-
-
Notifications
You must be signed in to change notification settings - Fork 839
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feat: Support Allowing Actions from Specific Principal ARNs in Bucket Policy. #95
Conversation
/test all |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please see comments
This Pull Request has been updated, so we're dismissing all reviews.
…m-aws-s3-bucket into feat/deployment-arns
…erraform fmt issues.
…m-aws-s3-bucket into feat/deployment-arns
90d6b67
to
e523f73
Compare
e523f73
to
3b0ba44
Compare
Co-authored-by: Nuru <[email protected]>
…ation for AllowPrivilegedPrincipal statement. Co-authored-by: Nuru <[email protected]>
/test all |
1 similar comment
/test all |
… user_name output tested; re-order variables in privileged principals fixure.
/test all |
/test all |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please see comments @korenyoni
/test all |
what
examples/complete
(split up into multiple files to keepmain.tf
simple)local.enabled
where possiblewhy
references