diff --git a/iam.tf b/iam.tf index 7c4c340..2b6fd44 100644 --- a/iam.tf +++ b/iam.tf @@ -1,5 +1,5 @@ data "aws_iam_policy_document" "log_assume" { - count = "${var.enabled == "true" ? 1 : 0}" + count = var.enabled == "true" ? 1 : 0 statement { actions = ["sts:AssumeRole"] @@ -28,14 +28,14 @@ data "aws_iam_policy_document" "log" { } resource "aws_iam_role_policy" "log" { - count = "${var.enabled == "true" ? 1 : 0}" + count = var.enabled == "true" ? 1 : 0 name = module.vpc_label.id role = aws_iam_role.log[0].id policy = data.aws_iam_policy_document.log.json } resource "aws_iam_role" "log" { - count = "${var.enabled == "true" ? 1 : 0}" + count = var.enabled == "true" ? 1 : 0 name = module.vpc_label.id assume_role_policy = data.aws_iam_policy_document.log_assume[0].json } @@ -66,13 +66,13 @@ data "aws_iam_policy_document" "kinesis" { } resource "aws_iam_role" "kinesis" { - count = "${var.enabled == "true" ? 1 : 0}" + count = var.enabled == "true" ? 1 : 0 name = module.kinesis_label.id assume_role_policy = data.aws_iam_policy_document.kinesis_assume.json } resource "aws_iam_role_policy" "kinesis" { - count = "${var.enabled == "true" ? 1 : 0}" + count = var.enabled == "true" ? 1 : 0 name = module.vpc_label.id role = aws_iam_role.kinesis[0].id policy = data.aws_iam_policy_document.kinesis.json