_bucket_mfa_delete
951+
enabled = var.s3_bucket_versioning_enabled
952952
}
953953

954954
dynamic "logging" {

variables.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -468,12 +468,6 @@ variable "s3_bucket_access_log_bucket_name" {
468468
description = "Name of the S3 bucket where s3 access log will be sent to"
469469
}
470470

471-
variable "s3_bucket_mfa_delete" {
472-
type = bool
473-
description = "A boolean that indicates that versions of S3 objects can only be deleted with MFA. ( Terraform cannot apply changes of this value; https://github.com/terraform-providers/terraform-provider-aws/issues/629 )"
474-
default = true
475-
}
476-
477471
variable "s3_bucket_versioning_enabled" {
478472
type = bool
479473
default = true

0 commit comments

Comments
 (0)