From af76893dd9015f982281666618d9ee651fa92d04 Mon Sep 17 00:00:00 2001 From: badra001 Date: Tue, 19 Jul 2022 16:01:56 -0400 Subject: [PATCH] fix --- README.md | 1 + main.tf | 13 +++++++------ 2 files changed, 8 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index a6f3472..22bf092 100644 --- a/README.md +++ b/README.md @@ -45,6 +45,7 @@ No modules. | [aws_iam_group.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group) | resource | | [aws_iam_group_membership.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership) | resource | | [aws_iam_group_policy_attachment.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_policy_attachment) | resource | +| [aws_iam_group_policy_attachment.audit_other](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_policy_attachment) | resource | | [aws_iam_policy.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource | | [aws_iam_user.audit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_user) | resource | | [aws_arn.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/arn) | data source | diff --git a/main.tf b/main.tf index 9c10c87..0968323 100644 --- a/main.tf +++ b/main.tf @@ -127,16 +127,17 @@ data "aws_iam_policy" "aws-managed-security-audit" { } resource "aws_iam_group_policy_attachment" "audit" { - for_each = toset(compact(concat([data.aws_iam_policy.aws-managed-security-audit.arn, aws_iam_policy.audit.arn], var.additional_policies))) + group = aws_iam_group.audit.name + policy_arn = aws_iam_policy.audit.arn +} + +resource "aws_iam_group_policy_attachment" "audit_other" { + for_each = toset(compact(concat([data.aws_iam_policy.aws-managed-security-audit.arn], var.additional_policies))) + # for_each = toset(local.policies) group = aws_iam_group.audit.name policy_arn = each.key } -#resource "aws_iam_group_policy_attachment" "audit_other" { -# for_each = toset(local.policies) -# group = aws_iam_group.audit.name -# policy_arn = each.key -#} # #--- # access key (not for rotation)