* Add U() in front of URL
* Add period at end of statement
* Spell check

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
This commit is contained in:
Abhijeet Kasurde 2018-10-10 20:14:17 +05:30 committed by Ryan Brown
parent 452a4ab781
commit d76a84a6c8
37 changed files with 110 additions and 110 deletions

View file

@ -25,7 +25,7 @@ options:
role_arn:
description:
- The Amazon Resource Name (ARN) of the role that the caller is
assuming (http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html#Identifiers_ARNs)
assuming U(https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html#Identifiers_ARNs).
required: true
role_session_name:
description:
@ -37,8 +37,8 @@ options:
duration_seconds:
description:
- The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) to 43200 seconds (12 hours).
The max dependis on the IAM role's sessions duration setting.
By default, the value is set to 3600 seconds.s
The max depends on the IAM role's sessions duration setting.
By default, the value is set to 3600 seconds.
external_id:
description:
- A unique identifier that is used by third parties to assume a role in their customers' accounts.
@ -49,7 +49,7 @@ options:
description:
- The value provided by the MFA device, if the trust policy of the role being assumed requires MFA.
notes:
- In order to use the assumed role in a following playbook task you must pass the access_key, access_secret and access_token
- In order to use the assumed role in a following playbook task you must pass the access_key, access_secret and access_token.
extends_documentation_fragment:
- aws
- ec2
@ -85,7 +85,7 @@ changed:
EXAMPLES = '''
# Note: These examples do not set authentication details, see the AWS Guide for details.
# Assume an existing role (more details: http://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html)
# Assume an existing role (more details: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html)
sts_assume_role:
role_arn: "arn:aws:iam::123456789012:role/someRole"
role_session_name: "someRoleSession"