diff --git a/group-assignment/README.md b/group-assignment/README.md index a19c51a..c44d42a 100644 --- a/group-assignment/README.md +++ b/group-assignment/README.md @@ -31,7 +31,6 @@ No modules. | [aws_organizations_organizational_unit_descendant_accounts.accounts](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/organizations_organizational_unit_descendant_accounts) | data source | | [aws_organizations_organizational_unit_descendant_accounts.ou](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/organizations_organizational_unit_descendant_accounts) | data source | | [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source | -| [aws_ssoadmin_permission_set.pset](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssoadmin_permission_set) | data source | | [ldap_object.users](https://registry.terraform.io/providers/trevex/ldap/latest/docs/data-sources/object) | data source | ## Inputs diff --git a/group-assignment/main.tf b/group-assignment/main.tf index 7ff7414..febdf7a 100644 --- a/group-assignment/main.tf +++ b/group-assignment/main.tf @@ -2,7 +2,8 @@ locals { name = coalesce(var.name, try(local.settings.group, null)) description = coalesce(var.description, try(local.settings.description, null), local.name) permissionset_name = coalesce(var.permissionset_name, try(local.settings.group, null), local.name) - permissionset_arn = coalesce(var.permissionset_arn, try(data.aws_ssoadmin_permission_set.pset[0].arn, null)) + # permissionset_arn = coalesce(var.permissionset_arn, try(data.aws_ssoadmin_permission_set.pset[0].arn, null)) + permissionset_arn = var.permissionset_arn } resource "aws_identitystore_group" "group" { @@ -43,15 +44,15 @@ resource "aws_ssoadmin_account_assignment" "accounts" { } } -data "aws_ssoadmin_permission_set" "pset" { - count = var.permissionset_arn ? 1 : 0 - instance_arn = var.instance_arn - name = local.permissionset_name - - lifecycle { - precondition { - condition = local.permissionset_arn != null - error_message = "The permissionset name must be present." - } - } -} +# data "aws_ssoadmin_permission_set" "pset" { +# count = var.permissionset_arn == null ? 1 : 0 +# instance_arn = var.instance_arn +# name = local.permissionset_name +# +# lifecycle { +# precondition { +# condition = local.permissionset_arn != null +# error_message = "The permissionset name must be present." +# } +# } +# }