Skip to content

Commit 4502dac

Browse files
Apply suggestions from code review
Co-authored-by: Anton Babenko <[email protected]>
1 parent 9b381af commit 4502dac

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

examples/iam-group/outputs.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ output "group_name" {
1818
}
1919

2020
output "group_unique_id" {
21-
description = " The unique ID assigned by AWS"
21+
description = "The unique ID assigned by AWS"
2222
value = module.iam_group.unique_id
2323
}
2424

modules/iam-account/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ aws_iam_account_alias.this: Error creating account alias with name my-account-al
3232
If you want to manage IAM alias using Terraform (otherwise why are you reading this?) you need to import this resource like this:
3333

3434
```sh
35-
$ terraform import module.iam_account.aws_iam_account_alias.this this
35+
$ terraform import "module.iam_account.aws_iam_account_alias.this[0]" this
3636

3737
module.iam_account.aws_iam_account_alias.this: Importing from ID "this"...
3838
module.iam_account.aws_iam_account_alias.this: Import complete!

modules/iam-oidc-provider/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ See more details [here](https://docs.github.com/en/actions/deployment/security-h
1212

1313
```hcl
1414
module "iam_oidc_provider" {
15-
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-provider"
15+
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-provider"
1616
1717
url = "https://token.actions.githubusercontent.com"
1818
@@ -28,7 +28,7 @@ See more details [here](https://support.atlassian.com/bitbucket-cloud/docs/integ
2828

2929
```hcl
3030
module "iam_oidc_provider" {
31-
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-provider"
31+
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-provider"
3232
3333
url = "https://api.bitbucket.org/2.0/workspaces/example-workspace/pipelines-config/identity/oidc"
3434

modules/iam-role/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ The defaults provided by the module are suitable for GitHub Free, Pro, & Team, i
1010

1111
```hcl
1212
module "iam_oidc_role" {
13-
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-role"
13+
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-role"
1414
1515
enable_github_oidc = true
1616
@@ -33,7 +33,7 @@ For GitHub Enterprise Server, users will need to provide value for the `oidc_aud
3333

3434
```hcl
3535
module "iam_oidc_role" {
36-
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-role"
36+
source = "terraform-aws-modules/iam/aws//modules/iam-oidc-role"
3737
3838
enable_github_oidc = true
3939

0 commit comments

Comments
 (0)