You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/setup-iam-permissions/README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
# Module - IAM setup for using boundaries
2
2
3
-
This module is optional and only added as example. You can deploy the root terraform module via you own IAM user with the right credentials. Alternatively you can create a role to deploy the root module with a limit boundary set.
3
+
This module is optional and only added as example. You can deploy the root terraform module via your own IAM user with the right credentials. Alternatively you can create a role to deploy the root module with a limit boundary set.
4
4
5
-
This module will create an AWS IAM role that is required to use permission boundaries. The created rol can be used to deploy the root module.
5
+
This module will create an AWS IAM role that is required to use permission boundaries. The created role can be used to deploy the root module.
6
6
7
7
## Usages
8
8
@@ -33,7 +33,7 @@ output "boundary" {
33
33
}
34
34
```
35
35
36
-
Next execute the created Terraform code `terraform init && terraform apply` The module will. You can use the created role in your terraform provider with assume role and the boundary as well the namespace needs to be set to the root module.
36
+
Next execute the created Terraform code via `terraform init && terraform apply`. You can use the created role in your terraform provider with assume role and the boundary as well the namespace needs to be set to the root module.
0 commit comments