You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_availability_zone.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zone)| data source |
172
171
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
173
172
|[aws_canonical_user_id.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/canonical_user_id)| data source |
174
173
|[aws_iam_policy_document.access_log_delivery](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -211,7 +210,7 @@ No modules.
211
210
| <aname="input_attach_policy"></a> [attach\_policy](#input\_attach\_policy)| Controls if S3 bucket should have bucket policy attached (set to `true` to use value of `policy` as bucket policy) |`bool`|`false`| no |
212
211
| <aname="input_attach_public_policy"></a> [attach\_public\_policy](#input\_attach\_public\_policy)| Controls if a user defined public bucket policy will be attached (set to `false` to allow upstream to apply defaults to the bucket) |`bool`|`true`| no |
213
212
| <aname="input_attach_require_latest_tls_policy"></a> [attach\_require\_latest\_tls\_policy](#input\_attach\_require\_latest\_tls\_policy)| Controls if S3 bucket should require the latest version of TLS |`bool`|`false`| no |
214
-
| <aname="input_availability_zone"></a> [availability\_zone](#input\_availability\_zone)| Availability Zone ID or Local Zone ID |`string`|`null`| no |
213
+
| <aname="input_availability_zone_id"></a> [availability\_zone\_id](#input\_availability\_zone\_id)| Availability Zone ID or Local Zone ID |`string`|`null`| no |
215
214
| <aname="input_block_public_acls"></a> [block\_public\_acls](#input\_block\_public\_acls)| Whether Amazon S3 should block public ACLs for this bucket. |`bool`|`true`| no |
216
215
| <aname="input_block_public_policy"></a> [block\_public\_policy](#input\_block\_public\_policy)| Whether Amazon S3 should block public bucket policies for this bucket. |`bool`|`true`| no |
217
216
| <aname="input_bucket"></a> [bucket](#input\_bucket)| (Optional, Forces new resource) The name of the bucket. If omitted, Terraform will assign a random, unique name. |`string`|`null`| no |
|[aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones)| data source |
46
47
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
47
48
|[aws_iam_policy_document.bucket_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
0 commit comments