Creates an Amazon CloudFront origin access identity.
For information about CloudFront distributions, see the Amazon CloudFront Developer Guide. For more information on generating origin access identities, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content.
The following example below creates a CloudFront origin access identity.
resource "aws_cloudfront_origin_access_identity" "origin_access_identity" { comment = "Some comment" }
comment
(Optional) - An optional comment for the origin access identity. In addition to all arguments above, the following attributes are exported:
id
- The identifier for the distribution. For example: EDFDVBD632BHDS5
. caller_reference
- Internal value used by CloudFront to allow future updates to the origin access identity. cloudfront_access_identity_path
- A shortcut to the full path for the origin access identity to use in CloudFront, see below. etag
- The current version of the origin access identity's information. For example: E2QWRUHAPOMQZL
. iam_arn
- A pre-generated ARN for use in S3 bucket policies (see below). Example: arn:aws:iam::cloudfront:user/CloudFront Origin Access Identity
E2QWRUHAPOMQZL
. s3_canonical_user_id
- The Amazon S3 canonical user ID for the origin access identity, which you use when giving the origin access identity read permission to an object in Amazon S3. Normally, when referencing an origin access identity in CloudFront, you need to prefix the ID with the origin-access-identity/cloudfront/
special path. The cloudfront_access_identity_path
allows this to be circumvented. The below snippet demonstrates use with the s3_origin_config
structure for the aws_cloudfront_web_distribution
resource:
s3_origin_config { origin_access_identity = "${aws_cloudfront_origin_access_identity.origin_access_identity.cloudfront_access_identity_path}" }
Note that the AWS API may translate the s3_canonical_user_id
CanonicalUser
principal into an AWS
IAM ARN principal when supplied in an aws_s3_bucket
bucket policy, causing spurious diffs in Terraform. If you see this behaviour, use the iam_arn
instead:
data "aws_iam_policy_document" "s3_policy" { statement { actions = ["s3:GetObject"] resources = ["${aws_s3_bucket.example.arn}/*"] principals { type = "AWS" identifiers = ["${aws_cloudfront_origin_access_identity.origin_access_identity.iam_arn}"] } } statement { actions = ["s3:ListBucket"] resources = ["${aws_s3_bucket.example.arn}"] principals { type = "AWS" identifiers = ["${aws_cloudfront_origin_access_identity.origin_access_identity.iam_arn}"] } } } resource "aws_s3_bucket_policy" "example" { bucket = "${aws_s3_bucket.example.id}" policy = "${data.aws_iam_policy_document.s3_policy.json}" }
Cloudfront Origin Access Identities can be imported using the id
, e.g.
$ terraform import aws_cloudfront_origin_access_identity.origin_access E74FTE3AEXAMPLE
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/aws/r/cloudfront_origin_access_identity.html