|
2 | 2 | resource "aws_iam_role" "backend-all" { |
3 | 3 | name = "${var.resource_prefix}-terraform-backend" |
4 | 4 | description = "Allows access to all Terraform workspaces" |
5 | | - assume_role_policy = "${data.aws_iam_policy_document.backend-assume-role-all.json}" |
| 5 | + assume_role_policy = data.aws_iam_policy_document.backend-assume-role-all.json |
6 | 6 | } |
7 | 7 |
|
8 | 8 | resource "aws_iam_role_policy" "backend-all" { |
9 | 9 | name = "${var.resource_prefix}-terraform-backend" |
10 | | - policy = "${data.aws_iam_policy_document.iam-role-policy.json}" |
| 10 | + policy = data.aws_iam_policy_document.iam-role-policy.json |
11 | 11 | role = "${var.resource_prefix}-terraform-backend" |
12 | 12 |
|
13 | | - depends_on = ["aws_iam_role.backend-all"] |
| 13 | + depends_on = [aws_iam_role.backend-all] |
14 | 14 | } |
15 | 15 |
|
16 | 16 | #These roles are limited to their specific workspace through the use of S3 resource permissions |
17 | 17 | resource "aws_iam_role" "backend-restricted" { |
18 | | - count = "${length(var.workspace_prefixes)}" |
| 18 | + count = length(var.workspace_prefixes) |
19 | 19 | name = "${var.resource_prefix}-terraform-backend-${element(var.workspace_prefixes, count.index)}" |
20 | 20 | description = "Allows access to the ${element(var.workspace_prefixes, count.index)} workspace prefix " |
21 | | - assume_role_policy = "${element(data.aws_iam_policy_document.backend-assume-role-restricted.*.json, count.index)}" |
| 21 | + assume_role_policy = element( |
| 22 | + data.aws_iam_policy_document.backend-assume-role-restricted.*.json, |
| 23 | + count.index, |
| 24 | + ) |
22 | 25 | } |
23 | 26 |
|
24 | 27 | resource "aws_iam_role_policy" "backend-restricted" { |
25 | | - count = "${length(var.workspace_prefixes)}" |
| 28 | + count = length(var.workspace_prefixes) |
26 | 29 | name = "${var.resource_prefix}-terraform-backend-${element(var.workspace_prefixes, count.index)}" |
27 | | - policy = "${element(data.aws_iam_policy_document.iam-role-policy-restricted.*.json, count.index)}" |
| 30 | + policy = element( |
| 31 | + data.aws_iam_policy_document.iam-role-policy-restricted.*.json, |
| 32 | + count.index, |
| 33 | + ) |
28 | 34 | role = "${var.resource_prefix}-terraform-backend-${element(var.workspace_prefixes, count.index)}" |
29 | 35 |
|
30 | | - depends_on = ["aws_iam_role.backend-restricted"] |
| 36 | + depends_on = [aws_iam_role.backend-restricted] |
31 | 37 | } |
0 commit comments