Potential Terraform Configuration data"aws_s3_bucket_policy""policy"{ arn="arn:aws:s3:::my-bucket-name"}data"aws_s3_bucket_policy""policy"{ name="my-bucket-name"} 👍7yuonoda, judgeaxl, RickVarella, svanzoest, systemonkey, ctrawick, and gals-ma reacted with thumbs up emoji ...
I have created a "Public Access Block" and added a further resource to create an "AWS S3 Bucket Policy" to Allow anyone public access to "GetObject" from the bucket/site. Unfortunately when running a "terraform apply" command I receive an error: Error: putting S3 Bucket (t...
Argument Reference The following arguments are supported: bucket- (Required) The name of the bucket to which to apply the policy. policy- (Required) The text of the policy. See the source of this document atTerraform.io Data Sources
I'm also facing this issue on Terraform v1.0.9 and registry.terraform.io/hashicorp/aws v3.63.0. Here is a condensed terraform config that I'm using to create a private S3 bucket and server files through a CloudFront CDN. The policy with generated values from the created resources works wh...
Ran a plan and expected to see no resources being destroyed or created. However I am seeing that the lifecycle_rule in the example_bucket is getting destroyed, as if it hasn't picked up the import. I tested this by allowing Terraform to destroy the resource, and then ta...
Just in case anyone is reading this and using Terraform, you have to first use this resource when creating any public policy: resource "aws_s3_bucket_public_access_block" "example" { bucket = aws_s3_bucket.example.id block_public_acls = false block_public_policy = false...