diff --git a/main.tf b/main.tf index 75de574..ebcf2c6 100644 --- a/main.tf +++ b/main.tf @@ -1,14 +1,10 @@ /** * # Usage * -* for terraform 0.11 v1.x use tf-0.11 -* for terraform 0.12 v2.x use tf-0.12 (until rolled into head) or specific version v2.x.y -* master -* * ```code * module "scanner" { * source = "../module/aws-security-audit" -* source = "git::https://vc1.csvd.census.gov/terraform-modules/aws-security-audit.git?ref=tf-0.12 +* source = "git::https://vc1.csvd.census.gov/terraform-modules/aws-security-audit.git * * group = "g-audit-group" * users = [ "s-ois-scan" ] @@ -44,6 +40,8 @@ locals { local.tags_email, local.tags_reference[var.reference != "" ? "exists" : "not_exists"] ) + aws_access_key_id = concat(aws_iam_access_key.audit[*].id,list("")) + aws_secret_access_key = concat(aws_iam_access_key.audit[*].encrypted_secret,list("")) } #--- @@ -139,7 +137,9 @@ resource "null_resource" "audit_output" { count = length(var.users) triggers = { user = element(aws_iam_user.audit[*].name,count.index) - aws_access_key_id = element(aws_iam_access_key.audit[*].id,count.index) - aws_secret_access_key = element(aws_iam_access_key.audit[*].encrypted_secret,count.index) +# aws_access_key_id = element(aws_iam_access_key.audit[*].id,count.index) +# aws_secret_access_key = element(aws_iam_access_key.audit[*].encrypted_secret,count.index) + aws_access_key_id = element(local.aws_access_key_id,count.index) + aws_secret_access_key = element(local.aws_secret_access_key,count.index) } } diff --git a/version.tf b/version.tf new file mode 100644 index 0000000..1c2fce3 --- /dev/null +++ b/version.tf @@ -0,0 +1,5 @@ +variable "_module_version" { + description = "Module version number" + type = string + default = "1.21" +}