Update iam_policy.py

Fixed doc for policy_name - it is a required field
Removed empty aliases
reviewable/pr18780/r1
Rob 9 years ago committed by whiter
parent b2b2fda5d4
commit 9bf0d06e4a

@ -27,54 +27,34 @@ options:
required: true required: true
default: null default: null
choices: [ "user", "group", "role"] choices: [ "user", "group", "role"]
aliases: []
iam_name: iam_name:
description: description:
- Name of IAM resource you wish to target for policy actions. In other words, the user name, group name or role name. - Name of IAM resource you wish to target for policy actions. In other words, the user name, group name or role name.
required: true required: true
aliases: []
policy_name: policy_name:
description: description:
- The name label for the policy to create or remove. - The name label for the policy to create or remove.
required: false required: true
aliases: []
policy_document: policy_document:
description: description:
- The path to the properly json formatted policy file (mutually exclusive with C(policy_json)) - The path to the properly json formatted policy file (mutually exclusive with C(policy_json))
required: false required: false
aliases: []
policy_json: policy_json:
description: description:
- A properly json formatted policy as string (mutually exclusive with C(policy_document), see https://github.com/ansible/ansible/issues/7005#issuecomment-42894813 on how to use it properly) - A properly json formatted policy as string (mutually exclusive with C(policy_document), see https://github.com/ansible/ansible/issues/7005#issuecomment-42894813 on how to use it properly)
required: false required: false
aliases: []
state: state:
description: description:
- Whether to create or delete the IAM policy. - Whether to create or delete the IAM policy.
required: true required: true
default: null default: null
choices: [ "present", "absent"] choices: [ "present", "absent"]
aliases: []
skip_duplicates: skip_duplicates:
description: description:
- By default the module looks for any policies that match the document you pass in, if there is a match it will not make a new policy object with the same rules. You can override this by specifying false which would allow for two policy objects with different names but same rules. - By default the module looks for any policies that match the document you pass in, if there is a match it will not make a new policy object with the same rules. You can override this by specifying false which would allow for two policy objects with different names but same rules.
required: false required: false
default: "/" default: "/"
aliases: []
aws_secret_key:
description:
- AWS secret key. If not set then the value of the AWS_SECRET_KEY environment variable is used.
required: false
default: null
aliases: [ 'ec2_secret_key', 'secret_key' ]
aws_access_key:
description:
- AWS access key. If not set then the value of the AWS_ACCESS_KEY environment variable is used.
required: false
default: null
aliases: [ 'ec2_access_key', 'access_key' ]
requirements: [ "boto" ]
notes: notes:
- 'Currently boto does not support the removal of Managed Policies, the module will not work removing/adding managed policies.' - 'Currently boto does not support the removal of Managed Policies, the module will not work removing/adding managed policies.'
author: "Jonathan I. Davila (@defionscode)" author: "Jonathan I. Davila (@defionscode)"

Loading…
Cancel
Save