Align IAM version number to the current version (2012-10-17)
This commit is contained in:
parent
8935013f69
commit
90d70786ac
|
@ -319,7 +319,7 @@ resource "aws_iam_role" "ecs_service" {
|
||||||
name = "EcsService"
|
name = "EcsService"
|
||||||
assume_role_policy = <<EOF
|
assume_role_policy = <<EOF
|
||||||
{
|
{
|
||||||
"Version": "2008-10-17",
|
"Version": "2012-10-17",
|
||||||
"Statement": [
|
"Statement": [
|
||||||
{
|
{
|
||||||
"Action": "sts:AssumeRole",
|
"Action": "sts:AssumeRole",
|
||||||
|
|
|
@ -430,7 +430,7 @@ func testAccCheckAWSS3BucketCors(n string, corsRules []*s3.CORSRule) resource.Te
|
||||||
// within AWS
|
// within AWS
|
||||||
var randInt = rand.New(rand.NewSource(time.Now().UnixNano())).Int()
|
var randInt = rand.New(rand.NewSource(time.Now().UnixNano())).Int()
|
||||||
var testAccWebsiteEndpoint = fmt.Sprintf("tf-test-bucket-%d.s3-website-us-west-2.amazonaws.com", randInt)
|
var testAccWebsiteEndpoint = fmt.Sprintf("tf-test-bucket-%d.s3-website-us-west-2.amazonaws.com", randInt)
|
||||||
var testAccAWSS3BucketPolicy = fmt.Sprintf(`{ "Version": "2008-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "*" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::tf-test-bucket-%d/*" } ] }`, randInt)
|
var testAccAWSS3BucketPolicy = fmt.Sprintf(`{ "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "*" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::tf-test-bucket-%d/*" } ] }`, randInt)
|
||||||
|
|
||||||
var testAccAWSS3BucketConfig = fmt.Sprintf(`
|
var testAccAWSS3BucketConfig = fmt.Sprintf(`
|
||||||
resource "aws_s3_bucket" "bucket" {
|
resource "aws_s3_bucket" "bucket" {
|
||||||
|
|
|
@ -128,7 +128,7 @@ resource "aws_sns_topic" "test_topic" {
|
||||||
name = "example"
|
name = "example"
|
||||||
policy = <<EOF
|
policy = <<EOF
|
||||||
{
|
{
|
||||||
"Version": "2008-10-17",
|
"Version": "2012-10-17",
|
||||||
"Id": "Policy1445931846145",
|
"Id": "Policy1445931846145",
|
||||||
"Statement": [
|
"Statement": [
|
||||||
{
|
{
|
||||||
|
|
|
@ -136,7 +136,7 @@ resource "aws_vpc_endpoint" "second-private-s3" {
|
||||||
route_table_ids = ["${aws_route_table.default.id}"]
|
route_table_ids = ["${aws_route_table.default.id}"]
|
||||||
policy = <<POLICY
|
policy = <<POLICY
|
||||||
{
|
{
|
||||||
"Version": "2008-10-17",
|
"Version": "2012-10-17",
|
||||||
"Statement": [
|
"Statement": [
|
||||||
{
|
{
|
||||||
"Sid":"AllowAll",
|
"Sid":"AllowAll",
|
||||||
|
@ -176,7 +176,7 @@ resource "aws_vpc_endpoint" "second-private-s3" {
|
||||||
route_table_ids = ["${aws_route_table.default.id}"]
|
route_table_ids = ["${aws_route_table.default.id}"]
|
||||||
policy = <<POLICY
|
policy = <<POLICY
|
||||||
{
|
{
|
||||||
"Version": "2008-10-17",
|
"Version": "2012-10-17",
|
||||||
"Statement": [
|
"Statement": [
|
||||||
{
|
{
|
||||||
"Sid":"AllowAll",
|
"Sid":"AllowAll",
|
||||||
|
|
|
@ -13,7 +13,7 @@ resource "aws_s3_bucket" "prod" {
|
||||||
acl = "private"
|
acl = "private"
|
||||||
policy = <<POLICY
|
policy = <<POLICY
|
||||||
{
|
{
|
||||||
"Version": "2008-10-17",
|
"Version": "2012-10-17",
|
||||||
"Statement": [
|
"Statement": [
|
||||||
{
|
{
|
||||||
"Sid": "AllowTest",
|
"Sid": "AllowTest",
|
||||||
|
|
|
@ -23,7 +23,7 @@ resource "aws_iam_role" "role" {
|
||||||
path = "/"
|
path = "/"
|
||||||
assume_role_policy = <<EOF
|
assume_role_policy = <<EOF
|
||||||
{
|
{
|
||||||
"Version": "2008-10-17",
|
"Version": "2012-10-17",
|
||||||
"Statement": [
|
"Statement": [
|
||||||
{
|
{
|
||||||
"Action": "sts:AssumeRole",
|
"Action": "sts:AssumeRole",
|
||||||
|
|
Loading…
Reference in New Issue