|
34 | 34 | "AWS::IAM::AssumeRolePolicyDocument" |
35 | 35 | } |
36 | 36 |
|
| 37 | +ASSUME_ROLE_POLICY_TYPE = "AWS::IAM::AssumeRolePolicyDocument" |
| 38 | + |
37 | 39 | def get_identity_resource_name(resource): |
38 | 40 | if isinstance(resource, PermissionSet): |
39 | 41 | return resource.Name |
@@ -365,12 +367,12 @@ def check_resources(self, resources, roles): |
365 | 367 | raise ApplicationError(f'Unable to find trust policy for {role.RoleName}') |
366 | 368 | else: |
367 | 369 | policy_str = json.dumps(role.TrustPolicy) |
368 | | - if (policy_str, resource.ResourceType) not in self.resource_policy_cache: |
| 370 | + if (policy_str, ASSUME_ROLE_POLICY_TYPE) not in self.resource_policy_cache: |
369 | 371 | LOGGER.info(f'Check trust policy for role {role.RoleName}') |
370 | | - response = self._call_api(role.TrustPolicy, RESOURCE_POLICY_TYPE, "AWS::IAM::AssumeRolePolicyDocument") |
| 372 | + response = self._call_api(role.TrustPolicy, RESOURCE_POLICY_TYPE, ASSUME_ROLE_POLICY_TYPE) |
371 | 373 | LOGGER.info(f'{self.operation_name} response {response}') |
372 | | - self.resource_policy_cache[(policy_str, resource.ResourceType)] = response |
| 374 | + self.resource_policy_cache[(policy_str, ASSUME_ROLE_POLICY_TYPE)] = response |
373 | 375 | else: |
374 | 376 | LOGGER.info(f'Trust policy for role {role.RoleName} already checked. Skipped.') |
375 | | - response = self.resource_policy_cache.get((policy_str, resource.ResourceType)) |
| 377 | + response = self.resource_policy_cache.get((policy_str, ASSUME_ROLE_POLICY_TYPE)) |
376 | 378 | self._handle_response(response, role.RoleName, 'TrustPolicy', self.operation_name) |
0 commit comments