diff --git a/terraform-state/outputs.tf b/terraform-state/outputs.tf index b761540..9a53b3a 100644 --- a/terraform-state/outputs.tf +++ b/terraform-state/outputs.tf @@ -30,5 +30,5 @@ output "tfstate_region" { output "role_arn" { description = "Role ARN for Terraform" - value = aws_iam_role.role.arn + value = !var.application_mode ? aws_iam_role.role[0].arn : null } diff --git a/terraform-state/policy.tf b/terraform-state/policy.tf index b59575a..610ade5 100644 --- a/terraform-state/policy.tf +++ b/terraform-state/policy.tf @@ -194,6 +194,6 @@ data "aws_iam_policy_document" "allow_assume_role" { sid = "AllowSTSAssumeTerraformRole" effect = "Allow" actions = ["sts:AssumeRole"] - resources = [aws_iam_role.role.arn] + resources = !var.application_mode ? [aws_iam_role.role[0].arn] : [] } }