Skip to content

Add example for awscc_s3vectors_vector_bucket_policy#3014

Open
wellsiau-aws wants to merge 1 commit intohashicorp:mainfrom
wellsiau-aws:d-awscc_s3vectors_vector_bucket_policy
Open

Add example for awscc_s3vectors_vector_bucket_policy#3014
wellsiau-aws wants to merge 1 commit intohashicorp:mainfrom
wellsiau-aws:d-awscc_s3vectors_vector_bucket_policy

Conversation

@wellsiau-aws
Copy link
Collaborator

Description

This PR adds a validated Terraform example for awscc_s3vectors_vector_bucket_policy.

Validation Summary

  • ✅ Terraform code generated and validated
  • ✅ Real AWS deployment tested (apply/destroy lifecycle)
  • ✅ Independent validation review completed
  • ✅ Required tools installed with make tools
  • ✅ Documentation generated with make docs

Resource Details

  • Resource: awscc_s3vectors_vector_bucket_policy
  • Provider Version: 1.69.0
  • Validation Date: 2026-02-16
  • AWS Region: us-west-2

Files Added

  • examples/resources/awscc_s3vectors_vector_bucket_policy/s3vectors_vector_bucket_policy.tf
  • templates/resources/awscc_s3vectors_vector_bucket_policy.md.tmpl
  • docs/resources/awscc_s3vectors_vector_bucket_policy.md (auto-generated by make docs)

Validation Report

Click to expand full validation report
TERRAFORM VALIDATION REPORT
==========================
Date: 2026-02-12 06:25:48 UTC
Resource Name: awscc_s3vectors_vector_bucket_policy

TARGET RESOURCE VERIFICATION
----------------------------
Target resource found in Terraform code: Yes - awscc_s3vectors_vector_bucket_policy resource definition found
Resource definition includes required parameters: vector_bucket_name, policy (with proper JSON structure)

TERRAFORM LIFECYCLE TESTING
--------------------------
terraform init: skipped - reused existing .terraform directory
terraform validate: SUCCESS - Configuration is valid
terraform plan: SUCCESS - Plan shows 2 resources to be created (1 target + 1 supplemental)
terraform apply: SUCCESS - Both awscc_s3vectors_vector_bucket_policy (target) and awscc_s3vectors_vector_bucket (supplemental) created successfully
terraform destroy: SUCCESS - All resources properly destroyed

RESOURCE VERIFICATION
-------------------
Target resource was successfully provisioned: Yes - awscc_s3vectors_vector_bucket_policy created with ID arn:aws:s3vectors:us-west-2:204034886740:bucket/example-vector-bucket
Resource details:
- Vector bucket policy applied to example-vector-bucket
- Policy includes s3vectors permissions (GetVector, PutVector, DeleteVector, ListVectors)
- Policy correctly references the vector bucket ARN
- Supplemental vector bucket resource also created successfully
All resources were properly destroyed: Yes - Both policy and bucket destroyed successfully

VALIDATION RESULT
----------------
RESULT: PASSED
DETAILS: Target resource awscc_s3vectors_vector_bucket_policy was found in Terraform code, successfully created during apply, and properly destroyed. All Terraform lifecycle steps completed successfully.

This PR was automatically generated by the TANGO Multi-Agent Pipeline.

This commit adds a validated Terraform example for the awscc_s3vectors_vector_bucket_policy resource.

Files added:
- examples/resources/awscc_s3vectors_vector_bucket_policy/s3vectors_vector_bucket_policy.tf
- templates/resources/awscc_s3vectors_vector_bucket_policy.md.tmpl
- docs/resources/awscc_s3vectors_vector_bucket_policy.md (generated by make docs)

The example has been validated through real AWS deployment testing
and passes all HashiCorp validation requirements.

Generated by TANGO Multi-Agent Pipeline
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant