@@ -33,7 +33,7 @@ module "labels" {
33
33
# Private Repository
34
34
# ###############################################################################
35
35
resource "aws_ecr_repository" "default" {
36
- count = var. enable_private_ecr ? 1 : 0
36
+ count = var. enable && var . enable_private_ecr ? 1 : 0
37
37
name = var. use_fullname != " " ? var. use_fullname : module. labels . id
38
38
tags = module. labels . tags
39
39
image_tag_mutability = var. image_tag_mutability
@@ -57,7 +57,7 @@ resource "aws_ecr_repository" "default" {
57
57
}
58
58
59
59
resource "aws_ecr_lifecycle_policy" "private" {
60
- count = var. enable_private_ecr ? 1 : 0
60
+ count = var. enable && var . enable_private_ecr ? 1 : 0
61
61
repository = join (" " , aws_ecr_repository. default [* ]. name )
62
62
63
63
policy = << EOF
96
96
# Public Repository
97
97
# ###############################################################################
98
98
resource "aws_ecrpublic_repository" "default" {
99
- count = var. enable_public_ecr ? 1 : 0
99
+ count = var. enable && var . enable_public_ecr ? 1 : 0
100
100
101
101
repository_name = var. use_fullname != " " ? var. use_fullname : module. labels . id
102
102
@@ -119,6 +119,7 @@ resource "aws_ecrpublic_repository" "default" {
119
119
# Private ECR IAM Policies
120
120
# ###############################################################################
121
121
data "aws_iam_policy_document" "resource_readonly_access_private" {
122
+ count = var. enable ? 1 : 0
122
123
statement {
123
124
sid = " ReadonlyAccess"
124
125
effect = " Allow"
@@ -153,6 +154,7 @@ data "aws_iam_policy_document" "resource_readonly_access_private" {
153
154
}
154
155
155
156
data "aws_iam_policy_document" "resource_full_access_private" {
157
+ count = var. enable ? 1 : 0
156
158
statement {
157
159
sid = " FullAccess"
158
160
effect = " Allow"
@@ -170,12 +172,13 @@ data "aws_iam_policy_document" "resource_full_access_private" {
170
172
}
171
173
172
174
data "aws_iam_policy_document" "resource_private" {
175
+ count = var. enable ? 1 : 0
173
176
source_policy_documents = [local . principals_readonly_access_non_empty ? join (" " , data. aws_iam_policy_document . resource_readonly_access_private [* ]. json ) : join (" " , data. aws_iam_policy_document . empty [* ]. json )]
174
177
override_policy_documents = [local . principals_full_access_non_empty ? join (" " , data. aws_iam_policy_document . resource_full_access_private [* ]. json ) : join (" " , data. aws_iam_policy_document . empty [* ]. json )]
175
178
}
176
179
177
180
resource "aws_ecr_repository_policy" "private" {
178
- count = local. ecr_need_policy && var. enable_private_ecr ? 1 : 0
181
+ count = var . enable && local. ecr_need_policy && var. enable_private_ecr ? 1 : 0
179
182
repository = join (" " , aws_ecr_repository. default [* ]. name )
180
183
policy = join (" " , data. aws_iam_policy_document . resource_private [* ]. json )
181
184
}
@@ -184,6 +187,7 @@ resource "aws_ecr_repository_policy" "private" {
184
187
# Public ECR IAM Policies
185
188
# ###############################################################################
186
189
data "aws_iam_policy_document" "resource_readonly_access_public" {
190
+ count = var. enable ? 1 : 0
187
191
statement {
188
192
sid = " ReadonlyAccess"
189
193
effect = " Allow"
@@ -210,6 +214,7 @@ data "aws_iam_policy_document" "resource_readonly_access_public" {
210
214
}
211
215
212
216
data "aws_iam_policy_document" "resource_full_access_public" {
217
+ count = var. enable ? 1 : 0
213
218
statement {
214
219
sid = " FullAccess"
215
220
effect = " Allow"
@@ -228,14 +233,17 @@ data "aws_iam_policy_document" "resource_full_access_public" {
228
233
229
234
230
235
data "aws_iam_policy_document" "resource_public" {
236
+ count = var. enable ? 1 : 0
231
237
source_policy_documents = [local . principals_readonly_access_non_empty ? join (" " , data. aws_iam_policy_document . resource_readonly_access_public [* ]. json ) : join (" " , data. aws_iam_policy_document . empty [* ]. json )]
232
238
override_policy_documents = [local . principals_full_access_non_empty ? join (" " , data. aws_iam_policy_document . resource_full_access_public [* ]. json ) : join (" " , data. aws_iam_policy_document . empty [* ]. json )]
233
239
}
234
240
235
241
resource "aws_ecr_repository_policy" "public" {
236
- count = local. ecr_need_policy && var. enable_public_ecr ? 1 : 0
242
+ count = var . enable && local. ecr_need_policy && var. enable_public_ecr ? 1 : 0
237
243
repository = join (" " , aws_ecrpublic_repository. default [* ]. repository_name )
238
244
policy = join (" " , data. aws_iam_policy_document . resource_public [* ]. json )
239
245
}
240
246
241
- data "aws_iam_policy_document" "empty" {}
247
+ data "aws_iam_policy_document" "empty" {
248
+ count = var. enable ? 1 : 0
249
+ }
0 commit comments