@@ -67,16 +67,14 @@ data "aws_iam_policy_document" "functions" {
6767}
6868
6969resource  "aws_iam_policy"  "ecr_scanning"  {
70-   count  =   var. is_organizational  ?  0  :  1 
71- 
7270  name         =  " ${ local . ecr_role_name } -ecr" 
7371  description  =  " Grants Sysdig Secure access to ECR images" 
7472  policy       =   data. aws_iam_policy_document . scanning . json 
7573  tags         =   var. tags 
7674}
7775
7876resource  "aws_iam_policy"  "functions_scanning"  {
79-   count  =   var. lambda_scanning_enabled  &&   ! var . is_organizational ?  1  :  0 
77+   count  =   var. lambda_scanning_enabled  ?  1  :  0 
8078
8179  name         =  " ${ local . ecr_role_name } -functions" 
8280  description  =  " Grants Sysdig Secure access to AWS Lambda" 
@@ -108,26 +106,22 @@ data "aws_iam_policy_document" "scanning_assume_role_policy" {
108106}
109107
110108resource  "aws_iam_role"  "scanning"  {
111-   count  =   var. is_organizational  ?  0  :  1 
112- 
113109  name                =   local. ecr_role_name 
114110  tags                =   var. tags 
115111  assume_role_policy  =   data. aws_iam_policy_document . scanning_assume_role_policy . json 
116112}
117113
118114resource  "aws_iam_policy_attachment"  "scanning"  {
119-   count  =   var. is_organizational  ?  0  :  1 
120- 
121115  name        =   local. ecr_role_name 
122-   roles       =   [aws_iam_role . scanning [ 0 ] . name ]
123-   policy_arn  =   aws_iam_policy. ecr_scanning [ 0 ] . arn 
116+   roles       =   [aws_iam_role . scanning . name ]
117+   policy_arn  =   aws_iam_policy. ecr_scanning . arn 
124118}
125119
126120resource  "aws_iam_policy_attachment"  "functions"  {
127-   count  =   var. lambda_scanning_enabled  &&   ! var . is_organizational   ?  1  :  0 
121+   count  =   var. lambda_scanning_enabled  ?  1  :  0 
128122
129123  name        =   local. ecr_role_name 
130-   roles       =   [aws_iam_role . scanning [ 0 ] . name ]
124+   roles       =   [aws_iam_role . scanning . name ]
131125  policy_arn  =   aws_iam_policy. functions_scanning [0 ]. arn 
132126}
133127
@@ -145,7 +139,7 @@ resource "sysdig_secure_cloud_auth_account_component" "vm_workload_scanning_acco
145139  version     =  " v0.1.0" 
146140  trusted_role_metadata  =  jsonencode ({
147141    aws =  {
148-       role_name =  aws_iam_role.scanning[ 0 ] .name
142+       role_name =  aws_iam_role.scanning.name
149143    }
150144  })
151145
0 commit comments