From 9bf0d06e4a280a75858bc20f2e4d1620c27be533 Mon Sep 17 00:00:00 2001 From: Rob Date: Mon, 14 Sep 2015 12:25:36 +1000 Subject: [PATCH] Update iam_policy.py Fixed doc for policy_name - it is a required field Removed empty aliases --- cloud/amazon/iam_policy.py | 22 +--------------------- 1 file changed, 1 insertion(+), 21 deletions(-) diff --git a/cloud/amazon/iam_policy.py b/cloud/amazon/iam_policy.py index 04fc8086939..475a6c35d65 100644 --- a/cloud/amazon/iam_policy.py +++ b/cloud/amazon/iam_policy.py @@ -27,54 +27,34 @@ options: required: true default: null choices: [ "user", "group", "role"] - aliases: [] iam_name: description: - Name of IAM resource you wish to target for policy actions. In other words, the user name, group name or role name. required: true - aliases: [] policy_name: description: - The name label for the policy to create or remove. - required: false - aliases: [] + required: true policy_document: description: - The path to the properly json formatted policy file (mutually exclusive with C(policy_json)) required: false - aliases: [] policy_json: description: - A properly json formatted policy as string (mutually exclusive with C(policy_document), see https://github.com/ansible/ansible/issues/7005#issuecomment-42894813 on how to use it properly) required: false - aliases: [] state: description: - Whether to create or delete the IAM policy. required: true default: null choices: [ "present", "absent"] - aliases: [] skip_duplicates: description: - By default the module looks for any policies that match the document you pass in, if there is a match it will not make a new policy object with the same rules. You can override this by specifying false which would allow for two policy objects with different names but same rules. required: false default: "/" - aliases: [] - aws_secret_key: - description: - - AWS secret key. If not set then the value of the AWS_SECRET_KEY environment variable is used. - required: false - default: null - aliases: [ 'ec2_secret_key', 'secret_key' ] - aws_access_key: - description: - - AWS access key. If not set then the value of the AWS_ACCESS_KEY environment variable is used. - required: false - default: null - aliases: [ 'ec2_access_key', 'access_key' ] -requirements: [ "boto" ] notes: - 'Currently boto does not support the removal of Managed Policies, the module will not work removing/adding managed policies.' author: "Jonathan I. Davila (@defionscode)"