Skip to content

Commit

Permalink
fix
Browse files Browse the repository at this point in the history
  • Loading branch information
badra001 committed Jul 19, 2022
1 parent da1d9b8 commit af76893
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 6 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,7 @@ No modules.
| [aws_iam_group.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group) | resource |
| [aws_iam_group_membership.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership) | resource |
| [aws_iam_group_policy_attachment.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_policy_attachment) | resource |
| [aws_iam_group_policy_attachment.audit_other](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_policy_attachment) | resource |
| [aws_iam_policy.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
| [aws_iam_user.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_user) | resource |
| [aws_arn.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/arn) | data source |
Expand Down
13 changes: 7 additions & 6 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -127,16 +127,17 @@ data "aws_iam_policy" "aws-managed-security-audit" {
}

resource "aws_iam_group_policy_attachment" "audit" {
for_each = toset(compact(concat([data.aws_iam_policy.aws-managed-security-audit.arn, aws_iam_policy.audit.arn], var.additional_policies)))
group = aws_iam_group.audit.name
policy_arn = aws_iam_policy.audit.arn
}

resource "aws_iam_group_policy_attachment" "audit_other" {
for_each = toset(compact(concat([data.aws_iam_policy.aws-managed-security-audit.arn], var.additional_policies)))
# for_each = toset(local.policies)
group = aws_iam_group.audit.name
policy_arn = each.key
}

#resource "aws_iam_group_policy_attachment" "audit_other" {
# for_each = toset(local.policies)
# group = aws_iam_group.audit.name
# policy_arn = each.key
#}
#
#---
# access key (not for rotation)
Expand Down

0 comments on commit af76893

Please sign in to comment.