feat: Creating SNS/SQS policies should be optional #54
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Make the creation of SNS/SQS policies conditional based on two new variables,
create_sns_policy
andcreate_sqs_policy
.Motivation and Context
We have a use case (as I'm sure others do) where we need to send S3 bucket notifications to an external account that we don't control, and so we can't create the related SNS/SQS policies in that account (and they aren't necessary). The rest of the notification setup is valid when using the external resource ARNs, however.
Breaking Changes
None; the variables default to
true
so behavior will be the same.How Has This Been Tested?
Using the module as published failed to apply the notification due to the inability create the policy, so I added it manually and imported it. This snippet...:
... results in this plan:
Changing the module to use this branch like so...:
... results in
No changes. Infrastructure is up-to-date.
. It appears to me that the SNS policy is created in the same manner, so I added a variable to make that policy creation conditional as well, but that hasn't been tested.