Commit 151356a8 authored by Anton Babenko's avatar Anton Babenko Committed by GitHub

docs: Updated examples in README (#105)

parent c77256d2
...@@ -29,7 +29,7 @@ Terraform 0.11. Pin module version to `~> v1.0`. Submit pull-requests to `terraf ...@@ -29,7 +29,7 @@ Terraform 0.11. Pin module version to `~> v1.0`. Submit pull-requests to `terraf
```hcl ```hcl
module "iam_account" { module "iam_account" {
source = "terraform-aws-modules/iam/aws//modules/iam-account" source = "terraform-aws-modules/iam/aws//modules/iam-account"
version = "~> 2.0" version = "~> 3.0"
account_alias = "awesome-company" account_alias = "awesome-company"
...@@ -41,8 +41,8 @@ module "iam_account" { ...@@ -41,8 +41,8 @@ module "iam_account" {
`iam-assumable-role`: `iam-assumable-role`:
```hcl ```hcl
module "iam_assumable_role" { module "iam_assumable_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role" source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role"
version = "~> 2.0" version = "~> 3.0"
trusted_role_arns = [ trusted_role_arns = [
"arn:aws:iam::307990089504:root", "arn:aws:iam::307990089504:root",
...@@ -58,14 +58,15 @@ module "iam_assumable_role" { ...@@ -58,14 +58,15 @@ module "iam_assumable_role" {
"arn:aws:iam::aws:policy/AmazonCognitoReadOnly", "arn:aws:iam::aws:policy/AmazonCognitoReadOnly",
"arn:aws:iam::aws:policy/AlexaForBusinessFullAccess", "arn:aws:iam::aws:policy/AlexaForBusinessFullAccess",
] ]
number_of_custom_role_policy_arns = 2
} }
``` ```
`iam-assumable-role-with-oidc`: `iam-assumable-role-with-oidc`:
```hcl ```hcl
module "iam_assumable_role_with_oidc" { module "iam_assumable_role_with_oidc" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 2.0" version = "~> 3.0"
create_role = true create_role = true
...@@ -80,6 +81,7 @@ module "iam_assumable_role_with_oidc" { ...@@ -80,6 +81,7 @@ module "iam_assumable_role_with_oidc" {
role_policy_arns = [ role_policy_arns = [
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
] ]
number_of_role_policy_arns = 1
} }
``` ```
...@@ -87,7 +89,7 @@ module "iam_assumable_role_with_oidc" { ...@@ -87,7 +89,7 @@ module "iam_assumable_role_with_oidc" {
```hcl ```hcl
module "iam_assumable_roles" { module "iam_assumable_roles" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-roles" source = "terraform-aws-modules/iam/aws//modules/iam-assumable-roles"
version = "~> 2.0" version = "~> 3.0"
trusted_role_arns = [ trusted_role_arns = [
"arn:aws:iam::307990089504:root", "arn:aws:iam::307990089504:root",
...@@ -108,7 +110,7 @@ module "iam_assumable_roles" { ...@@ -108,7 +110,7 @@ module "iam_assumable_roles" {
```hcl ```hcl
module "iam_assumable_roles_with_saml" { module "iam_assumable_roles_with_saml" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-roles-with-saml" source = "terraform-aws-modules/iam/aws//modules/iam-assumable-roles-with-saml"
version = "~> 2.0" version = "~> 3.0"
create_admin_role = true create_admin_role = true
...@@ -125,7 +127,7 @@ module "iam_assumable_roles_with_saml" { ...@@ -125,7 +127,7 @@ module "iam_assumable_roles_with_saml" {
```hcl ```hcl
module "iam_user" { module "iam_user" {
source = "terraform-aws-modules/iam/aws//modules/iam-user" source = "terraform-aws-modules/iam/aws//modules/iam-user"
version = "~> 2.0" version = "~> 3.0"
name = "vasya.pupkin" name = "vasya.pupkin"
force_destroy = true force_destroy = true
...@@ -140,7 +142,7 @@ module "iam_user" { ...@@ -140,7 +142,7 @@ module "iam_user" {
```hcl ```hcl
module "iam_policy" { module "iam_policy" {
source = "terraform-aws-modules/iam/aws//modules/iam-policy" source = "terraform-aws-modules/iam/aws//modules/iam-policy"
version = "~> 2.0" version = "~> 3.0"
name = "example" name = "example"
path = "/" path = "/"
...@@ -167,7 +169,7 @@ EOF ...@@ -167,7 +169,7 @@ EOF
```hcl ```hcl
module "iam_group_with_assumable_roles_policy" { module "iam_group_with_assumable_roles_policy" {
source = "terraform-aws-modules/iam/aws//modules/iam-group-with-assumable-roles-policy" source = "terraform-aws-modules/iam/aws//modules/iam-group-with-assumable-roles-policy"
version = "~> 2.0" version = "~> 3.0"
name = "production-readonly" name = "production-readonly"
...@@ -186,7 +188,7 @@ module "iam_group_with_assumable_roles_policy" { ...@@ -186,7 +188,7 @@ module "iam_group_with_assumable_roles_policy" {
```hcl ```hcl
module "iam_group_with_policies" { module "iam_group_with_policies" {
source = "terraform-aws-modules/iam/aws//modules/iam-group-with-policies" source = "terraform-aws-modules/iam/aws//modules/iam-group-with-policies"
version = "~> 2.0" version = "~> 3.0"
name = "superadmins" name = "superadmins"
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment