aws: Reorder resources in IAM examples in docs

- This is to make relevant resources more visible
This commit is contained in:
Radek Simko 2015-05-12 22:15:16 +01:00
parent f24e8c7b53
commit c214130401
5 changed files with 42 additions and 42 deletions

View File

@ -13,16 +13,16 @@ Provides an IAM access key. This is a set of credentials that allow API requests
## Example Usage
```
resource "aws_iam_user" "lb" {
name = "loadbalancer"
path = "/system/"
}
resource "aws_iam_access_key" "lb" {
user = "${aws_iam_user.lb.name}"
status = "Active"
}
resource "aws_iam_user" "lb" {
name = "loadbalancer"
path = "/system/"
}
resource "aws_iam_user_policy" "lb_ro" {
name = "test"
user = "${aws_iam_user.lb.name}"

View File

@ -13,11 +13,6 @@ Provides an IAM policy attached to a group.
## Example Usage
```
resource "aws_iam_group" "my_developers" {
name = "developers"
path = "/users/"
}
resource "iam_group_policy" "my_developer_policy" {
name = "my_developer_policy"
group = "${aws_iam_group.my_developers.id}"
@ -36,6 +31,11 @@ resource "iam_group_policy" "my_developer_policy" {
}
EOF
}
resource "aws_iam_group" "my_developers" {
name = "developers"
path = "/users/"
}
```
## Argument Reference

View File

@ -13,6 +13,11 @@ Provides an IAM instance profile.
## Example Usage
```
resource "aws_iam_instance_profile" "test_profile" {
name = "test_profile"
roles = ["${aws_iam_role.role.name}"]
}
resource "aws_iam_role" "role" {
name = "test_role"
path = "/"
@ -31,11 +36,6 @@ resource "aws_iam_role" "role" {
}
EOF
}
resource "aws_iam_instance_profile" "test_profile" {
name = "test_profile"
roles = ["${aws_iam_role.role.name}"]
}
```
## Argument Reference

View File

@ -13,6 +13,23 @@ Provides an IAM role policy.
## Example Usage
```
resource "aws_iam_role_policy" "test_policy" {
name = "test_policy"
role = "${aws_iam_role.test_role.id}"
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:Describe*"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
resource "aws_iam_role" "test_role" {
name = "test_role"
assume_role_policy = <<EOF
@ -31,23 +48,6 @@ resource "aws_iam_role" "test_role" {
}
EOF
}
resource "aws_iam_role_policy" "test_policy" {
name = "test_policy"
role = "${aws_iam_role.test_role.id}"
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:Describe*"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
```
## Argument Reference

View File

@ -13,16 +13,6 @@ Provides an IAM policy attached to a user.
## Example Usage
```
resource "aws_iam_user" "lb" {
name = "loadbalancer"
path = "/system/"
}
resource "aws_iam_access_key" "lb" {
user = "${aws_iam_user.lb.name}"
status = "Active"
}
resource "aws_iam_user_policy" "lb_ro" {
name = "test"
user = "${aws_iam_user.lb.name}"
@ -41,6 +31,16 @@ resource "aws_iam_user_policy" "lb_ro" {
}
EOF
}
resource "aws_iam_user" "lb" {
name = "loadbalancer"
path = "/system/"
}
resource "aws_iam_access_key" "lb" {
user = "${aws_iam_user.lb.name}"
status = "Active"
}
```
## Argument Reference