feat: Add ability to create deny insecure transport policy #77
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
attach_deny_insecure_transport_policy
variable introduced to attach a policy that denies non-SSL requests to the bucket.Motivation and Context
Quite common requirement for secure environments. Could be useful for module users.
implements #43
Breaking Changes
No breaking changes
How Has This Been Tested?
terraform plan/apply/destroy
usingexamples/complete
Found that enabling either
attach_elb_log_delivery_policy
orattach_deny_insecure_transport_policy
on existing bucket results to following error uponaws_s3_bucket_public_access_block.this[0]
destruction:I understand it is a known issue and not related to introduced functionality. Terraform re-run applies changes successfully.