Skip to content

Commit cf4e77b

Browse files
authored
fix: Correct iam-group variable name mis-spelling (#610)
1 parent 677a921 commit cf4e77b

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

docs/UPGRADE-6.0.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ stateDiagram
134134
- None
135135
- `iam-group`
136136
- `create_group` -> `create`
137-
- `group_users` -> `group`
137+
- `group_users` -> `users`
138138
- `custom_group_policy_arns` -> `policies`
139139
- `attach_iam_self_management_policy` -> `create_policy`
140140
- `iam_self_management_policy_name_prefix` -> `policy_name_prefix`

modules/iam-group/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ No modules.
7272
|------|-------------|------|---------|:--------:|
7373
| <a name="input_create"></a> [create](#input\_create) | Controls if resources should be created (affects all resources) | `bool` | `true` | no |
7474
| <a name="input_create_policy"></a> [create\_policy](#input\_create\_policy) | Whether to create IAM policy for IAM group | `bool` | `true` | no |
75-
| <a name="input_enable_mfa_enforcment"></a> [enable\_mfa\_enforcment](#input\_enable\_mfa\_enforcment) | Determines whether permissions are added to the policy which requires the groups IAM users to use MFA | `bool` | `true` | no |
75+
| <a name="input_enable_mfa_enforcement"></a> [enable\_mfa\_enforcement](#input\_enable\_mfa\_enforcement) | Determines whether permissions are added to the policy which requires the groups IAM users to use MFA | `bool` | `true` | no |
7676
| <a name="input_enable_self_management_permissions"></a> [enable\_self\_management\_permissions](#input\_enable\_self\_management\_permissions) | Determines whether permissions are added to the policy which allow the groups IAM users to manage their credentials and MFA | `bool` | `true` | no |
7777
| <a name="input_name"></a> [name](#input\_name) | The group's name. The name must consist of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: `=,.@-_.` | `string` | `""` | no |
7878
| <a name="input_path"></a> [path](#input\_path) | Path in which to create the group | `string` | `null` | no |

modules/iam-group/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ data "aws_iam_policy_document" "this" {
171171
}
172172

173173
dynamic "statement" {
174-
for_each = var.enable_self_management_permissions && var.enable_mfa_enforcment ? [1] : []
174+
for_each = var.enable_self_management_permissions && var.enable_mfa_enforcement ? [1] : []
175175

176176
content {
177177
sid = "DenyAllExceptListedIfNoMFA"

modules/iam-group/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ variable "enable_self_management_permissions" {
4848
default = true
4949
}
5050

51-
variable "enable_mfa_enforcment" {
51+
variable "enable_mfa_enforcement" {
5252
description = "Determines whether permissions are added to the policy which requires the groups IAM users to use MFA"
5353
type = bool
5454
default = true

wrappers/iam-group/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ module "wrapper" {
55

66
create = try(each.value.create, var.defaults.create, true)
77
create_policy = try(each.value.create_policy, var.defaults.create_policy, true)
8-
enable_mfa_enforcment = try(each.value.enable_mfa_enforcment, var.defaults.enable_mfa_enforcment, true)
8+
enable_mfa_enforcement = try(each.value.enable_mfa_enforcement, var.defaults.enable_mfa_enforcement, true)
99
enable_self_management_permissions = try(each.value.enable_self_management_permissions, var.defaults.enable_self_management_permissions, true)
1010
name = try(each.value.name, var.defaults.name, "")
1111
path = try(each.value.path, var.defaults.path, null)

0 commit comments

Comments
 (0)