File tree Expand file tree Collapse file tree 2 files changed +1
-5
lines changed Expand file tree Collapse file tree 2 files changed +1
-5
lines changed Original file line number Diff line number Diff line change @@ -111,10 +111,6 @@ We highly recommend that in your code you pin the version to the exact version y
111
111
using so that your infrastructure remains stable, and update versions in a
112
112
systematic way so that they do not catch you by surprise.
113
113
114
- Also, because of a bug in the Terraform registry ([ hashicorp/terraform #21417 ] ( https://github.com/hashicorp/terraform/issues/21417 ) ),
115
- the registry shows many of our inputs as required when in fact they are optional.
116
- The table below correctly indicates which inputs are required.
117
-
118
114
119
115
Using a [ canned ACL] ( https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html ) .
120
116
Original file line number Diff line number Diff line change @@ -459,7 +459,7 @@ data "aws_iam_policy_document" "aggregated_policy" {
459
459
}
460
460
461
461
resource "aws_s3_bucket_policy" "default" {
462
- count = local. enabled && (var. allow_ssl_requests_only || var. allow_encrypted_uploads_only || length (var. s3_replication_source_roles ) > 0 || length (var. privileged_principal_arns ) > 0 || length (var . source_policy_documents ) > 0 ) ? 1 : 0
462
+ count = local. enabled && (var. allow_ssl_requests_only || var. allow_encrypted_uploads_only || length (var. s3_replication_source_roles ) > 0 || length (var. privileged_principal_arns ) > 0 || length (local . source_policy_documents ) > 0 ) ? 1 : 0
463
463
bucket = join (" " , aws_s3_bucket. default [* ]. id )
464
464
policy = join (" " , data. aws_iam_policy_document . aggregated_policy [* ]. json )
465
465
depends_on = [aws_s3_bucket_public_access_block . default ]
You can’t perform that action at this time.
0 commit comments