From 6e0d65baf487fd86eb409ec85fdf712f9f161f48 Mon Sep 17 00:00:00 2001 From: badra001 Date: Tue, 29 Jul 2025 13:13:49 -0400 Subject: [PATCH] fix --- rolesanywhere/aws_config.tf | 4 ++-- rolesanywhere/role.tf | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/rolesanywhere/aws_config.tf b/rolesanywhere/aws_config.tf index 1cfd37f..605670d 100644 --- a/rolesanywhere/aws_config.tf +++ b/rolesanywhere/aws_config.tf @@ -1,8 +1,8 @@ resource "local_file" "aws_config_file" { - filename = format("%v/%v.%v", "./certs", local.role_name, "aws_config") + filename = format("%v/%v/%v.%v", path.root, "certs", local.role_name, "aws_config") file_permission = "0644" directory_permission = "0755" - content = templatefile("aws_config.tpl", { + content = templatefile("${path.module}/aws_config.tpl", { account_alias = var.account_alias role_name = local.role_name role_arn = aws_iam_role.role.arn diff --git a/rolesanywhere/role.tf b/rolesanywhere/role.tf index e95a518..b5f1156 100644 --- a/rolesanywhere/role.tf +++ b/rolesanywhere/role.tf @@ -38,8 +38,8 @@ resource "aws_iam_role" "role" { } resource "aws_iam_role_policy_attachment" "role" { - for_each = var.create ? toset(var.attached_policies) : toset([]) - role = var.create ? aws_iam_role.role[0].name : "" + for_each = toset(var.attached_policies) + role = aws_iam_role.role.name policy_arn = each.value }