From fc255fbd21cf75d23b1a9b40f01131e5a0fd3ee7 Mon Sep 17 00:00:00 2001 From: Brian Coca Date: Fri, 5 Jun 2015 14:09:02 -0400 Subject: [PATCH] minor doc fixes --- cloud/amazon/iam.py | 17 +++-------------- 1 file changed, 3 insertions(+), 14 deletions(-) diff --git a/cloud/amazon/iam.py b/cloud/amazon/iam.py index 05c74c5b716..a4111ee5477 100644 --- a/cloud/amazon/iam.py +++ b/cloud/amazon/iam.py @@ -28,48 +28,42 @@ options: required: true default: null choices: [ "user", "group", "role"] - aliases: [] name: description: - Name of IAM resource to create or identify required: true - aliases: [] new_name: description: - When state is update, will replace name with new_name on IAM resource required: false - aliases: [] + default: null new_path: description: - When state is update, will replace the path with new_path on the IAM resource required: false - aliases: [] + default: null state: description: - Whether to create, delete or update the IAM resource. Note, roles cannot be updated. required: true default: null choices: [ "present", "absent", "update" ] - aliases: [] path: description: - When creating or updating, specify the desired path of the resource. If state is present, it will replace the current path to match what is passed in when they do not match. required: false default: "/" - aliases: [] access_key_state: description: - When type is user, it creates, removes, deactivates or activates a user's access key(s). Note that actions apply only to keys specified. required: false default: null choices: [ "create", "remove", "active", "inactive"] - aliases: [] key_count: description: - When access_key_state is create it will ensure this quantity of keys are present. Defaults to 1. required: false default: '1' - aliases: [] access_key_ids: description: - A list of the keys that you want impacted by the access_key_state paramter. @@ -78,13 +72,11 @@ options: - A list of groups the user should belong to. When update, will gracefully remove groups not listed. required: false default: null - aliases: [] password: description: - When type is user and state is present, define the users login password. Also works with update. Note that always returns changed. required: false default: null - aliases: [] update_password: required: false default: always @@ -103,12 +95,9 @@ options: required: false default: null aliases: [ 'ec2_access_key', 'access_key' ] - - -requirements: [ "boto" ] notes: - 'Currently boto does not support the removal of Managed Policies, the module will error out if your user/group/role has managed policies when you try to do state=absent. They will need to be removed manually.' -author: Jonathan I. Davila and Paul Seiffert +author: Jonathan I. Davila and Paul Seiffert (@defionscode) extends_documentation_fragment: aws '''