mirror of
https://github.com/opentofu/opentofu.git
synced 2025-02-25 18:45:20 -06:00
aws: Reorder resources in IAM examples in docs
- This is to make relevant resources more visible
This commit is contained in:
parent
f24e8c7b53
commit
c214130401
@ -13,16 +13,16 @@ Provides an IAM access key. This is a set of credentials that allow API requests
|
||||
## Example Usage
|
||||
|
||||
```
|
||||
resource "aws_iam_user" "lb" {
|
||||
name = "loadbalancer"
|
||||
path = "/system/"
|
||||
}
|
||||
|
||||
resource "aws_iam_access_key" "lb" {
|
||||
user = "${aws_iam_user.lb.name}"
|
||||
status = "Active"
|
||||
}
|
||||
|
||||
resource "aws_iam_user" "lb" {
|
||||
name = "loadbalancer"
|
||||
path = "/system/"
|
||||
}
|
||||
|
||||
resource "aws_iam_user_policy" "lb_ro" {
|
||||
name = "test"
|
||||
user = "${aws_iam_user.lb.name}"
|
||||
|
@ -13,11 +13,6 @@ Provides an IAM policy attached to a group.
|
||||
## Example Usage
|
||||
|
||||
```
|
||||
resource "aws_iam_group" "my_developers" {
|
||||
name = "developers"
|
||||
path = "/users/"
|
||||
}
|
||||
|
||||
resource "iam_group_policy" "my_developer_policy" {
|
||||
name = "my_developer_policy"
|
||||
group = "${aws_iam_group.my_developers.id}"
|
||||
@ -36,6 +31,11 @@ resource "iam_group_policy" "my_developer_policy" {
|
||||
}
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "aws_iam_group" "my_developers" {
|
||||
name = "developers"
|
||||
path = "/users/"
|
||||
}
|
||||
```
|
||||
|
||||
## Argument Reference
|
||||
|
@ -13,6 +13,11 @@ Provides an IAM instance profile.
|
||||
## Example Usage
|
||||
|
||||
```
|
||||
resource "aws_iam_instance_profile" "test_profile" {
|
||||
name = "test_profile"
|
||||
roles = ["${aws_iam_role.role.name}"]
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "role" {
|
||||
name = "test_role"
|
||||
path = "/"
|
||||
@ -31,11 +36,6 @@ resource "aws_iam_role" "role" {
|
||||
}
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "aws_iam_instance_profile" "test_profile" {
|
||||
name = "test_profile"
|
||||
roles = ["${aws_iam_role.role.name}"]
|
||||
}
|
||||
```
|
||||
|
||||
## Argument Reference
|
||||
|
@ -13,6 +13,23 @@ Provides an IAM role policy.
|
||||
## Example Usage
|
||||
|
||||
```
|
||||
resource "aws_iam_role_policy" "test_policy" {
|
||||
name = "test_policy"
|
||||
role = "${aws_iam_role.test_role.id}"
|
||||
policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Action": [
|
||||
"ec2:Describe*"
|
||||
],
|
||||
"Effect": "Allow",
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "test_role" {
|
||||
name = "test_role"
|
||||
assume_role_policy = <<EOF
|
||||
@ -31,23 +48,6 @@ resource "aws_iam_role" "test_role" {
|
||||
}
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "aws_iam_role_policy" "test_policy" {
|
||||
name = "test_policy"
|
||||
role = "${aws_iam_role.test_role.id}"
|
||||
policy = <<EOF
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Action": [
|
||||
"ec2:Describe*"
|
||||
],
|
||||
"Effect": "Allow",
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
## Argument Reference
|
||||
|
@ -13,16 +13,6 @@ Provides an IAM policy attached to a user.
|
||||
## Example Usage
|
||||
|
||||
```
|
||||
resource "aws_iam_user" "lb" {
|
||||
name = "loadbalancer"
|
||||
path = "/system/"
|
||||
}
|
||||
|
||||
resource "aws_iam_access_key" "lb" {
|
||||
user = "${aws_iam_user.lb.name}"
|
||||
status = "Active"
|
||||
}
|
||||
|
||||
resource "aws_iam_user_policy" "lb_ro" {
|
||||
name = "test"
|
||||
user = "${aws_iam_user.lb.name}"
|
||||
@ -41,6 +31,16 @@ resource "aws_iam_user_policy" "lb_ro" {
|
||||
}
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "aws_iam_user" "lb" {
|
||||
name = "loadbalancer"
|
||||
path = "/system/"
|
||||
}
|
||||
|
||||
resource "aws_iam_access_key" "lb" {
|
||||
user = "${aws_iam_user.lb.name}"
|
||||
status = "Active"
|
||||
}
|
||||
```
|
||||
|
||||
## Argument Reference
|
||||
|
Loading…
Reference in New Issue
Block a user