You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It would be great to be able to manage the S3 bucket policy from terraform. This would allow a finer degree of control that is not possible from the canned ACL perspective.
A potential issue if the policy is a string json blob any changes to the blob would result in the bucket being torn down and recreated? Being a terraform noob I'm not sure if there is a different way to handle it?
The text was updated successfully, but these errors were encountered:
Hey there - we're consolidating Requests for AWS API Coverage over in the spreadsheet linked at #28 - head over there to record your username on what you'd like us to prioritize next! (This would be s3.PutBucketPolicy I believe.)
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
May 2, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
It would be great to be able to manage the S3 bucket policy from terraform. This would allow a finer degree of control that is not possible from the canned ACL perspective.
Pontential Syntax:
A potential issue if the policy is a string json blob any changes to the blob would result in the bucket being torn down and recreated? Being a terraform noob I'm not sure if there is a different way to handle it?
The text was updated successfully, but these errors were encountered: