You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
165
165
|[aws_canonical_user_id.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/canonical_user_id)| data source |
166
+
|[aws_iam_policy_document.access_log_delivery](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
166
167
|[aws_iam_policy_document.combined](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
167
168
|[aws_iam_policy_document.deny_insecure_transport](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
168
169
|[aws_iam_policy_document.elb_log_delivery](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -177,11 +178,14 @@ No modules.
177
178
| Name | Description | Type | Default | Required |
| <aname="input_acceleration_status"></a> [acceleration\_status](#input\_acceleration\_status)| (Optional) Sets the accelerate configuration of an existing bucket. Can be Enabled or Suspended. |`string`|`null`| no |
181
+
| <aname="input_access_log_delivery_policy_source_accounts"></a> [access\_log\_delivery\_policy\_source\_accounts](#input\_access\_log\_delivery\_policy\_source\_accounts)| (Optional) List of AWS Account IDs should be allowed to deliver access logs to this bucket. |`list(string)`|`[]`| no |
182
+
| <aname="input_access_log_delivery_policy_source_buckets"></a> [access\_log\_delivery\_policy\_source\_buckets](#input\_access\_log\_delivery\_policy\_source\_buckets)| (Optional) List of S3 bucket ARNs wich should be allowed to deliver access logs to this bucket. |`list(string)`|`[]`| no |
180
183
| <aname="input_acl"></a> [acl](#input\_acl)| (Optional) The canned ACL to apply. Conflicts with `grant`|`string`|`null`| no |
| <aname="input_analytics_self_source_destination"></a> [analytics\_self\_source\_destination](#input\_analytics\_self\_source\_destination)| Whether or not the analytics source bucket is also the destination bucket. |`bool`|`false`| no |
183
186
| <aname="input_analytics_source_account_id"></a> [analytics\_source\_account\_id](#input\_analytics\_source\_account\_id)| The analytics source account id. |`string`|`null`| no |
184
187
| <aname="input_analytics_source_bucket_arn"></a> [analytics\_source\_bucket\_arn](#input\_analytics\_source\_bucket\_arn)| The analytics source bucket ARN. |`string`|`null`| no |
188
+
| <aname="input_attach_access_log_delivery_policy"></a> [attach\_access\_log\_delivery\_policy](#input\_attach\_access\_log\_delivery\_policy)| Controls if S3 bucket should have S3 access log delivery policy attached |`bool`|`false`| no |
185
189
| <aname="input_attach_analytics_destination_policy"></a> [attach\_analytics\_destination\_policy](#input\_attach\_analytics\_destination\_policy)| Controls if S3 bucket should have bucket analytics destination policy attached. |`bool`|`false`| no |
186
190
| <aname="input_attach_deny_insecure_transport_policy"></a> [attach\_deny\_insecure\_transport\_policy](#input\_attach\_deny\_insecure\_transport\_policy)| Controls if S3 bucket should have deny non-SSL transport policy attached |`bool`|`false`| no |
187
191
| <aname="input_attach_elb_log_delivery_policy"></a> [attach\_elb\_log\_delivery\_policy](#input\_attach\_elb\_log\_delivery\_policy)| Controls if S3 bucket should have ELB log delivery policy attached |`bool`|`false`| no |
0 commit comments