Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow making changes to the s3 bucket policy #115

Closed
nitrocode opened this issue Apr 22, 2022 · 0 comments · Fixed by #142
Closed

Allow making changes to the s3 bucket policy #115

nitrocode opened this issue Apr 22, 2022 · 0 comments · Fixed by #142

Comments

@nitrocode
Copy link
Member

nitrocode commented Apr 22, 2022

Have a question? Please checkout our Slack Community or visit our Slack Archive.

Slack Community

Describe the Feature

It would be nice to make changes to the IAM policy

For instance, if I'm migrating from one s3 bucket to another s3 bucket, I would need s3:copyobject permissions. If I can add that in the terraform instead of clickopsing, that would be much smoother.

policy = local.policy

@nitrocode nitrocode changed the title Allow making changes to the IAM policy Allow making changes to the s3 bucket policy Apr 22, 2022
dod38fr pushed a commit to dod38fr/terraform-aws-tfstate-backend that referenced this issue Jun 1, 2023
This parameter allows the user to specify policies that are applied to
the S3 bucket with the policies defined by this module.

Closes: cloudposse#115
dod38fr pushed a commit to dod38fr/terraform-aws-tfstate-backend that referenced this issue Jun 1, 2023
This parameter allows the user to specify policies that are applied to
the S3 bucket with the policies defined by this module.

Closes: cloudposse#115
dod38fr added a commit to dod38fr/terraform-aws-tfstate-backend that referenced this issue Jun 8, 2023
This parameter allows the user to specify policies that are applied to
the S3 bucket along the policies defined by this module.

Closes: cloudposse#115
@Nuru Nuru closed this as completed in #142 Nov 3, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant