From bef7655134bfd0f6121cc09c75f185bfec52e94c Mon Sep 17 00:00:00 2001 From: hitofuji Date: Mon, 18 Nov 2024 17:27:56 +0900 Subject: [PATCH 1/5] docs: update terminology from "customer managed policies" to "managed IAM policies" --- .../iam/group_policy_attachments_exclusive.go | 4 +-- .../iam/role_policy_attachments_exclusive.go | 4 +-- .../iam/user_policy_attachments_exclusive.go | 4 +-- ...policy_attachments_exclusive.html.markdown | 25 +++++++++-------- ...policy_attachments_exclusive.html.markdown | 25 +++++++++-------- ...policy_attachments_exclusive.html.markdown | 25 +++++++++-------- ...policy_attachments_exclusive.html.markdown | 28 +++++++++---------- ...policy_attachments_exclusive.html.markdown | 28 +++++++++---------- ...policy_attachments_exclusive.html.markdown | 28 +++++++++---------- ...policy_attachments_exclusive.html.markdown | 23 +++++++-------- ...policy_attachments_exclusive.html.markdown | 23 +++++++-------- ...policy_attachments_exclusive.html.markdown | 23 +++++++-------- 12 files changed, 120 insertions(+), 120 deletions(-) diff --git a/internal/service/iam/group_policy_attachments_exclusive.go b/internal/service/iam/group_policy_attachments_exclusive.go index 876c700f996..16cc78d2d57 100644 --- a/internal/service/iam/group_policy_attachments_exclusive.go +++ b/internal/service/iam/group_policy_attachments_exclusive.go @@ -144,10 +144,10 @@ func (r *resourceGroupPolicyAttachmentsExclusive) Update(ctx context.Context, re resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...) } -// syncAttachments handles keeping the configured customer managed policy +// syncAttachments handles keeping the configured managed IAM policies // attachments in sync with the remote resource. // -// Customer managed policies defined on this resource but not attached to +// Managed IAM policies defined on this resource but not attached to // the group will be added. Policies attached to the group but not configured // on this resource will be removed. func (r *resourceGroupPolicyAttachmentsExclusive) syncAttachments(ctx context.Context, groupName string, want []string) error { diff --git a/internal/service/iam/role_policy_attachments_exclusive.go b/internal/service/iam/role_policy_attachments_exclusive.go index c7c28108b92..956fac1725b 100644 --- a/internal/service/iam/role_policy_attachments_exclusive.go +++ b/internal/service/iam/role_policy_attachments_exclusive.go @@ -144,10 +144,10 @@ func (r *resourceRolePolicyAttachmentsExclusive) Update(ctx context.Context, req resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...) } -// syncAttachments handles keeping the configured customer managed policy +// syncAttachments handles keeping the configured managed IAM policies // attachments in sync with the remote resource. // -// Customer managed policies defined on this resource but not attached to +// Managed IAM policies defined on this resource but not attached to // the role will be added. Policies attached to the role but not configured // on this resource will be removed. func (r *resourceRolePolicyAttachmentsExclusive) syncAttachments(ctx context.Context, roleName string, want []string) error { diff --git a/internal/service/iam/user_policy_attachments_exclusive.go b/internal/service/iam/user_policy_attachments_exclusive.go index db960ec61ef..51c258f474c 100644 --- a/internal/service/iam/user_policy_attachments_exclusive.go +++ b/internal/service/iam/user_policy_attachments_exclusive.go @@ -144,10 +144,10 @@ func (r *resourceUserPolicyAttachmentsExclusive) Update(ctx context.Context, req resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...) } -// syncAttachments handles keeping the configured customer managed policy +// syncAttachments handles keeping the configured managed IAM policies // attachments in sync with the remote resource. // -// Customer managed policies defined on this resource but not attached to +// Managed IAM policies defined on this resource but not attached to // the user will be added. Policies attached to the user but not configured // on this resource will be removed. func (r *resourceUserPolicyAttachmentsExclusive) syncAttachments(ctx context.Context, userName string, want []string) error { diff --git a/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown index 9011155831b..b478200083e 100644 --- a/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown @@ -3,17 +3,18 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_group_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. --- + # Resource: aws_iam_group_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. -!> This resource takes exclusive ownership over customer managed policies attached to a group. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a group. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the group. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the group. ## Example Usage @@ -37,11 +38,11 @@ class MyConvertedCode(TerraformStack): ) ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -65,8 +66,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -* `group_name` - (Required) IAM group name. -* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +- `group_name` - (Required) IAM group name. +- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference @@ -74,7 +75,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `group_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `group_name`. For example: ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -91,10 +92,10 @@ class MyConvertedCode(TerraformStack): IamGroupPolicyAttachmentsExclusive.generate_config_for_import(self, "example", "MyGroup") ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `group_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `group_name`. For example: ```console % terraform import aws_iam_group_policy_attachments_exclusive.example MyGroup ``` - \ No newline at end of file + diff --git a/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown index 62cd4f89bf3..3a2ad236cec 100644 --- a/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown @@ -3,17 +3,18 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_role_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. --- + # Resource: aws_iam_role_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. -!> This resource takes exclusive ownership over customer managed policies attached to a role. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a role. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the role. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the role. ## Example Usage @@ -37,11 +38,11 @@ class MyConvertedCode(TerraformStack): ) ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -65,8 +66,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -* `role_name` - (Required) IAM role name. -* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +- `role_name` - (Required) IAM role name. +- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference @@ -74,7 +75,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `role_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `role_name`. For example: ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -91,10 +92,10 @@ class MyConvertedCode(TerraformStack): IamRolePolicyAttachmentsExclusive.generate_config_for_import(self, "example", "MyRole") ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `role_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `role_name`. For example: ```console % terraform import aws_iam_role_policy_attachments_exclusive.example MyRole ``` - \ No newline at end of file + diff --git a/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown index 2d12bcabb03..4a034d3ad16 100644 --- a/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown @@ -3,17 +3,18 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_user_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. --- + # Resource: aws_iam_user_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. -!> This resource takes exclusive ownership over customer managed policies attached to a user. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a user. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the user. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the user. ## Example Usage @@ -37,11 +38,11 @@ class MyConvertedCode(TerraformStack): ) ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -65,8 +66,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -* `user_name` - (Required) IAM user name. -* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +- `user_name` - (Required) IAM user name. +- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference @@ -74,7 +75,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `user_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `user_name`. For example: ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -91,10 +92,10 @@ class MyConvertedCode(TerraformStack): IamUserPolicyAttachmentsExclusive.generate_config_for_import(self, "example", "MyUser") ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `user_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `user_name`. For example: ```console % terraform import aws_iam_user_policy_attachments_exclusive.example MyUser ``` - \ No newline at end of file + diff --git a/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown index 874b7027383..c69fc484c13 100644 --- a/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown @@ -3,17 +3,18 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_group_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. --- + # Resource: aws_iam_group_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. -!> This resource takes exclusive ownership over customer managed policies attached to a group. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a group. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the group. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the group. ## Example Usage @@ -37,14 +38,13 @@ class MyConvertedCode extends TerraformStack { }); } } - ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policyArns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policyArns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -67,15 +67,14 @@ class MyConvertedCode extends TerraformStack { }); } } - ``` ## Argument Reference The following arguments are required: -* `groupName` - (Required) IAM group name. -* `policyArns` - (Required) A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +- `groupName` - (Required) IAM group name. +- `policyArns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference @@ -83,7 +82,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `groupName`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `groupName`. For example: ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -104,13 +103,12 @@ class MyConvertedCode extends TerraformStack { ); } } - ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `groupName`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `groupName`. For example: ```console % terraform import aws_iam_group_policy_attachments_exclusive.example MyGroup ``` - \ No newline at end of file + diff --git a/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown index b0583730fa7..600032f58da 100644 --- a/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown @@ -3,17 +3,18 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_role_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. --- + # Resource: aws_iam_role_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. -!> This resource takes exclusive ownership over customer managed policies attached to a role. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a role. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the role. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the role. ## Example Usage @@ -37,14 +38,13 @@ class MyConvertedCode extends TerraformStack { }); } } - ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policyArns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policyArns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -67,15 +67,14 @@ class MyConvertedCode extends TerraformStack { }); } } - ``` ## Argument Reference The following arguments are required: -* `roleName` - (Required) IAM role name. -* `policyArns` - (Required) A list of customer managed policy ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +- `roleName` - (Required) IAM role name. +- `policyArns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference @@ -83,7 +82,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `roleName`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `roleName`. For example: ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -104,13 +103,12 @@ class MyConvertedCode extends TerraformStack { ); } } - ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `roleName`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `roleName`. For example: ```console % terraform import aws_iam_role_policy_attachments_exclusive.example MyRole ``` - \ No newline at end of file + diff --git a/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown index 1b843050fba..94f0c88b73b 100644 --- a/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown @@ -3,17 +3,18 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_user_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. --- + # Resource: aws_iam_user_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. -!> This resource takes exclusive ownership over customer managed policies attached to a user. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a user. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the user. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the user. ## Example Usage @@ -37,14 +38,13 @@ class MyConvertedCode extends TerraformStack { }); } } - ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policyArns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policyArns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -67,15 +67,14 @@ class MyConvertedCode extends TerraformStack { }); } } - ``` ## Argument Reference The following arguments are required: -* `userName` - (Required) IAM user name. -* `policyArns` - (Required) A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +- `userName` - (Required) IAM user name. +- `policyArns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference @@ -83,7 +82,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `userName`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `userName`. For example: ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -104,13 +103,12 @@ class MyConvertedCode extends TerraformStack { ); } } - ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `userName`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `userName`. For example: ```console % terraform import aws_iam_user_policy_attachments_exclusive.example MyUser ``` - \ No newline at end of file + diff --git a/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown index d984a62e157..65f289603c5 100644 --- a/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown @@ -3,15 +3,16 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_group_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. --- + # Resource: aws_iam_group_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. -!> This resource takes exclusive ownership over customer managed policies attached to a group. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a group. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the group. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the group. ## Example Usage @@ -24,11 +25,11 @@ resource "aws_iam_group_policy_attachments_exclusive" "example" { } ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```terraform resource "aws_iam_group_policy_attachments_exclusive" "example" { @@ -41,8 +42,8 @@ resource "aws_iam_group_policy_attachments_exclusive" "example" { The following arguments are required: -* `group_name` - (Required) IAM group name. -* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +- `group_name` - (Required) IAM group name. +- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference @@ -50,7 +51,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `group_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `group_name`. For example: ```terraform import { @@ -59,7 +60,7 @@ import { } ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `group_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `group_name`. For example: ```console % terraform import aws_iam_group_policy_attachments_exclusive.example MyGroup diff --git a/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown index dc0458a52f5..f3c6582cec9 100644 --- a/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown @@ -3,15 +3,16 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_role_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. --- + # Resource: aws_iam_role_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. -!> This resource takes exclusive ownership over customer managed policies attached to a role. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a role. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the role. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the role. ## Example Usage @@ -24,11 +25,11 @@ resource "aws_iam_role_policy_attachments_exclusive" "example" { } ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```terraform resource "aws_iam_role_policy_attachments_exclusive" "example" { @@ -41,8 +42,8 @@ resource "aws_iam_role_policy_attachments_exclusive" "example" { The following arguments are required: -* `role_name` - (Required) IAM role name. -* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +- `role_name` - (Required) IAM role name. +- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference @@ -50,7 +51,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `role_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `role_name`. For example: ```terraform import { @@ -59,7 +60,7 @@ import { } ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `role_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `role_name`. For example: ```console % terraform import aws_iam_role_policy_attachments_exclusive.example MyRole diff --git a/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown index 7916805644a..973fe795c87 100644 --- a/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown @@ -3,15 +3,16 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_user_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. + Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. --- + # Resource: aws_iam_user_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. +Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. -!> This resource takes exclusive ownership over customer managed policies attached to a user. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over managed IAM policies attached to a user. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the user. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the user. ## Example Usage @@ -24,11 +25,11 @@ resource "aws_iam_user_policy_attachments_exclusive" "example" { } ``` -### Disallow Customer Managed Policies +### Disallow Managed IAM Policies -To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not __prevent__ customer managed policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```terraform resource "aws_iam_user_policy_attachments_exclusive" "example" { @@ -41,8 +42,8 @@ resource "aws_iam_user_policy_attachments_exclusive" "example" { The following arguments are required: -* `user_name` - (Required) IAM user name. -* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +- `user_name` - (Required) IAM user name. +- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference @@ -50,7 +51,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `user_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `user_name`. For example: ```terraform import { @@ -59,7 +60,7 @@ import { } ``` -Using `terraform import`, import exclusive management of customer managed policy assignments using the `user_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policies assignments using the `user_name`. For example: ```console % terraform import aws_iam_user_policy_attachments_exclusive.example MyUser From 825b8b0f8e2b459a76d31970088eb159e555a87c Mon Sep 17 00:00:00 2001 From: Jared Baker Date: Mon, 18 Nov 2024 09:59:20 -0500 Subject: [PATCH 2/5] chore: revert cdktf doc changes Changes to these documents are handled by an automated process --- ...policy_attachments_exclusive.html.markdown | 25 ++++++++--------- ...policy_attachments_exclusive.html.markdown | 25 ++++++++--------- ...policy_attachments_exclusive.html.markdown | 25 ++++++++--------- ...policy_attachments_exclusive.html.markdown | 28 ++++++++++--------- ...policy_attachments_exclusive.html.markdown | 28 ++++++++++--------- ...policy_attachments_exclusive.html.markdown | 28 ++++++++++--------- 6 files changed, 81 insertions(+), 78 deletions(-) diff --git a/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown index b478200083e..9011155831b 100644 --- a/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/python/r/iam_group_policy_attachments_exclusive.html.markdown @@ -3,18 +3,17 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_group_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. + Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. --- - # Resource: aws_iam_group_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. +Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. -!> This resource takes exclusive ownership over managed IAM policies attached to a group. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over customer managed policies attached to a group. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the group. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the group. ## Example Usage @@ -38,11 +37,11 @@ class MyConvertedCode(TerraformStack): ) ``` -### Disallow Managed IAM Policies +### Disallow Customer Managed Policies -To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not __prevent__ customer managed policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -66,8 +65,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -- `group_name` - (Required) IAM group name. -- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +* `group_name` - (Required) IAM group name. +* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference @@ -75,7 +74,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `group_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `group_name`. For example: ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -92,10 +91,10 @@ class MyConvertedCode(TerraformStack): IamGroupPolicyAttachmentsExclusive.generate_config_for_import(self, "example", "MyGroup") ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `group_name`. For example: +Using `terraform import`, import exclusive management of customer managed policy assignments using the `group_name`. For example: ```console % terraform import aws_iam_group_policy_attachments_exclusive.example MyGroup ``` - + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown index 3a2ad236cec..62cd4f89bf3 100644 --- a/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/python/r/iam_role_policy_attachments_exclusive.html.markdown @@ -3,18 +3,17 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_role_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. + Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. --- - # Resource: aws_iam_role_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. +Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. -!> This resource takes exclusive ownership over managed IAM policies attached to a role. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over customer managed policies attached to a role. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the role. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the role. ## Example Usage @@ -38,11 +37,11 @@ class MyConvertedCode(TerraformStack): ) ``` -### Disallow Managed IAM Policies +### Disallow Customer Managed Policies -To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not __prevent__ customer managed policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -66,8 +65,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -- `role_name` - (Required) IAM role name. -- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +* `role_name` - (Required) IAM role name. +* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference @@ -75,7 +74,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `role_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `role_name`. For example: ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -92,10 +91,10 @@ class MyConvertedCode(TerraformStack): IamRolePolicyAttachmentsExclusive.generate_config_for_import(self, "example", "MyRole") ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `role_name`. For example: +Using `terraform import`, import exclusive management of customer managed policy assignments using the `role_name`. For example: ```console % terraform import aws_iam_role_policy_attachments_exclusive.example MyRole ``` - + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown index 4a034d3ad16..2d12bcabb03 100644 --- a/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/python/r/iam_user_policy_attachments_exclusive.html.markdown @@ -3,18 +3,17 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_user_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. + Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. --- - # Resource: aws_iam_user_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. +Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. -!> This resource takes exclusive ownership over managed IAM policies attached to a user. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. +!> This resource takes exclusive ownership over customer managed policies attached to a user. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policy_arns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the user. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the user. ## Example Usage @@ -38,11 +37,11 @@ class MyConvertedCode(TerraformStack): ) ``` -### Disallow Managed IAM Policies +### Disallow Customer Managed Policies -To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. +To automatically remove any configured customer managed policies, set the `policy_arns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not __prevent__ customer managed policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -66,8 +65,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -- `user_name` - (Required) IAM user name. -- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +* `user_name` - (Required) IAM user name. +* `policy_arns` - (Required) A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference @@ -75,7 +74,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `user_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `user_name`. For example: ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -92,10 +91,10 @@ class MyConvertedCode(TerraformStack): IamUserPolicyAttachmentsExclusive.generate_config_for_import(self, "example", "MyUser") ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `user_name`. For example: +Using `terraform import`, import exclusive management of customer managed policy assignments using the `user_name`. For example: ```console % terraform import aws_iam_user_policy_attachments_exclusive.example MyUser ``` - + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown index c69fc484c13..874b7027383 100644 --- a/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/typescript/r/iam_group_policy_attachments_exclusive.html.markdown @@ -3,18 +3,17 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_group_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. + Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. --- - # Resource: aws_iam_group_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) group. +Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) group. -!> This resource takes exclusive ownership over managed IAM policies attached to a group. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. +!> This resource takes exclusive ownership over customer managed policies attached to a group. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_group_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the group. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the group. ## Example Usage @@ -38,13 +37,14 @@ class MyConvertedCode extends TerraformStack { }); } } + ``` -### Disallow Managed IAM Policies +### Disallow Customer Managed Policies -To automatically remove any configured managed IAM policies, set the `policyArns` argument to an empty list. +To automatically remove any configured customer managed policies, set the `policyArns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not __prevent__ customer managed policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -67,14 +67,15 @@ class MyConvertedCode extends TerraformStack { }); } } + ``` ## Argument Reference The following arguments are required: -- `groupName` - (Required) IAM group name. -- `policyArns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +* `groupName` - (Required) IAM group name. +* `policyArns` - (Required) A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference @@ -82,7 +83,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `groupName`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `groupName`. For example: ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -103,12 +104,13 @@ class MyConvertedCode extends TerraformStack { ); } } + ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `groupName`. For example: +Using `terraform import`, import exclusive management of customer managed policy assignments using the `groupName`. For example: ```console % terraform import aws_iam_group_policy_attachments_exclusive.example MyGroup ``` - + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown index 600032f58da..b0583730fa7 100644 --- a/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/typescript/r/iam_role_policy_attachments_exclusive.html.markdown @@ -3,18 +3,17 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_role_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. + Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. --- - # Resource: aws_iam_role_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) role. +Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) role. -!> This resource takes exclusive ownership over managed IAM policies attached to a role. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. +!> This resource takes exclusive ownership over customer managed policies attached to a role. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_role_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the role. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the role. ## Example Usage @@ -38,13 +37,14 @@ class MyConvertedCode extends TerraformStack { }); } } + ``` -### Disallow Managed IAM Policies +### Disallow Customer Managed Policies -To automatically remove any configured managed IAM policies, set the `policyArns` argument to an empty list. +To automatically remove any configured customer managed policies, set the `policyArns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not __prevent__ customer managed policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -67,14 +67,15 @@ class MyConvertedCode extends TerraformStack { }); } } + ``` ## Argument Reference The following arguments are required: -- `roleName` - (Required) IAM role name. -- `policyArns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +* `roleName` - (Required) IAM role name. +* `policyArns` - (Required) A list of customer managed policy ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference @@ -82,7 +83,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `roleName`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `roleName`. For example: ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -103,12 +104,13 @@ class MyConvertedCode extends TerraformStack { ); } } + ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `roleName`. For example: +Using `terraform import`, import exclusive management of customer managed policy assignments using the `roleName`. For example: ```console % terraform import aws_iam_role_policy_attachments_exclusive.example MyRole ``` - + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown index 94f0c88b73b..1b843050fba 100644 --- a/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/cdktf/typescript/r/iam_user_policy_attachments_exclusive.html.markdown @@ -3,18 +3,17 @@ subcategory: "IAM (Identity & Access Management)" layout: "aws" page_title: "AWS: aws_iam_user_policy_attachments_exclusive" description: |- - Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. + Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. --- - # Resource: aws_iam_user_policy_attachments_exclusive -Terraform resource for maintaining exclusive management of managed IAM policies assigned to an AWS IAM (Identity & Access Management) user. +Terraform resource for maintaining exclusive management of customer managed policies assigned to an AWS IAM (Identity & Access Management) user. -!> This resource takes exclusive ownership over managed IAM policies attached to a user. This includes removal of managed IAM policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. +!> This resource takes exclusive ownership over customer managed policies attached to a user. This includes removal of customer managed policies which are not explicitly configured. To prevent persistent drift, ensure any `aws_iam_user_policy_attachment` resources managed alongside this resource are included in the `policyArns` argument. -~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It **will not** detach the configured policies from the user. +~> Destruction of this resource means Terraform will no longer manage reconciliation of the configured policy attachments. It __will not__ detach the configured policies from the user. ## Example Usage @@ -38,13 +37,14 @@ class MyConvertedCode extends TerraformStack { }); } } + ``` -### Disallow Managed IAM Policies +### Disallow Customer Managed Policies -To automatically remove any configured managed IAM policies, set the `policyArns` argument to an empty list. +To automatically remove any configured customer managed policies, set the `policyArns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not __prevent__ customer managed policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing customer managed policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -67,14 +67,15 @@ class MyConvertedCode extends TerraformStack { }); } } + ``` ## Argument Reference The following arguments are required: -- `userName` - (Required) IAM user name. -- `policyArns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +* `userName` - (Required) IAM user name. +* `policyArns` - (Required) A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference @@ -82,7 +83,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `userName`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage customer managed policy assignments using the `userName`. For example: ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -103,12 +104,13 @@ class MyConvertedCode extends TerraformStack { ); } } + ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `userName`. For example: +Using `terraform import`, import exclusive management of customer managed policy assignments using the `userName`. For example: ```console % terraform import aws_iam_user_policy_attachments_exclusive.example MyUser ``` - + \ No newline at end of file From b634a9523afe590f3585af97dcd437607448283b Mon Sep 17 00:00:00 2001 From: Jared Baker Date: Mon, 18 Nov 2024 10:04:59 -0500 Subject: [PATCH 3/5] chore: tidy comment grammar --- internal/service/iam/group_policy_attachments_exclusive.go | 2 +- internal/service/iam/role_policy_attachments_exclusive.go | 2 +- internal/service/iam/user_policy_attachments_exclusive.go | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/internal/service/iam/group_policy_attachments_exclusive.go b/internal/service/iam/group_policy_attachments_exclusive.go index 16cc78d2d57..bdc9dc22643 100644 --- a/internal/service/iam/group_policy_attachments_exclusive.go +++ b/internal/service/iam/group_policy_attachments_exclusive.go @@ -144,7 +144,7 @@ func (r *resourceGroupPolicyAttachmentsExclusive) Update(ctx context.Context, re resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...) } -// syncAttachments handles keeping the configured managed IAM policies +// syncAttachments handles keeping the configured managed IAM policy // attachments in sync with the remote resource. // // Managed IAM policies defined on this resource but not attached to diff --git a/internal/service/iam/role_policy_attachments_exclusive.go b/internal/service/iam/role_policy_attachments_exclusive.go index 956fac1725b..a33ce17283a 100644 --- a/internal/service/iam/role_policy_attachments_exclusive.go +++ b/internal/service/iam/role_policy_attachments_exclusive.go @@ -144,7 +144,7 @@ func (r *resourceRolePolicyAttachmentsExclusive) Update(ctx context.Context, req resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...) } -// syncAttachments handles keeping the configured managed IAM policies +// syncAttachments handles keeping the configured managed IAM policy // attachments in sync with the remote resource. // // Managed IAM policies defined on this resource but not attached to diff --git a/internal/service/iam/user_policy_attachments_exclusive.go b/internal/service/iam/user_policy_attachments_exclusive.go index 51c258f474c..8f0226d8e5b 100644 --- a/internal/service/iam/user_policy_attachments_exclusive.go +++ b/internal/service/iam/user_policy_attachments_exclusive.go @@ -144,7 +144,7 @@ func (r *resourceUserPolicyAttachmentsExclusive) Update(ctx context.Context, req resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...) } -// syncAttachments handles keeping the configured managed IAM policies +// syncAttachments handles keeping the configured managed IAM policy // attachments in sync with the remote resource. // // Managed IAM policies defined on this resource but not attached to From 2c0d7c3e24a79a0028be412651b365a7f1e9217f Mon Sep 17 00:00:00 2001 From: Jared Baker Date: Mon, 18 Nov 2024 10:09:49 -0500 Subject: [PATCH 4/5] chore: tidy website grammar --- ...am_group_policy_attachments_exclusive.html.markdown | 10 +++++----- ...iam_role_policy_attachments_exclusive.html.markdown | 10 +++++----- ...iam_user_policy_attachments_exclusive.html.markdown | 10 +++++----- 3 files changed, 15 insertions(+), 15 deletions(-) diff --git a/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown index 65f289603c5..6a3744bcc79 100644 --- a/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown @@ -29,7 +29,7 @@ resource "aws_iam_group_policy_attachments_exclusive" "example" { To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a group via Terraform (or any other interface). This resource enables bringing managed IAM policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```terraform resource "aws_iam_group_policy_attachments_exclusive" "example" { @@ -42,8 +42,8 @@ resource "aws_iam_group_policy_attachments_exclusive" "example" { The following arguments are required: -- `group_name` - (Required) IAM group name. -- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +* `group_name` - (Required) IAM group name. +* `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference @@ -51,7 +51,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `group_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policy assignments using the `group_name`. For example: ```terraform import { @@ -60,7 +60,7 @@ import { } ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `group_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policy assignments using the `group_name`. For example: ```console % terraform import aws_iam_group_policy_attachments_exclusive.example MyGroup diff --git a/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown index f3c6582cec9..7855adc0d68 100644 --- a/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown @@ -29,7 +29,7 @@ resource "aws_iam_role_policy_attachments_exclusive" "example" { To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a role via Terraform (or any other interface). This resource enables bringing managed IAM policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```terraform resource "aws_iam_role_policy_attachments_exclusive" "example" { @@ -42,8 +42,8 @@ resource "aws_iam_role_policy_attachments_exclusive" "example" { The following arguments are required: -- `role_name` - (Required) IAM role name. -- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +* `role_name` - (Required) IAM role name. +* `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference @@ -51,7 +51,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `role_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policy assignments using the `role_name`. For example: ```terraform import { @@ -60,7 +60,7 @@ import { } ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `role_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policy assignments using the `role_name`. For example: ```console % terraform import aws_iam_role_policy_attachments_exclusive.example MyRole diff --git a/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown index 973fe795c87..264a79dff6a 100644 --- a/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown @@ -29,7 +29,7 @@ resource "aws_iam_user_policy_attachments_exclusive" "example" { To automatically remove any configured managed IAM policies, set the `policy_arns` argument to an empty list. -~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policies assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. +~> This will not **prevent** managed IAM policies from being assigned to a user via Terraform (or any other interface). This resource enables bringing managed IAM policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. ```terraform resource "aws_iam_user_policy_attachments_exclusive" "example" { @@ -42,8 +42,8 @@ resource "aws_iam_user_policy_attachments_exclusive" "example" { The following arguments are required: -- `user_name` - (Required) IAM user name. -- `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +* `user_name` - (Required) IAM user name. +* `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference @@ -51,7 +51,7 @@ This resource exports no additional attributes. ## Import -In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policies assignments using the `user_name`. For example: +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to exclusively manage managed IAM policy assignments using the `user_name`. For example: ```terraform import { @@ -60,7 +60,7 @@ import { } ``` -Using `terraform import`, import exclusive management of managed IAM policies assignments using the `user_name`. For example: +Using `terraform import`, import exclusive management of managed IAM policy assignments using the `user_name`. For example: ```console % terraform import aws_iam_user_policy_attachments_exclusive.example MyUser From 53f0b68d05cc4f8cdb8a0e9eb8c3322d45cf2e7e Mon Sep 17 00:00:00 2001 From: Jared Baker Date: Mon, 18 Nov 2024 10:13:31 -0500 Subject: [PATCH 5/5] chore: tidy argument description grammar --- .../docs/r/iam_group_policy_attachments_exclusive.html.markdown | 2 +- .../docs/r/iam_role_policy_attachments_exclusive.html.markdown | 2 +- .../docs/r/iam_user_policy_attachments_exclusive.html.markdown | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown index 6a3744bcc79..192e850d6df 100644 --- a/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_group_policy_attachments_exclusive.html.markdown @@ -43,7 +43,7 @@ resource "aws_iam_group_policy_attachments_exclusive" "example" { The following arguments are required: * `group_name` - (Required) IAM group name. -* `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. +* `policy_arns` - (Required) A list of managed IAM policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed. ## Attribute Reference diff --git a/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown index 7855adc0d68..be76bb34c2c 100644 --- a/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_role_policy_attachments_exclusive.html.markdown @@ -43,7 +43,7 @@ resource "aws_iam_role_policy_attachments_exclusive" "example" { The following arguments are required: * `role_name` - (Required) IAM role name. -* `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. +* `policy_arns` - (Required) A list of managed IAM policy ARNs to be attached to the role. Policies attached to this role but not configured in this argument will be removed. ## Attribute Reference diff --git a/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown b/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown index 264a79dff6a..2035b6c71e8 100644 --- a/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown +++ b/website/docs/r/iam_user_policy_attachments_exclusive.html.markdown @@ -43,7 +43,7 @@ resource "aws_iam_user_policy_attachments_exclusive" "example" { The following arguments are required: * `user_name` - (Required) IAM user name. -* `policy_arns` - (Required) A list of managed IAM policies ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. +* `policy_arns` - (Required) A list of managed IAM policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed. ## Attribute Reference