Skip to content

Commit 54b7165

Browse files
booiantonbabenko
andauthored
feat: Correct enable_mfa_enforcement spelling (#404)
Co-authored-by: Anton Babenko <[email protected]>
1 parent daa33d4 commit 54b7165

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

modules/iam-group-with-policies/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ No modules.
4444
| <a name="input_create_group"></a> [create\_group](#input\_create\_group) | Whether to create IAM group | `bool` | `true` | no |
4545
| <a name="input_custom_group_policies"></a> [custom\_group\_policies](#input\_custom\_group\_policies) | List of maps of inline IAM policies to attach to IAM group. Should have `name` and `policy` keys in each element. | `list(map(string))` | `[]` | no |
4646
| <a name="input_custom_group_policy_arns"></a> [custom\_group\_policy\_arns](#input\_custom\_group\_policy\_arns) | List of IAM policies ARNs to attach to IAM group | `list(string)` | `[]` | no |
47-
| <a name="input_enable_mfa_enforcment"></a> [enable\_mfa\_enforcment](#input\_enable\_mfa\_enforcment) | Determines whether permissions are added to the policy which requires the groups IAM users to use MFA | `bool` | `true` | no |
47+
| <a name="input_enable_mfa_enforcement"></a> [enable\_mfa\_enforcement](#input\_enable\_mfa\_enforcement) | Determines whether permissions are added to the policy which requires the groups IAM users to use MFA | `bool` | `true` | no |
4848
| <a name="input_group_users"></a> [group\_users](#input\_group\_users) | List of IAM users to have in an IAM group which can assume the role | `list(string)` | `[]` | no |
4949
| <a name="input_iam_self_management_policy_name_prefix"></a> [iam\_self\_management\_policy\_name\_prefix](#input\_iam\_self\_management\_policy\_name\_prefix) | Name prefix for IAM policy to create with IAM self-management permissions | `string` | `"IAMSelfManagement-"` | no |
5050
| <a name="input_name"></a> [name](#input\_name) | Name of IAM group | `string` | `""` | no |

modules/iam-group-with-policies/policies.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ data "aws_iam_policy_document" "iam_self_management" {
146146
}
147147

148148
dynamic "statement" {
149-
for_each = var.enable_mfa_enforcment ? [1] : []
149+
for_each = var.enable_mfa_enforcement ? [1] : []
150150

151151
content {
152152
sid = "DenyAllExceptListedIfNoMFA"

modules/iam-group-with-policies/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ variable "custom_group_policies" {
3434
default = []
3535
}
3636

37-
variable "enable_mfa_enforcment" {
37+
variable "enable_mfa_enforcement" {
3838
description = "Determines whether permissions are added to the policy which requires the groups IAM users to use MFA"
3939
type = bool
4040
default = true

wrappers/iam-group-with-policies/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ module "wrapper" {
99
group_users = try(each.value.group_users, var.defaults.group_users, [])
1010
custom_group_policy_arns = try(each.value.custom_group_policy_arns, var.defaults.custom_group_policy_arns, [])
1111
custom_group_policies = try(each.value.custom_group_policies, var.defaults.custom_group_policies, [])
12-
enable_mfa_enforcment = try(each.value.enable_mfa_enforcment, var.defaults.enable_mfa_enforcment, true)
12+
enable_mfa_enforcement = try(each.value.enable_mfa_enforcement, var.defaults.enable_mfa_enforcement, true)
1313
attach_iam_self_management_policy = try(each.value.attach_iam_self_management_policy, var.defaults.attach_iam_self_management_policy, true)
1414
iam_self_management_policy_name_prefix = try(each.value.iam_self_management_policy_name_prefix, var.defaults.iam_self_management_policy_name_prefix, "IAMSelfManagement-")
1515
aws_account_id = try(each.value.aws_account_id, var.defaults.aws_account_id, "")

0 commit comments

Comments
 (0)