Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Commit

Permalink
Merge pull request #178 from hngerebara/fix-broken-links
Browse files Browse the repository at this point in the history
fix broken links
  • Loading branch information
brikis98 authored Jan 20, 2020
2 parents f8b3c95 + aafb8fe commit 76c90d2
Show file tree
Hide file tree
Showing 8 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ We also recommend updating the automated tests *before* updating any code (see [
Development](https://en.wikipedia.org/wiki/Test-driven_development)). That means you add or update a test case,
verify that it's failing with a clear error message, and *then* make the code changes to get that test to pass. This
ensures the tests stay up to date and verify all the functionality in this Module, including whatever new
functionality you're adding in your contribution. Check out the [tests](https://github.com/hashicorp/terraform-aws-vault/tree/master/tests) folder for instructions on running the
functionality you're adding in your contribution. Check out the [tests](https://github.com/hashicorp/terraform-aws-vault/tree/master/test) folder for instructions on running the
automated tests.

## Update the code
Expand Down
2 changes: 1 addition & 1 deletion examples/vault-auto-unseal/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ even if you immediately delete it.
Make sure to note down the ID of the AMI.
1. Install [Terraform][terraform].
1. [Create an AWS KMS key][key_creation]. Take note of the key alias.
1. Open `vars.tf`, set the environment variables specified at the top of the file,
1. Open `variables.tf`, set the environment variables specified at the top of the file,
and fill in any other variables that don't have a default. Put the AMI ID you
previously took note into the `ami_id` variable and the KMS key alias into
`auto_unseal_kms_key_alias`.
Expand Down
2 changes: 1 addition & 1 deletion examples/vault-cluster-private/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ To deploy a Vault Cluster:
example](https://github.com/hashicorp/terraform-aws-vault/tree/master/examples/vault-consul-ami) documentation for
instructions. Make sure to note down the ID of the AMI.
1. Install [Terraform](https://www.terraform.io/).
1. Open `vars.tf`, set the environment variables specified at the top of the file, and fill in any other variables that
1. Open `variables.tf`, set the environment variables specified at the top of the file, and fill in any other variables that
don't have a default. If you built a custom AMI, put the AMI ID into the `ami_id` variable. Otherwise, one of our
public example AMIs will be used by default. These AMIs are great for learning/experimenting, but are NOT
recommended for production use.
Expand Down
2 changes: 1 addition & 1 deletion examples/vault-ec2-auth/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ of the Vault nodes.
1. Build a Vault and Consul AMI. See the [vault-consul-ami example][vault_consul_ami] documentation for
instructions. Make sure to note down the ID of the AMI.
1. Install [Terraform](https://www.terraform.io/).
1. Open `vars.tf`, set the environment variables specified at the top of the file, and fill in any other variables that
1. Open `variables.tf`, set the environment variables specified at the top of the file, and fill in any other variables that
don't have a default. Put the AMI ID you previously took note into the `ami_id` variable.
1. Run `terraform init`.
1. Run `terraform apply`.
Expand Down
2 changes: 1 addition & 1 deletion examples/vault-s3-backend/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ To deploy a Vault Cluster:
example](https://github.com/hashicorp/terraform-aws-vault/tree/master/examples/vault-consul-ami) documentation for
instructions. Make sure to note down the ID of the AMI.
1. Install [Terraform](https://www.terraform.io/).
1. Open `vars.tf`, set the environment variables specified at the top of the file, and fill in any other variables that
1. Open `variables.tf`, set the environment variables specified at the top of the file, and fill in any other variables that
don't have a default. If you built a custom AMI, put the AMI ID into the `ami_id` variable. Otherwise, one of our
public example AMIs will be used by default. These AMIs are great for learning/experimenting, but are NOT
recommended for production use.
Expand Down
6 changes: 3 additions & 3 deletions modules/vault-cluster/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ module "vault_cluster" {
}
]
# ... See vars.tf for the other parameters you must define for the vault-cluster module
# ... See variables.tf for the other parameters you must define for the vault-cluster module
}
```

Expand All @@ -66,7 +66,7 @@ Note the following parameters:
run Vault. The `run-vault` script is one of the scripts installed by the [install-vault](https://github.com/hashicorp/terraform-aws-vault/tree/master/modules/install-vault)
module.

You can find the other parameters in [vars.tf](vars.tf).
You can find the other parameters in [variables.tf](variables.tf).

Check out the [root example](https://github.com/hashicorp/terraform-aws-vault/tree/master/examples/root-example) and
[vault-cluster-private](https://github.com/hashicorp/terraform-aws-vault/tree/master/examples/vault-cluster-private) examples for working sample code.
Expand Down Expand Up @@ -437,7 +437,7 @@ This module attaches a security group to each EC2 Instance that allows inbound r
[CIDR blocks](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) that will be allowed access. You can use the `allowed_ssh_security_group_ids` parameter to control the list of source Security Groups that will be allowed access.

Note that all the ports mentioned above are configurable via the `xxx_port` variables (e.g. `api_port`). See
[vars.tf](vars.tf) for the full list.
[variables.tf](variables.tf) for the full list.



Expand Down
4 changes: 2 additions & 2 deletions modules/vault-elb/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ module "vault_elb" {
vault_asg_name = "${module.vault_cluster.asg_name}"
# ... See vars.tf for the other parameters you must define for the vault-cluster module
# ... See variables.tf for the other parameters you must define for the vault-cluster module
}
# Configure the Vault cluster to use the ELB
Expand All @@ -47,7 +47,7 @@ Note the following parameters:
[vault-cluster module](https://github.com/hashicorp/terraform-aws-vault/tree/master/modules/vault-cluster)
tells it to register each server with the ELB when it is booting.

You can find the other parameters in [vars.tf](vars.tf).
You can find the other parameters in [variables.tf](variables.tf).

Check out the [root example](https://github.com/hashicorp/terraform-aws-vault/tree/master/examples/root-example) for working sample code.

Expand Down
2 changes: 1 addition & 1 deletion modules/vault-security-group-rules/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,6 @@ Note the following parameters:
* `security_group_id`: Use this parameter to specify the ID of the security group to which the rules in this module
should be added.

You can find the other parameters in [vars.tf](vars.tf).
You can find the other parameters in [variables.tf](variables.tf).

Check out the [vault-cluster module](https://github.com/hashicorp/terraform-aws-vault/tree/master/modules/vault-cluster) for example usage.

0 comments on commit 76c90d2

Please sign in to comment.