Skip to content

Commit

Permalink
Align IAM version number to the current version (2012-10-17)
Browse files Browse the repository at this point in the history
  • Loading branch information
ijin committed Nov 12, 2015
1 parent 8935013 commit 90d7078
Show file tree
Hide file tree
Showing 6 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion builtin/providers/aws/resource_aws_ecs_service_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -319,7 +319,7 @@ resource "aws_iam_role" "ecs_service" {
name = "EcsService"
assume_role_policy = <<EOF
{
"Version": "2008-10-17",
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
Expand Down
2 changes: 1 addition & 1 deletion builtin/providers/aws/resource_aws_s3_bucket_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -430,7 +430,7 @@ func testAccCheckAWSS3BucketCors(n string, corsRules []*s3.CORSRule) resource.Te
// within AWS
var randInt = rand.New(rand.NewSource(time.Now().UnixNano())).Int()
var testAccWebsiteEndpoint = fmt.Sprintf("tf-test-bucket-%d.s3-website-us-west-2.amazonaws.com", randInt)
var testAccAWSS3BucketPolicy = fmt.Sprintf(`{ "Version": "2008-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "*" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::tf-test-bucket-%d/*" } ] }`, randInt)
var testAccAWSS3BucketPolicy = fmt.Sprintf(`{ "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "*" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::tf-test-bucket-%d/*" } ] }`, randInt)

var testAccAWSS3BucketConfig = fmt.Sprintf(`
resource "aws_s3_bucket" "bucket" {
Expand Down
2 changes: 1 addition & 1 deletion builtin/providers/aws/resource_aws_sns_topic_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ resource "aws_sns_topic" "test_topic" {
name = "example"
policy = <<EOF
{
"Version": "2008-10-17",
"Version": "2012-10-17",
"Id": "Policy1445931846145",
"Statement": [
{
Expand Down
4 changes: 2 additions & 2 deletions builtin/providers/aws/resource_aws_vpc_endpoint_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,7 @@ resource "aws_vpc_endpoint" "second-private-s3" {
route_table_ids = ["${aws_route_table.default.id}"]
policy = <<POLICY
{
"Version": "2008-10-17",
"Version": "2012-10-17",
"Statement": [
{
"Sid":"AllowAll",
Expand Down Expand Up @@ -176,7 +176,7 @@ resource "aws_vpc_endpoint" "second-private-s3" {
route_table_ids = ["${aws_route_table.default.id}"]
policy = <<POLICY
{
"Version": "2008-10-17",
"Version": "2012-10-17",
"Statement": [
{
"Sid":"AllowAll",
Expand Down
2 changes: 1 addition & 1 deletion examples/aws-s3-cross-account-access/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ resource "aws_s3_bucket" "prod" {
acl = "private"
policy = <<POLICY
{
"Version": "2008-10-17",
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowTest",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ resource "aws_iam_role" "role" {
path = "/"
assume_role_policy = <<EOF
{
"Version": "2008-10-17",
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
Expand Down

0 comments on commit 90d7078

Please sign in to comment.