You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_elb_service_account.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/elb_service_account)| data source |
@@ -148,6 +149,7 @@ No modules.
148
149
| <aname="input_block_public_policy"></a> [block\_public\_policy](#input\_block\_public\_policy)| Whether Amazon S3 should block public bucket policies for this bucket. |`bool`|`false`| no |
149
150
| <aname="input_bucket"></a> [bucket](#input\_bucket)| (Optional, Forces new resource) The name of the bucket. If omitted, Terraform will assign a random, unique name. |`string`|`null`| no |
150
151
| <aname="input_bucket_prefix"></a> [bucket\_prefix](#input\_bucket\_prefix)| (Optional, Forces new resource) Creates a unique bucket name beginning with the specified prefix. Conflicts with bucket. |`string`|`null`| no |
152
+
| <aname="input_control_object_ownership"></a> [control\_object\_ownership](#input\_control\_object\_ownership)| Whether to manage S3 Bucket Ownership Controls on this bucket. |`bool`|`false`| no |
151
153
| <aname="input_cors_rule"></a> [cors\_rule](#input\_cors\_rule)| List of maps containing rules for Cross-Origin Resource Sharing. |`any`|`[]`| no |
152
154
| <aname="input_create_bucket"></a> [create\_bucket](#input\_create\_bucket)| Controls if S3 bucket should be created |`bool`|`true`| no |
153
155
| <aname="input_force_destroy"></a> [force\_destroy](#input\_force\_destroy)| (Optional, Default:false ) A boolean that indicates all objects should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable. |`bool`|`false`| no |
@@ -156,6 +158,7 @@ No modules.
156
158
| <aname="input_lifecycle_rule"></a> [lifecycle\_rule](#input\_lifecycle\_rule)| List of maps containing configuration of object lifecycle management. |`any`|`[]`| no |
| <aname="input_object_ownership"></a> [object\_ownership](#input\_object\_ownership)| Object ownership. Valid values: BucketOwnerPreferred or ObjectWriter. 'BucketOwnerPreferred': Objects uploaded to the bucket change ownership to the bucket owner if the objects are uploaded with the bucket-owner-full-control canned ACL. 'ObjectWriter': The uploading account will own the object if the object is uploaded with the bucket-owner-full-control canned ACL. |`string`|`"ObjectWriter"`| no |
159
162
| <aname="input_policy"></a> [policy](#input\_policy)| (Optional) A valid bucket policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. For more information about building AWS IAM policy documents with Terraform, see the AWS IAM Policy Document Guide. |`string`|`null`| no |
| <aname="input_request_payer"></a> [request\_payer](#input\_request\_payer)| (Optional) Specifies who should bear the cost of Amazon S3 data transfer. Can be either BucketOwner or Requester. By default, the owner of the S3 bucket would incur the costs of any data transfer. See Requester Pays Buckets developer guide for more information. |`string`|`null`| no |
description="Whether to manage S3 Bucket Ownership Controls on this bucket."
165
+
type=bool
166
+
default=false
167
+
}
168
+
169
+
variable"object_ownership" {
170
+
description="Object ownership. Valid values: BucketOwnerPreferred or ObjectWriter. 'BucketOwnerPreferred': Objects uploaded to the bucket change ownership to the bucket owner if the objects are uploaded with the bucket-owner-full-control canned ACL. 'ObjectWriter': The uploading account will own the object if the object is uploaded with the bucket-owner-full-control canned ACL."
0 commit comments