From e8ce56088b60331a976dd429d306feadc86af5b4 Mon Sep 17 00:00:00 2001 From: badra001 Date: Fri, 16 Jan 2026 12:28:54 -0500 Subject: [PATCH] fix inline_policy --- policies/sc-servicecatalog-t1/README.md | 2 -- policies/sc-servicecatalog-t1/outputs.tf | 2 +- policies/sc-servicecatalog-t1/variables.settings.tf | 1 - policies/sc-servicecatalog-t1/variables.tf | 10 +++++----- 4 files changed, 6 insertions(+), 9 deletions(-) delete mode 120000 policies/sc-servicecatalog-t1/variables.settings.tf diff --git a/policies/sc-servicecatalog-t1/README.md b/policies/sc-servicecatalog-t1/README.md index c8eed4b..243ac06 100644 --- a/policies/sc-servicecatalog-t1/README.md +++ b/policies/sc-servicecatalog-t1/README.md @@ -30,12 +30,10 @@ No modules. | [account\_alias](#input\_account\_alias) | AWS Account Alias | `string` | `""` | no | | [account\_id](#input\_account\_id) | AWS Account ID (default will pull from current user) | `string` | `""` | no | | [customer\_managed\_policy\_names](#input\_customer\_managed\_policy\_names) | Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset | `map(string)` | `{}` | no | -| [inline\_policy](#input\_inline\_policy) | AWS Policy document for the single allowed inline policy | `string` | `null` | no | | [managed\_policy\_names](#input\_managed\_policy\_names) | Names of AWS Managed Policy to attach to the permissionset | `list(string)` | `[]` | no | | [name](#input\_name) | Permission Set Name for which all settings apply | `string` | `null` | no | | [override\_prefixes](#input\_override\_prefixes) | Override built-in prefixes by component. This should be used primarily for common infrastructure things | `map(string)` | `{}` | no | | [relay\_state](#input\_relay\_state) | Relay State to pass along to permissionset | `string` | `null` | no | -| [settings\_file](#input\_settings\_file) | File name and path to YAML with users(list), account\_ids(list), org\_ous(list), and all(bool). See sample.yml in code. | `string` | `null` | no | | [tags](#input\_tags) | AWS Tags to apply to appropriate resources | `map(string)` | `{}` | no | ## Outputs diff --git a/policies/sc-servicecatalog-t1/outputs.tf b/policies/sc-servicecatalog-t1/outputs.tf index ef99006..8467959 100644 --- a/policies/sc-servicecatalog-t1/outputs.tf +++ b/policies/sc-servicecatalog-t1/outputs.tf @@ -15,7 +15,7 @@ output "customer_managed_policy_names" { output "inline_policy" { description = "AWS Policy document for the single allowed inline policy (use .json to get policy)" - value = var.inline_policy + value = data.aws_iam_policy_document.inline } output "relay_state" { diff --git a/policies/sc-servicecatalog-t1/variables.settings.tf b/policies/sc-servicecatalog-t1/variables.settings.tf deleted file mode 120000 index 1326193..0000000 --- a/policies/sc-servicecatalog-t1/variables.settings.tf +++ /dev/null @@ -1 +0,0 @@ -../../common/variables.settings.tf \ No newline at end of file diff --git a/policies/sc-servicecatalog-t1/variables.tf b/policies/sc-servicecatalog-t1/variables.tf index c331403..53d6bf1 100644 --- a/policies/sc-servicecatalog-t1/variables.tf +++ b/policies/sc-servicecatalog-t1/variables.tf @@ -16,11 +16,11 @@ variable "customer_managed_policy_names" { default = {} } -variable "inline_policy" { - description = "AWS Policy document for the single allowed inline policy" - type = string - default = null -} +# variable "inline_policy" { +# description = "AWS Policy document for the single allowed inline policy" +# type = string +# default = null +# } variable "relay_state" { description = "Relay State to pass along to permissionset"