@@ -67,16 +67,14 @@ data "aws_iam_policy_document" "functions" {
6767}
6868
6969resource "aws_iam_policy" "ecr_scanning" {
70- count = var. is_organizational ? 0 : 1
71-
7270 name = " ${ local . ecr_role_name } -ecr"
7371 description = " Grants Sysdig Secure access to ECR images"
7472 policy = data. aws_iam_policy_document . scanning . json
7573 tags = var. tags
7674}
7775
7876resource "aws_iam_policy" "functions_scanning" {
79- count = var. lambda_scanning_enabled && ! var . is_organizational ? 1 : 0
77+ count = var. lambda_scanning_enabled ? 1 : 0
8078
8179 name = " ${ local . ecr_role_name } -functions"
8280 description = " Grants Sysdig Secure access to AWS Lambda"
@@ -108,26 +106,22 @@ data "aws_iam_policy_document" "scanning_assume_role_policy" {
108106}
109107
110108resource "aws_iam_role" "scanning" {
111- count = var. is_organizational ? 0 : 1
112-
113109 name = local. ecr_role_name
114110 tags = var. tags
115111 assume_role_policy = data. aws_iam_policy_document . scanning_assume_role_policy . json
116112}
117113
118114resource "aws_iam_policy_attachment" "scanning" {
119- count = var. is_organizational ? 0 : 1
120-
121115 name = local. ecr_role_name
122- roles = [aws_iam_role . scanning [ 0 ] . name ]
123- policy_arn = aws_iam_policy. ecr_scanning [ 0 ] . arn
116+ roles = [aws_iam_role . scanning . name ]
117+ policy_arn = aws_iam_policy. ecr_scanning . arn
124118}
125119
126120resource "aws_iam_policy_attachment" "functions" {
127- count = var. lambda_scanning_enabled && ! var . is_organizational ? 1 : 0
121+ count = var. lambda_scanning_enabled ? 1 : 0
128122
129123 name = local. ecr_role_name
130- roles = [aws_iam_role . scanning [ 0 ] . name ]
124+ roles = [aws_iam_role . scanning . name ]
131125 policy_arn = aws_iam_policy. functions_scanning [0 ]. arn
132126}
133127
@@ -145,7 +139,7 @@ resource "sysdig_secure_cloud_auth_account_component" "vm_workload_scanning_acco
145139 version = " v0.1.0"
146140 trusted_role_metadata = jsonencode ({
147141 aws = {
148- role_name = aws_iam_role.scanning[ 0 ] .name
142+ role_name = aws_iam_role.scanning.name
149143 }
150144 })
151145
0 commit comments