Difference between revisions of "Terraform resources: aws s3 bucket policy"
Jump to navigation
Jump to search
↑ https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_policy
(6 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <code>aws_s3_bucket_policy</code> resource <ref> https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_policy</ref> | |
− | |||
− | |||
== Official example == | == Official example == | ||
{{aws_s3_bucket_policy example}} | {{aws_s3_bucket_policy example}} | ||
+ | |||
+ | == Errors == | ||
+ | * <code>[[Error: Error putting S3 policy: AccessDenied: Access Denied]]</code> | ||
+ | |||
+ | == Related == | ||
+ | * <code>[[count.index]]</code> | ||
== See also == | == See also == | ||
+ | * {{aws_s3_bucket_policy}} | ||
* {{tf s3}} | * {{tf s3}} | ||
[[Category:AWS]] | [[Category:AWS]] |
Latest revision as of 14:40, 25 January 2024
aws_s3_bucket_policy
resource [1]
Contents
Official example[edit]
resource "aws_s3_bucket" "example" { bucket = "my-tf-test-bucket" } resource "aws_s3_bucket_policy" "allow_access_from_another_account" { bucket = aws_s3_bucket.example.id policy = data.aws_iam_policy_document.allow_access_from_another_account.json } data "aws_iam_policy_document" "allow_access_from_another_account" { statement { principals { type = "AWS" identifiers = ["123456789012"] } actions = [ "s3:GetObject", "s3:ListBucket", ] resources = [ aws_s3_bucket.example.arn, "${aws_s3_bucket.example.arn}/*", ] } }
Errors[edit]
Related[edit]
See also[edit]
aws_s3_bucket_policy
- Terraform S3 resources:
aws_s3_bucket, aws_s3_object, aws_s3_bucket_policy, aws_s3_bucket_acl, aws_s3_bucket_website_configuration, aws_s3_bucket cors_configuration, aws_s3_account_public_access_block
, Terraform module: s3-bucket,aws_s3_bucket_versioning, aws_s3_bucket_server_side_encryption_configuration, aws_s3_bucket_logging
Advertising: